Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
  • How to find duplicate text in files with the uniq command on Linux

    You must have dealt with text files containing duplicate lines and words. The uniq tool is your best chance in Ubuntu where text files and redundant information are involved.

    In Ubuntu, the uniq command is used to show duplicate lines in a text file. If you wish to eliminate identical words or lines from a text file, this command can assist. Because the uniq command looks for unnecessary copies by matching neighbouring lines, it can only be used with sorted text files.

    In this tutorial, you will learn how to remove duplicate text from text files using the uniq command. You will also learn the full capabilities and options that the uniq command provides.

  • How to Enable Basic Authentication on ELK Stack -

    In this tutorial, you will learn how to enable basic authentication on ELK stack. Elastic/ELK stack supports user authentication. This enables it to restrict access to various resources within the cluster. To access these resources when authentication is enabled, a user has to prove their identity using username/passwords or other forms of identity depending on the authentication realm enabled.

  • How to install collectd and send metrics to Graphite/Statsd

    Collectd is a daemon which collects system and application performance metrics periodically and provides mechanisms to store the values in a variety of ways, in our case sending to Graphite. Collectd gathers metrics from various sources, e.g. the operating system, applications, log files and external devices, and stores this information or makes it available over the network. Those statistics can be used to monitor systems, find performance bottlenecks (i.e. performance analysis) and predict future system load (i.e. capacity planning). Or if you just want pretty graphs of your private server and are fed up with some homegrown solution you’re at the right place, too.

  • How to Setup Promtail, Grafana and Loki for free Log Management in Debian 11

    Grafana Loki is an open source log aggregation tool provided by the Grafana Labs. It is a horizontally scalable, highly available, multi-tenant log aggregation system inspired by Prometheus. It is designed to be very cost effective and easy to operate. It does not index the contents of the logs, but rather a set of labels for each log stream. This reduces the workload of processing and storing logs.

    Promtail is Loki’s log collector, which sends log tags to Grafana Loki for indexing.

  • How to Setup Central Logging Server with Rsyslog in Ubuntu 20.04 – Citizix

    Rsyslog is an open-source software utility used on UNIX and Unix-like computer systems for forwarding log messages in an IP network. It is an open-source utility for log processing. It permits the logging of data from different types of systems in a central repository. Rsyslog is a Syslog protocol with more extensions, features, and benefits.

    Rsyslog can deliver over one million messages per second to local destinations when limited processing is applied making it so powerful. By default, Linux uses the syslog daemon to record logs about how the system is running and then putting these logs into a central repository in: /var/log where we can examine and investigate them.
    In simple terms of meaning everything from kernel events to user actions is logged by Linux, allowing you to see al most any action performed on your pc or servers.

  • » so ext4 is good for notebooks & desktops & workstations, zfs is better on servers? |

    so, ext4 is good for notebooks & desktops & workstations (that do regular backups on a separate, external, then disconnected medium)

    is zfs “better” on/for servers?

  • How to Install Redmine Project Management Software on Rocky Linux 8

    Redmine is a free and open-source project management software and issue tracking tool. It is written using the Ruby on Rails framework and can be integrated with various version control systems. It includes a repository browser and diff viewer. It can be used to manage projects features per project wikis and forums, time tracking and role-based access control. It is cross-platform, cross-database and supports 49 languages.

    In this tutorial, you will learn how to install Redmine on a Rocky Linux 8 based server.

  • A Guide to Non-Alphanumeric Characters

    Alphanumeric is a description of characters that is both letters and numbers. Typically you will see this term when setting a username on a website or elsewhere- when there is a restriction around the characters you are able to use. ‘1ffcs3rf1a’ is an example of a an alphanumeric string.

  • How to install the Vivaldi Browser on Elementary OS 6.0 - Invidious

    In this video, we are looking at how to install the Vivaldi Browser on Elementary OS 6.0.

  • How to Add Application Shortcuts to the Ubuntu Desktop

    Having app shortcuts on your desktop significantly decreases the time it takes to launch an app. Here's how to add desktop shortcuts on Ubuntu.

    Unlike Windows, Ubuntu doesn't automatically add desktop shortcuts for the apps you install. While this might not cause problems for experienced Linux users, those who come from Windows can find this behavior strange, provoking them to switch back to their old OS. After all, who wouldn't want the convenience of launching their apps directly from the desktop—that's what a desktop is for!

    In this guide, you'll learn how to create and add application shortcuts to the Ubuntu desktop. Let's delve right into it.

  • How to install BASTON by Txori on a Chromebook

    Today we are looking at how to install BASTON by Txori on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

More in Tux Machines

Programming Leftovers

  • Return String From Function C++

    A way to identify a series of strings as a class member is specified in C++’s definition. The String class holds attributes as a stream of bits, with the ability to handle a single-byte character. In C++, we may retrieve a string, but we should still examine how the string will be retained and transferred. Because C++ returns elements on the heap, which has a finite amount of space, providing immense components will induce stack overflow issues that could result in errors and security flaws. If we can return a std::string object from the standard template library, we may provide a constant pointer to the string. Ascertain that the string is retained in static memory. This article outlines various approaches for returning a string from a C++ function.

  • How to round of Numbers in Java

    Java provides a built-in class known as Math class which belongs to the java.lang package. The java.lang.Math class provides numerous methods that are used to perform different numeric operations such as rounding of a number, finding square root, and so on. The Math class offers multiple methods to round off a number such as round(), ceil(), floor().

  • Writing it down

    PWC 165 refers us to mathsisfun for the algorithm to be used. Let’s write it down.

Emulate the VIC-20 home computer with Linux

Emulation is the practice of using a program (called an emulator) on a PC to mimic the behaviour of a home computer or a video game console, in order to play (usually retro) games on a computer. Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a single non-technical user. Back in the 1980s, home computers came to the forefront of teenagers’ minds. Specifically, the Amiga, ZX Spectrum, and Atari ST were extremely popular. They were hugely popular home computers targeted heavily towards games, but they also ran other types of software. The Commodore VIC-20 is an 8-bit home computer that was released in 1980/1. It featured a MOS Technology 6502 CPU, with 20KB ROM and 5KB RAM although 1.5K of the RAM was used for the video display and aspects of the BASIC and kernal. It offered limited low-resolution graphics (176 x 184) with storage provided by cassette and floppy disk. Read more

PostgreSQL Anonymizer 1.0: Privacy By Design For Postgres

PostgreSQL Anonymizer is an extension that hides or replaces personally identifiable information (PII) or commercially sensitive data from a PostgreSQL database. The extension supports 3 different anonymization strategies: Dynamic Masking, Static Masking and Anonymous Dumps. It also offers a large choice of Masking Functions such as Substitution, Randomization, Faking, Pseudonymization, Partial Scrambling, Shuffling, Noise Addition and Generalization. Read more

today's howtos

  • Web UI Dashboard for Kubernetes
  • Dmesg Command in Linux – Options + Examples
  • How to set up your graphics card in Zorin OS - Real Linux User

    Most modern Linux distributions have out of the box outstanding support for most of the available hardware components, like your graphics card, printer and WiFi adapter. Even for many relatively new hardware technologies there is support with the help of Hardware Enablement. But it is always possible that the setup procedure doesn’t come up directly with the correct or most optimized drivers for your specific internal or external devices. In this article as part of my Zorin OS tutorial series I will focus on the support of graphics cards and will show you how to install or update graphics drivers in Zorin OS.

  • How to install Vivaldi browser on Fedora 36 - NextGenTips

    Vivaldi browser is a freeware, cross-platform web browser developed by Vivaldi Technologies. It has a minimalistic user interface with basic icons and fonts and, an optionally color scheme that changes based on the background and design of the web page being visited.