today's howtos
-
Speak to me! – Purism
My trusty laptop’s speakers gave up the ghost. I don’t like to sit around in headphones all the time, I don’t have any other speakers, and the replacements are still being manhandled by the postman.
I’d get used to the austerity if I hadn’t started missing calls from a friend. That’s unacceptable! But what am I supposed to do? Buy extra gadgets just to throw them away after a week? Nope, I’m not that kind of a person.
But hey – I have a Librem 5! It has a speaker. It’s open. I have control over it, and I’m a hacker too. So I should be able to come up with a hack to turn it into a speaker for my laptop, right?
Pulseaudio to the rescue. I look through the guide. There it is: forwarding audio over a network.
-
How To Install CSF Firewall on Debian 11 - idroot
In this tutorial, we will show you how to install CSF Firewall on Debian 11. For those of you who didn’t know, CSF is also known as “Config Server Firewall” is a free and advanced firewall for Linux systems. We should use ConfigServer Security & Firewall (CSF) since this CSF have more advanced and comprehensive features than other firewall application such as UFW, Firewalld, or Iptables. Compared to the other Linux firewall application, CSF is more user-friendly and effective which is mostly used by web hosting providers.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the ConfigServer Security & Firewall (CSF) on a Debian 11 (Bullseye).
-
What are the differences between SQL and MySQL | FOSS Linux
Due to many organizations, businesses, companies, and firms making an online presence, databases have become the core requirement for their daily operations. A database in a layman’s language is defined as a collection of data stored and organized electronically to ensure easy retrieval, access, management, and manipulation of business data.
Most business successes depend on databases since they aid in storing essential and relevant data in a central position. Besides, databases also help facilitate communication of crucial business info such as employee profiles, sales transactions, customer profiles, marketing campaigns, product inventory, etc. Furthermore, databases have ensured that the company’s data is secure through various authentication mechanisms like access specifiers, user logins, and sign-ups.
This article will talk about the difference between the two popular relational databases SQL and MySQL.
-
How to install Funkin' Psych Engine on a Chromebook
Today we are looking at how to install Friday Night Funkin' Psych Engine on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
-
How to Use an SSH Key with Non-root Users - Unixcop
You can SSH to your Linux instance as root with the key. However, the key doesn’t work for non-root users.
So we will illustrate two methods to use SSH keys with non-root users.
-
Allow Port Through Firewall in Ubuntu 20.04 - Linux Nightly
Ubuntu comes with ufw (uncomplicated firewall) installed by default. This is a frontend for iptables/nftables, the built-in Linux firewall, and is meant to make firewall management a bit easier.
In this guide, you’ll see how to add rules to the firewall to open ports and allow certain services to have access through the firewall on Ubuntu.
-
Some regex tests with grep, sed and AWK
In my data work I regularly do searching and filtering with GNU grep (version 3.3), GNU sed (4.7) and GNU AWK (4.2.1). I don't know if they all use the same regex engine, but I've noticed differences in regex speed between these three programs. This post documents some of the differences.
-
Upgrade to Fedora 35 from Fedora 34 using DNF – If Not True Then False
This is guide, howto upgrade Fedora 34 to Fedora 35 using DNF. This method works on desktop and server machines. You can also upgrade older Fedora installations (example Fedora 33/32/31/30) directly to Fedora 35.
I have tested this method on several machines, but if you have problems, please let me know. Always remember backup, before upgrade!
-
Jenkins: Basic security settings - Anto ./ Online
Jenkins contains sensitive information. Thus it must be secured, like any other sensitive platform. Thankfully Jenkins provides you with many security options. This guide will show you all the essential bits that you need to know.
You access these features on the Configure Global Security page under manage Jenkins.
-
LDAP query from Python · Pablo Iranzo Gómez's blog
Recently, some colleagues commented about validating if users in a Telegram group were or not employees anymore, so that the process could be automated without having to chase down the users that left the company.
One of the fields that can be configured by each user, is the link to other platforms (Github, LinkedIn, Twitter, Telegram, etc), so querying an LDAP server could suffice to get the list of users.
First, we need to get some data required, in our case, we do anonymous binding to our LDAP server and the field to search for containing the ‘other platform’ links.
- Login or register to post comments
- Printer-friendly version
- 1901 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago