Announcement

Collapse
No announcement yet.

Articles

Collapse

Articles Home Page

  •  
  • Filter
  • Time
  • Show
Clear All
new posts

  • How to Disable UEFI Secure Boot on a Proxmox VE Virtual Machine

    How to Disable UEFI Secure Boot on a Proxmox VE Virtual Machine

    For GPU passthrough to work or for installing specific device drivers on a Proxmox VE virtual machine, you may need to disable UEFI Secure Boot on your Proxmox VE virtual machine.

    In this article, I will show you how to disable UEFI secure boot on a Proxmox VE virtual machine.

    The procedures shown in this article will also work on any KVM/QEMU/libvirt virtual machines and virtual machines running on other virtualization platforms based on the KVM/QEMU/libvirt hyperviso...
    Go to post

  • How to Check Bash Version

    How to Check Bash Version

    Checking the bash version helps Linux users in many cases, including troubleshooting and finding the currently available version in the system. If you are a regular bash user, it is good to check the bash version and keep it up to date as per the latest updates available. However, if you are a newbie in bash scripting, then you probably have never encountered a situation where you need to check the bash version.
    So, in this guide, we will explain the simplest way to check the bash version...
    Go to post

  • How to Set and Use Environment Variables In Bash Script

    How to Set and Use Environment Variables In Bash Script

    In bash scripting, environment variables are used to save and manage the data to modify the processes in the system. Using the bash scripts, you can use the environment variables to configure the system process. Environment variables also offer security and transmit the information from one script to another.
    Hence, there are multiple uses of environment variables that you can use to enhance the automation in the Linux system. So, if you want to learn the simple ways to set and use environment...
    Go to post

  • What is Shebang: Bash Script Header on First Line?

    What is Shebang: Bash Script Header on First Line?

    As Linux enthusiasts, we all come across bash scripting as an essential part of the Linux system. However, many Linux users don’t know why the first line of the bash script contains #!. So this combination of # and ! is called shebang or shebang.
    Although shebang looks like a bash script header, it initially instructs the system about interpreters to execute the script. This concept feels a bit complicated, but that’s not true, as this guide is all about the shebang: bash script header....
    Go to post

  • How to Install NVIDIA GPU Driver on Fedora 40+ KDE 6 Spin on Wayland

    How to Install NVIDIA GPU Driver on Fedora 40+ KDE 6 Spin on Wayland

    Installing the NVIDIA GPU driver is the first thing you will want to do after installing Fedora 40 on your computer. Fedora 40 comes with different spins (desktop environments) and the latest software. Wayland display server (which will replace the X11/Xorg display server completely one day) is the default on some of the Fedora 40 spins. One of the most awaited Fedora 40 spin is the KDE spin. Fedora 40 KDE spin comes with the KDE Plasma 6 desktop environment which supports only the Wayland display...
    Go to post

  • Bash Script Loops Examples

    Bash Script Loops Examples

    A loop in programming is a control structure that allows a specific code to be executed repeatedly until a condition is met. This process is repeated until no further action is required. Loop allows you to repeat the desired set of instructions numerous times to attain the desired outcome. These recursions can be useful for all tasks that require repetitive operations or when working with data collections.
    In this article, we will explore the meaning, types, and examples of loops, further...
    Go to post

  • How to SSH Into EC2 Instance

    How to SSH Into EC2 Instance

    EC2 is a service provided by Amazon Web Services (AWS) that lets you rent virtual servers (known as instances). In these instances, you can leverage virtual machines to develop, test, deploy, and manage computer applications.

    SSH is an incredible utility for accessing and managing Amazon Elastic Compute Cloud (EC2) instances. With SSH, you can operate a remote device, access data, execute commands, troubleshoot issues, and more. Although you can easily SSH into an EC2 instance, many...
    Go to post

  • How to SSH Into Docker Container

    How to SSH Into Docker Container

    Administrators commonly use SSH to access and operate remote servers and devices, including a Docker container. When you connect to any device using SSH, you can run commands, access its files, and perform multiple other tasks. You can also use the Docker container as a hypervisor image that can run applications. For example, a software developer can create a Docker container image to package the software.

    Hence, a Docker container image package software with all the dependencies and...
    Go to post

  • How to Tunnel Web Traffic Through SSH for Secure Browsing

    How to Tunnel Web Traffic Through SSH for Secure Browsing

    Nowadays, an uncountable number of cyber attacks, scams, and data theft occur every single day. This makes it necessary for users to look for ways to secure their data. After all, it is better to take precautions than to experience a guilt trip. Fortunately, SSH offers tunneling, which channels internet traffic to your local system via a remote system.

    Meanwhile, this transmission encrypts incoming and outgoing network traffic on your local Linux device, ensuring the system’s security....
    Go to post

  • Developing Robust Integration of Linux and IoT Solutions

    Developing Robust Integration of Linux and IoT Solutions




    by George Whittaker


    The Internet of Things (IoT) represents a vast frontier for innovation, promising to connect and automate our world in ways we're just beginning to understand. Linux, known for its stability, security, and open-source nature, stands as a preferred operating system for many IoT devices. This article delves into how you can leverage Linux to build powerful, reliable, and secure IoT solutions.
    ...
    Go to post
There are no articles in this category.
 
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

There are no tags yet.

Latest Articles

Collapse

  • Providing a license for package sources
    by Kasimba
    Arch Linux hasn't had a license for any package sources (such as PKGBUILD files) in the past, which is potentially problematic. Providing a license will preempt that uncertainty.

    In RFC 40 we agreed to change all package sources to be licensed under the very liberal 0BSD license. This change will not limit what you can do with package sources. Check out the RFC for more on the rationale and prior discussion.

    Before we make this change, we will provide contributors with...
    11-19-2024, 09:21 AM
  • Linux Binary Analysis for Reverse Engineering and Vulnerability Discovery
    by Kasimba



    by George Whittaker


    Introduction

    In the world of cybersecurity and software development, binary analysis holds a unique place. It is the art of examining compiled programs to understand their functionality, identify vulnerabilities, or debug issues—without access to the original source code. For Linux, which dominates servers, embedded systems, and even personal computing, the skill of binary analysis is...
    11-18-2024, 07:10 PM
  • Ubuntu vs Debian: Linux Distributions Compared Deep Dive
    by Kasimba
    Debian and Ubuntu are two popular Linux distributions. In this deep dive we will guide you on the key differences between them from perspective of both corporate enterprise and personal productivity or pleasure usage. After reading this blog post you should be in a better position to decide to select Ubuntu or Debian.
    Stewardship, Licensing, Community and Cost

    Where as Debian is 100% fully committed to free software as defined by the Debian Free Software Guidelines, Ubuntu is created...
    11-17-2024, 08:30 PM
  • Debian Backup and Recovery Solutions: Safeguard Your Data with Confidence
    by Kasimba



    by George Whittaker


    Introduction

    In the digital age, data loss is a critical concern, and effective backup and recovery systems are vital for any Debian system administrator or user. Debian, known for its stability and suitability in enterprise, server, and personal computing environments, offers a multitude of tools for creating robust backup and recovery solutions. This guide will explore these solutions,...
    11-13-2024, 05:30 PM
  • Installing Development Tools on Debian: Setting Up Compilers, Libraries, and IDEs for a Robust Development Environment
    by Kasimba



    by George Whittaker


    Introduction

    Debian is one of the most trusted and stable Linux distributions, making it a top choice among developers and system administrators. Setting up a powerful development environment on Debian involves installing the right tools, compilers, libraries, and Integrated Development Environments (IDEs) that can support various programming languages and workflows. This guide provides...
    11-07-2024, 11:22 PM
  • Building Your Own Ubuntu Personal Cloud: A Step-by-Step Guide to Creating a Secure Data Haven
    by Kasimba



    by George Whittaker


    In today’s digital world, data is more than just information; it’s a part of our lives. From photos and documents to sensitive personal information, our data represents our memories, work, and interests. While cloud storage services are widely available, they often come with privacy concerns, subscription fees, and limitations on customization. This is where building a personal cloud on Ubuntu comes...
    11-07-2024, 04:30 PM
Working...
X