today's howtos
-
How to install RubyMine on Linux Mint 21 - Invidious
In this video, we are looking at how to install RubyMine on Linux Mint 21.
-
How to install Krita on a Chromebook
Today we are looking at how to install Krita on a Chromebook.
If you have any questions, please contact us via a Rumble comment and we would be happy to assist you!
Please use the video as a visual guide, and the commands and links below to install it on your Chromebook.
-
Installing the latest development version of Hyperbole
The latest development version of Hyperbole can be installed directly from the GNU-devel ELPA Packages using built-in Emacs Package Manager.
The Elpa GNU-devel package repository provides a development version of Hyperbole. It pulls from the latest Hyperbole development branch to get the tip version and makes an installable package. This is done on a daily basis. Installing this does not require any new package manager software. Since Hyperbole is a mature package, this version is usually fine to use and is updated on a day-to-day basis. But new features are tested on this branch and once in awhile it may break for a short time before a fix is pushed.
-
Copy a file with progress and save hash to a different file
-
EX180 Series: Deploying a Rootless Multi-Container WordPress Application with Podman
We’ve covered most of the exam objectives related to Podman in the previous article. What we’re going to do today is to take a look at how to use environment variables, set up persistent storage and perform a multi-container deployment of a WordPress application.
-
How to Install VirtualBox Ubuntu Linux
Oracle VM VirtualBox 7.0, the latest free and open-source hypervisor from Oracle has been released with numerous new features and improvements. The new version sees additions such as a recent utility showing performance statistics for running guests, secure boot support, Full VM encryption support (via CLI), and a reworked virtual machine wizard. Additionally, various bugs have been fixed in this release. For more information, visit the VirtualBox 7.0 changelog.
In the following tutorial, you will learn how to install VirtualBox 7.0 on your Ubuntu 22.10, 22.04 and 20.04 system by importing the official virtual box repository and installing the most up-to-date version using the command line terminal. The extra benefit for users using this method is that you will receive them instantly from the VirtualBox repository when updates drop.
-
How to run multiple versions of PHP on a server with Rocky Linux 9 / 8
Today, you will learn how to run multiple versions of PHP on a server with Rocky Linux 9 / 8
As we all know, PHP is an important language at server level since it has been used to create most of the web applications that exist. However, many times having so many web applications on the same server can cause the need to have several versions of PHP.
Let’s go for it.
-
Why are PBKDF2-SHA256 and PBKDF2_SHA256 different in 389-ds? - Firstyear's blog-a-log
Passwords are a shared-knowledge secret, so knowledge of the password allows you to authenticate as the person. When we store that secret, we don’t want it stored in a form where a person can steal and use it. This is why we don’t store passwords cleartext - A rogue admin or a database breach would leak your passwords (and people do love to re-use their passwords over many websites …)
Because of this authentication experts recommend hashing your password. A one-way hash function given an input, will always produce the same output, but given the hash output, you can not derive the input.
However, this also isn’t the full story. Simply hashing your password isn’t enough because people have found many other attacks. These include things like rainbow tables which are a compressed and precomputed “lookup” of hash outputs to their inputs. You can also bruteforce dictionaries of common passwords to see if they match. All of these processes for an attacker use their CPU to generate these tables or bruteforce the passwords.
Most hashes though are designed to be fast and in many cases your CPU has hardware to accelerate and speed these up. All this does is mean that if you use a verification hash for storing passwords then an attacker just can attack your stored passwords even faster.
To combat this, what authentication experts truly recommend is key derivation functions. A key derivation function is similar to a hash where an input always yields the same output, but a KDF also intends to be resource consuming. This can be ram or cpu time for example. The intent is that an attacker bruteforcing your KDF hashed passwords should have to expend a large amount of CPU time and resources, while also producing far fewer results.