today's howtos
-
How to Deal With Spaces in Filenames on Linux
Like most operating systems, Linux supports filenames with spaces in them. But using these filenames on the command line isn’t always straightforward. Here are several ways you can handle filenames containing spaces.
-
How to Check Whether Your Disk Is an SSD or HDD on Linux
Solid-state drives (SSDs) have been on the rise in recent years; they are fast, silent, and less prone to failure than traditional hard disk drives (HDDs). Still, HDDs power a lot of computers.
Not sure what kind of disk drive your Linux PC is using? Here’s how to easily check your disk type without opening the hood.
-
How to install Pinta on KDE Neon - Invidious [Ed: Pinta is a Microsoft Mono vector; better to use GIMP or Krita]
-
How to install CLion 2022.3 on a Chromebook
Today we are looking at how to install CLion 2022.3 on a Chromebook.
If you have any questions, please contact us via a Rumble comment and we would be happy to assist you!
-
How to Switch from Debian Stable to Testing
If you are looking for the most stable Linux distribution, sure, Debian is the right choice.
Especially if you are planning to use it on servers.
But, on the desktop side, things are a bit different. I mean, you are given packages that are at least a year old and support for new-age hardware is even worse.
So what do you do in those cases, Well, you can use Debian testing!
-
APT vs APT-GET Commands: What's the Difference?
This article guide takes a look at the usage of ‘apt’ and ‘apt-get’ commands in Debian-based Linux distributions like Ubuntu and Linux Mint. It further clarifies the confusion that might be behind the usage of these two commands.
-
How to Install Visual Studio Code on Fedora 37/36/35 [Ed: Don't do it. This is proprietary software that Microsoft uses to spy on developers. It's an attack on programmers' rights and freedoms.]
-
Install Telnet Client on Ubuntu 22.04
In this post, you will learn how to install a Telnet client on Ubuntu 22.04.
Telnet is a tool that has been used for decades by computer system administrators in the networking field. So, you may notice that it is a remote access technology that is already a few years old,
Precisely because of the outdated nature of the technology, it has fallen into disuse and is even considered insecure.