Showing headlines posted by linuxer
« Previous ( 1 ... 2 3 4 5 6 7 8 9 10 11 12 ... 35 ) Next »Setting Up Nginx Reverse Proxy Server on Ubuntu/Debian
A reverse proxy server is a type of server that sits in front of web servers and forwards client (e.g., web browser) requests to those web servers. Reverse proxies are typically installed to increase security, performance, and reliability. This tutorial will guide you through the process of setting up Nginx, a high-performance and highly scalable web server, as a reverse proxy on a system running Ubuntu or Debian.
How to Find Writable Files and Directories in Linux
When managing a Linux system, ensuring the security and appropriate permissions of files and directories is crucial. Particularly, being aware of which files and directories have write permissions is important for system security and data integrity. This guide will show you how to use the find command to search recursively through the file system to identify files and directories based on their write permissions.
How to disable NGINX logging on Linux
Disabling logging in NGINX can be useful for various reasons, such as reducing disk usage, improving performance, or simply because you don’t need the logs for a particular application. This guide will walk you through the steps to disable access and error logging in NGINX on a Linux system.
How to Retrieve Docker Container’s Internal IP Address
Docker containers are an essential part of modern application deployment and development. Often, there is a need to know the internal IP address of a Docker container for debugging, networking, or integration purposes. This article will guide you through the steps to retrieve the internal IP address of a Docker container using different methods.
Bash Scripting: Understanding the Use of Parentheses, Brackets, and Braces
In this tutorial, we will explore the various uses of parentheses, brackets, and braces in BASH scripting. These symbols have distinct functionalities and are crucial for writing effective scripts. Understanding their uses can help you in tasks such as arithmetic operations, test constructs, and parameter expansions.
Using sed and Bash to Fill Empty Cells in a CSV File
Dealing with CSV files containing empty cells can be challenging, especially when trying to process or analyze data programmatically. In this article, we will explore how to use Bash and the powerful text stream editor sed to fill these empty cells efficiently. This approach ensures that your data is complete and ready for further manipulation or analysis.
Internal vs External Linux Shell Commands
Linux commands are an essential part of managing and operating Linux systems, providing users with the ability to perform a wide range of tasks from file manipulation to system monitoring. These commands can be categorized into two types: internal and external commands. Internal commands are built into the shell itself, enabling quick execution without the need for external binaries. In contrast, external commands are separate executable files located in the system’s file hierarchy.
How to Deny/Allow Access to Files Using .htaccess
The .htaccess file is a powerful configuration tool for web servers that use Apache. It allows you to control various aspects of your website, including security settings. One of the critical uses of the .htaccess file is to manage access to files and directories. This article will guide you through the process of using .htaccess to deny or allow access to files based on different criteria, such as IP address, user authentication, and file types.
How to Check a Website Header Using Linux Command Line
Checking the headers of a website can provide valuable information about the server, security policies, and other metadata. This is particularly useful for web developers, system administrators, and security professionals. The Linux command line offers several tools that allow users to inspect website headers easily and efficiently.
How to Disable User Accounts on a Linux System
Disabling user accounts on a Linux system is a common administrative task, often performed to prevent users from accessing the system without completely removing their accounts. This can be necessary for various reasons, such as security concerns, temporary suspensions, or transitioning users to different systems. This guide will walk you through the steps required to disable user accounts effectively and securely.
How to Create a File-Based Filesystem Using dd Command on Linux
Creating a file-based filesystem on Linux using the dd command is a useful technique for testing, development, or creating isolated storage environments without partitioning your physical disks. This tutorial will guide you through each step in detail, explaining the purpose and the commands involved.
How to Insert a Line at the Beginning of a File on Linux
In Linux, modifying files from the command line is a common task. Whether you need to prepend configuration parameters, add headers to text files, or make bulk edits, knowing how to insert a line at the beginning of a file can be very useful. This article explores several methods to achieve this efficiently.
SSH Tunnels: Secure Remote Access and Port Forwarding
SSH is a communication protocol that allows us to access remote hosts and securely transfer data over unsecure networks, thanks to encrypted connections. By using the SSH tunneling technique, we can forward TCP traffic from and to a local machine, bypassing firewall restrictions. In this tutorial, we learn the difference between local and remote SSH tunnels, and how to create them.
How to Clone Permissions from Another File or Directory on Linux
In this article, we will explore how to clone permissions from one file or directory to another on a Linux system. This is a common task that can save time and ensure consistency across your file system. By using a few simple commands, you can easily duplicate the permissions of any file or directory to another, maintaining the desired access control settings.
Self-Host Immich: Open Source Google Photos Alternative
Immich is a free and open source alternative to Google Photos, with a focus on privacy. Both the server software and the mobile client application, are developed in the open on GitHub. Thanks to the container technology, deploying a private, self-hosted instance of Immich is quite easy. In this tutorial, we learn how to run a self-hosted Immich instance using Docker, to manage and backup our photos and videos.
How to Extract Files from an RPM Package Archive
RPM (Red Hat Package Manager) is a package management system used primarily in Red Hat-based distributions like RHEL, CentOS, and Fedora. Sometimes, you may need to extract files from an RPM package without installing it, either for inspection or to use certain files in a different context. This article will guide you through the steps to extract files from an RPM package archive.
Understanding the ls Command with a Long Listing Format Output and Permission Bits
The ls command is one of the most frequently used commands in Linux and Unix-like operating systems. It lists the contents of a directory, and when used with various options, it can provide detailed information about files, including permissions, ownership, size, and modification dates. This article delves into the ls command’s long listing format output and how to interpret permission bits.
How to Switch Between Python Versions on Fedora Linux
Switching between different versions of Python on Fedora Linux can be essential for various development environments and projects. With multiple versions of Python available, it’s important to manage them effectively to ensure compatibility and functionality across different projects. This guide will walk you through the process of switching between Python versions on Fedora Linux in a detailed, step-by-step manner.
How to Check and Change the Default Runlevel (target) on Ubuntu Linux
Understanding and managing runlevels is an essential skill for Linux administrators. Runlevels determine the state of the machine after booting, such as whether it starts with a graphical interface or in a multi-user mode. This article provides a comprehensive guide on how to check and change the default runlevel in Ubuntu Linux.
How to manage files on cloud storage with Rclone on Linux
Rclone is a free and open source command line program to manage files on cloud storage services like Google Drive, Backblaze B2, Amazon S3, and many more. The application is written in the Go programming language, and its source code is hosted on GitHub. In this tutorial we learn how to install Rclone on the most used Linux distributions, and how to perform basics operations like copying, syncing, moving and deleting data. In the process, we also see how to obtain Google Drive API credentials, and how to configure a Google Drive remote for Rclone.