Showing headlines posted by linuxer

( 1 2 3 4 5 6 ... 26 ) Next »

Ubuntu Network Configuration Guide

  • linuxconfig.org; By Korbin Brown (Posted by linuxer on May 1, 2024 12:20 PM EDT)
  • Story Type: Tutorial; Groups: Ubuntu
Network setup for Ubuntu can range from easy to hard, depending on what you’re trying to do. Canonical prides itself on making their Ubuntu Linux operating system very simple to use, even if you do not have a lot of technical knowledge. Despite its simplicity, Ubuntu has a lot going on under the hood to make things work, including networking configuration that allows you to connect to local devices or servers across the world.

How to Check MX Records Using the DIG Command

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 30, 2024 8:17 AM EDT)
  • Story Type: Tutorial; Groups: Linux
The Domain Information Groper (DIG) command is a versatile tool for querying Domain Name System (DNS) servers. It is commonly used by network administrators to troubleshoot DNS issues because of its flexibility in showing the various records associated with a domain. In this article, you will learn how to utilize the DIG command specifically to query for Mail Exchange (MX) records, which are essential for determining the mail servers responsible for email reception for a domain.

How to use docker-compose with Podman on Linux

  • linuxconfig.org; By Egidio Docile (Posted by linuxer on Apr 29, 2024 1:59 PM EDT)
  • Story Type: Tutorial; Groups: Linux
Podman is a free and open source alternative to Docker, created by Red Hat. Although Docker is probably more widespread, to the point that it became a synonym for “containers”, from a technical point of view, Podman is superior: it was designed, right from the start, to be daemonless, it is able to run without the need for root privileges, and is better integrated in the Linux environment. One of the things which potentially prevented many to migrate from Docker to Podman, was the lack of a full-fledged Podman equivalent for docker-compose. By creating a layer of compatibility between Podman and Docker, it is now actually possible to user docker-compose as if it was a Podman native tool.

Extracting Specific Files and Directories from GZIP Archives

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 29, 2024 3:04 AM EDT)
  • Story Type: Tutorial; Groups: Linux
Extracting files from compressed archives is a common task in Linux, essential for managing software, scripts, or datasets. Gzip with tar is widely used due to its efficiency in handling multiple files and directories. In this guide, we’ll explore how to effectively extract specific components from a gzip-compressed tar archive using ‘data.tar.gz’ as our example.

How to Check NVIDIA Driver Version on Linux

Understanding the version of the NVIDIA driver installed on your Linux system is crucial for compatibility with various applications, especially for gaming, scientific computing, and machine learning tasks. Whether you are troubleshooting a driver issue or ensuring that you meet the prerequisites for software that requires a specific driver version, knowing how to check your NVIDIA driver version is a useful skill.

Ubuntu: Change Default Terminal Emulator

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 22, 2024 11:43 AM EDT)
  • Story Type: Tutorial; Groups: Ubuntu
Changing the default terminal emulator in Ubuntu can sometimes lead to the error ‘Too many levels of symbolic links’. This issue can occur during the configuration of terminal alternatives. This guide will help you understand how to resolve this problem and set your preferred terminal emulator as the default on Ubuntu.

How to orchestrate restic backups with autorestic on Linux

  • linuxconfig.org; By Egidio Docile (Posted by linuxer on Apr 22, 2024 9:54 AM EDT)
  • Story Type: Tutorial; Groups: Linux
Restic is a modern backup program with support for encryption and deduplication. As we saw in this tutorial, Restic is easy to use, but it doesn’t make use of a configuration file, and doesn’t natively include a method to orchestrate and organize multiple backups. That is where autorestic comes in handy: it is a wrapper around Restic which let us configure and orchestrate backups in a single yaml configuration file, specifying multiple sources (locations) and destinations (backends).

How to Fix: Too Many Levels of Symbolic Links Error

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 18, 2024 12:10 PM EDT)
  • Story Type: Tutorial; Groups: Linux
The error “Too many levels of symbolic links” typically indicates a problem where a symbolic link points back to itself directly or indirectly, creating an infinite loop. This loop prevents the completion of operations involving the symlink such as reading or listing contents. Understanding how to properly use the ln command in Linux to create symbolic links is crucial for preventing this error.

How to Disable Unattended Upgrades on Ubuntu

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 17, 2024 4:04 PM EDT)
  • Story Type: Tutorial; Groups: Ubuntu
Unattended upgrades can be a double-edged sword. While they keep your system up to date automatically, they might also unexpectedly change the system’s state or introduce new issues without your prior knowledge. In certain environments, especially in production or where stability is a must, it might be preferable to disable these automatic updates. This guide will walk you through the steps necessary to disable unattended upgrades on your Ubuntu system.

How to Install G++ (C++ Compiler) on Ubuntu

Welcome to this comprehensive guide on installing and managing different versions of the G++ compiler on Ubuntu. The G++ compiler is a vital tool for developers who need to compile C++ applications, and having the correct version installed can significantly affect the functionality and compatibility of developed software. This tutorial is designed to help students, hobbyists, and professional developers successfully install the G++ compiler on their Ubuntu systems and navigate between different versions as needed.

Ubuntu Restricted Extras: What They Are and How to Install Them

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 12, 2024 3:18 PM EDT)
  • Story Type: Tutorial; Groups: Ubuntu
Ubuntu Restricted Extras is a software package that enhances the user experience on Ubuntu desktops by providing a set of important utilities and codecs that are typically not included in the standard installation. This includes media codecs necessary to play various audio and video files, support for playing DVDs, and Microsoft TrueType fonts. These are called “restricted” because they are not included with Ubuntu by default due to legal and copyright restrictions in various countries.

How to find my IP address on Ubuntu Linux

Finding your IP address on Ubuntu can be crucial for various networking tasks, such as setting up a server, troubleshooting connectivity issues, or simply ensuring your network’s security. Ubuntu, with its powerful command-line interface and graphical user interface options, offers multiple methods to discover your machine’s IP address. Whether you’re a seasoned system administrator or a curious novice, understanding how to locate your IP address is a valuable skill in the digital age. Keep in mind that your internal IP address is different from your system’s external IP.

How to fix: The requested nginx plugin does not appear to be installed

Encountering an error stating “the requested NGINX plugin does not appear to be installed” can be a stumbling block when setting up or configuring your web server. This issue often arises during the installation of Let’s Encrypt SSL certificates using Certbot or when configuring certain modules within NGINX. Fortunately, with a systematic approach, this problem can be resolved efficiently.

Germany's Government Embraces Linux: A Bold Step Towards Technological Sovereignty

  • linuxcareers.com; By Lucas Rees (Posted by linuxer on Apr 9, 2024 10:44 AM EDT)
  • Story Type: News Story; Groups: Linux
In an ambitious shift towards digital sovereignty, Schleswig-Holstein has set a notable precedent within Germany by initiating a large-scale transition from proprietary software to open-source alternatives. The German state's move signifies a broader commitment to independence, security, and sustainability in digital government operations.

How to Restart Network on Ubuntu Linux

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 8, 2024 10:55 AM EDT)
  • Story Type: Tutorial; Groups: Ubuntu
Network connectivity issues can be a common frustration for users of Ubuntu Linux. Whether you’re dealing with slow internet speeds, connection dropouts, or changes in network configuration, restarting your network services can often be a quick and effective solution. This guide will walk you through several methods to restart your network on Ubuntu Linux, ensuring you can get back online with minimal disruption.

Linux Users Alerted to Backdoor Threat in Popular Compression Tool

  • linuxcareers.com; By Lucas Rees (Posted by linuxer on Apr 5, 2024 5:54 PM EDT)
  • Story Type: Security; Groups: Linux
A critical warning was issued by the Cybersecurity and Infrastructure Security Agency (CISA) regarding the discovery of a hidden backdoor within a commonly utilized Linux utility. This utility, known for its file compression and encryption capabilities, serves as an essential tool for sharing files securely between systems.

Enabling SSH Root Login on Ubuntu/Debian Linux Servers

Securing remote server access is paramount for system administrators and developers. While it’s common practice to disable root login over SSH due to security concerns, there are scenarios where enabling it is necessary, such as when managing a remote server without a user account or for specific administrative tasks. This article guides you through enabling SSH root login on Ubuntu or Debian Linux servers or desktops, ensuring you can access your system with the necessary precautions.

Setting Up a Linux Intrusion Detection System with AIDE

An intrusion detection system (IDS) is an important security tool for system administrators. Its purpose is to notify us whenever it detects that a potential intrusion has occurred. When an attacker compromises a system, one of the first things they will usually do is attempt to change file permissions, attempt to escalate to the root user account, or start modifying system files. The IDS is configured to monitor for these changes and make us aware of them if they occur.

How to use Raspberry Pi to monitor network traffic

There are a plethora of tools available for the Raspberry Pi that system administrators can use to monitor network traffic. Newer Raspberry Pi models even come with a built in WiFi chip in addition to the traditional Ethernet port, giving us even more options for connecting to networks and monitoring traffic. Network monitoring can be useful for troubleshooting connectivity problems or identifying bottlenecks that are slowing down connections.

In this tutorial, we will go over various tools that can be used to monitor the network traffic on a Raspberry Pi. Along with default utilities on Raspberry Pi OS, additional packet sniffing and network analyzer tools such as Wireshark can be installed and used to gather information on network traffic. Let’s see how to use them.

Converting Images to AVIF on Linux, Including JPG, PNG, and WebP Formats

The AVIF (AV1 Image File Format) is gaining popularity for its impressive compression capabilities without sacrificing image quality, making it a preferred choice for web developers and photographers alike. This guide explores various methods to convert images to AVIF format on Linux, enabling users to leverage this advanced image format’s benefits.

( 1 2 3 4 5 6 ... 26 ) Next »