This howto is about changing the user and group for running the apache http server under ubuntu/debian systems.
This is an article about how to configure a linux box to selectively route specific traffic through a VPN interface.
The use of the Kerberos protocol in authentication for network access has several advantages. In this post, I review, what makes Kerberos authentication for network access control and attractive option then cover the Kernac project that is working towards an implementation of such capability.
This is a handy example that shows how to use the gettimeofday and localtime functions to calculate elapsed time in milliseconds.
The quality of error handling is a good indicator of the programmer's professionalism. It is very important to do proper error handling to achieve robust performance from your program in whatever programming languafe you are using. In this article, I explain a paradigm, or method for managing error handling in C code.