today's howtos
-
How to Check Password Authentication is enabled in SSH or not?
Secure Shell (SSH) is a widely used protocol for managing servers remotely with a secure connection. Let’s learn a few methods to check whether your system enables password authentication in SSH. By default, SSH uses password authentication, which allows users to log in with a username and password.
-
How to Install FFmpeg on AlmaLinux 9 or Rocky Linux
FFmpeg is an open-source multimedia framework used widely by developers and multimedia users for video/audio conversion, streaming, and basic editing tasks. Even being free software, FFmepg supports many audio, video, and codec formats, making it a versatile Audio and video solution for GNU/Linux users.
-
idroot
-
ID Root ☛ How To Make Tetris Game using PyGame in Python
Tetris is one of the most iconic video games ever created, captivating players since its inception in 1984. Its simple yet addictive gameplay has inspired countless adaptations and clones. In this article, we will guide you through the process of creating your own Tetris game using PyGame, a popular library for game development in Python.
-
ID Root ☛ How To Install Mattermost on AlmaLinux 9
In today’s fast-paced digital landscape, effective communication and collaboration are paramount for teams to thrive. Mattermost, an open-source messaging platform, provides a robust solution for organizations looking to enhance their internal communications.
-
ID Root ☛ How To Install Composer on Fedora 41
Composer is an essential tool for PHP developers, acting as a dependency manager that simplifies the process of managing libraries and packages. By automating the installation and updating of these dependencies, Composer enhances productivity and ensures that projects remain organized.
-
ID Root ☛ How To Install Composer on Ubuntu 24.04 LTS
In the world of PHP development, Composer has become an indispensable tool for managing dependencies and streamlining project workflows. As Ubuntu 24.04 LTS continues to be a popular choice for developers and system administrators, understanding how to properly install and configure Composer on this platform is crucial.
-
ID Root ☛ How To Install Wireguard on AlmaLinux 9
In today’s interconnected world, secure communication is paramount. Whether you’re a system administrator, a privacy-conscious individual, or a business owner, setting up a reliable Virtual Private Network (VPN) is crucial. This guide will walk you through the process of installing WireGuard, a cutting-edge VPN protocol, on AlmaLinux 9, a robust and community-driven enterprise GNU/Linux distribution.
-
-
University of Toronto ☛ Notes on the compatibility of crypted passwords across Unixes in late 2024
For years now, all sorts of Unixes have been able to support better password 'encryption' schemes than the basic old crypt(3) salted-mutant-DES approach that Unix started with (these days it's usually called 'password hashing'). However, the support for specific alternate schemes varies from Unix to Unix, and has for many years. Back in 2010 I wrote some notes on the situation at the time; today I want to look at the situation again, since password hashing is on my mind right now.
-
Howard Oakley ☛ Why you need to make archives, and how to
We back up to ensure that we can recover files, whole volumes, our complete Mac if needed. When that crucial document you were working on earlier has vanished, or becomes damaged, or disaster strikes a disk, backups are essential. But how do you preserve all those documents that used to come on paper, records, correspondence and certificates? How will you or your successors be able to retrieve them in ten or thirty years time? This brief article considers how you should archive them safely, which isn’t the same as backing them up.
By archiving, I mean putting precious files somewhere they can be retrieved in at least ten years time. They may include financial, business, employment and personal records, as well as all finished work that you want to record for posterity. For most, they’ll also include a careful selection of still images, movies, and the more important documents you might create, such as books, theses and papers. They’re what you and the law want you to keep in perpetuity, and to be able to retrieve even after you’re gone.
To see how this can be achieved, I consider: the storage medium to be used, file formats that will be retrievable, how to index them for access, physical storage conditions, and the checks of their integrity that are needed.