How to Upgrade Ubuntu

Update Release Name in Sources To start upgrading you need to change the /etc/apt/sources.list file and replace the name of your previous release with new one. So, for example if you are 20.04, replace every instance of focal with kinetic. If you currently have 22.04, replace jammy with kinetic. This process can be automated by using the following sed command: 1 ...

December 30, 2022 Â· 1 min Â· 207 words Â· Omid Farhang

How to Upgrade Ubuntu Kernel

Ubuntu by default uses LTS Kernels: Canonical provides long-term support (LTS) kernels for Ubuntu LTS releases. Canonical also provides interim operating system releases with updated kernels every 6 months. For customers and business partners that don’t have specialised bleeding-edge workloads or latest hardware needs, the latest LTS release ”-generic” kernel is the best option for them such as the 4.15 default kernel in Ubuntu 18.04 LTS. Customers who need the latest hardware support capability can install the latest HWE kernel such as the ones contained in interim releases, keeping in mind the shorter support lifespan associated with these kernels (9 months). HWE kernel customers are recommended to upgrade to a newer LTS release that supports their hardware and/or software needs as soon as it is available. Another option for customers is to use point releases. For example, there is an 18.04.4 point release as of February 2020, which includes an updated 5.3.x kernel but is also considered LTS, exactly like the original GA 4.15 kernel in 18.04. ...

December 30, 2022 Â· 2 min Â· 401 words Â· Omid Farhang

Set permanent custom resolution for Ubuntu and KDE Using Xrandr and Xsetup

After switching from Gnome and Unity to KDE, I had a problem with SDDM and it was that it could not detect correct resolution for my UltraWide monitor and set it to Full HD instead of 2560Ă—1080. I had a similar problem in Ubuntu with another old monitor. Anyway that solution is same in both cases. The solution for this problem is using Xrandr and Xsetup to set the correct resolution and make it permanent. ...

May 24, 2018 Â· 2 min Â· 227 words Â· Omid Farhang

Malware Prevention guide for Windows

To help secure your computer against malware: If your computer is already infected or you are in doubt, first look at the Malware Removal Guide. Build up your malware defenses Install antivirus and antispyware programs from a trusted source Never download anything in response to a warning from a program you didn’t install or don’t recognize that claims to protect your PC or offers to remove viruses. It is highly likely to do the opposite. Get reputable anti-malware programs from a vendor you trust. I recommend Avira. It’s highly recommended that you create another layer of protection beyond Avira. This second layer could be composed with Malwarebytes’ Anti-Malware, Hitman Pro or any other on-demand antimalware software. Use a safe browser with good extensions I recommend Google Chrome and Here is my suggested list of extensions for a safe navigation. Update software regularly Cybercriminals are endlessly inventive in their efforts to exploit vulnerabilities in software, and many software companies work tirelessly to combat these threats. That is why you should: ...

January 3, 2011 Â· 3 min Â· 600 words Â· Omid Farhang

Malware Removal guide for Windows

If after following this guide you failed disinfecting your computer, or you cannot follow this guide yourself, I will be available to help you. The most important thing in fighting malwares is: Do NOT Panic. Do NOT Hurry. Do NOT ignore any step in removal guide unless I tell you. This manual for removing malwares can be used for either minor or major malware infection. ...

January 2, 2011 Â· 2 min Â· 415 words Â· Omid Farhang

Install Adobe AIR on 64-bit Ubuntu 10.10

Right now Adobe AIR is only officially available for 32-bit Linux. But it does work on 64-bit Linux with the 32-bit compatibility libraries. There are several ways to install Adobe AIR on Linux. My preferred way on Ubuntu is to use the .deb package. However the .deb package distributed by Adobe can only be installed on 32-bit systems. Good news is that this can be easily fixed! To install the Adobe AIR .deb package on a 64-bit system just follow these steps: ...

October 17, 2010 Â· 1 min Â· 192 words Â· Omid Farhang

Check for Windows Updates

3 Step to make sure your windows is fully updated and patched to have fast, stable and secure windows: Update windows, office and other Microsoft products automatically: Microsoft Update Check for update for common windows programs: FileHippo.com Update Checker Check if you have insecure program using Secunia

January 13, 2009 Â· 1 min Â· 47 words Â· Omid Farhang

Cleanup Windows Hard Disk

The Disk Cleanup tool helps you free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files. Why Cleanup Remove temporary Internet files. Remove downloaded program files (such as Microsoft ActiveX controls and Java applets). Empty the Recycle Bin. Remove Windows temporary files such as error reports. Remove optional Windows components that you don’t use. Remove installed programs that you no longer use. Remove unused restore points and shadow copies from System Restore. Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later. ...

January 13, 2009 Â· 3 min Â· 509 words Â· Omid Farhang

How to handle suspicious e-mail

There are good reasons to be suspicious of e-mail. Some e-mail messages might be phishing scams, some might carry viruses. Images in spam e-mail might turn out to be pornographic, or to include Web beacons, which can be adapted to secretly send a message back to the sender. Follow these guidelines to help protect yourself when suspicious mail shows up in your Inbox. If you receive a phishing e-mail message, do not respond to it. Don’t open junk mail at all If an e-mail looks suspicious, don’t risk your personal information by responding to it. Delete junk e-mail messages without opening them. Sometimes even opening spam can alert spammers or put an unprotected computer at risk. Don’t reply to e-mail unless you’re certain that the message comes from a legitimate source. This includes not responding to messages that offer an option to “Remove me from your list.” Do not “unsubscribe” unless the mail is from a known or trusted sender. Use the junk mail tools in your e-mail program. For example, Windows Live Hotmail gives you the option to unsubscribe from mail that you previously had trusted or requested. This sends a notice back to the sender to have you removed from their list, while at the same time automatically adding the sender to your block list. Approach links in e-mail messages with caution Links in phishing e-mail messages often take you to phony sites that encourage you to transmit personal or financial information to con artists. Avoid clicking a link in an e-mail message unless you are sure of the real target address, or URL. ...

January 13, 2009 Â· 5 min Â· 885 words Â· Omid Farhang

How to recognize phishing e-mails or links

A few clues can help you spot fraudulent e-mail messages or links within them. What does a phishing e-mail look like? Phishing e-mail messages are designed to steal your identity. They ask for personal data, or direct you to Web sites or phone numbers to call where they ask you to provide personal data. Phishing e-mail messages take a number of forms: They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site. They might appear to be from someone you know. Spear phishing is a targeted form of phishing in which an e-mail message might look like it comes from your employer, or from a colleague who might send an e-mail message to everyone in the company, such as the head of human resources or IT. They might ask you to make a phone call. Phone phishing scams direct you to call a customer support phone number. A person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data. The phone phisher might claim that your account will be closed or other problems could occur if you don’t respond. They might include official-looking logos and other identifying information taken directly from legitimate Web sites, and they might include convincing details about your personal information that scammers found on your social networking pages. They might include links to spoofed Web sites where you are asked to enter personal information. Here is an example of what a phishing scam in an e-mail message might look like. ...

January 13, 2009 Â· 4 min Â· 749 words Â· Omid Farhang