Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 974 975 976 977 978 979 980 981 982 983 984 ... 7359 ) Next »
9 Best File Comparison and Difference (Diff) Tools for Linux
While writing program files or normal text files, programmers and writers sometimes want to know the difference between two files or two versions of the same file. When you compare two computer files on Linux, the difference between their contents is called a diff.
How to monitor disk space usage with shell script
This shell script will trigger an email when the system reaches a given threshold.
Google says Pixel 6, 6 Pro coming this year with custom AI acceleration
For now, tedious Apple-grade teasing. Google says the latest iteration of its Android smartphones, the Pixel 6 and Pixel 6 Pro, are coming this fall.…
Use OpenCV on Fedora Linux - part 1
Learn how to start using the 2500+ computer vision algorithms of OpenCV in this short introductory article! And stay tuned for part two!
Updated 20 Command Line Tools to Monitor Linux Performance
It’s really a very tough job for every System or Network administrator to monitor and debug Linux System Performance problems every day.
Does the world need another cross-platform framework? Tough, here's JetBrains with Compose Multiplatform
'A different way of thinking about applications' says project lead. An open-source Kotlin framework for cross-platform applications, based on Jetpack Compose for Android, is now in preview.…
Podman Tutorial – Get Started With Podman
This comprehensive tutorial teaches you Podman basics, such as how to search and download images, create a new container from the image, run a container, remove a container, and build your own image from the container and more.
Paragon’s NTFS3 Driver is About to Become A Part of the Linux Kernel
Paragon’s NTFS3 driver fully supports reads and writes and many other features not found with the existing Linux driver. This new driver is much better off for those needing to deal with Microsoft NTFS file-systems from Linux.
Use OpenCV on Fedora Linux -- part 2
Check out the long-awaited part two of the OpenCV on Fedora Linux series! Learn how to access individual pixels and how to resize, crop, and flip images programmatically.
How to Install Fail2ban with Firewalld on Rocky Linux 8.4
Fail2ban is a system daemon for protecting servers from malicious login and brute-force attacks. Fail2ban is an open-source IPS (Intrusion Prevention Software) framework written in Python. In this guide, you will learn how to install fail2ban on Rocky Linux, configuring fail2ban with firewalld, and securing the SSH service against brute-force attacks.
How to Convert a PDF File to PNG/JPG Image in Linux
Portable Document Format (PDF) files are widely used nowadays. Images in any format are still easier to edit and manipulate than PDF files so it is general practice to convert pdf files to images to edit them. In this article, you will learn different ways to convert PDF files to images.
How to Install Latest qBittorrent on Ubuntu 20.04 Desktop and Server
In the following tutorial, you will learn how to install qBittorrent on Ubuntu 20.04 and 21.04.
qBittorrent is a cross-platform free and open-source BitTorrent client. qBittorrent is a native application written in C++ which uses Boost, Qt 5 toolkit, and libtorrent-rasterbar library and is extremely lightweight and fast. qBittorrent is very popular amongst torrent users as the main alternative to UTorrent.
qBittorrent is a cross-platform free and open-source BitTorrent client. qBittorrent is a native application written in C++ which uses Boost, Qt 5 toolkit, and libtorrent-rasterbar library and is extremely lightweight and fast. qBittorrent is very popular amongst torrent users as the main alternative to UTorrent.
Python Wrapper for C++ solving the recent YandexQ problem
In this post I follow approach suggested in How to wrap a C++ object using pure Python Extension API which differs from C++ coding technique been presented earlier. Public Class Strike containing method "filter" is supposed to be declared. Later on in PyStrike_init( ) new instance of this class is been created.
Access OpenVPN from a client computer
OpenVPN creates an encrypted tunnel between two points, preventing a third party from accessing your network traffic. By setting up your virtual private network (VPN) server, you become your own VPN provider. Many popular VPN services already use OpenVPN, so why tie your connection to a specific provider when you can have complete control yourself?
read more
lfs – list your filesystems
lfs is an open source utility that lists your file systems improving on the venerable df utility in a number of ways.
How to Install and Configure HAProxy on Rocky Linux 8
HAProxy is a free, open source and reliable load balancer designed for high traffic websites. It load balances incoming traffic by distributing it across multiple backend servers. In this article we show you how to install and configure HAProxy on Rocky Linux 8.
Set up a VPN server on your Linux PC
Have you been connected to an untrusted network such as a hotel or café WiFi and need to securely browse the internet from your smartphone or laptop? By using a virtual private network (VPN), you can access that untrusted network anonymously and as safely as if you were on a private network.
VPN is an amazing tool for safeguarding private data. By using a VPN, you can connect to a private network on the internet while maintaining anonymity.
read more
Top 5 Software Tools for Linux with Data Encryption
Data encryption is a must-have feature in today’s world of cybersecurity. It allows you to encode your data making it unintelligible to someone who doesn’t have the authorized access. To be more secure online, it might be a good idea to opt for software that comes with this useful feature by default.
Best Arch Linux Based Distributions in 2021
Here list of the 6 best Arch Linux-based distributions in 2021. Arch Linux has a reputation for being a do-it-yourself Linux distribution.
Get started with Argo CD
In a typical push-based deployment, tools like Ansible and Jenkins connect directly to the server or cluster and execute the provisioning commands. This approach works well when the cluster is accessible on the network and there is direct connectivity between your deployment server and the destination server. For compliance or security reasons, connectivity between the deployment tool and the cluster may not be possible.
read more
« Previous ( 1 ... 974 975 976 977 978 979 980 981 982 983 984 ... 7359 ) Next »