Language Selection

English French German Italian Portuguese Spanish

today's howtos

Filed under
HowTos
  • Speak to me! – Purism

    My trusty laptop’s speakers gave up the ghost. I don’t like to sit around in headphones all the time, I don’t have any other speakers, and the replacements are still being manhandled by the postman.

    I’d get used to the austerity if I hadn’t started missing calls from a friend. That’s unacceptable! But what am I supposed to do? Buy extra gadgets just to throw them away after a week? Nope, I’m not that kind of a person.

    But hey – I have a Librem 5! It has a speaker. It’s open. I have control over it, and I’m a hacker too. So I should be able to come up with a hack to turn it into a speaker for my laptop, right?

    Pulseaudio to the rescue. I look through the guide. There it is: forwarding audio over a network.

  • How To Install CSF Firewall on Debian 11 - idroot

    In this tutorial, we will show you how to install CSF Firewall on Debian 11. For those of you who didn’t know, CSF is also known as “Config Server Firewall” is a free and advanced firewall for Linux systems. We should use ConfigServer Security & Firewall (CSF) since this CSF have more advanced and comprehensive features than other firewall application such as UFW, Firewalld, or Iptables. Compared to the other Linux firewall application, CSF is more user-friendly and effective which is mostly used by web hosting providers.

    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the ConfigServer Security & Firewall (CSF) on a Debian 11 (Bullseye).

  • What are the differences between SQL and MySQL | FOSS Linux

    Due to many organizations, businesses, companies, and firms making an online presence, databases have become the core requirement for their daily operations. A database in a layman’s language is defined as a collection of data stored and organized electronically to ensure easy retrieval, access, management, and manipulation of business data.

    Most business successes depend on databases since they aid in storing essential and relevant data in a central position. Besides, databases also help facilitate communication of crucial business info such as employee profiles, sales transactions, customer profiles, marketing campaigns, product inventory, etc. Furthermore, databases have ensured that the company’s data is secure through various authentication mechanisms like access specifiers, user logins, and sign-ups.

    This article will talk about the difference between the two popular relational databases SQL and MySQL.

  • How to install Funkin' Psych Engine on a Chromebook

    Today we are looking at how to install Friday Night Funkin' Psych Engine on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  • How to Use an SSH Key with Non-root Users - Unixcop

    You can SSH to your Linux instance as root with the key. However, the key doesn’t work for non-root users.

    So we will illustrate two methods to use SSH keys with non-root users.

  • Allow Port Through Firewall in Ubuntu 20.04 - Linux Nightly

    Ubuntu comes with ufw (uncomplicated firewall) installed by default. This is a frontend for iptables/nftables, the built-in Linux firewall, and is meant to make firewall management a bit easier.

    In this guide, you’ll see how to add rules to the firewall to open ports and allow certain services to have access through the firewall on Ubuntu.

  • Some regex tests with grep, sed and AWK

    In my data work I regularly do searching and filtering with GNU grep (version 3.3), GNU sed (4.7) and GNU AWK (4.2.1). I don't know if they all use the same regex engine, but I've noticed differences in regex speed between these three programs. This post documents some of the differences.

  • Upgrade to Fedora 35 from Fedora 34 using DNF – If Not True Then False

    This is guide, howto upgrade Fedora 34 to Fedora 35 using DNF. This method works on desktop and server machines. You can also upgrade older Fedora installations (example Fedora 33/32/31/30) directly to Fedora 35.

    I have tested this method on several machines, but if you have problems, please let me know. Always remember backup, before upgrade!

  • Jenkins: Basic security settings - Anto ./ Online

    Jenkins contains sensitive information. Thus it must be secured, like any other sensitive platform. Thankfully Jenkins provides you with many security options. This guide will show you all the essential bits that you need to know.

    You access these features on the Configure Global Security page under manage Jenkins.

  • LDAP query from Python · Pablo Iranzo Gómez's blog

    Recently, some colleagues commented about validating if users in a Telegram group were or not employees anymore, so that the process could be automated without having to chase down the users that left the company.

    One of the fields that can be configured by each user, is the link to other platforms (Github, LinkedIn, Twitter, Telegram, etc), so querying an LDAP server could suffice to get the list of users.

    First, we need to get some data required, in our case, we do anonymous binding to our LDAP server and the field to search for containing the ‘other platform’ links.

More in Tux Machines

LibreOffice Base Guide 7.2 has been released

The LibreOffice Documentation Team releases the Base Guide 7.2, based on refactored content from the Base Guide 6.4, with the 7.2 branding and text layout. It covers LibreOffice’s database component. The team decided to just fast-forward the release number, given the very little developments for Base since LibreOffice 6.4. The team intended to complete the Guide set for LibreOffice 7.2 and get ready to update contents of the set for the forthcoming LibreOffice 7.3 release. The LibreOffice Base Guide is a community effort that include valuable collaboration from Robert Großkopf, Pulkit Krishna, Dan Lewis, Drew Jensen (In Memoriam), Peter Schofield, Jost Lange, Steve Schwettman, Jean-Pierre Ledure, Jochen Schiffers, Martin Fox, Alain Romedenne, Jenna Sargent, Hazel Russman, Andrew Pitonyak and Randolph Gamo. Read more

Krita 4 splash screen

This easter egg is not part (yet) of Krita 5, will not be part of the release of 5.0 coming soon and that's good: you don't want to miss the new splash screen from Tyson Tan with the larger size in Krita 5. It's splendid! But for sure I'll try to propose an illustration for later Krita 5.1 or 5.2 release, one that could be ready before December 2022. Feel free to also contribute to make ones (it's not just a privilege I had), you just need to propose your artwork made with Krita, with an aspect ratio for this format, about the season, and with a permissive license (eg. CC-By 4.0). Don't forger to post-it on https://krita-artists.org/ , so the community and developers can see it. Read more

LoRa expansion boards work with Raspberry Pi SBC and Raspberry Pi Pico board (Crowdfunding)

We’ve covered a number of LoRa solutions based on Raspberry Pi boards, and SB Components is now offering another with the LoRa HAT for Raspberry Pi equipped with an Ebyte E22 LoRa module operating in either the 433 MHz, or 868 and 915 MHz bands. The company also offers a LoRa expansion for Pico based on the same E22 module, adding a small 1.14-inch LCD for information display, and designed for the Raspberry Pi Pico board with the RP2040 dual-core Cortex-M0+ microcontroller. Read more

Programming Leftovers