today's howtos
-
TecAdmin ☛ Configuring Apache as Reverse Proxy for Odoo
This guide is tailored for system administrators and IT professionals who are looking to enhance their Odoo deployment with Apache, a robust and widely-used web server. By setting up Apache as a reverse proxy, you can not only streamline client requests but also add an extra layer of security to your Odoo instance.
-
Achieving Log Centralization and Analysis with Open Source SIEM and XDR: UTMStack
Deploying UTMStack for log centralization and analysis involves three main components: log collectors aka agents, a central server for log centralization, and correlation rules for detection and incident response.
-
Ubuntu Pit ☛ Linux Netstat Command Tutorial for SysAdmins [40 Examples]
The netstat (network statistics) utility in GNU/Linux provides information related to network connections. You can use various netstat commands to display active network connections, interface data, routing tables, and so on. These are essential information for network admins and infosec professionals.
-
LinuxConfig ☛ FFMPEG Script to Convert Multiple Files in Linux
-
Ubuntu Pit ☛ 14 Basic Tar Commands in GNU/Linux with Examples for Newbies
In Linux, Tar stands for tape archive. One of the important commands for facilitating archive functionality is this command, which creates and extracts archives. We can use the Tar command to create uncompressed and compressed files and modify as well as maintain them.
-
Ubuntu Pit ☛ 50 YUM Command Examples for RHEL or CentOS Users
YUM (Yellowdog Updater, Modified) is a free and powerful package manager for RPM-based GNU/Linux distributions. It was initially developed to manage packages on the RHEL but now works in all RPM-based systems, including CentOS, Fedora, Scientific Linux, and Oracle Linux.
-
Ubuntu Pit ☛ Command Options and Examples of Tee Command in Linux
In Linux, terminal commands are the handiest things one might focus on learning. If you’re a new or professional GNU/Linux user, you might have used many commands to add or sum the results of more than one command in the shell.
-
SUSE's Corporate Blog ☛ How to extract the signer’s certificate and verify the signature of a GNU/Linux kernel image
It’s been quite a while since the introduction of UEFI and Secure Boot, which ensures that only code bearing a signature by a trusted party will get executed by the firmware.