Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
HowTos
  • How To Install vnStat on Debian 11 - idroot

    In this tutorial, we will show you how to install vnStat on Debian 11. For those of you who didn’t know, vnStat is a console-based utility that monitors network traffic ( transmit and received ) on the selected network interface and stores it. To generate the logs, vnStat uses the information provided by the kernel.

    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the vnStat monitor network traffic on a Debian 11 (Bullseye).

  • How do I Redirect Output to a File in Linux

    Redirecting is a method of changing the standard input and output devices when executing a command. Linux commands work by taking input and producing an output.

    We can use redirection to send and use the data present in the system so far. By using Redirect, we will not send copies of our data to the system. The following article explains how to use redirect output to a file in Linux.

  • How To Install Gitea on Debian 11 - idroot

    In this tutorial, we will show you how to install Gitea on Debian 11. For those of you who didn’t know, Gitea is an open-source Git service written in the Go language. It is a version control platform similar to GitHub. It is robust, scalable, and offers many features including issues and time tracking, repository branching, file locking, and tagging, merging, and many others. Since Gitea was created using the Go language, it supports a lot of operating systems includes Linux, macOS, and Windows, on architectures like amd64, i386, ARM, PowerPC, and others.

    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Gitea on a Debian 11 (Bullseye).

  • How To Easily Send Files Between Devices With Sharik | Tom's Hardware

    The quickest and easiest way to install Sharik is via snap – integrated into the Software Store from Ubuntu 16.04 or later, or you can install it directly from the command line.

    $ sudo snap install sharik-app
    At time of writing, the latest version for Ubuntu 20.04 on snap was 2.5. If you want the very latest version – 3.0 – then install it through its own repo instead.

    1. Open a terminal and use curl to download the GPG key and add it to your list of approved keys. This gives us assurance and security that the repository which stores the application is secure.

  • How Do I Force Kill a Screen Session Linux

    Almost everyone uses different tools and software in their system to complete their daily tasks efficiently. However, sometimes bugs and glitches create trouble for the software. These glitches can clog the system screen, and it gets hard to close the program. That’s why many operating systems offer a feature to force-kill a screen session. So, in this article, we will explain the procedure to force-kill a screen in Linux.

  • How Do I Create a Dedicated Crontab History Log

    Scripts and commands can run automatically at a set date and time by using cron jobs. Cron jobs are logged by default to a file called /var/log/Syslog. To view the most recent entries, we can use the systemctl command. So Crontab is a great command option, but many users do not know how to create or check the history. If you also don’t know how to do it, read this blog from start to end, as we will provide a brief on how to create a dedicated crontab history log.

  • How do I Remove Lines from a File Using the SED Command

    The sed command is known as a stream editor. The sed command is used in Linux to do basic text transformation.

    One of the many essential commands of Linux is also the sed command which plays a vital role in file manipulation. It is used for many purposes; some of the main ones are as follows.

    Remove or delete that particular line that matches the given patterns.

  • How do I whitelist an IP address on fail2ban?

    This tutorial explains how to whitelist IP addresses using fail2ban and includes instructions for fail2ban installation on Debian and other Linux distributions.

  • How to Use Sed Command with Regex

    The sed command has longlist of supported operations that can be performed to ease the process of editing text files. It allows the users to apply the expressions that are usually used in programming languages; one of the core supported expressions is Regular Expression (regex).

    The regex is used to manage text inside text files, with the help of regex a pattern that consists of string and these patterns are then used to match or locate the text. The regex is widely used in programming languages such as Python, Perl, Java and its support is also available for command line programs such as grep and several text editors too like sed.

    Although the simple searching and sorting can be performed using sed command, using regex with sed enables advanced level matching in text files. The regex works on the directions of characters used; these characters guide the sed command to perform the directed tasks. In this article, we will demonstrate the use of regex with sed command and followed by the examples that will show the application of regex.

  • How to Use Sed to Edit File in Place

    Linux supports various types of command line utilities to automate the tasks which makes Linux in the leading line of OS; because of its importance and usage, it has hundreds of distributions that are based on Linux and they do support numerous commands to perform actions automatically.

    There is a huge pool of commands available for Ubuntu and sed command utility is one of them; the sed command can be used to perform fundamental operations on text files like editing, deleting text inside a file.

  • If your domain is not sending email, set these DNS settings to avoid spoofing and phishing

    As you may know, email spoofing allows attackers to pose as someone else to gain illegal profit. For example, I only use webmaster@cyberciti.biz for communication, but someone might create a spoofed-up email, say info@opensourceflare.com, to trick someone.

  • New Features of Synology DSM 7

    Disk Station Manager, or DSM in short, is the operating system for the Synology NAS devices. Synology released DSM 7 recently – the latest version of the DSM operating system for Synology NAS devices.

    You can upgrade the DSM operating system software of your Synology NAS if you’re running DSM 6.2 or later and your NAS has more than 1 GB of RAM/memory installed.

  • Remove All Files with Extension Linux Command Line

    Every file consists of a specific extension. If we want to delete files of the same or different extensions from our Linux system, we must follow many different types of commands. In this article, we will see how to remove all files with the extension Linux command line.

  • Setup Sudo No Password for Specific Command Only

    Are you a Linux or Unix operating system user? Then yes, sudo is your extensive helper command in Linux. On the Linux operating system, you can run commands as another user using the sudo command. Sudo is the most commonly used tool in the Linux system. But before running commands, sudo needs user authentication.

    Users need to log in using their user ID and password before using the command. But entering the password every time might become hectic. This article will discuss the sudo command, how to use the sudo command, and set up the sudo no password for commands in the next sections.

    Using a root account, you must be done with the initial setup before running the commands. You can access the root by using the $sudo command. But you must know the password initially.

  • cd Up One Level Linux

    We often use directories when working on a computer system. The directory is nothing but a folder or a location where a file is stored. We store our files in different directories. And sometimes we may need to change the folders. Instead of going to the folder directly, we can do this using cd (Change Directory) command.

    On Linux and other Unix-like operating systems, the cd command can change the current working directory. Working in the current directory of a computer is also referred to as the user’s current directory. In this article, we will dive deeper into the cd command and give you a brief on cd up one level Linux.

  • Bash Print All Environment Variables and Values

    Your shell compiles multiple types of information while interacting with the server from the shell session. It provides information about the shell behavior and its access to the resources. Configuration settings contain some of these settings, and user input determines others.

    In this way, the shell keeps track of all settings and information to maintain the environment. Shells build an environment each time they start a session that contains variables that define a system’s properties. So, if you want to know the methods to bash print all environment variables and values, then read this blog to get a brief on it.

  • What are umask bits and How to Use Them in Linux?

    In Linux, every file and directory has some permissions that help to manage the access level of every user on the system. User file creation mode mask bits set the permissions for newly created files or directories. Linux umask consists of nine bits: three bits for the user(owner), group, and other users. The umask changes the default permission of newly created files to prevent other users from accessing them. We can change these permissions by using umask commands.

  • Case files of a TSE: A CoW ate my filesystem
  • Accessing the internet from the terminal with the curl command | FOSS Linux

    CURL is a command-line utility that developers use to transfer data via several network protocols. Client URL (cURL) or (curl) is considered a non-interactive web browser that uses URL syntax to transfer data to and from servers. It can pull information from the internet and display it in your terminal or save it to a file in your local drive.

    This is essentially what web browsers like Firefox or Chromium do, except they render the information. However, curl downloads and displays basic information. Curl is powered by ‘libcurl’, a free and easy-to-use client-side URL transfer library.

    cURL works without user interaction, unlike popular web browsers like Firefox. To use cURL, you launch the curl command while at the same time you issue the web address. You also have to specify if you want the data saved to a file or displayed in the terminal. Therefore, using curl for novice users can create a few challenges, especially when interacting with a site that requires authentication or an API.

  • Tunneling and Port Forwarding

    The process of network traffic redirection from one port to another port is called Port Forwarding or Tunneling. Port Forwarding provides numerous advantages, i.e., it can be used for secure communication between two systems. It can also be used for communications that aren’t possible in cases where a port has been blocked but needs to be accessed locally or remotely. This article provides a brief overview of tunneling and port forwarding the network traffic locally and remotely using different techniques, i.e., SSH Tunneling, Rinetd, ngrok.

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.