today's howtos
-
HowTo Forge ☛ How to Install Mattermost on Rocky GNU/Linux 9
Mattermost is an open-source and self-hosted messaging system for your organization. It is an alternative to services like Slack and Abusive Monopolist Microsoft Teams.
-
HowTo Forge ☛ How to Install and Use Vuls Vulnerability Scanner on Ubuntu 24.04
With Vuls, you can scan multiple operating systems using multiple methods. You can scan the locals of your host, and you can scan remote hosts/servers via SSH. It also provides multiple scanning methods, a fast scan that does not require root privileges and a deep scan that requires root privileges. Vuls can scan multiple target servers at once. When the scan is finished, you can send the result via Email and Slack.
In this guide, we'll show you how to install Vuls Vulnerability Scanner on Ubuntu 24.04 server. You'll be installing Vuls, generating CVE databases, and scanning Ubuntu/Debian via local and remote scans.
-
Dan Q ☛ Build Colors from Colors with CSS Relative Color Syntax
The feature here is that you can take a color you already have and manipulate its components. Which things you can change vary by the color space you choose, so for an RGB color you can change the red, green, blue, and alpha channels, for an HSL color you can change hue, saturation, lightness, and alpha, and for my beloved OKLCH you can change lightness, chroma, hue, and yes, opacity.
-
University of Toronto ☛ Complications in supporting 'append to a file' in a NFS server
In the comments of my entry on the general problem of losing network based locks, an interesting side discussion has happened between commentator abel and me over NFS servers (not) supporting the Unix O_APPEND feature. The more I think about it, the more I think it's non-trivial to support well in an NFS server and that there are some subtle complications (and probably more than I haven't realized). I'm mostly going to restrict this to something like NFS v3, which is what I'm familiar with.
-
University of Toronto ☛ Losing NFS locks and the SunOS SIGLOST signal
NFS is a network filesystem that famously also has a network locking protocol associated with it (or part of it, for NFSv4). This means that NFS has to consider the issue of the NFS client losing a lock that it thinks it holds. In NFS, clients losing locks normally happens as part of NFS(v3) lock recovery, triggered when a NFS server reboots. On server reboot, clients are told to re-acquire all of their locks, and this re-acquisition can explicitly fail (as well as going wrong in various ways that are one way to get stuck NFS locks). When a NFS client's kernel attempts to reclaim a lock and this attempt fails, it has a problem. Some process on the local machine thinks that it holds a (NFS) lock, but as far as the NFS server and other NFS clients are concerned, it doesn't.
-
Hyperdoc Inc ☛ How WebSockets cost us $1M on our AWS bill
To support zero-copy reads we feed frames from the peek pointer into our media pipeline, and only advance the read pointer when the frame has been fully processed.
This means that it's safe for the media pipeline to hold a reference to the data inside the ringbuffer, since that reference is guaranteed to be valid until the data is fully processed and the read pointer is advanced.
We use atomic operations to update the pointers in a thread-safe manner, and to signal that new data is available or buffer space is free we use a named semaphore.
After implementing this ringbuffer, and deploying this into production with a few other optimizations, we were able to reduce the CPU usage of our bots by up to 50%.
-
Unix Men ☛ How to Fix SSH Connection Refused Error
Are you encountering the frustrating “Connection refused” error when trying to connect via SSH? This comprehensive guide will help you identify and fix SSH connection issues step by step.
-
Unix Men ☛ How to Install NumPy in Python
Here are a few Python coding tips for every beginner coding geek
-
Unix Men ☛ Yum: Install a Specific Version of Package on GNU/Linux Device
Yum is the package manager of choice in most GNU/Linux based operating systems, especially CentOS and RedHat systems. Since CentOS is approaching EOL shortly, the official migration platform proposed by CentOS is to RedHat Enterprise GNU/Linux (RHEL). Both of these platforms use Yum as their package manager.
-
Unix Men ☛ Guide for Ubuntu: Install NodeJs instructions
Node.js (or NodeJs as it is commonly called), is a well-known open-source javascript runtime. It allows developers to run Javascript (referred to as JS generally and in this article as well) on the server side. Node.js allows seamless back-end development and full-stack applications.
-
Ubuntu Handbook ☛ Install GIMP 3.0 RC1 via PPA in Ubuntu 24.04 | 24.10
GIMP, the popular free open-source image editor, announced the first release candidate for the next major 3.0 version on Wednesday. So, what exactly is a “release candidate” (RC)? A
-
Unix Men ☛ Understanding Symlink: Beginner’s Guide to Symbolic Links
What is a Symlink? A symlink, short for symbolic link, is a special type of file that serves as a reference or pointer to another file or directory.
-
idroot
-
ID Root ☛ How To Install Grub Customizer on Linux Mint 22
Grub Customizer is a powerful graphical tool that simplifies the process of managing and customizing the GRUB2 bootloader. If you’re using Linux Mint 22 and want more control over your boot menu, Grub Customizer is the perfect solution.
-
ID Root ☛ How To Change Hostname on Fedora 41
The hostname is a unique identifier assigned to a device on a network. It serves as a human-readable name for your Fedora 41 system, making it easier to recognize and manage within a network environment.
-
ID Root ☛ How To Install Yarn on AlmaLinux 9
In the ever-evolving world of web development, efficient package management is crucial for streamlined workflows and robust project structures. Yarn, a fast, reliable, and secure dependency management tool, has gained significant popularity among developers.
-
ID Root ☛ How To Install PyCharm on Fedora 41
PyCharm is a powerful Integrated Development Environment (IDE) designed specifically for Python programming. It offers a range of features that enhance productivity, such as intelligent code completion, debugging tools, and seamless integration with version control systems.
-
ID Root ☛ How To Install Zabbix on Ubuntu 24.04 LTS
In today’s digital landscape, monitoring the performance and health of your IT infrastructure is crucial. Zabbix, an open-source monitoring solution, provides comprehensive tools for tracking servers, applications, and network devices.
-
ID Root ☛ How To Set Static IP Address on Ubuntu 24.04 LTS
Configuring a static IP address on your Ubuntu 24.04 LTS system can significantly enhance your network management capabilities. A static IP address provides a consistent address for your device, making it easier to connect and communicate within a network.
-
ID Root ☛ How To Install Lynis on Fedora 41
In today’s digital landscape, securing your systems is more crucial than ever. One of the most effective tools for this purpose is Lynis, a powerful security auditing tool designed to help system administrators enhance their security posture.
-
ID Root ☛ How To Install Uptime Kuma on Ubuntu 24.04 LTS
In today’s digital landscape, monitoring the uptime and performance of your servers and websites is crucial. Enter Uptime Kuma, a powerful, self-hosted monitoring tool that provides real-time status updates, notifications, and detailed reports.
-
ID Root ☛ How To Install Tor Browser on Fedora 41
In today’s digital age, privacy and security have become paramount concerns for internet users worldwide. As cyber threats continue to evolve, it’s crucial to have tools that protect our online activities and personal information.
-
-
How to Install and Use GeoIP on AlmaLinux 9 or Rocky GNU/Linux 9
A tool known as “GeoIP” can be used to find the IP address according to the geographical location on AlmaLinux 9 or other similar RHEL distros such as Oracle Linux, Rocky Linux, Fedora, and CentOS.
-
How do you Turn off Password Authentication in SSH?
The system admin’s top priority is to ensure that robust security protocols have been implemented to safeguard servers and desktops in a network from unauthorized access.