today's howtos
-
How to Create a New User and Grant Permissions in MySQL
MySQL is a popular open-source relational database management system that helps businesses manage large amounts of data efficiently. One of the key features of MySQL is its ability to create multiple users with different permissions, allowing businesses to control who has access to what data.
-
How to Remove Docker Images, Containers, and Volumes
Docker has become an indispensable tool for developers and system administrators. It enables them to run applications in isolated containers, making it easy to manage dependencies and streamline deployment processes. However, as you work with Docker, you may accumulate unused images, containers, and volumes, which can occupy valuable storage space.
-
How to Write Bash Script with User Input
-
How to Install and Configure UFW Firewall on Ubuntu 22.04 or 20.04
This in-depth guide will walk you through installing and configuring the Uncomplicated Firewall (UFW) on Ubuntu 22.04 and 20.04. We will provide multiple configuration examples, detailed explanations of each command, and discuss additional features such as logging, application profiles, and remote connections.
-
How to Configure Security Headers in Nginx
In this article, we will discuss how to improve the security of your web server by implementing various security headers in NGINX. By utilizing security headers, you can safeguard your website against a wide range of web-based attacks and ensure the protection of user data. What are Security Headers in Nginx?
-
How To Install MariaDB on Fedora 37
In this tutorial, we will show you how to install MariaDB on Fedora 37. For those of you who didn’t know, MariaDB is a popular open-source database management system that is widely used in web applications.
-
How to Configure Linux Mint 21 Automatic Updates
Keep your Linux Mint 21 up-to-date and bug-free with automatic updates. Learn how to set them up with our step-by-step guide.
-
Linux Mint User and Group Management
This article will provide an overview of managing users and groups in Linux Mint, a popular Linux distribution. It will cover the basics of user management, including adding and deleting users, modifying user settings, and managing user groups.
-
How to Get a Directory Size in Linux: Practical Examples
Getting a directory size in Linux is common for administrators and users who want to manage their disk space effectively. This article will explore 10 examples of how to get the size of a directory in Linux using various commands and scripting techniques.
-
How to Use Fail2ban Commands in Linux
Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. It does this by monitoring system logs for repeated failed login attempts and blocking the offending IP addresses.
-
Python Variables: Concepts and Examples
Python is a versatile and powerful programming language popular among developers for its readability and ease of use. In this article, we will explore the concept of variables in Python and understand how to use them effectively. We will cover ten topics with three unique examples and break them down into relevant sections.
-
How to Create a Systemd Service in Linux
This comprehensive guide focuses on mastering systemd services—an integral aspect of contemporary Linux systems. By delving into the structure of systemd service files and understanding how to create custom services for root and normal users, readers will acquire the knowledge and expertise necessary to manage and develop systemd services proficiently.
-
How to Delete a Git Branch Locally and Remotely
In Git, people often make different branches to work on new features and bug fixes, while keeping them separate from the main codebase. But when the work on a feature is done, it's a good idea to remove the branch to keep things tidy and clear.
-
Status Resolved: Failed! Error: SET PASSWORD has no significance for user ‘root’@’localhost’
Getting error: "Failed! Error: SET PASSWORD has no significance for user ‘root’@’localhost"? Then read the steps here to fix it up. When you run the mysql_secure_installation command in your terminal window, it will ask you to enter the root password and set up security options for your MySQL installation.
-
Managing Large-Scale Web Applications with NGINX on Linux
Introduction NGINX is a popular open-source web server known for its high performance and scalability. It is commonly used to manage large-scale web applications that require high availability and performance.
-
Linux Shell Scripting: Automating Tasks and Streamlining Workflows
Introduction Linux shell scripting is writing scripts to automate tasks and streamline workflows in the Linux operating system. With the power of the Linux command line interface and a range of scripting languages available, users can write scripts to automate repetitive tasks, perform complex data manipulations, and even build entire applications.
-
Building a Real-Time Data Pipeline with Apache Kafka on Linux
Introduction Building a real-time data pipeline is a common requirement for modern data-driven applications. Apache Kafka is a popular distributed streaming platform allowing developers to build scalable, fault-tolerant, highly available real-time data pipelines.
-
Configuring a Load Balancer on Ubuntu Server: A Step-by-Step Tutorial
This tutorial will show you how to configure a load balancer on Ubuntu Server. Introduction Load balancing is a critical component of modern web applications, allowing them to distribute traffic across multiple servers to improve performance, scalability, and availability.
-
Boost Your Network Performance: How To Clear DNS Cache on Linux
As a Linux user, you might have experienced slow internet connections or the inability to access some websites. Often, this issue can be traced back to your DNS cache.
-
Fix “Updating from such a repository can’t be done securely” Error In Linux
How to fix the “Updating from such a repository can’t be done securely” error in Linux You might have encountered this error while trying to run the apt update or the apt upgrade command.
-
Everything You Need to Know About UFW Logs
Learn all about UFW logs and how to use them effectively. This comprehensive guide covers everything you need to know about UFW logs.
-
Check for Container Image Vulnerabilities with Trivy
Security should be one of the most important aspects of container deployments, especially for enterprise production environments that depend on highly scaled applications and services that will not only see massive demand but that will also interact with other services, servers, APIs, etc.
If you skimp on security, you could leave your company open to hacking. All it takes is one hacker gaining access to a single container and they could wind up with the keys to your kingdom.
You don’t want that.
The thing is security has to start from the ground up, otherwise, everything is susceptible. Think of it this way: You cannot build a house on a foundation with cracks, holes, and other vulnerabilities and expect it to be secure. Eventually, that house could crumble. Containers are the same way. If you build them on a foundation with vulnerabilities, there’s no way they’ll be secure.
-
6 Ways to Find a Raspberry Pi's IP Address
Quite often, it is necessary to know the IP address of your Raspberry Pi. You will need the IP to configure any service related to networking, such as SSH. Also, you need to know the IP when using the Pi as a web server, a file server, or a print server.
It is easy to find the Raspberry Pi's IP address using the GUI, command line, or network scan, which are all discussed here.
-
How to Connect to a Wi-Fi Network on Ubuntu Server
Ubuntu Server is a powerful server operating system. It's very much similar to Ubuntu Desktop but comes without the GUI. You interact with the system primarily via the terminal.
If you are used to connecting Ubuntu to Wi-Fi from the GUI, you might find it a bit tricky to connect to Wi-Fi from the command line. Don't worry though, here's how you can connect to Wi-Fi on Ubuntu Server.