Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
  • Openstack RDO && KVM Hypervisor: Setting up KDE Plasma on Rocky Linux 8.4 KVM/VBOX 6.1.26 Guest on Server F34

    Following below is a brief set of instructions setting up KDE Plasma on RockyLinux along with Gnome Desktop Manager which is actually needed to support graphical login, otherwise system might be started via text login followed by "startx"

  • Automatically create multiple applications in Argo CD |

    In a previous article, I demonstrated how Argo CD makes pull-based GitOps deployments simple. In this tutorial, I’ll show you how to automatically create multiple applications in Argo CD using Argo CD itself.

  • How to back up MySQL databases from the command line in Linux | FOSS Linux

    The current technological evolution of every aspect of life has made data more precious than gold and silver. If you can acquire, grow, and protect data, you are one step away from being a data god. Yet, big companies that control life aspects like e-commerce, fuel, transport, and food landscapes rely on data protection to shield themselves from an inevitable collapse.

    Right now, losing data is like losing your life insurance. So the database management system you are using should have a backup orientation. If you are a MySQL administrator or a user dealing with growing data, you should consider implementing a more than frequent backup automation plan. Reason? You might end up being a victim of a data hack or even alter your data by accident.

    Such circumstances can lead to unforgiving data breaches, especially when you don’t have a database backup plan. If you are an invested MySQL user or administrator, this article is here to fix your database backup worries. We will meet two objectives. First, you will understand the implementation of exporting databases through “mysqldump”. Then, finally, we will touch on how using “crontab” can make this entire process easier through automation.

  • How To Install Nessus Scanner on Ubuntu 20.04 LTS - idroot

    In this tutorial, we will show you how to install Nessus Scanner on Ubuntu 20.04 LTS. For those of you who didn’t know, Nessus gives you malware detection, scanning of embedded devices, configurations auditing, control systems auditing, and compliance checks among other features. It is developed and maintained by Tenable. The vulnerability scanner platform can save the scan results in various formats such as plain text, XML, HTML, and LaTeX.

    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Nessus Scanner on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

  • How To Enable Full Disk Encryption on an Ubuntu 20.04 Desktop - JumpCloud

    Device security is one of the primary concerns that security professionals, developers, and other IT professionals have in the face of a growing number of cyber threats. Criminal hackers are increasingly more sophisticated in their attack vectors and constantly inventing new ways of bypassing even the most secure systems. Though some may argue that Linux is the most secure and stable operating system, it can still fall prey to the same misconfigurations and user errors that plague users of Mac and Windows devices.

    No device is foolproof, and like many things in your environment, your Linux system is as secure as its weakest point. The default configurations chosen during the first installation are not enough to harden your device, and unpatched Linux systems and the use of outdated software can significantly increase the chances of a breach. In a worst-case scenario you may find your hard drive completely wiped, with critical files inaccessible and possibly stolen without much evidence left behind. Source code stored on a Linux laptop could fall prey to malicious individuals or perhaps there is PII stored on the laptop in a local file or database; regardless of the individual use case, ensuring that your data is secure is critical.

    There are various steps you can take to safeguard Linux devices from potential breaches. One of them is enabling full disk encryption on their drive.

  • 40+ open source and Linux terms you need to know - TechRepublic

    If you’re new to Linux and open source software, you will quickly find that there are many terms to learn. Or maybe you’ve come across a word or two in your journey and found yourself lost. Fortunately, TechRepublic Premium is here to help you along the way.

    We’ve collected more than 40 terms that are commonly used within the open-source and Linux communities; terms that aren’t always in the regular parlance.

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.