Language Selection

English French German Italian Portuguese Spanish


Enter your Tux Machines username.
Enter the password that accompanies your username.

More in Tux Machines

Nginx 1.20.0 Is Released

Nginx developer Maxim Dounin has announced a new stable release of the by-far most popular web server on the Internet with a brief change-log listing "1.20.x stable branch" as the only changes. There is a bit more to the latest Nginx 1.20.0 release than that. [...] Every website you visit is served by some kind of web server software. The Apache web server is still the kind of the kill and the go-to solution, it has dominated the web server market since 1995. Russian software engineer Igor Vladimirovich Sysoev released the first version of the BSD-licensed Nginx web server on October 4th, 2004. It gained a small user-base and went doggedly on in the Apache's shadow until it eventually overtook Apache in terms of total websites available on the Internet in April 2019. Nginx served 415 million websites or 35.34% of all websites on the Internet in March 2021 according to Netcraft, beating Apache's share of 317 million websites by a fair margin. Read more Also: Natron is Alive and Releases v2.4

Android Leftovers

How to take your open source project to the next level

Open sourcing the code to your software as a service (SaaS) is not sufficient to make it actually be open source. Does that sound contradictory to you? Let me explain. Most services that espouse "open source" do so by simply throwing the code over the wall. It's better than nothing but really misses the point that powers open source: enabling users to make a change to the software they're using. Some other popular services powered by Open Source software, do include the tools used to operate/deploy their service. Pause for applause. But that’s also insufficient to actually enable users to become contributors effectively. Read more

today's howtos

  • How To Install NTP Server on CentOS 8

    In this tutorial, we will show you how to install NTP Server on CentOS 8. For those of you who didn’t know, Chrony is an implementation of the Network Time Protocol (NTP). Chrony commonly synchronizes a computer to Internet time servers or other sources, such as a radio or satellite receiver or telephone modem service. It can also be used as a time source/server for client systems. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the NTP Server on a CentOS 8.

  • Linux commands for testing connectivity and transfer rates

    There are quite a few tools that can help test your connectivity on the Linux command line. In this post, we'll look at a series of commands that can help estimate your connection speed, test whether you can reach other systems, analyze connection delays, and determine whether particular services are available.

  • How to Install VSFTP on Ubuntu 20.04 - Cloudbooklet

    Install VSFTP on Ubuntu 20.04. In this guide you are going to learn how to setup a FTP server and provide access to particular directory as chroot for a user. This setup is tested on Google Compute Engine VM Instance running Ubuntu 20.04 LTS. So this setup works fine for any virtual machine on AWS EC2 Instance or DigitalOcean or any other cloud hosting servers or VPS or Dedicated.

  • How to Install Jupyter Notebook on Ubuntu 20.04 / 18.04

    How to install Jupyter Notebook on Ubuntu 20.04 to share live code with others. In this guide, we’ll show you how to Install Jupyter Notebook on Ubuntu 20.04 LTS. Here we show you simple ways to install Jupyter on Ubuntu 20.04 LTS (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04 and any other Debian based distribution like Linux Mint and Elementary OS. Jupyter Notebook is an open-source web application that allows you to create and share live code documents with others. Jupyter is a next-generation notebook interface. Jupyter supports more than 40 programming languages including Python, R, Julia, and Scala.

  • How to Create Manjaro Bootable USB – Linux Hint

    Manjaro is a leading open-source Arch-based Linux distribution. It’s a cutting-edge distribution with automated tools that require little to no manual interruption. Manjaro provides a middle ground for users who desire control, performance, and some software stability. Hence, these features make it an ideal distribution for Linux beginners. As a Manjaro aspirant, it is ideal to have a live bootable USB. A live USB provides a convenient way for any beginner user to experiment with the distribution without installing it on the system. In this article, we cover various ways to create a bootable Manjaro USB in Windows and Linux.

  • How to Dual Boot Manjaro Linux with Windows 10 – Linux Hint

    Among many other features, user accessibility, cutting-edge software, and automated tools make Manjaro the next best Linux distribution. As an Arch Linux derivative, Manjaro provides new users with an Arch experience via an intuitive interface, unique hardware management software, and stable performance. This article demonstrates the Manjaro Linux dual boot process with the Windows 10 operating system for Linux beginners. The guide provides details on required BIOS settings, Windows disk partition process and walks you through the step-by-step procedure to install Manjaro 20.2.1 Nibia release with a KDE-plasma desktop environment.

  • Use of “lsof” Command to Find Open Files – Linux Hint

    “lsof” stands for List Open Files. It is a Linux utility for listing down all the open files of a system. This command can be combined with different parameters to modify its output as desired. You can see the details of all of its parameters and flags by seeing the help manual of the “lsof” command. In today’s article, you will be able to learn the correct usage of the “lsof” command for finding all the open files in Linux Mint 20.

  • How Do I Do a Reverse DNS Lookup in Linux? – Linux Hint

    DNS process is known as forwarding DNS resolution in which it resolves the domain name with an IP address. Whereas, Reverse DNS Resolution or Reverse DNS lookup, also known as rDNS, is used to determine or resolve the IP address associated with the domain name. As the name implies, it is a reverse DNS lookup process that resolves an IP address back to the domain name. Reverse DNS lookup is used by email servers to validate and block spam email messages. If the rDNS check fails, then Email servers by default mark the incoming messages as SPAM. Most of the time, email servers automatically reject the messages from an IP address that does not contain rDNS in place. Therefore, if you need to add an rDNS, you can contact your hosting or IP provider to do it. In this article, we will explain how you can perform the reverse DNS lookup process in Linux through the command line environment.

  • How Do I Convert a CER File to PEM? – Linux Hint

    There can be different reasons that you want to convert your security certificates to other formats. One of the reasons is when your system is not accepting the existing format or if your security certificate file is not compatible with the application. Whatever your reason for converting formats for the security certificates files is, you can easily do so using the most convenient and reliable OpenSSL utility. OpenSSL is an open-source full-featured command-line utility that is usually used for generating CSR and private keys, installing SSL/TLS certificates, converting security certificate formats, etc. In today’s post, we will describe how to convert a CER file to PEM.

  • How to set DNS name servers on Ubuntu Linux? – Linux Hint

    DNS nameservers (resolvers) provide a method to translate the domain name into the IP addresses. It is provided by the ISP (internet service providers) and is used by various other devices to do the DNS lookup for a requested domain. We will show you in this tutorial how to set or configure the DNS nameserver using different methods on the Ubuntu system. All configurations have been performed on Ubuntu 20.04 system.

  • How can I exclude directories from grep -R? – Linux Hint

    Grep is indeed a Linux / Unix terminal shell utility that searches a document for a sequence of characters. A regular expression seems to be the term for the textual pattern to be searched. It outputs the row with the outcome when it detects the same match. While browsing across huge log files, the grep query comes in hand. So, grep –R has been used to exclude directories while using some keywords. Let’s discuss grep –R in this tutorial step by step.

  • Getting started with Manjaro Part II – Linux Hint

    Manjaro offers a unique Command-line tool that sets it apart from other Arch-based distributions. The unique Manjaro Hardware detection command-line tool allows control over system hardware configurations and multiple kernels management. There are currently two types of Manjaro Hardware detection commands, mhwd, mhwd-kernel. This article introduces the mhwd command, which automates the identification and installation of system hardware. As well as the mhwd-kernel command to enable easy installation and management of multiple kernels in Manjaro Linux.

  • How do I check my NIC card speed Linux? – Linux Hint

    NIC or network interface card provides an interface between your system and a network apart from one wired network or wireless. Every NIC comes with a speed rating like 100 Mbps or 1Gbps. Knowing the NIC card speed can be helpful in different situations. It can help you diagnose performance issues. Knowing the speed limit of the NIC is also helpful if you are upgrading your internet services to higher bandwidth, as it will help you to verify if you can take full advantage of the available bandwidth. In this post, we will describe how to check NIC card speed in Linux OS.

  • How to unban an IP in fail2ban – Linux Hint

    Many of the security tools do not protect your system from compromise. Even setting the strongest password does not solve the problem as it can also be broken with several techniques. Fail2ban is a great tool that allows you to ban the IP address that is making incorrect authentication attempts. Rather than allowing a user to make tries and succeeds, it blocks them in the first place. Hence, it prevents intrusion before they comprise your system. While making incorrect authentication attempts, sometimes fail2ban can block legitimate connections too. By default, the ban time is 10 minutes. After 10 minutes, a banned IP address is unbanned automatically. However, if a legitimate system is banned and you can’t wait for the ban time to expire, you can manually unban it. In this post, we will describe how to unban an IP address in fail2ban.