Showing headlines posted by bob
« Previous ( 1 ... 243 244 245 246 247 248 249 250 251 252 253 ... 1245 ) Next »Are you using this magic method for filesystems from Python 3.6?
This is the seventh in a series of articles about features that first appeared in a version of Python 3.x. Python 3.6 was first released in 2016, and even though it has been out for a while, many of the features it introduced are underused and pretty cool. Here are three of them.
4 essential characteristics of successful APIs
If you are building an application that uses some variation of a client/server model, you need an application programming interface (API). An API is a clearly defined boundary between one process and another. A common boundary in web applications is a REST/JSON API.
Network address translation part 4 - Conntrack troubleshooting
This is the fourth post in a series about network address translation (NAT). The first article introduced how to use the iptables/nftables packet tracing feature to find the source of NAT-related connectivity problems. The second article introduced the “conntrack” command. The third article gave an introduction to the “conntrack” event framework. This article shows how […]
Microsoft sheds some light on perplexing Outlook blank email incident: Word was to blame
Office 365 users learn that Microsoft can make or break their productivity every 4 hours. Microsoft has published a Preliminary Post Incident Report on last week's events which broke Outlook on Windows for millions of users, making emails impossible to view or create.…
Firefly launches $89 and up SBC with an RK3566 and M.2 storage
Firefly has launched a “ROC-RK3566-PC” SBC with a Rockchip RK3566 and 2GB ($89) or 4GB ($119) RAM plus 32GB eMMC, GbE, WiFi/BT, MIPI, HDMI, M.2, and 3x USB. Specs have also been posted for a RK3568-based model. T-Chip Technology’s Firefly community project is continuing its transition to Rockchip’s quad-core, Cortex-A55 based RK3566 and RK3568 by […]
Use open source tools to set up a private VPN
Getting from one place to another over a computer network can be a tricky thing. Aside from knowing the right address and opening the right ports, there's the question of security. For Linux, SSH is a popular default, and while there's a lot you can do with SSH it's still "just" a secure shell (that's what SSH stands for, in fact.) A broader protocol for encrypted traffic is VPN, which creates a unique, virtual private network between two points.
read more
Convenient matrices and other improvements Python 3.5 brought us
This is the sixth in a series of articles about features that first appeared in a version of Python 3.x. Python 3.5 was first released in 2015, and even though it has been out for a long time, many of the features it introduced are underused and pretty cool. Here are three of them.
The @ operator
The @ operator is unique in Python in that there are no objects in the standard library that implement it! It was added for use in mathematical packages that have matrices.
read more
How to Install Drupal 9 on Fedora 34
This tutorial shows you how to install Drupal 9 CMS on Fedora 34. We will use Apache as the webserver and MariaDB for the database.
Manage AWS SNS Topics using aws-cli
In this article, I will show you the commands to create an SNS Topic, Subscription, confirm, and delete the Subscription on Linux shell using aws-cli.
Looking back at what Python 3.4 did for enum
This is the fifth in a series of articles about features that first appeared in a version of Python 3.x. Python 3.4 was first released in 2014, and even though it has been out for a long time, many of the features it introduced are underused and pretty cool. Here are three of them.
read more
How to Install WebERP On CentOS 8
webERP is a free, open-source, and complete web-based accounting and business management system. This tutorial will show you how to install webERP with Apache and Let's Encrypt SSL on CentOS 8.
Manage AWS VPC using aws-cli
Managing a VPC and other resources like Subnet, Route Table, Internet Gateway from the terminal using aws-cli can be a bit confusing if you are not good at VPC. In this article, we will create a VPC with 2 Subnets, Route Table, and Internet Gateway, these subnets will be public subnets.
What Python 3.3 did to improve exception handling in your code
This is the fourth in a series of articles about features that first appeared in a version of Python 3.x. Python 3.3 was first released in 2012, and even though it has been out for a long time, many of the features it introduced are underused and pretty cool. Here are three of them.
read more
How to Install CTparental Parental Control Software on Debian 10
CTparental is a free and open-source parental control tool used to control computer usage or internet browsing. In this post, we will show you how to install CTparental on Debian 10.
How to Install Chrony NTP Server on CentOS 8
Chrony is the default Network Time Protocol (NTP) server in CentOS 8 operating system. It is a replacement for the old Ntpd. In this tutorial, I will show you how to install and use Chrony on CentOS 8 server.
Xavier NX based edge AI camera offers up to an 8MP sensor
Adlink’s “NEON-2000-JNX” embedded C-mount camera runs an Ubuntu-based “EVA” stack on a Jetson Xavier NX and provides GbE, USB Type-C with DP, and support for 6x sensors up to an 8MP Sony IMX334. In July of last year, Adlink unveiled a NEON-2000-JT2 Series embedded machine vision camera that came with a choice of a Nvidia’s […]
What is Ingress Controller and how to deploy Nginx Ingress Controller in Kubernetes Cluster on AWS using Helm
Ingress is a Kubernetes object that manages external access to the services in the Kubernetes Cluster. In this article, we will see the installation of the Nginx Ingress Controller using Helm on the Kubernetes Cluster set up using Kops.
Systemd Service Strengthening
In an age where hacker attacks are a daily occurrence, it is of fundamental importance to minimize the attack surface. Containerization is probably the best way to isolate a service provided for the public, but this is not always possible for several reasons. For example, think of a legacy system application developed on systemd. This could make the most of the capabilities provided by a systemd-based operative system and it could be managed via a systemd unit, or it could automatically pull updates using a systemd timer, and so on. For this reason, we are going to explain how to improve the security of a systemd service.
Linux and open-source communities rise to Bidens cybersecurity challenge
Massive ransomware attacks to the left of us, supply chain attacks to the right of us, but the Linux Foundation is answering the president's call for greater software security.
How to Install Memcached on CentOS 8
Memcached is an open-source and high-performance memory caching system. It stores data in memory and is being used for optimizing dynamic websites. In this guide, I will explain how to install Memcached on CentOS 8 operating system.
« Previous ( 1 ... 243 244 245 246 247 248 249 250 251 252 253 ... 1245 ) Next »
