today's howtos

-
How to find duplicate text in files with the uniq command on Linux
You must have dealt with text files containing duplicate lines and words. The uniq tool is your best chance in Ubuntu where text files and redundant information are involved.
In Ubuntu, the uniq command is used to show duplicate lines in a text file. If you wish to eliminate identical words or lines from a text file, this command can assist. Because the uniq command looks for unnecessary copies by matching neighbouring lines, it can only be used with sorted text files.
In this tutorial, you will learn how to remove duplicate text from text files using the uniq command. You will also learn the full capabilities and options that the uniq command provides.
-
How to Enable Basic Authentication on ELK Stack - kifarunix.com
In this tutorial, you will learn how to enable basic authentication on ELK stack. Elastic/ELK stack supports user authentication. This enables it to restrict access to various resources within the cluster. To access these resources when authentication is enabled, a user has to prove their identity using username/passwords or other forms of identity depending on the authentication realm enabled.
-
How to install collectd and send metrics to Graphite/Statsd
Collectd is a daemon which collects system and application performance metrics periodically and provides mechanisms to store the values in a variety of ways, in our case sending to Graphite. Collectd gathers metrics from various sources, e.g. the operating system, applications, log files and external devices, and stores this information or makes it available over the network. Those statistics can be used to monitor systems, find performance bottlenecks (i.e. performance analysis) and predict future system load (i.e. capacity planning). Or if you just want pretty graphs of your private server and are fed up with some homegrown solution you’re at the right place, too.
-
How to Setup Promtail, Grafana and Loki for free Log Management in Debian 11
Grafana Loki is an open source log aggregation tool provided by the Grafana Labs. It is a horizontally scalable, highly available, multi-tenant log aggregation system inspired by Prometheus. It is designed to be very cost effective and easy to operate. It does not index the contents of the logs, but rather a set of labels for each log stream. This reduces the workload of processing and storing logs.
Promtail is Loki’s log collector, which sends log tags to Grafana Loki for indexing.
-
How to Setup Central Logging Server with Rsyslog in Ubuntu 20.04 – Citizix
Rsyslog is an open-source software utility used on UNIX and Unix-like computer systems for forwarding log messages in an IP network. It is an open-source utility for log processing. It permits the logging of data from different types of systems in a central repository. Rsyslog is a Syslog protocol with more extensions, features, and benefits.
Rsyslog can deliver over one million messages per second to local destinations when limited processing is applied making it so powerful. By default, Linux uses the syslog daemon to record logs about how the system is running and then putting these logs into a central repository in: /var/log where we can examine and investigate them.
In simple terms of meaning everything from kernel events to user actions is logged by Linux, allowing you to see al most any action performed on your pc or servers. -
» so ext4 is good for notebooks & desktops & workstations, zfs is better on servers? | dwaves.de
so, ext4 is good for notebooks & desktops & workstations (that do regular backups on a separate, external, then disconnected medium)
is zfs “better” on/for servers?
-
How to Install Redmine Project Management Software on Rocky Linux 8
Redmine is a free and open-source project management software and issue tracking tool. It is written using the Ruby on Rails framework and can be integrated with various version control systems. It includes a repository browser and diff viewer. It can be used to manage projects features per project wikis and forums, time tracking and role-based access control. It is cross-platform, cross-database and supports 49 languages.
In this tutorial, you will learn how to install Redmine on a Rocky Linux 8 based server.
-
A Guide to Non-Alphanumeric Characters
Alphanumeric is a description of characters that is both letters and numbers. Typically you will see this term when setting a username on a website or elsewhere- when there is a restriction around the characters you are able to use. ‘1ffcs3rf1a’ is an example of a an alphanumeric string.
-
How to install the Vivaldi Browser on Elementary OS 6.0 - Invidious
In this video, we are looking at how to install the Vivaldi Browser on Elementary OS 6.0.
-
How to Add Application Shortcuts to the Ubuntu Desktop
Having app shortcuts on your desktop significantly decreases the time it takes to launch an app. Here's how to add desktop shortcuts on Ubuntu.
Unlike Windows, Ubuntu doesn't automatically add desktop shortcuts for the apps you install. While this might not cause problems for experienced Linux users, those who come from Windows can find this behavior strange, provoking them to switch back to their old OS. After all, who wouldn't want the convenience of launching their apps directly from the desktop—that's what a desktop is for!
In this guide, you'll learn how to create and add application shortcuts to the Ubuntu desktop. Let's delve right into it.
-
How to install BASTON by Txori on a Chromebook
Today we are looking at how to install BASTON by Txori on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
-
- Login or register to post comments
Printer-friendly version
- 2627 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Programming Leftovers
| Emulate the VIC-20 home computer with Linux
Emulation is the practice of using a program (called an emulator) on a PC to mimic the behaviour of a home computer or a video game console, in order to play (usually retro) games on a computer.
Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a single non-technical user.
Back in the 1980s, home computers came to the forefront of teenagers’ minds. Specifically, the Amiga, ZX Spectrum, and Atari ST were extremely popular. They were hugely popular home computers targeted heavily towards games, but they also ran other types of software.
The Commodore VIC-20 is an 8-bit home computer that was released in 1980/1. It featured a MOS Technology 6502 CPU, with 20KB ROM and 5KB RAM although 1.5K of the RAM was used for the video display and aspects of the BASIC and kernal.
It offered limited low-resolution graphics (176 x 184) with storage provided by cassette and floppy disk.
|
PostgreSQL Anonymizer 1.0: Privacy By Design For Postgres
PostgreSQL Anonymizer is an extension that hides or replaces personally identifiable information (PII) or commercially sensitive data from a PostgreSQL database.
The extension supports 3 different anonymization strategies: Dynamic Masking, Static Masking and Anonymous Dumps. It also offers a large choice of Masking Functions such as Substitution, Randomization, Faking, Pseudonymization, Partial Scrambling, Shuffling, Noise Addition and Generalization.
| today's howtos
|
Recent comments
3 hours 50 min ago
4 hours 14 min ago
7 hours 22 min ago
7 hours 33 min ago
7 hours 35 min ago
15 hours 19 min ago
17 hours 4 min ago
18 hours 46 min ago
21 hours 6 min ago
1 day 1 hour ago