Windows Error 0x80071AC3 Volume is dirty error message CHKDSK

This article will guide you on steps to fix #Windows #Error #0x80071AC3, Volume is dirty error message – #CHKDSK which occurs as a result of data #corruption, corrupted system files, #malware #infection, as well as improper #installation of #application, and so on.

Windows Error 0x80070079: The semaphore timeout period has expired

This article will guide you on the steps to resolve #Windows #Error #0x80070079: The semaphore timeout period has expired which can be fixed by simply #updating or #reinstalling the #network #adapter #drivers.

Windows error WslRegisterDistribution failed with error 0x8007019e and 0x8000000d

This article will guide you on the methods to resolve #Windows error #WslRegisterDistribution failed with error #0x8007019e and #0x8000000d which occurs due to the absence of supporting Windows 10 features since the error does not even let one use the WSL-based command line.

Sandbox failed to start with error 0xc030106 in Windows 10

This article will guide you on the different methods to resolve Windows error "Sandbox failed to start with error 0xc030106". Methods to fix Windows Sandbox #error 0xc0370106 includes; 1. Run #Windows Sandbox as Administrator. 2. Re-enable some of the supporting processes. 3. #Install pending Windows Updates. 4. #Disable and Enable Windows #Sandbox. 5. #Uninstall Recent Windows 10 Cumulative #Updates. 6. #System File Checker #Utility. 7. Run #DISM #command.

Tips to resolve Taskbar not visible in Remote Desktop on Windows 10

This article will guide you on how to fix the #taskbar is not visible in #Windows. How do I get my taskbar back on #Remote #Desktop? 1. Go to: 'Start' > 'Programs' > 'Communication' > 'Remote Desktop Connection'. 2. Click on the 'Options >>' button. 3. Click on the 'Display' tab. Check (or uncheck) "Display the connection bar when I use the full screen" (for Windows CE6 Operating System) or "Display the connection bar" (for Windows CE5 Operating System).

Setting Up an Icecast Audio Streaming Server

This article will guide you through the steps on setting up an HTTPS audio stream over #Icecast on #Linux. The guide will assume that you are running #Ubuntu 18.04.

Msvcr120.dll_clr0400.dll Missing Error in Windows 10

This article will guide you on the right steps to take to enable you fix Windows error "Msvcr120.dll_clr0400.dll is missing".

Windows Sandbox failed to start, Error 0x80070015, The device is not ready in Windows 10

This article will guide you on the right steps to go about fixing Windows Sandbox failed to start, Error 0x80070015, The device is not ready in Windows 10 error.

Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect

This article will guide you on the steps to fix Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect error by installing any pending updates in your Windows 10 computer, as well as make sure that all the services related to Windows Sandbox are enabled.

How to fix Windows when Sandbox item is greyed out

This article will guide you on the steps to take when Windows Sandbox item is greyed out in Windows 10. To enable Windows Sandbox in Windows 10, you are required to go to the search bar, type Turn Windows features on or off and click the search result to enter the Windows Features interface. Then, check the Windows Sandbox item.

Deleting files and folders using Command Prompt in Windows 10

This article will guide you on the steps to delete files and folders via the command prompt. Also you can use this method to clean out your computer for any junk or corrupted files as well as eliminate any unwanted files from your system.

Install And Configure A Squid Proxy ?

This guide will put your through the steps to install and configure a proxy server is using Squid proxy.

Install Zabbix agent on CentOS

This guide will show you the steps to install zabbix agent on your CentOS server.

Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect

This article will guide you on the different methods to fix Windows error "Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect" by installing any pending updates in your Windows 10 computer.

Windows 10 error 0x800703EE when copying files to external storage

This tutorial will help you to resolve Windows 10 error 0x800703EE when copying files to external storage which occurs due to corrupted or outdated USB drivers or it could be caused be a disabled Windows Backup and Volume Shadow copy service.

Windows Error "The task image is corrupt or has been tampered with (0x80041321)"

This article will guide you on the steps to fix Windows Error "The task image is corrupt or has been tampered with (0x80041321)" which is generally triggered by a wrongly set value in the registry, usually left behind by third-party back-up software.

Solution to Calculator Application not working in Windows 10

This article will guide you on how to quickly fix the problem with the Calculator app on your Windows 10 computer.

Windows error Installation ended prematurely because of an error

This article will guide you on the steps to fix Windows error "Fatal error, Installation ended prematurely because of an error" which occurs when performing any software reinstallation or installation.

Boot Device Not Found Error in Windows 10

This article will guide you on the different methods to fix Windows “Boot Device Not Found” error which occurs when the UEFI or the BIOS was not able to locate the drive where it can boot.

Windows 10 Hello Errors 0x801c004d or 0x80070490

This article will guide you on the steps to resolve Windows 10 Hello Errors 0x801c004d or 0x80070490.

Windows Error 0x8004230F

This article will guide you on the steps to fix Windows Error 0x8004230F when creating System Restore point in Windows 10.

Steps to fix Windows error "There is insufficient disk space to complete operation"

This article will guide you on the different methods to fix Windows error “There is insufficient disk space to complete operation” which could be triggered as a result of lack of disk space or corrupted disk.

Steps to solve Remote Access Connection Manager Service not working, Error 0xc0000005 in Windows 10?

This article will guide you on the steps to fix Windows error 0xc0000005 the problem with the Remote Access Connection Manager Service.

Complete guide to fix Windows Upgrade Error 0x800F081E – 0x20003 in Windows 10

This article will guide you through the steps to quickly fix Windows error 0x800F081E – 0x20003 which occurs when some of the update requirements are missing or the files that are installed are already of a higher version compared to the ones that are still pending.

What to do if the Copy and Paste feature is not working in Windows 10

This guide will give you different tips and step by step process to fix Copy and Paste feature if it is not working in Windows 10.

How to fix "NVIDIA GameStream is not working" in Windows 10

This tutorial will guide you on the different tips to fix the issue with the NVIDIA GameStream service when the service fails to work in Windows Systems.

Tips to fix "Error 633: The modem or other connecting device is already in use" in Windows 10?

This article will guide you on the different methods to resolve VPN Error 633 in your Windows 10 computer which occurs while trying to connect to the internet.

Methods to change the Left & Right mouse buttons in Windows 10

This article will guide you on the steps to perform changing the Left & Right mouse buttons in Windows 10.

Windows Error 0xc0000142

This article will help you to fix Windows Error 0xc0000142 which occurs when an application fails to properly initialize.

Steps to fix Chrome error 103 connection aborted error

This article will guide you on the steps to fix Chrome error 103 connection aborted error which occurs as a result of issues in your Google Chrome browser or system issues.

Fix Error 103 in Google Chrome

This tutorial will help you with the complete steps to follow to fix Google Chrome error 103.

Hardening Windows Using Microsoft Security Baseline

This article covers Hardening Windows Using Microsoft Security Baseline.

Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting its Internet-facing web apps, while a hospital may focus on protecting confidential patient information.

The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.

A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.


How can you use security baselines?

You can use security baselines to:

1. Ensure that user and device configuration settings are compliant with the baseline.

2. Set configuration settings. For example, you can use Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune to configure a device with the setting values specified in the baseline.

Install PHP 8 on Ubuntu 20.04 or 18.04 - Step by Step Process ?

This article covers steps to install PHP 8 on Ubuntu. PHP is arguably one of the most widely used server-side programming languages. It's the language of choice when developing dynamic and responsive websites. Basically, popular CM platforms such as WordPress, Drupal, and Magento are based on PHP.


To Install PHP as Apache Module

Run the commands:

$ sudo apt update
$ sudo apt install php8.0 libapache2-mod-php8.0

Once the packages are installed, restart Apache for the PHP module to get loaded:

$ sudo systemctl restart apache2


To Configure Apache with PHP-FPM

Php-FPM is a FastCGI process manager for PHP. 

1. Run the following command to install the necessary packages:

$ sudo apt update
$ sudo apt install php8.0-fpm libapache2-mod-fcgid

2. By default PHP-FPM is not enabled in Apache. 

To enable it, run:

$ sudo a2enmod proxy_fcgi setenvif
$ sudo a2enconf php8.0-fpm

3. To activate the changes, restart Apache:

$ systemctl restart apache2 


To install PHP 8.0 with Nginx

Nginx doesn't have built-in support for processing PHP files. We'll use PHP-FPM ("fastCGI process manager") to handle the PHP files.

Run the following commands to install PHP and PHP FPM packages:

$ sudo apt update
$ sudo apt install php8.0-fpm

Once the installation is completed, the FPM service will start automatically. 

To check the status of the service, run

$ systemctl status php8.0-fpm

Do not forget to restart the Nginx service so that the new configuration takes effect:

$ sudo systemctl restart nginx

Configure RDS User Profile Disks on Windows

This article covers method to configure and use User Profile Disks on a server with Remote Desktop Services role running on Windows Server 2012 / 2012 R2 / 2016.

In a single RDS collection, there can exist only one VHDX profile file for one user. If a user connects to the resources from two different collections, a separate profile disk should be created for each of them.

Also note that the UPD drive is bound to the RDS server Windows OS version. You can’t transfer (use) an UPD user profile from an RDS server from one version of Windows Server to another.


To Setup & Enable RDS User Profile Disks:

1. Create a shared network location for the disks.

2. Launch SERVER MANAGER.

3. Expand REMOTE DESKTOP SERVICES > COLLECTIONS.

4. Click on your Collection.

5. Click TASKS > EDIT PROPERTIES (top right corner).

6. Click USER PROFILE DISKS (bottom of the menu on the left).

7. Click ENABLE USER PROFILE DISKS.

8. Set the location to what you created in step 1

i.e. \\YourServerNameHere\UserProfileDisks$

9. Set the maximum size of those disks.

10. Scroll down and set what you want to have stored on those VHD's.


How to Resize User Profile Disks Using PowerShell ?

You can extend the virtual vhdx drive with the user's UPD profile using the PowerShell cmdlet Resize-VirtualDisk from the Hyper-V module:

Net use U: \\rdvh1\DemoLabOficeApps
Resize-VHD -Path u:\UVHD-<SID>.vhdx -SizeBytes 40GB
Net use U: /delete

If you want to run the Resize-VHD cmdlet from a desktop with Windows 10, you must install the feature Hyper-V -> Hyper-V Platform -> Hyper-V Services.

Send test SNMP trap in Nagios - How does this work ?

This article covers how to send a trap to Nagios server to test SNMP Trap functionality.

Basically, when troubleshooting an SNMP Trap issue, it can be very helpful to remove the actual device that could be causing problems and use the snmptrap command instead.

So in this guide, you will learn all the methods of sending a trap to your Nagios server to test SNMP Trap functionality.


SNMP Trap Definition

The following trap definition can be placed in /etc/snmp/snmptt.conf which will allow the test traps sent above to be passed through to Nagios:

EVENT netSnmpExampleHeartbeatRate .1.3.6.1.4.1.8072.2.3.0.1 "netSnmpExampleHeartbeatRate" Normal
FORMAT SNMP netSnmpExampleHeartbeatRate
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "" "netSnmpExampleHeartbeatRate"


The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

Install PHP 8 on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install PHP 8 on any Linux distribution.


To install Apache with PHP 8 module:

$ sudo apt install apache2 libapache2-mod-php8.0 

After successful installation, restart Apache service to reload newly installed modules:

$ sudo systemctl restart apache2 


To check loaded PHP modules use the command:

$ php -m

Install WHM Cpanel on AlmaLinux 8 Server - Step by Step Process ?

This article covers the complete steps to install WHM Cpanel on AlmaLinux 8 Server.

To manage Linux servers for hosting purposes most of the services are using WHM's Cpanel.

Although there are many hosting manager software, because of its easy-to-use interface and features, it is one of the best control panels for Web hosting services. 


cPanel, Control Panel, is a control panel developed in 1997 that offers us high-quality web hosting with excellent features that, thanks to WHM (Web Host Manager), can be managed from a graphics console, with everyone doing their job.

iisnode encountered an error when processing the request - Fix it Now ?

This article covers methods to resolve "iisnode encountered an error when processing the request" error.

Basically, this iisnode error triggers when the application pool doesn't have enough permissions to write to the current folder. 

Therefore, you need to Allow, 'Full Control', for user 'IIS_IUSRS', from 'Advanced Security' upon right clicking your application root directory.


This error simply denotes that Your application pool doesn't seem to have enough permissions to write to the current folder.

1. You can either edit the permissions to give the IIS_IUSRS group write permissions to that folder

2. Go into the advanced settings menu and under Process Model -> Identity change the user account to a user that already has write permissions.

Clean Up and Compress WinSxS Folder on Windows Server / Windows 10 - Do it Now ?

This article covers methods to Clean Up and Compress WinSxS Folder on Windows Server/Windows 10. 

WinSxS folder in Windows is the reasons of its constant growth and ways to clean up it. 

The C:\Windows\WinSxS directory is the repository of Windows components. This directory contains DLLs, binary and XML files necessary for installation and operation of various Windows roles or features.

When installing the Windows updates (usually this happens every month), the new version of the updated component is installed on the system, while the old one is saved to the WinSxS folder (it is necessary to provide compatibility and make it possible to rollback to the previous versions of the components when you uninstall the Windows update).


To clean up the WinSxS folder on Windows 10 and Windows Server 2016/2019:

1. Optimize the component store and remove old versions of Windows component files left after installing Windows updates;

2. Features on Demand – allows you to remove unused Windows components from the disk;

3. Enable NTFS compression on the WinSxS folder – a way to reduce the size of the WinSxS directory using the built-in compression of the NTFS file system.


How to Check the Actual Size of WinSxS Folder on Windows 10?

The easiest way to get the current size of the WinSxS folder on Windows is to open the properties of the %windir%\WinSxS folder in File Explorer (or use a PowerShell script). 

You can find out the real size of the WinSxS folder on disk using the du tool from Sysinternals:

du -v c:\windows\winSXS

Mapped Network Drives Not Showing in Elevated Programs

This article covers methods to fix 'Mapped Network Drives Not Showing in Elevated Programs' issue for our customers.
When UAC is enabled, the system creates two logon sessions at user logon. Both logon sessions are linked to one another.
One session represents the user during an elevated session, and the other session where you run under least user rights.
When drive mappings are created, the system creates symbolic link objects (DosDevices) that associate the drive letters to the UNC paths.
These objects are specific for a logon session and are not shared between logon sessions.
When the UAC policy is configured to Prompt for credentials, a new logon session is created in addition to the existing two linked logon sessions.

To resolve this Windows issue:

1. In Local Group Policy Editor, locate the following Group Policy path:

Local Computer Policy\Windows Settings\Security Settings\Local Policies\Security Options

2. Configure the following policy to Prompt for consent: User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode


Note:
The EnableLinkedConnections registry entry forces the symbolic links to be written to both linked logon sessions that are created, when UAC is enabled.

Can't move the folder because there is a folder in the same location that can't be redirected

This article covers Steps to resolve Windows error, Can't move the folder because there is a folder in the same location that can't be redirected.


To resolve this error, try the following:

1. Open Registry Editor by pressing Windows logo+R then type "regedit". Press Enter.
2. Now head to this address:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

3. Locate a personal folder at the right panel that is displaying the error and double-click on it.
4. Replace the current value data with the corresponding Default Value in the below list:

Desktop - %USERPROFILE%\Desktop 
Favorites - %USERPROFILE%\Favorites 
Music - %USERPROFILE%\Music 
Pictures - %USERPROFILE%\Pictures 
Videos - %USERPROFILE%\Videos 
Documents - %USERPROFILE%\Documents 
Downloads - %USERPROFILE%\Downloads

Note the Corresponding registry key for the Downloads folder.
5. Click Ok to save the changes, close Registry Editor and restart the computer.


DISM Error 0x800f0906 "The source file could not be downloaded"

This article covers methods to fix DISM Error 0x800f0906. Basically, the failure of the DISM command-line utility will lead us to the DISM Error 0x800f0906.
The DISM (Deployment Image Servicing and Management) command-line utility is an incredibly nifty little tool that can be used to service and repair a Windows installation.
The DISM.exe command failing can be a pretty significant issue, especially if this happens when you desperately need the utility to work its magic.
When the DISM command-line tool fails with error code 0x800f0906, the accompanying error message either states that the source files could not be downloaded or that the files required to repair the store could not be found.

To resolve DISM Error 0x800f0906:

Uninstall the KB3022345 Update
1. Press the Windows key on your keyboard to open the Start menu, and either click Control Panel, or type in Control Panel and open the result, depending on which version of Windows you’re using.
2. Switch to Icons view, in the top right corner of Control Panel, and open Programs and Features from the list.
3. On the left side, click on the View installed updates
4. You will see a search box in the top right corner, type KB3022345 to find the update with less effort.
5. When you've found it, right-click it, and choose
6. Once everything is done, reboot your device.

Disk full due to large System Volume Information Folder on Windows

This article covers how to access System Volume Information Folder and clear up the disk space.
Basically, the disk full warning in windows can also happen due to the large System Volume Information Folder.

What is System Volume Information Folder in Windows?

1. WindowsImageBackup —system restore points on desktop Windows versions or System State backups made using Windows Server Backup (wbadmin) in server OSs;
2. The contents of Indexing Service database used for fast file search (including Outlook search);
3. Distributed Link Tracking Service database;
4. Disk snapshots made by Volume Shadow Copy, which can be used to recover older versions of files. For each snapshot, a separate file is created with a long ID as a name;shadow copy files on system volume information folder
5. NTFS disk quota settings;
6. Base and chunks of the Data Deduplication service;
7. DFS Replication database (dfsr.db);
8. WPSettings.dat file – created by the storage service (StorSvc);
9. The USB drives will also store an IndexerVolumeGuid file that defines the unique disk label used by the Windows Search service;
10. AppxProgramDataStaging, AppxStaging – Windows UWP app backups (it can be used for recovery after removal).

Make Sure the File is an NTFS Volume and isn't in a Compressed Folder or Volume

This article covers methods to resolve Windows error "Make Sure the File is an NTFS Volume and isn't in a Compressed Folder or Volume" for our customers.
The first thing you should do to isolate the error is to change the path of the downloaded ISO file.
Sometimes, the error is triggered by the address of the ISO file for some reason in which case moving the file to another drive solves the problem.
Therefore, try changing the volume in which the ISO file is stored to fix your error.

Causes of this Windows error:

This error is not something new, however, there was a certain thing that made it trigger the most.

Following are the factors that usually cause it —


1. Windows 10 security update.

For most of the users, the error came into being after the release of KB4019472 Windows 10 update which happened to be a security update. This update made the error emerge for most of the users.


2. Location of ISO file.

In some cases, the error can be due to the location or path of the downloaded ISO file. In such a scenario, you will have to change the location.

Windows error "The volume does not contain a recognized file system" - Fix it Now ?

This article covers methods to fix 'The volume does not contain a recognized file system' the Windows error for our customers.

What Caused The Volume Does Not Contain the Recognized File System Error ?

Here are some of the reasons that can cause the error occurs on devices:
1. System re-installation
2. Presence of virus or malware
3. Unsafe system shut down.
4. Failure of file system conversion
5. Deletion of essential system files by mistake
6. Presence of bad sectors
7. Users misapplication
8. Virus/Trojan infection
9. Insufficient power supply

To fix this Windows error:

1. Proceed to Start and click on My Computer or This PC.
2. Select that drive that is not accessible and then choose Properties by right-clicking it.
3. From the Properties window, select the Tool tab and click on the Check button from the Error checking.
4. Select the Scan Drive option.
Once the scanning process is complete, please go back to This PC or My Computer to check whether the drive is fixed or not.

Windows Server error, You don't currently have permission to access this folder - Fix it now ?

This article covers methods to fix the 'You Don't Currently Have Permission to Access This Folder' issue for our customers.
If you happen to meet "You don't currently have permission to access this folder" issue when you are opening a folder, do not worry. You can fix the problem with the  effective tips here.

To remove the folder access error:

1. Gain Access by Allowing Everyone
i. Right-click on the folder that you're unable to access and select "Properties".
ii. Click on "Security" tab and under Group or user names click on "Edit".
iii. Click on "Add" and type everyone. Click on "Check names" and then click "OK".
iv. Select "Everyone". Under "Allow", select "Full control" and click on "Apply" and click "Ok".

2. Change the Ownership of the File/Folder
You can also try to change the ownership of the file or folder to troubleshoot "You Don't Currently Have Permission to Access This Folder" issue on Windows 10/8/7.
i. Right-click on the folder to navigate to "Properties".
ii. Go to the "group or username" section on the "Security" tab.
iii. Click on "Advanced", and then "Change".
iv. Type your account name. Click on "Check names" > "OK".
v. Check "Replace owner on sub containers and objects" > "OK".

VNC error 'Timed out waiting for the response from the host computer' - Fix it Now ?

This article covers methods to fix VNC 'Timed out waiting for the response from the host computer' error for our customers.


1. You can try adding a firewall rule:

$ sudo /sbin/iptables -I INPUT 1 -p TCP --dport 5901:5910 -j ACCEPT

2. Or directly modify the file /etc/sysconfig/iptables file and add a line:

-A INPUT -p tcp -m state --state NEW -m tcp --dport 5901:5910 -j ACCEPT

3. Restart the iptables service:

$ service iptables restart

4. If there is no iptables.service file, use yum to install it:

$ yum install iptables-services

5. Then Run the command,

$ sudo /sbin/iptables -I INPUT 1 -p TCP --dport 5901:5910 -j ACCEPT

The firewall does not need to be restarted, nor does it execute flush privileges, and then connect with the VNC client and find that the connection is up.

Cloud SQL Proxy error – An attempt was made to access a socket

This article covers methods to resolve Cloud SQL Proxy error. 

The Cloud SQL Proxy error looks like this:

An attempt was made to access a socket in a way forbidden by its access permissions


Therefore you cannot bind to it while it's running:

The SQL Server engages the 3306 port locally. 

1. Stop the SQL Server to bind the CloudSQL Proxy to it.

2. Incase of Windows 10: Go to Task Manager -> Services -> MySQL57

3. Right click and stop that task. 

4. Once you have done that try running the same command again. 

It'll work and show as output:

Listening on 127.0.0.1:3306 for <instance-name>


Requirements for using the Cloud SQL Auth proxy.

To use the Cloud SQL Auth proxy, you must meet the following requirements:

1. The Cloud SQL Admin API must be enabled.

2. You must provide the Cloud SQL Auth proxy with Google Cloud authentication credentials.

3. You must provide the Cloud SQL Auth proxy with a valid database user account and password.

4. The instance must either have a public IPv4 address, or be configured to use private IP.

The public IP address does not need to be accessible to any external address (it does not need to be added as an authorized network address).

Plesk error Access to the path is denied - Fix it Now

This article covers Plesk Access to the path is denied error. For instance, while trying to access http://example.com/testfolder/test.aspx, it produces the error:

Access to the path %plesk_vhosts%example.com\httpdocs\testfolder is denied

This signifies that the Required system user and/or permissions are not configured properly for the directory %plesk_vhosts%example.com\httpdocs\testfolder in Plesk.


To fix this Plesk error:

1. Connect to the server via RDP.

2. When default permissions on the domain folder are lost, the following actions can be performed to restore them:

i. For Plesk 12.5, Onyx and Obsidian:

"%plesk_cli%\repair.exe" --repair-webspace-security -webspace-name example.com

If it is necessary to repair permissions for all domains, the following command should be used:

"%plesk_cli%\repair.exe" --repair-all-webspaces-security

Also, Plesk Reconfigurator could be used: in the Windows Start menu, select All Programs > Plesk > Plesk Reconfigurator and select Repair Plesk installation > Plesk Virtual Hosts Security > Check .

ii. For Plesk before 12.5:

Go to the Domains page, mark the required domains, and click on the Check permissions button.

Then uncheck the Check-only mode checkbox and click OK .

Plesk error PHP has encountered an Access Violation - Fix it now

This article covers how to fix PHP has encountered an Access Violation which occurs in the Windows server with the Plesk control panel. 

Do a copy libmysql.dll from C:\Program Files (x86)\SWsoft\Plesk\Additional\PleskPHP5 to C:\WINDOWS\system32

Wait for few minutes and it should fix the issue.


To fix PHP has encountered an Access Violation at XXXXX in Plesk:

1. Connect to the server via SSH.

2. Create a backup of the psa database:

plesk db dump psa > /root/psa_backup.sql

3. Download the attached script:

$ wget https://plesk.zendesk.com/hc/article_attachments/115001860533/script_kb213376309

4. Make the script executable:

$ chmod +x script_kb213376309

5. Launch the script for the affected subscription:

Note: change the "example.com" website in the command below to the correct one.

$ ./script_kb213376309 example.com

6. If an error like below appears:

ERROR 1062 (23000) at line 5: Duplicate entry '123-789' for key 'PRIMARY' exit status 1

find the duplicate record in the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry.

plesk db "select * from IpAddressesCollections where ipCollectionId=123;"

7. Remove the duplicate record from the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry

Change the "456" ipAddressId in the command below to the correct one based on the output from the previous step.

$ plesk db "delete from IpAddressesCollections where ipCollectionId=123 and ipAddressId=456;"

WDS deployment in Virtual machines – Few test cases

This article covers some methods to test Windows deployment in virtual machines. Windows Deployment Services (WDS) enables you to deploy Windows operating systems over the network, which means that you do not have to install each operating system directly from a CD or DVD.


To install Windows Deployment Services:

Windows Deployment Services ships as an innate role of Windows Server. I will be demonstrating on WS2016. All currently-supported versions provide it and you follow nearly the same process on each of them.

1. Start in Server Manager. Use the Add roles and features link on the main page (Dashboard) or on the Manage drop-down.

2. Click Next on the introductory page.

3. Choose Role-based or feature-based installation.

4. On the assumption that you're running locally, you'll only have a single server to choose from. If you've added others, choose accordingly.

5. Check Windows Deployment Services.

6. Immediately upon selecting Windows Deployment Services, you’ll be asked if you’d like to include the management tools. Unless you will always manage from another server, leave the box checked and click Add Features.

7. Click Next on the Select server roles page and then click Next on the Select server features page (unless you wish to pick other things; no others are needed for this walkthrough).

8. You'll receive another informational screen explaining that WDS requires further configuration for successful operation. Read through for your own edification. You can use the mentioned command line tools if you like, but that won't be necessary.

9. You will be asked to select the components to install. Leave both Deployment Server and Transport Server checked.

10. Click Install on the final screen and wait for the installation to finish.


To create WDS Boot Images:

When a system starts up and PXE directs it to the WDS server, it first receives a boot image. The boot image should match the operating system it will deploy.

You can obtain one easily.

1. Find the DVD or ISO for the operating system that you want to install. Look in its Sources folder for a file named boot.wim. 

2. On your WDS server, right-click the Boot Images node and click Add Boot Image.

3. On the first page of the wizard, browse to the image file. You can load it right off the DVD as it will be copied to the local storage that you picked when you configured WDS.

4. You’re given an opportunity to change the boot image’s name and description. I would take that opportunity, because the default Microsoft Windows Setup (x##) won’t tell you much when you have multiples.

5. You will then be presented with a confirmation screen. Clicking Next starts the file copy to the local source directory. After that completes, just click Finish.

SQL Server Error 9002 - Fix it now

This article covers methods to resolve SQL Server Error 9002 for our customers. SQL Server Error 9002 happens when the SQL Transaction Log file becomes full or indicated the database is running out of space. A transaction log file increases until the log file utilizes all the available space in disk. A quick fix is to create more space for log file.


To Fix SQL Server Error 9002:


1. Backup Transaction Log File

Incase, SQL database that you are using is full or out of space, you should free the space. For this purpose, it is needed to create a backup of transaction log file immediately. Once the backup is created, the transaction log is truncated. If you do not take back up of log files, you can also use full or Bulk-Logged Recovery model to simple recovery model.


2. Free Disk Space

Generally, the transaction Log file is saved on the disk drive. So, you can free the disk space which contains Log file by deleting or moving other files on order to create some new space in the drive. The free space on disk will allow users to perform other task and resolve SQL Error Log 9002 The Transaction Log for Database is Full.


3. Move Log File to a Different Disk

If you are not able to free the space on a disk drive, then another option is to transfer the log file into a different disk. Make sure another disk in which you are going to transfer your log file, has enough space.

i. Execute sp_detach_db command to detach the database.

ii. Transfer the transaction log files to another disk.

iii. Now, attach the SQL database by running sp_attach_db command.


4. Enlarge Log File

If the sufficient space is available on the disk then you should increase the size of your log file. Because, the maximum size for a log file is considered as 2 TB per .ldf file.


To enlarge log file, there is an Autogrow option but if it is disabled, then you need to manually increase the log file size.

i. To increase log file size, you need to use the MODIFY FILE clause in ALTER DATABASE statement. Then define the particular SIZE and MAXSIZE.

ii. You can also add the log file to the specific SQL database. For this, use ADD FILE clause in ALTER DATABASE statement.

Then, add an additional .ldf file which allows to increase the log file.

Enable Windows Lock Screen after Inactivity via GPO - How to do it

This article covers how to Enable Windows Lock Screen on domain computers or servers using Group Policy. Locking the computer screen when the user is inactive (idle) is an important information security element.
The user may forget to lock his desktop (with the keyboard shortcut Win + L) when he needs to leave the workplace for a short time.
If any other employee or client who is nearby can access his data. The auto-lock screen policy will fix this flaw.
After some time of inactivity (idle), the user's desktop will be automatically locked, and the user will need to re-enter their domain password to return to the session.

To enable lock screen with group policy:
1. Create a new GPO then edit it and go to:
Computer Config>Policies>Windows Settings>Security Settings>Local Policies>Security Options.
2. Find Interactive logon: Machine inactivity limit .
3. Set that to whatever time you want and it will lock the PC after it hits that timer.

To change my lock screen wallpaper using group policy:
1. Run GPEDIT. MSC.
2. Go this path "Computer Configuration\Policies\Administrative Templates\Control Panel\Personalization".
3. Enable the GP "Force a specific default lock screen image".
4. Specify the path to the image file.
5. Click OK.

To Find Windows 10's Spotlight Lock Screen Pictures:
1. Click View in File Explorer.
2. Click Options.
3. Click the View tab.
4. Select "Show hidden files, folders and drives" and click Apply.
5. Go to This PC > Local Disk (C:) > Users > [YOUR USERNAME] > AppData > Local > Packages > Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy > LocalState > Assets.

Cannot download Docker images behind a proxy - Fix it Now

This article covers the error, Cannot download Docker images behind a proxy. 

You can fix this docker issue by doing the following:

1. In the file /etc/default/docker, add the line:

export http_proxy='http://<host>:<port>'

2. Restart Docker:

$ sudo service docker restart


Also, you can Follow the steps given below to fix this docker error:

1. Create a systemd drop-in directory for the docker service:

$ mkdir /etc/systemd/system/docker.service.d

2. Create a file called /etc/systemd/system/docker.service.d/http-proxy.conf and add the HTTP_PROXY env variable:

[Service]
Environment="HTTP_PROXY=http://proxy.example.com:80/"

3. If you have internal Docker registries that you need to contact without proxying you can specify them via the NO_PROXY environment variable:

Environment="HTTP_PROXY=http://proxy.example.com:80/"
Environment="NO_PROXY=localhost,127.0.0.0/8,docker-registry.somecorporation.com"

4. Flush changes:

$ sudo systemctl daemon-reload

5. Verify that the configuration has been loaded:

$ sudo systemctl show --property Environment docker
Environment=HTTP_PROXY=http://proxy.example.com:80/

6. Restart Docker:

$ sudo systemctl restart docker

Updating Windows VM Templates on VMWare with PowerShell - How to do it

This article covers how to update Windows VM Templates on VMWare. 

The update process of a VM template on VMWare consists of the following stages:

1. A template from the Content Library is converted to a virtual machine.;

2. After starting it, an administrator logs on, installs approved Windows updates using WSUS, updates the required software;

3. After the updates have been installed, the VM is restarted, then turned of and converted back to the template.

Recover orphan innodb database from ibd file - How to perform this task

This article covers how to recover the orphan InnoDB database from the ibd file. 


Orphan InnoDB database incident mostly happened when:

1 – user accidentally remove ibdata1 file. (mostly in /var/lib/mysql/ibdata1).

2 – ibdata file courrupted.


To Recover Orphaned InnoDB Tables:

1. Restart the MySQL service to recreate ibdata1, then take a backup of your database folder.

2. Login to MySQL.

3. Create a dummy database with the same name. Then, create a dummy table with the same name as the corrupted one (don’t mind the table structure for now).

4. Stop the MySQL service, copy the .frm file from the backup you took to replace the .frm file.

5. Start MySQL and have a look at the structure of your table - it should now be in place! However, don’t get too happy yet.

6. Issue a SHOW CREATE TABLE statement and copy its contents, then create the table with them.

7. Stop MySQL, copy the .ibd file from the backup directory to /var/lib/database_name and replace the existing .ibd file from the dummy table.

8. Now it’s time for Percona’s tools to shine - download and install the Percona Data Recovery Tool for InnoDB , then run the following (here -o represents the full location of your ibdata1 file, -f represents the full location of your .ibd file, -d represents the database name and -t represents your table name):

ibdconnect -o /var/lib/mysql/ibdata1 -f /var/lib/mysql/database_name/table_name.ibd -d database_name -t table_name

9. Now, run a checksum check against InnoDB - make sure you get no error messages (you might need to run this tool several times):

innochecksum /var/lib/mysql/ibdata1

10. Finally, you should be good to go - simply start MySQL.

Listen on Privileged Ports with Nagios Log Servers - How to set it up

This article covers how to configure Nagios Log Servers to listen on privileged ports. Now Nagios Log Server Administrators who would like configure Nagios Log Server to listen on ports below 1024 which are privileged in Linux. This can be useful if you have legacy devices that can only send on specific ports (e.g. syslog on port 514).

Ports below 1024 are privileged on Linux and only allow the root user to listen on them. 

This can be implemented via two solutions:

1. Run Logstash as root

2. Use setcap


To use Use setcap for Listening On Privileged Ports:

Here, you can use the logstash running as the nagios user but this method may be less secure in some environments as it will allow any Java process to listen on privileged ports.

i. The logstash init configuration file requires three lines to be added to the end of it, open the file with the following command:

On Debian | Ubuntu:

$ vi /etc/default/logstash

or

$ sudo /etc/default/logstash

2. Then, Add the following three lines to the end of the file:

echo $(dirname $(find /usr/lib -name libjli.so)) | awk '{print $1}'> /etc/ld.so.conf.d/java.conf

eval "$(which ldconfig)"

setcap 'cap_net_bind_service=+ep' $(readlink -f $(which java))

3. Save the file and close vi.

4. Restart Logstash Service

The logstash service needs to be restarted for these changes to apply:

$ sudo systemctl restart lagstash.service

Cannot Copy and Paste via RDP - How to fix this Windows issue

This article covers how to Allow/Prevent Copy and Paste via RDP Clipboard on Windows. Copy and paste is an essential function that should ideally work every day without fail. You can resolve this Windows issue by restarting the rdpclip.exe program in the remote computer.

Also, you can log off the remote user and then log back on on Windows.

Once the rdpclip.exe is relaunched, you should be able to copy paste using clipboard from the local computer to the remote computer. 


In order to fix the copy and paste issue in Windows, you need to end the rdpclicp.exe process and then restart it:

To do this;

1. Press Ctrl + Shift + ESC to start Task Manager.

2. Go to the "Details" tab.

3. Right-click the "rdpclip.exe" process.

4. Select "End task".

5. Go to Windows/system32 folder.

6. Look for "rdpclip.exe" and run it.

Enable Built-in Administrator Account on Windows 10 - How to implement this

This article covers an easy way to activate the administrator account is from the command prompt with elevated privileges. Windows 10 includes a built-in Administrator account that, by default, is hidden and disabled for security reasons. Sometimes, you need to perform a bit of Windows management or troubleshooting or make changes to your account that requires administrator access.

Windows 10 administrator default password will not be required, alternatively you can enter password for local account and sign in.


To know if I have the built-in Administrator account in Windows 10:

1. Right-click the name (or icon, depending on the version Windows 10) of the current account, located at the top left part of the Start Menu, then click on Change account settings. 

2. The Settings window will pop up and under the name of the account if you see the word "Administrator" then it is an Administrator account.


To reset the built-in Administrator account in Windows 10:

1. Boot from Windows 10 bootable CD/DVD or USB.

2. When the install now screen shows up click on Repair your computer > Advanced Options >Troubleshoot > Command Prompt.

3. Once you can boot into the command prompt, type "net user administrator /active:yes".


To enable hidden administrator:

1. Go to Security Settings > Local Policies > Security Options. 

2. The policy Accounts: Administrator account status determines whether the local Administrator account is enabled or not. 

3. Check the "Security Setting" to see if it is disabled or enabled. 

4. Double-click on the policy and select "Enabled" to enable the account.

This App Has Been Blocked for Your Protection on Windows - Fix it now

This article covers methods to fix the 'This App Has Been Blocked for Your Protection on Windows' error. Windows Defender SmartScreen acts as a sort of guard dog while you use Windows 10.

It will block you from opening some apps if they come from an unknown place or are created by an unknown publisher. 

Some apps really are harmful and really will get you in a mess. Only go around the Windows 10 app block if you know for sure that the file is safe.


To unblock an app that is blocked by the administrator:

1. Locate the file, right-click it, and select "Properties" from the contextual menu. 

2. Now, find the "Security" section in the General tab and check the checkbox next to "Unblock" - this should mark the file as safe and let you install it. 

3. Click "Apply" to save the changes and try to launch the installation file again.


To Unblock Programs In Windows Defender Firewall:

1. Select the “Start” button, then type “Firewall“.

2. Select the “Windows Defender Firewall” option.

3. Choose the "Allow an app or feature through Windows Defender Firewall" option in the left pane.


To install a program that is blocked by administrator:

1. Disable Windows SmartScreen.

2. Execute the file via Command Prompt.

3. Install the app using the hidden administrator account.

4. Temporarily disable your antivirus program.

Automatically Log in to Windows without Password - How to get this done

This article covers methods to automatically log in to Windows without password.

Here, you can disable password login on Windows 10 and boot the computer directly to the user’s desktop. In order to temporarily disable automatic logon in Windows and manually specify the user credentials under which you need to sign in, you must hold down the Shift key while Windows is booting.


CMD is the official and tricky way to bypass Windows 10 admin password. In this process, you will need a Windows Installation disk and If you don't have the same, then you can create a bootable USB drive consisting of Windows 10. Also, you need to disable UEFI secure boot option from the BIOS settings.


To Disable Windows 10 Login Password via the User Account Settings:

1. Press Win+R;

2. In the Run dialog box, enter netplwiz or control userpasswords2 command;

3. In the next window with the list of local user accounts, uncheck the option “User must enter a username and password to use this computer” and save changes (OK);


To Automatically log in to your Windows 10 PC:

1. Open the Run command box (Start > All apps > Windows System > Run or press Windows key + R).

2. A User Accounts window will open.

3. A new window labeled Automatically sign in will pop up.

4. Your computer will now bypass the log-in page when you turn on your PC, but it will not bypass the login page when you unlock your PC.

Steps to Run Program without Admin Privileges and to Bypass UAC Prompt

This article covers how to run a program without admin privileges. The trick to bypass UAC is to create a scheduled task (with highest privileges) for each program that you want to run, and then invoke the scheduled task item manually using schtasks.exe .

UAC helps keep your computer secure. If you reflexively disable UAC when setting up a computer, you should give it another try – UAC and the Windows software ecosystem have come a long way from when UAC was introduced with Windows Vista.


To  Eliminate UAC Prompts for Specific Applications:

1. In Task Scheduler, right-click "Task Scheduler Library" and select "New Folder" Name it whatever you would like.

2. Select the new folder and click "Create Task" (not "Create Basic Task")

3. Name the task something descriptive. ...

4. Under the Actions tab, select "Start a program" in the Action dropdown if it isn't already.


To bypass UAC administrator password:

1. Right-click Start button at left lower corner of PC, select Control Panel.

2. Click User Accounts and family Safety.

3. Click User Accounts.

4. Click Change your account type.

5. Enter Admin password and click Yes to continue.

6. Select Administrator as your new account type, and click Change Account Type.

Remote session disconnected because there are no remote desktop license servers

This article covers how to resolve the error 'remote session disconnected because there are no remote desktop license servers'.


If the problems tend to be associated with the following user messages:

i. The remote session was disconnected because there are no Remote Desktop client access licenses available for this computer.

ii. The remote session was disconnected because there are no Remote Desktop License Servers available to provide a license.


Then, configure the RD Licensing service by following the steps below:

1. Open Server Manager and navigate to Remote Desktop Services.

2. On Deployment Overview, select Tasks, and then select Edit Deployment Properties.

3. Select RD Licensing, then select the appropriate licensing mode for your deployment (Per Device or Per User).

4. Enter the fully qualified domain name (FQDN) of your RD License server, and then select Add.

5. If you have more than one RD License server, repeat step 4 for each server.


If the RD License Diagnoser lists other problems, such as "The RDP protocol component X.224 detected an error in the protocol stream and has disconnected the client," there may be a problem that affects the license certificates. Such problems tend to be associated with user messages, such as the following:

Because of a security error, the client could not connect to the Terminal server. After making sure that you are signed in to the network, try connecting to the server again.

In this case, refresh the X509 Certificate registry keys by following the steps given below:

To resolve this problem, back up and then remove the X509 Certificate registry keys, restart the computer, and then reactivate the RD Licensing server.

1. Open the Registry Editory and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM.

2. On the Registry menu, select Export Registry File.

3. Enter exported- Certificate into the File name box, then select Save.

4. Right-click each of the following values, select Delete, and then select Yes to verify the deletion:

i. Certificate

ii. X509 Certificate

iii. X509 Certificate ID

iv. X509 Certificate2

5. Exit the Registry Editor and restart the RDSH server.


To fix Remote session was disconnected because there are no Remote Desktop client access licenses:

1. You need to delete the following registry key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSLicensing.

2. If it doesn't work and you get the following error message: "The remote computer disconnected the session because of an error in the licensing protocol";

3. Then all you need to do is Right-Click on the Remote Desktop Connection icon and select "Run as Administrator".

Unlock a file locked by any process or system - Do it now

This article covers how to unlock a file locked by any process or system. 

If everything goes correctly, you will fix this Windows problem without killing the process and – more importantly – without having to reboot the system.


To unlock a locked file in Windows 10?

1. Type the name of the locked file in the field, and click the Search button. 

2. Select the file from the search result. 

3. Behind the search window, in "Process Explorer," right-click the locked file, and select Close Handle to unlock it.


To Open a Locked File When Another Program Is Using It:

1. Close The Program That Is Using The Locked File.

2. Kill The Program Process Using Task Manager.

3. Turn Off The Preview Pane In File Explorer.

4. Toggle The Folder Process In File Explorer.

5. Launch & Close The Locked File.

6. Restart Your Windows Computer.

7. Use Command Prompt To Delete The File.

Linux vs Windows file systems - Which do you prefer

This article covers difference between Linux and Windows file system. Basically, both Windows and Linux use file systems to store data in an organized manner. 


Advantages of using Linux:

1. Linux facilitates with powerful support for networking. 

2. The client-server systems can be easily set to a Linux system. 

3. It provides various command-line tools such as ssh, ip, mail, telnet, and more for connectivity with the other systems and servers. 

4. Tasks such as network backup are much faster than others.


Disadvantages of Linux OS:

1. No single way of packaging software.

2. No standard desktop environment.

3. Poor support for games.

4. Desktop software is still rare.


Why Linux is not popular as Windows?

The main reason why Linux is not popular on the desktop is that it doesn't have “the one” OS for the desktop as does Microsoft with its Windows and Apple with its macOS. 

If Linux had only one operating system, then the scenario would be totally different today. Linux kernel has some 27.8 million lines of code.


Linux a good operating system and widely considered one of the most reliable, stable, and secure operating systems too. In fact, many software developers choose Linux as their preferred OS for their projects. 

It is important, however, to point out that the term "Linux" only really applies to the core kernel of the OS.


Most Stable Linux Distros:

1. Debian. Suitable for: Beginners.

2. Fedora. Suitable for: Software Developers, Students.

3. Linux Mint. Suitable for: Professionals, Developers, Students.

4. Manjaro. Suitable for: Beginners.

5. openSUSE. Suitable for: Beginners and advanced users.

6. Tails. Suitable for: Security and privacy.

7. Ubuntu.

8. Zorin OS.


Reasons Why Linux Is Better Than Windows:

1. Total cost of ownership. The most obvious advantage is that Linux is free whereas Windows is not.

2. Beginner friendly and easy to use. Windows OS is one of the simplest desktop OS available today.

3. Reliability. Linux is more reliable when compared to Windows.

4. Hardware.

5. Software.

6. Security.

7. Freedom.

8. Annoying crashes and reboots.


Can Linux and Windows share files?

The easiest and most reliable way to share files between a Linux and Windows computer on the same local area network is to use the Samba file sharing protocol. 

All modern versions of Windows come with Samba installed, and Samba is installed by default on most distributions of Linux.


Can Linux read NTFS drives?

Linux can read NTFS drives using the old NTFS filesystem that comes with the kernel, assuming that the person that compiled the kernel didn't choose to disable it. 

To add write access, it's more reliable to use the FUSE ntfs-3g driver, which is included in most distributions.


For typical everyday Linux use, there's absolutely nothing tricky or technical you need to learn. Running a Linux server, of course, is another matter just as running a Windows server is. 

But for typical use on the desktop, if you've already learned one operating system, Linux should not be difficult.


Is Linux a good career choice?

A Linux Administrator job can definitely be something you can start your career with. 

It is basically the first step to start working in the Linux industry. 

Literally every company nowadays works on Linux. So yes, you are good to go.

Server Hardening - What it means

This article covers techniques to prevent attacks on the server. Basically, if we manage our servers without proper precautionary actions it is easy to spoil the reputation of the server.

Hardening your server is the process of increasing security on your server through a variety of means to result in a much more secure operating environment. Server hardening is one of the most important tasks to be handled on your servers. 

The default configuration of most operating systems is not designed with security as the primary focus. 

Default server setups focus more on usability, functionality and communication.


Server Hardening Security Measures Includes:

1. Hide login password from cgi scripts.

This setting allows you to hide the REMOTE_PASSWORD variable from scripts that the cpsrvd daemon's CGI handler executes.

2. Referrer safety check.

Only permit cPanel, Webmail and WHM to execute functions when the browser-provided referrer (port and domain or IP address) exactly matches the destination URL.

3. Initial default/catch-all forwarder destination

Select Fail to automatically discard un-routable email that your servers new accounts receive. This will help protect your server from mail attacks.

4. Verify signatures of third-party cPaddons.

Enable this option to verify GPG signatures of all third-party CPaddons.

5. Prevent "nobody" from sending mail.

Enable to block email that the nobody user sent to the remote address. Nobody is the username for Apache.

6. Enable SPF on domains for newly created accounts.

7. Proxy subdomain override.

Disable this option to prevent automatically-generated proxy domains when a user creates a subdomain.

8. Proxy subdomain creation.

Disable this option to prevent the addition of cPanel, Webmail, Web Disk and WHM proxy subdomain DNS entries to new accounts.

9. Cookie IP validation.

Disable this option to allow logins regardless of the user's IP address.

An error occurred while reconnecting - Fix this Windows error now

This article covers methods to resolve fix 'An error occurred while reconnecting' Windows error. 


Causes for 'The Local Device Name is already in Use' Error on Windows:

1. Drive mapping has gone wrong – The process of network drive mapping can sometimes produce problems like this one when it comes to drive letters.

2. Some drive letters are unassigned – Some drives may have incorrect or even missing drive letters which causes this error to appear.

3. File and Printer Sharing is disabled – If this option is disabled in any firewall you might be using, networking becomes difficult and full of errors.

4. No space on the server – Users have reported that they had to free up at least a couple of gigabytes on the root drive of the network’s server to get rid of the problem.


To fix 'The Local Device Name is already in Use' Error on Windows:

Remap the Drive Using Command Prompt

Remapping the network drive is the official solution recommended by Microsoft for users facing this problem. However, it has worked for many users and it has become one of the most used methods for this problem. 

Check out the steps to implement this;

1. Search for “Command Prompt” either right in the Start menu or by tapping the search button right next to it. Right-click on the first result which will appear at the top and select the “Run as administrator” option.

2. Users who are using an older version of Windows can use the Windows Logo Key + R key combination in order to bring up the Run dialog box. Type in “cmd” in the box and use the Ctrl + Shift + Enter key combination in order to run Command Prompt as an administrator.

3. Copy and paste the command shown below and make sure you click the Enter key on your keyboard.

net use * /delete

4. After you see that the operation is completed successfully, run the following command:

net use Z: \\server\share /user:username password

5. Make sure you replace the username and password placeholders with the correct username and password. Check to see if the problem is resolved!

Your system requires smb2 or higher Windows error - Fix it now

This article covers how to fix the Windows error 'Your system requires smb2 or higher'. SMB1 protocol is vulnerable and your system will give you a warning message saying that it requires SMB2. 

Most Windows 10 users reported Your system requires SMB2 or higher error message on their PC. 

SMB stands for Server Message Block, and it's a protocol for sharing files. The protocol has two versions, the SMB1, and the SMB2, and while both can be used, the latter is the more secure one.


To enable SMB2 on Windows 10:

Check if your system can install SMB2

1. Start PowerShell as administrator. Press the Windows Key+ X and select PowerShell (Admin).

2.Type Get-SmbServerConfiguration | Select EnableSMB2Protocol in the command prompt of the Window PowerShell and press Enter.

3. If your system can run SMB2 protocol, type windows features in the Search box and select Turn Windows features on or off.

4. Once the Windows Features window opens, check SMB1/CIFS File Sharing Support option and hit OK.

5. Restart your PC and check if the problem with SMB2 is resolved.


To enable SMB2 on Windows 10 using Powershell:

1. Start PowerShell as administrator. We already showed you how to do that in our previous solution.

2. Enter Set-SmbServerConfiguration –EnableSMB2Protocol $true and press Enter.

3. Press Y to confirm.

Windows Update Error 0x80240440 - Fix it now

This article covers how to fix Windows Update Error 0x80240440. 


To fix Windows Update error 0x80240440:

1. Click Start and start typing on your keyboard for "services.msc"

2. In your search results "services.msc" should show up. Open it with a click.

3. A new windows will open containing all Windows services on your system.

Search for "Windows Update"

5. Right-click the "Windows Update" and then click Stop.


Also, you can clean the Windows Update temporary cache folder:

1. Hold your windows-key pressed and hit "R" key simultanous.

2. A small new windows will appear.

3. Type %windir%\SoftwareDistribution\DataStore in this new window and click OK.

4. This will open Windows Explorer on the correct location.

5. Delete all contents of this folder. (Hint: Use Ctrl + A to select all files and folders).


Eventually, you can start the Windows Update Service again:

1. Switch back to the windows Services.

2. Locate Windows Update.

3. Right-click on it and choose Start.

Windows update error 0x800f0805 - Fix it now

This article covers methods to resolve windows update error 0x800f0805. 

Windows update error #0x800f0805 indicates that the Windows edition was not detected. Check that the specified image is a valid Windows operating system image. All you need to do is restart your computer and try to activate it again, and it should work.


Causes of #error 0x800f0805 in Windows Update:

1. Bugs in update delivery to your system – This means that there is no fault in your system, instead, the Microsoft servers are experiencing issues.

2. Corrupted Windows files


Methods to fix the #Windows error 0x800f0805:

1. Using Windows Troubleshooter 

This built-in feature can automatically identify and apply fixes to issues on your device.

2. Manually downloading and installing the update

We can use the official Microsoft Update Catalog to download and install system updates manually.

3. Using System File Checker (SFC)

4. Using DISM

We recommend using a DISM scan after using SFC.

5. Resetting Windows Update components

This method will reset the Windows Update.

6. Reset your PC

If none of the above methods worked, you can freshly reinstall your OS without losing any files or settings by using 'Reset this PC' feature.

Windows update error 0xC190012E - Fix it now

This article covers methods to resolve Windows update error 0xC190012E.

This error generally happens when the user either tries to update their Windows operating system to Windows 10 v 1903 or when upgrading Windows 10 from insider preview for security reasons.


What triggers Windows Update Error 0xC190012E?

If the Windows Update is continuously failing to search for the Updates or are unable to install them due to error 0xc190012e then here is the problem that causing this error.

1. Missing Registry

2. No Internet accesses

3. An issue in Windows update service

4. Corrupt system files

5. Misconfiguration

6. Virus or Malware attack

Broken trust relationship between workstation and domain - Fix it now

This article covers tips to fix the 'broken trust relationship between workstation and domain' problem.

The underlying problem when this error is seen is that the machine you are trying to access can no longer communicate securely with the Active Directory domain to which it is joined.


Method to fix The trust relationship between this workstation and the primary domain failed Windows issue:

To resolve this issue, remove the computer from the domain, and then connect the computer to the domain.

1. Use a local administrator account to log on to the computer.

2. Select Start, press and hold (or right-click) Computer > Properties.

3. Select Change settings next to the computer name.

4. On the Computer Name tab, select Change.

5. Under the Member of heading, select Workgroup, type a workgroup name, and then select OK.

6. When you are prompted to restart the computer, select OK.

7. On the Computer Name tab, select Change again.

8. Under the Member of heading, select Domain, and then type the domain name.

9. Select OK, and then type the credentials of the user who has permissions in the domain.

10. When you are prompted to restart the computer, select OK.

11. Restart the computer.

MongoDB service is not starting up - Fix it now

This article covers how to resolve the the problem of starting MongoDB server when running the command mongod which may arise due to file permission or ownership issues.


The reason was the dbpath variable in /etc/mongodb.conf. 

To fix, you only had to change the owner of the /data/db directory recursively.

Also For ubunto , what made it happen and was real simple is to install mongodb package:

$sudo apt-get install  mongodb


Also, You can use the below-mentioned command for mongodb service is not starting up:-

$sudo rm /var/lib/mongodb/mongod.lock 

$mongod --repair 

$sudo service mongodb start


Mongodb service is not starting up:

This can also happen if your file permissions get changed somehow. 

Removing the lock file didn't help, and we were getting errors in the log file like:

2016-01-20T09:14:58.210-0800 [initandlisten] warning couldn't write to / rename file /var/lib/mongodb/journal/prealloc.0: couldn't open file    /var/lib/mongodb/journal/prealloc.0 for writing errno:13 Permission denied

2016-01-20T09:14:58.288-0800 [initandlisten] couldn't open /var/lib/mongodb/local.ns errno:13 Permission denied

2016-01-20T09:14:58.288-0800 [initandlisten] error couldn't open file /var/lib/mongodb/local.ns terminating


So, went to check permissions:

ls -l /var/lib/mongodb

total 245780

drwxr-xr-x 2 mongodb mongodb     4096 Jan 20 09:14 journal

drwxr-xr-x 2 root    root        4096 Jan 20 09:11 local

-rw------- 1 root    root    67108864 Jan 20 09:11 local.0

-rw------- 1 root    root    16777216 Jan 20 09:11 local.ns

-rwxr-xr-x 1 mongodb nogroup        0 Jan 20 09:14 mongod.lock

Install ClickHouse on Ubuntu 20.04 - Step by step process to perform it

This article covers how to install ClickHouse on Ubuntu. Basically, ClickHouse is an open-source analytics database developed for big data use cases. 

Install of ClickHouse on Ubuntu involves a series of steps that includes adjusting the configuration file to enable listening over other IP address and remote access. 


Column-oriented databases store records in blocks grouped by columns instead of rows. 

By not loading data for columns absent in the query, column-oriented databases spend less time reading data while completing queries. 

As a result, these databases can compute and return results much faster than traditional row-based systems for certain workloads, such as OLAP.


Online Analytics Processing (OLAP) systems allow for organizing large amounts of data and performing complex queries. 

They are capable of managing petabytes of data and returning query results quickly. 

In this way, OLAP is useful for work in areas like data science and business analytics.


Aggregation queries are queries that operate on a set of values and return single output values. 

In analytics databases, these queries are run frequently and are well optimized by the database. 


Some aggregate functions supported by ClickHouse are:

1. count: returns the count of rows matching the conditions specified.

2. sum: returns the sum of selected column values.

3. avg: returns the average of selected column values.


Some ClickHouse-specific aggregate functions include:

1. uniq: returns an approximate number of distinct rows matched.

2. topK: returns an array of the most frequent values of a specific column using an approximation algorithm.


You can set up a ClickHouse database instance on your server and create a database and table, add data, perform queries, and delete the database.

You can start, stop, and check the ClickHouse service with a few commands.

To start the clickhouse-server, use:

$ sudo systemctl start clickhouse-server

The output does not return a confirmation.

To check the ClickHouse service status, enter:

$ sudo systemctl status clickhouse-server

To stop the ClickHouse server, run this command:

$ sudo systemctl stop clickhouse-server

To enable ClickHouse on boot:

$ sudo systemctl enable clickhouse-server

To start working with ClickHouse databases, launch the ClickHouse client. 

When you start a session, the procedure is similar to other SQL management systems.

To start the client, use the command:

$ clickhouse-client

Troubleshoot DNS issues - Step by Step tips to resolve it

This article covers how to troubleshoot DNS issues. One of the handiest tools for troubleshooting DNS failures is the NSLOOKUP command, which you can access from a Windows Command Prompt window. Simply type NSLOOKUP followed by the name of the host for which you want to test the name resolution.

Basically, DNS errors are caused by problems on the user end, whether that's with a network or internet connection, misconfigured DNS settings, or an outdated browser. They can also be attributed to a temporary server outage that renders the DNS unavailable.


DNS: online name resolution:

The domain name system (DNS) is a directory service used for transforming alphanumeric domain names into numeric IP addresses. 

A decentralized process, name resolution generally takes place on DNS servers’ networks distributed throughout the world. 

Every internet address you enter into your web browser’s search bar is then forwarded by your router to a DNS server. This server then dissolves the domain name into a numeric sequence and returns a corresponding IP address. 

Should the DNS server fail to produce an answer, then it won’t be possible to access the desired website; the result is the error message ‘DNS server not responding’.


To  clear your DNS cache:

1. On your keyboard, press Win+X to open the WinX Menu.

2. Right-click Command Prompt and select Run as Administrator.

3. Run the following command: ipconfig /flushdns.


To Troubleshoot DNS issues:

The root of such irritating messages can often be traced back to the server outage. In such cases, the DNS server is temporarily unavailable. Most of the time, these problems can be corrected by changing browsers, switching a few of your firewall settings, or restarting your router.

1. In order to rule out that the connection problem isn’t being caused by your web browser, carry out a test by attempting to logon on to the desired web page with alternative applications.

2. In case you aren’t able to achieve your desired results simply by changing browsers, then the next step is to rule out Windows Firewall as the possible culprit.

3. Connection problems can often be solved by restarting the server. Most devices include a power button specifically for this purpose. Should this fail to yield any results, then it looks like a hard reboot may be in store; this is done simply by pulling out the power plug. 

4. If you have ruled out common causes of error such as the router software crashes or conflicts with Windows Firewall, then changing your DNS server could be the solution.



How to Check DNS server?

You can find out whether changing DNS server has solved the problem by carrying out a simple test. 

Enter the URL of a well-known site in your browser (e.g. www.google.com). 

If the site can be accessed it means the DNS server is functioning properly.

If the site can't be accessed, you can enter the following IP address into your browser: 172.217.16.195. 

This is one of Google’s IP addresses. If Google doesn't appear after entering the address, it probably means there's a general internet problem rather than a problem with the DNS server.

Code 9c57 Windows Update Error - Fix it now

This article covers fix the Code 9c57 Windows Update Error. Error Code 9c57 generally corresponds to a failed installation of Internet Explorer 11. In addition to that, the KB 2882822 update requires validation of genuine Windows installed on the system, so you may visit the link referred in the third question and check if your Windows requires activation.


What is 'Error code 9c57' in Windows Update?

Windows Update error 9c57 is an error that may occur when you are trying to install “Windows IE9 in Windows 7 for x64 Based System” update.


How can you fix ‘Error code 9c57’ in Windows Update?

Some of the common fixes include:

1. Manually installing Internet Explorer

2. Deleting SoftwareDistribution and running DISM command and sfc/ scannow command


Causes of Windows Update Error 9C57 - Error 9C57:

During software design, programmers code anticipating the occurrence of errors.

However, there are no perfect designs, as errors can be expected even with the best program design. Glitches can happen during runtime if a certain error is not experienced and addressed during design and testing.


To fix Windows Update Error 9C57 - Error 9C57:

1. When you get a runtime error, keep in mind that it is happening due to programs that are conflicting with each other. 

The first thing you can do to resolve the problem is to stop these conflicting programs.

2. Update / Reinstall Conflicting Programs

3. Virus infection causing runtime error on your computer must immediately be prevented, quarantined or deleted. Make sure you update your virus program and run a thorough scan of the computer or, run Windows update so you can get the latest virus definition and fix.

4. You might be getting the error because of an update, like the MS Visual C++ package which might not be installed properly or completely. What you can do then is to uninstall the current package and install a fresh copy.

5. You might also be experiencing runtime error because of a very low free space on your computer.

6. If the error is related to a bad graphics driver, then you may do the following:

Open your Device Manager, locate the graphics driver

Right click the video card driver then click uninstall, then restart your computer

Virtuozzo VS Hyper-V - Which is better

This article covers some comparison between Virtuozzo VS Hyper-V. 

Hyper-V and Virtuozzo are both popular VPS platforms used by a large number of web hosting providers for the provisioning of Windows VPS hosting services, with Virtuozzo being favoured for Windows Server 2003 VPS hosting and Hyper-V being the most reliable solution for Windows Server 2008 VPS hosting services.


Advantages of using Virtuozzo over Hyper-V include:

1. Direct Linux support – Virtuozzo can be installed on their Windows or Linux VPS hosting nodes, and although Hyper-V can be used for the hosting of virtual machines running Linux it is only available for use on Windows Server 2008.

2. Web based control panel (Parallels Power Panel) – the Parallels Power Panel will allow users to manage their Linux or Windows VPS hosting server from a web based interface meaning that if they aren't in a situation where they can access their VPS server via Remote Desktop then they can use the Power Panel to restart their VPS server if necessary or to kill any services or processes which may be overloading their VPS server’s resources.

3. Separate application – the fact that Virtuozzo is a separate application which can be installed on top of the operating system can have its advantages in some cases, for example if a web hosting providers wishes to discontinue using a server for VPS server hosting then all they have to do is uninstall the application from their server, although in most cases it is advised to do an OS reload anyway to ensure that you have a blank canvas to start with.


Advantages of using Hyper-V over Virtuozzo:

1. Cost – with Virtuozzo VPS hosting web hosting providers have to pay for the cost of the Virtuozzo application and the cost of the operating system license, but because Hyper-V is part of the Windows Server 2008 operating system they will only need to pay for the operating system license – this can help to reduce the costs of Hyper-V VPS hosting services and as the cost of the operating system falls, prices will fall further and will eventually meet Virtuozzo Windows Server 2003 hosting services when it comes to price which will mean that people will gradually move over to using Windows Server 2008 VPS hosting.

2. Reliability – as Hyper-V is part of the Window Server 2008 operating system, web hosting providers are able to guarantee reliable Windows Server 2008 VPS server hosting services.

3. Native support for Windows Server 2008 – although Virtuozzo may have support for Windows Server 2008, it hasn’t been able to offer the most reliable of Windows Server 2008 VPS hosting services.

The Windows Installer Service could not be accessed error - Fix it now

This article covers methods to resolve the Windows #Installer Service could not be accessed #error which occurs while we try to install a program in Windows or when you are running Windows in safe mode.

Windows Installer popups may be caused by Windows configuration issues, by Windows Update prompting you to install updates or by malware.


To fix #Windows installer error:

1. Click Start. , type services.

2. Right-click Windows Installer, and then click Properties.

3. If the Startup type box is set to Disabled, change it to Manual.

4. Click OK to close the Properties window.

5. Right-click the Windows Installer service, and then click Start.

6. Try to install or to uninstall again.


To fix error 1719 windows installer service could not be accessed:

1. Start the Windows Installer Service.

2. Stop and then Restart Windows Installer Service.

3. Reset the settings of Windows Installer Service in the registry.


To to Disable Windows Installer:

1. Log into Windows. Click the "Start" button.

2. Double-Click "Group Policy" in the left pane.

3. Expand the tree in the left side of the pane, "Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\Window Installer".

4. Double click "Disable Windows Installer.


To enable Windows Installer in Safe Mode:

1. Press Windows + R, type cmd, and press Ctrl + Shift + Enter to run CMD as administrator. 

2. Type the command net start msiserver in Command Prompt window, and press Enter to enable Windows Installer in Safe Mode in Windows 10.

Best Server Monitoring Software Products - Advantages and Disadvantages

This article covers the Best Server Monitoring Software. Basically, Server management software takes the burden of managing servers and other critical applications.

Reporting and monitoring is critical in business, especially when it comes to IT infrastructure such as network connectivity and server monitoring.

Being able to look back at historical trends and faults is especially useful when troubleshooting an issue on a critical server or service, so if you don’t already have a solution in place, then it might be time to seriously consider it.


Server Monitoring Software is able to check everything about your system, such as:

1. CPU usage

2. RAM utilization

3. Hard Disk Space

4. System Temperatures

5. Server Alerts (Hardware status warnings)

6. RAID Array health checks

7. Virtual Machine Alerts

8. You can also monitor user logins, suspicious activity on your server, and the status of your services and daemons


Best server monitoring software and tools includes:

1. SolarWinds Server & Application Monitor - Tracks the statuses of key server components and also watches the performance of applications running on each server. The tool runs on Windows Server but can also monitor Linux servers across a network.

2. Atera - A remote monitoring and management system that includes server monitoring features. Ideal for managed service providers.

3. Site24x7 Server Monitoring - A cloud-based monitoring system that can track the statuses of Windows and Linux servers as part of a company’s infrastructure.

4. ManageEngine Applications Manager - A server and applications monitoring system that includes extra capabilities such as VM monitoring. Runs on Windows Server and Linux.

5. Paessler PRTG - A package of monitors that includes a range of server status trackers. Installs on Windows Server.

6. Nagios XI - A comprehensive infrastructure monitoring system that includes live server monitoring services. Installs on Linux.

7. Opsview - A system monitoring tool that includes sever monitoring and is billed as an alternative to Nagios XI. Runs on Linux.

8. Zenoss - A system monitoring tool that includes a server monitoring module and is also available in a free version. Installs on Linux.

9. OP5 - Monitor Server monitoring as part of a system-wide monitor tool that accepts Nagios plug-ins. Install on Linux.

10. AppOptics - A cloud-based server and applications monitoring system that will track the performance of Windows and Linux servers.

11. Monitis - A cloud-based monitoring system that specializes in tracking the performance of Web servers and Web applications.

12. ManageEngine Free Windows Admin Tools - A collection of 15 free tools that cover different aspects of server monitoring including disk space, software inventory, and user lists.


What is server maintenance?

Server maintenance is process of keeping a server software updated and running so that a computer network can operate smoothly and avoid downtime or loss of data. Regular maintenance will keep the server running as expected and will help avoid a total or partial network failure.

Enable and Configure MPIO on Windows Server 2016 2012 R2

This article covers how to enable Multi-Path Input-Output or MPIO on a Windows server either from a graphical interface using the Server Manager console or from the PowerShell command line. 

Multipathing is the technique of creating more than one physical path between the server and its storage devices. It results in better fault tolerance and performance enhancement. Oracle VM Servers are installed with multipathing enabled because it is a requirement for SAN disks to be discovered by Oracle VM Manager.


To Install MPIO in Windows Server 2008 R2:

Note You must restart the server after you follow these steps.

1. Open Server Manager. To do this, click Start, click Administrative Tools, and then click Server Manager.

2. In Server Manager, click Features, and then click Add Features.

3. Select the Multipath I/O feature for installation, and then click Next.

4. Finish the installation by confirming the selections, and then restart the server.


To Configure MPIO for StorSimple volumes:

MPIO must be configured to identify StorSimple volumes. 

To configure MPIO to recognize StorSimple volumes, follow these steps:

1. Open the MPIO configuration. To do this, click Start, click Administrative Tools, and then click MPIO.

2. In the MPIO window, click Add on the MPIO Devices tab.

3. Type SSIMPLE Model in the Add MPIO Support window under Device Hardware ID.

4. Restart the server when you are prompted.


To Mount a StorSimple volume in Windows Server 2008 R2:

After MPIO is configured on the server, volumes that are created on the StorSimple appliance can be mounted and can take advantage of MPIO for redundancy. 

To mount a volume, follow these steps:

1. Open the iSCSI Initiator Properties dialog box on the server. To do this, click Start, click Administrative Tools, and then click iSCSI Initiator.

2. In the iSCSI Initiator Properties dialog box, click the Discovery tab, and then click Discover Portal.

3. Type the IP address of the "DATA" port on the StorSimple appliance.

Note If you use a private network for iSCSI connections, type the IP address of the DATA port that is connected to the private network.

4. Click the Targets tab in the iSCSI Initiator Properties dialog box. This displays the StorSimple appliance iSCSI qualified name (IQN) in the Discovered Targets section.

5. Click Connect to establish the iSCSI session with the StorSimple appliance. In the Connect To Target dialog box, click to select the Enable multi-path check box.

6. Open Server Manager. To do this, click Start, click Administrative Tools, and then click Server Manager.

7. In Server Manager, click Storage, and then click Disk Management. Volumes that are created on the StorSimple appliance and that are visible to this server appear under Disk Management as new disks.

8. Initialize the disk and create a new volume. During the format process, select a block size of 64 kilobytes (KB).

9. Under Disk Management, right-click the disk, and then click Properties.

10. In the SSIMPLE Model #### Multi-Path Disk Device Properties dialog box, click the MPIO tab, click Details in the DSM Name section, and then verify that the parameters are set to the default parameters.

mkvirtualenv command not found on Ubuntu - How to fix this error

This article covers solution to the #error 'mkvirtualenv: command not found' which happens while running mkvirtualenv #command.

You'll need to install virtualenvwrapper package into the same global site-packages area where virtualenv is installed. 

Administrative privileges are required for this installation. 

Ensure you're logged in as root user or standard user with sudo privileges.


Start by Updating the System package list:

$ sudo apt update

Then install #Python build tools.

# Python 2

$ sudo apt-get install python-pip python-dev build-essential

# Python 3

$ sudo apt-get install python3-pip python3-dev build-essential

Then install virtualenv and virtualenvwrapper packages.


With APT package manager:

$sudo apt install virtualenv virtualenvwrapper

With Pip:

# Python 2

$ sudo pip install virtualenv virtualenvwrapper

# Python 3

$ sudo pip3 install virtualenv virtualenvwrapper

NFS vs CIFS - The main Differences

This article covers NFS vs CIFS performance. 

NFS, or Network File System, was designed in 1984 by Sun Microsystems. This distributed file system protocol allows a user on a client computer to access files over a network in the same way they would access a local storage file. Because it is an open standard, anyone can implement the protocol.

All versions of NFS can use Transmission Control Protocol (TCP) running over an IP network, with NFSv4 requiring it. NFSv2 and NFSv3 can use the User Datagram Protocol (UDP) running over an IP network to provide a stateless network connection between the client and server.


Common Internet File System (CIFS) is a network filesystem protocol used for providing shared access to files and printers between machines on the network. A CIFS client application can read, write, edit and even remove files on the remote server.

Microsoft operating systems use CIFS for remote file operations (typically mapping network drives), browsing (via the Network Neighborhood icon), authentication (NT and Windows 2000), and remote printer services.


The NFS service has the following benefits:

1. Enables multiple computers to use the same files, so everyone on the network can access the same data.

2. Reduces storage costs by having computers share applications instead of needing local disk space for each user application.

Use Nmap to Scan Open Ports - How to

This article covers how to use Nmap to Scan Open Ports. Nmap is the world's leading port security network scanner. The Nmap hosted security tool can help you determine how well your firewall and security configuration is working.

How would you tell Nmap to scan all ports?
By default, Nmap scans the 1,000 most popular ports of each protocol it is asked to scan.
Alternatively, you can specify the -F (fast) option to scan only the 100 most common ports in each protocol or --top-ports to specify an arbitrary number of ports to scan.

The OS and Service scanning options are helpful for scanning a particular port or service to get more information.
If a service is running on a non-default port, it might be by design – or it might suggest there is a security breach.
Ports often have a default usage. Most ports under 1000 are dedicated and assigned to a specific service.

What file does Nmap use to determine which ports to scan?
Nmap needs an nmap-services file with frequency information in order to know which ports are the most common.

Malicious ("black hat") hackers (or crackers) commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.

Migrate database from MySQL to PostgreSQL using pgLoader

This article covers how to migrate a database using pgLoader with a single #command.
PostgreSQL, also known as “Postgres,” is an open-source relational database management system (RDBMS).
It has seen a drastic growth in popularity in recent years, with many developers and companies migrating their data to Postgres from other database solutions.
The prospect of migrating a database can be intimidating, especially when migrating from one database management system to another.

Facts about pgLoader:
1. pgLoader is an open-source #database migration tool that aims to simplify the process of migrating to #PostgreSQL.
2. It supports #migrations from several file types and RBDMSs — including #MySQL and SQLite — to PostgreSQL.
3. #pgLoader is a flexible tool that can perform a database migration in a single command.
4. With a few configuration tweaks, it can migrate an entire database from one physical machine to another using a secure SSL/TLS connection.

AWS error code 0x204

This article will guide you on methods to fix AWS #error code 0x204 which happens in the process of trying to login to a remote machine on VPC.

Amazon Virtual Private #Cloud (Amazon #VPC) is a service that lets you launch AWS resources in a logically isolated virtual network that you define. You can use both IPv4 and IPv6 for most resources in your virtual private cloud, helping to ensure secure and easy access to resources and applications.


To enable RDP access on AWS instance:

i. Open the Amazon EC2 console , set it to the stack's region, and choose Security Groups from the navigation pane. 

ii. Choose AWS-OpsWorks-RDP-Server, choose the Inbound tab, and choose Edit. 

iii. Choose Add Rule and specify the following settings: Type – RDP.


To connect from the #Amazon EC2 console:

1. Open the Amazon #EC2 console.

2. In the left navigation pane, choose Instances and select the instance to which to connect.

3. Choose Connect.

4. On the Connect To Your Instance page, choose EC2 Instance Connect (browser-based SSH connection), Connect.

KVM hypervisor How it Works

This article will guide you on how the KVM #hypervisor works. Basically, KVM is a type-2 hypervisor (installed on top of another OS, in this case some flavor of #Linux). 

It runs, however, like a type-1 hypervisor and can provide the power and functionality of even the most complex and powerful type-1 hypervisors, depending on the tools that are used with the KVM package itself.

KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V).

Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images.

1. The main difference between Type 1 vs. Type 2 hypervisors is that Type 1 runs on bare metal and Type 2 runs on top of an operating system. 

2. Each hypervisor type also has its own pros and cons and specific use cases.

3. Xen is better than #KVM in terms of virtual storage support, high availability, enhanced security, virtual network support, power management, fault tolerance, real-time support, and virtual CPU scalability.

4. A Type 1 hypervisor takes the place of the host operating system. 

5. Type 1 hypervisors are highly efficient because they have direct access to physical hardware. 

6. This also increases their security, because there is nothing in between them and the CPU that an attacker could compromise.

NTFS partition failed to mount

This article will guide you on methods to resolve NTFS partition failed to mount error. 

Causes of NTFS partition failed to mount error:

1. File system errors

After using #NTFS drive in #Windows you have detached it without removing it safely. Therefore NTFS journal has not been emptied from temporary streams.

To fix the problem:

i. Open Disk Utility under #Mac OS X. 

ii. You will find it in Applications – Utilities.

iii. Choose NTFS partition on the left and find First Aid tab on the right. 

iv. Under this tab you will find Verify Disk option. 

v. Run Verify and then Repair.

FFmpeg on CentOS

This article will guide you on how to install FFMPEG on #CentOS and fix its related #errors. FFmpeg is a powerful tool that can do almost anything with #multimedia files.

FFmpeg is a standard package on many #linux systems. 

You can check if it is installed with a #command like dpkg -s ffmpeg . 

If it is not installed, you should be able to install with your system's package manager. i.e. sudo apt-get install ffmpeg or search 'ffmpeg' in the Software Center on Ubuntu.

To run #FFmpeg in #Linux:

1. Start by updating the packages list: sudo apt update.

2. Next, install FFmpeg by typing the following command: sudo apt install ffmpeg.

3. To validate that the package is installed properly use the ffmpeg -version command which prints the FFmpeg version: ffmpeg -version. 

Setup OpenVPN on Windows Server

This article will guide you on how to setup OpenVPN on windows.

OpenVPN is a virtual private #network (#VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. 

To Configure OpenVPN client as service on Windows:

1. Editing your OpenVPN client configuration.

2. Storing your PrivateVPN.com credentials in a file.

3. Import edited .ovpn file and user.auth file to OpenVPN #config folder.

4. Configuring OpenVPN service to start automatically on boot.

To connect to OpenVPN from Windows Server:

i. Navigate to your #OpenVPN Access Server client web interface.

ii. Login with your credentials.

iii. Select 'OpenVPN Connect for #Windows'.

iv. Wait until the download completes, and then open it (specifics vary depending on your browser).

MySQL is not running

This article will guide you on methods to resolve MySQL #error 'MySQL is not running'. Basically, this MySQL error occurs due to many reasons that include stopping MySQL improperly, tables crashing and so on. 

Both MySQL and #Microsoft SQL Server (MSSQL) are widely used enterprise database systems. MySQL is an open-source relational #database management system (RDBMS), while MSSQL Server is a Microsoft-developed RDBMS. 

Enterprises can choose between multiple #MSSQL Server editions to suit their individual needs and budgets.

Why #MySQL is not opening?

1. You can also check the MySQL service is running in background or not. 

2. To do that open Task manager ( Press CTRL + SHIFT + ESC simultaneously ) and look for mysqld service in background process section. 

3. If it isn't listed there then the service is stopped or disabled.

Install WordPress with Docker Compose

This article will guide you on how to install WordPress with docker compose.

Docker Hub is an official repository where individuals and organizations can upload Docker images for public consumption.

The reason for using Docker is used to define and start running multi-container Docker applications. You need to define docker-compose. yml for the services that make up your app services. You should run docker-compose up and Compose starts and runs your entire app.

Steps to #Install WordPress with Docker on #Ubuntu 20.04 :

1. Create a Cloud Server. First, log in to yourCloud Server.

2. Install Required #Dependencies.

3. Install Docker.

4. Create a MariaDB #Container.

5. Create a #WordPress Container.

6. Configure #Nginx as a Reverse Proxy.

7. Access WordPress Interface.


To Update WordPress

The docker-compose.yml specifies the latest version of the WordPress image, so it's easy to update your WordPress version:

docker-compose down

docker-compose pull && docker-compose up -d

Install Firejail in Linux

This article will guide you on steps to #install #Firejail in Linux. Basically, Firejail reduces the risk of security breaches by restricting the untrusted applications and separating them from other parts of the system. 

#Sandboxing involves providing a safe environment for a program or #software so that you can play around with it without hurting your system. It actually keeps your program isolated from the rest of the system, by using any one of the different methods available in the #Linux #kernel.

To Install the Firejail Software:

1. Open up a terminal window.

2. Issue the command sudo apt-get install firejail.

3. Type your sudo password and hit Enter.

4. If prompted, type y to allow the installation to continue.

5. Allow the installation to complete.

Install XRDP Server

This article will guide you on steps to install XRDP #Server on #Ubuntu. To provide remote access via RDP, a Windows native protocol, XRDP behind the scenes uses #VNC, a remote access protocol more common in Linux.

After #xrdp is installed you can start the server with the following command:

Service xrdp start.

Service xrdp-sesman start (Thanks to Greg for pointing that out) — UPDATE!!

If want it to auto start after reboot you need to run this command also: update-rc.d xrdp enable (It will not start xrdp-sesman automatic).


To use XRDP Linux:

1. With #Ubuntu 18.04 first install xrdp: sudo apt-get -y install xrdp.

2. Next, one may adjust the configuration file: sudo nano /etc/xrdp/xrdp.ini.

3. Set encryption level to high: encrypt_level=high.

4. Next, allow just RDP through the local firewall: sudo ufw allow 3389/tcp.

Logging in Apache More about it

The Apache access logs stores information about events that occurred on your #Apache web #server. Apache web servers also provide administrators with another type of log file called error logs. 

The Apache error log has a logging level that filters the messages sent to the log. Apache #logs nothing for a single page request in warn level.

This log file is used to provide more information regarding a particular error that has occurred on the web server.

By default, you can find the Apache #access log file at the following path:

i. /var/log/apache/access. log.

ii. /var/log/apache2/access. log.

iii. /etc/httpd/logs/access_log.

To enable the Apache #HTTP access logs:

1. Open the Apache HTTP configuration at /Applications/MAMP/conf/apache/httpd.conf.

2. Find this line.

3. Change the line.

4. Restart Apache using the MAMP widgit.

5. Now, view your new logfiles!

Create a virtual machine using lightsail in AWS

This article will guide you on how to create a virtual #machine using Lightsail in #AWS.

#Lightsail is an easy-to-use virtual private server (#VPS) that offers you everything needed to build an application or website, plus a cost-effective, monthly plan.

To create a virtual machine in #cloud:

1. Using the left-hand navigation bar, click Compute Engine and then select #VM instances from the item list. 

2. If this is your first #VM on the platform. 

3. If you have a VM template you can import it to GCP, but in this case we will create a VM from scratch.

Install SSL Certificate in IIS 7

This article will guide you on steps to #install SSL Certificate in IIS 7 #windows 2008 server. 

IIS (Internet Information Services) is used to host ASP.NET web applications and static #websites. It can also be used as an #FTP server, host WCF services, and be extended to host #web #applications built on other platforms such as #PHP. There are built-in authentication options such as Basic, ASP.NET, and Windows auth.

To install a certificate in Windows Server:

i. In the left pane of the console, double-click #Certificates (Local Computer). 

ii. Right-click Personal, point to All Tasks, and then select Import. 

iii. On the Welcome to the Certificate Import Wizard page, select Next. 

iv. On the File to Import page, select Browse, locate your certificate file, and then select Next.

To enable SSL in IIS:

1. On the #IIS server, start the IIS Manager (on the Windows taskbar, select Start > Administrative Tools > Internet Information Services (IIS) Manager).

2. Enabling SSL in IIS

3. In Type, select https.

4. In SSL certificate, select an appropriate certificate from available choices.

5. Click OK.

Digitally Signed Files with PowerShell

This article will guide you on how to implement reporting on digitally signed files with PowerShell. 

Get-Command gets the commands from PowerShell modules and commands that were imported from other sessions. 

To get only commands that have been imported into the current session, use the ListImported parameter. 

Without parameters, Get-Command gets all of the cmdlets, functions, and aliases installed on the computer.

Automate Windows Server 2019 Administration with Ansible

This article will guide you on steps to automate Windows Server 2019 #Administration with Ansible. 

Ansible can be used to manage and execute core functions in Windows #environments, from security updates to remote management using #WinRM. Although Ansible must be run on #Linux, Windows administrators can use Ansible to manage and automate their systems without needing to know how to use a Linux #terminal.

To Connect Ansible on Windows from #Ubuntu:

1. Create Ansible Windows User. Create a new user for the Ansible windows connection setup.

2. Setup Libraries and WinRM.

3. Update the Ansible Inventory file.

4. Update the Ansible Group Variables.

5. Configure #Windows Servers to Manage.

6. Test Connectivity to the Windows Server.

Disable Password Expiration with PowerShell

This article will guide you on the method to disable password expiration in the #Windows server with PowerShell.

#PowerShell is the shell #framework developed by Microsoft for administration tasks such as configuration management and automation of repetitive jobs. 

The term 'PowerShell' refers to both – the shell used to execute commands and the scripting language that goes along with the framework.

Why did #Microsoft make me change my password?

This is a security feature of all Microsoft accounts which cannot be turned off. 

If the option for 72 days password expiration is enabled in your account then it will automatically ask you to reset password.

To turn off the password feature on Windows 10:

1. Click the Start menu and type "netplwiz." The top result should be a program of the same name — click it to open.

2. In the User Accounts screen that launches, untick the box that says "Users must enter a name and password to use this computer."

3. Hit "Apply."

4. When prompted, re-enter your password to confirm the changes.

mchk plesk How to use it

This article will guide you on mchk utility in #Plesk and how to use it to fix errors. It helps to repair malfunctioning Plesk services.

By using Plesk Reconfigurator, you can check and #repair Plesk installation that is malfunctioning due to misconfiguration of one or more of its components.

The following problems can be identified and corrected by using the Repair Plesk Installation option:

1. problems with mail delivery caused by user-made changes in DNS server addresses.

2. misconfigurations of system user accounts or groups used by Plesk to access system objects.

3. malfunction of Plesk's services.

4. misconfigurations in user access permissions for files and folders on server disks and hosting folders.

5. miscalculations of disk space usage by individual domains and subdomains.

Windows error 577

This article will guide you on different methods to fix Windows error 577. This error appears due to the issues with #Security Center that is an in-built Windows tool, which is set to scan the system on a regular basis and inform its user about a pending update, missing software, turned off antivirus, and similar issues.

To repair Windows startup:

1. Hold the Shift key down at the #Windows sign-in screen and press the Power button at the same time.

2. Continue holding the Shift key, then click Restart.

3. Once the PC restarts, it'll present a screen with a few options.

4. From here, click Advanced options.

5. In the Advanced options menu, choose Startup #Repair.

Server sent passive reply with unroutable address

This article will guide you on ways to resolve #Server sent passive reply with unroutable address which occurs due to bad server settings or when an FTP client is behind #NAT. 

#FileZilla has updated their FTP #client, and FTP over TLS is now used by default. This results in clients being unable to connect to their server from the outside network.

Make sure that you properly set up for FTP over TLS/SSL, explicit and passive ports are allowed on the #firewall and set on Serv-U:

i. Go to the Serv-U settings at: Global Limits & Settings > Settings - Network Settings.

ii. Ensure the Auto-configure firewall through UPnP checkbox is not checked.

iii. Ensure the Packet time-out is set to 300 seconds.

iv. Set #PASV Port Range is 50,000-50,009, and port forward these ports to your router.

This configures the file transfer traffic to be routed through the router and directly to Serv-U through “Port Forwarding”.


If, after this, you are still unable to connect, try disabling the "Block FTP_Bounce and FXP" option - this has been known to cause issues for some clients. To do this, follow the steps below:

1. Navigate to Global > Limits and Settings  > #FTP Settings.

2. Select Global Properties. (If this is not available, first select Use Custom Settings to gain access to it).

3. On the Advanced Options tab, make sure "Block FTP_Bounce and FXP" is unchecked (which it is by default).

Install NET framework 4.8 on windows server 2016

This article will guide you on how to #install .NET framework 4.8 on windows server 2016. 

Can't install .NET Framework 3.5 #Windows 10 0x800f0954?

NET Framework 3.5 or Any Optional #Feature. If the error 0x800f0954 occurs installing optional Windows features, it may be because the system is unable to access the Windows Update server. This is especially true in case of domain-joined computers which is configured to downloads updates from a WSUS server.

By using the Windows server 2016, we can install . NET Framework 3.5 which can be easily installed through Server Manager. 

i) Open the 'Server Manager' and navigate to the 'Manage' and then select 'Add Roles and Features'. 

ii) Click next to 'Features' section and select the option '.

To install Microsoft . #NET Framework 3.5. 1 on Windows Server 2012 R2:

1. Open Server Manager and select Features.

2. Select Add roles and features to launch the Add Roles and Features wizard.

3. In the Add Roles and Features wizard, click.

4. In the Confirm Installation Selections dialog box, click Install.

When you try to install the Microsoft . NET Framework 4.7 on a #computer that runs Windows 7 Service Pack 1 (SP1), Windows Server 2008 R2 SP1, or Windows Server 2012, the setup is blocked and cannot continue. 

This issue occurs when the computer does not have the update for D3DComplier (D3DCompiler_47. dll) installed.

Imagick php install

This article will guide you on how to install #Imagick #PHP #extension. Imagick is the most popular PHP extension which helps to create edit convert, and/or manipulates images. ImageMagick is a free and open source, feature-rich, text-based and cross-platform image manipulation tool used to create, edit, compose, or convert bitmap images. It runs on #Linux, #Windows, #Mac Os X, iOS, Android OS, and many other operating systems.

To use Imagick with PHP in your server, you can easily achieve it with the following #command:

sudo apt-get install php-imagick.

php -m | grep imagick.

sudo service apache2 restart.

How to install OBS on Linux Windows and MacOS

This article will guide you on steps to #install #OBS on #Windows. Also, we saw some common errors that we came across while installing OBS.

Open Broadcaster Software (OBS) is a free and open-source cross-platform streaming and recording program built with Qt and maintained by the OBS Project. There are versions of OBS Studio available for Microsoft Windows, macOS, and Linux distributions. OBS is funded on Open Collective.

As a standard Windows application, OBS should run fine on Windows 10 without any issues in the core program. However, OBS makes heavy use of advanced hardware features, particularly on your GPU such as texture sharing and hardware encoding. Windows 10 will come with new #drivers for your hardware, including your #GPU.

To set up OBS for #streaming:

1. Run the auto-configuration wizard. When you load OBS Studio for the first time you should see the Auto-Configuration Wizard.

2. Set up your audio devices. By default, OBS Studio is set to capture your system default desktop audio device and microphone.

3. Add your sources for video.

4. Test your stream and record settings.

Windows Live Mail Error 0x800ccc0e

This article will guide you on steps to fix #Outlook #Error #0x800ccc0e. Usually, this error occurs due to bad #email settings or because of minor problems with the email server or internet connection. Also, the customer may experience this error while receiving the mail on the email #client.

Try to run Windows Live Mail as Administrator in compatibility mode. Try to re-configure the Windows Live Mail account. Remove the existing WLM account and create a new one. Try reinstalling Windows Essentials 2012 on your Windows 10.

To get rid of Windows Live Mail error:

1. Open your Windows Live mail program.

2. Select the Home tab at the top right of your Windows Live Mail.

3. Click the Outbox to the left. Find any emails that are not sending out.

4. Once you send the email again, you can delete the email in the Outbox. 

The error will go away after the sent email is deleted.

Microsoft SQL server error 18470 How to fix it

This article will guide you on the different factors that causes SQL server error: 18470 and also how to fix this #error.

In SQL Server Configuration Manager, in the left pane, click SQL Server Services. In the results pane, right-click SQL Server (#MSSQLServer) or a named instance, and then click Start, Stop, Pause, Resume, or Restart.

User gets the #Microsoft SQL Server Error: 18470. This may happen if the SA (System Administrator) user account is disabled in #SQL Server. It can be verified by trying to log in to SQL Server Management Studio (#SSMS) using the SA account. In the Login Properties screen, select Status on the left side.

To Microsoft SQL Server Error 18456:

1. Log In with Remote Desktop.

2. Run Microsoft SQL Server Management.

3. Checking the Server Authentication Mode.

4. Restart the SQL Service.

5. Checking SQL User Permissions.

6. Mapping the User to the #Database.

Reset Windows Administrator Password from Hyper-V

This article will guide you on steps to reset the forgotten #Windows Administrator password from Hyper-V using an #ISO file.

Microsoft's Hyper-V virtualization can greatly reduce cost of operations. By purchasing a few very powerful #servers you can virtualize all or most of your entire infrastructure while reducing the cost of #hardware and maintenance.

To Reset Lost Admin Password for Hyper-V Virtual #Machine:

1. Select the administrator account, then click the Reset Password button to reset the password to blank. 

2. Click the Restart button to reboot the virtual machine, you are able to log in to the administrator account with a blank password.

Install Drush on Drupal 8

This article will guide you on steps to #install #Drush in #Drupal 8. Drush is a command-line utility to manage Drupal #CMS. For this installation of the Drush scripting interface, we will be working primarily on the command line. This is because Drush is a command line interface, and all of the commands you will use will need to be issued from there.

Drush is the command line shell and Unix scripting interface for Drupal.

To Install a global Drush via #Composer:

1. Install Composer globally.

2. Install the cgr tool following the instructions in that project.

3. Add composer's bin directory to the system path by placing export PATH="$HOME/.

4. Install latest stable Drush: cgr drush/drush .

5. Verify that Drush works: drush status.

How Chmod 777 works

This article will guide you on how to give #Chmod 777 to folders and files in #Linux. We also discussed the risks and more information about file permissions. 

If you are managing a Linux system, it is crucial to know how the Linux #permissions work.

You should never set 777 (rwxrwxrwx) permissions #files and #directories permissions. 777 means that anyone can do anything with those files.

To Give Root Privileges to a User in Linux:

1. Adding to Root Group using usermod. Let see how we can grant normal user root access by adding to root group.

2. Adding to #Root Group using Useradd Command.

3. Editing /etc/passwd file.

4. Setting as Sudo User.

Install and Configure OpenSSH on windows

This article will guide you on steps to install and configure #OpenSSH on #windows. Also, we saw some common errors relating to OpenSSH.

OpenSSH is the premier connectivity tool for remote login with the #SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks.

i. To install OpenSSH, start Settings then go to Apps > Apps and Features > Manage Optional Features. 

ii. Scan this list to see if OpenSSH client is already installed. 

iii. If not, then at the top of the page select "Add a feature", then: To install the OpenSSH client, locate "OpenSSH Client", then click "Install".

To Enable the OpenSSH Server in Windows 10:

1. Open the #Settings app and go to #Apps -> Apps & features.

2. On the right, click Manage optional features.

3. On the next page, click the button Add a feature.

4. In the list of features, select OpenSSH Server and click on the Install button.

5. Restart Windows 10.

Windows Activation Error Code 0xc004f074

This article will guide you on methods to fix #Windows activation error code #0xc004f074 and its causes.

When attempting to activate the Windows operating system, users sometimes receive the 0xC004f074 error code. This is a Windows Activation error that occurs when Windows is unable to reach your company's activation service or system administrator.

Changing your Windows #Product Key does not affect your personal files, installed applications and settings. Enter the new product key and click Next and follow the on screen instructions to #activate over the Internet.

To fix error 0xc004f074 in Windows 10:

1. Use the slmgr. vbs command.

2. Use the Slui 3 command. While on your start screen you need to press and hold the button Windows and the button R.

3. Run SFC scan.

4. Run the Update and Activation #Troubleshooters.

5. Contact #Microsoft Support.

The application failed to start correctly 0xc00007b in Windows

This article will guide you on steps to fix #application failed to start correctly #0xc00007b in Windows which occurs due to different reasons.

Application Error #0xc0000005 (Access Violation) error is usually caused by your computer not being able to correctly process the files and settings required to run a particular program or installation.

To can apply the methods below and see if they can help you get rid of this error.

1) Reboot your computer.

2) Run your application as #administrator.

3) Reinstall your application.

4) Reinstall Microsoft .NET #framework (for Windows 7 or below)

5) Reinstall Microsoft Visual C++ Redistributable Packages.

6) Update your #Windows.

Transfer Files with Rsync on Windows using SSH connection

This article will guide you on steps to perform Rsync from Windows to Linux over SSH.

#Rsync can use #SSH as a secure transport agent. Make sure rsync is installed by opening a #terminal session and typing rsync --version on each machine.

Most #Linux distributions can now read the FAT32 or NTFS disk formats natively, so you could copy your files to an external hard drive formatted in Windows with either of those file systems, which will then allow you to read the data back easily in Linux.

1. cwRsync is an implementation of rsync for Windows. 

2. rsync uses a #file #transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. 

3. #cwRsync can be used for remote file #backup and #synchronization from/to Windows systems.

Security certificate does not specify subject alternative names

This article will guide you on steps to fix #Security certificate does not specify subject alternative names. 

Basically, the #error, Security certificate does not specify subject alternative names trigger if the certificate does not have the correct SubjectAlternativeName extension.

Subject Alternative Names or SANs allow you to secure multiple domains from one SAN SSL certificate. SANs are additional domain names added to an SSL certificate.

To add a Subject Alternative Name to a certificate:

1. If you want to add #SAN, most CAs allow you to reissue a certificate with new details, though this will usually revoke your old certificate. 

2. You don't need the old CSR to reissue a certificate, you can instead create a new CSR with the updated details using a new or existing private key.

The Subject Alternative Name (#SAN) is an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate. The use of the SAN extension is standard practice for #SSL #certificates, and it's on its way to replacing the use of the common name.

Windows PSExec error code 20

This article will guide you on methods to resolve #PsExec #errors. Also you will learn common mistakes made when executing PsExec #commands.

PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console #applications, without having to manually install #client #software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like #IpConfig that otherwise do not have the ability to show information about remote #systems.

Windows update error 0x800B0109

This article will guide you on steps to fix the #windows #update error 0x800B0109.

Windows error code #0x80070422 refers to an inability of Windows 7 to startup the Windows Update service so your computer can connect to the update servers at Microsoft.

Steps For Fixing #Error Code #0x800b0109:

1. Open Administrative Tools from Control Panel. Open Control Panel, type administrative tools in the search box, and then click Administrative Tools.

2. Double-click Services.  If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Right-click the Background Intelligent Transfer Service (BITS) service, and then click Properties.

4. On the General tab, next to Startup type, make sure that Automatic (Delayed Start) is selected.

5. Next to Service status, check to see if the service is started. If it’s not, click Start.

6. Click OK to close the #Properties dialog box.

7. Right-click the Windows Event Log service, and then click Properties.

8. On the General tab, next to Startup type, make sure that Automatic is selected.

9. Next to Service status, check to see if the service is started. If it’s not, click Start.

Install imagemagick on CentOS

This article will guide you on steps to #install #ImageMagick and fix its errors. Basically, ImageMagick is used to manipulate the digital images.

ImageMagick helps to create, edit, compose, or convert #bitmap images. It can read and write images in a variety of formats (over 200) including #PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and #SVG.

To install ImageMagick from the source:

1. First #download the latest version of the program sources - ImageMagick.

2. Unzip the package to a folder of choice.

3. In the folder where you have unzipped ImageMagick run the configuration script.

4. If no errors were found, you can start the install process.

Windows update error 0x80240023

This article will guide you on steps to fix #Windows #update #error #0x80240023 which usually triggers while updating the Windows #system.
When you encounter an error #message, reboot your #machine and try to run the updates again. If you haven't run Windows #Update for some time, then you might have to repeat this process several times before all updates have been installed.
To fix errors on Windows 10:
1. Make sure that your #device has enough space.
2. Run Windows Update a few times.
3. Check third-party #drivers and download any updates.
4. Unplug extra #hardware.
5. Check Device #Manager for errors.
6. Remove third-party security #software.
7. Repair hard-drive errors.
8. Do a clean restart into Windows.

Perfmon Counters for CPU usage

This article will guide you on how to use #Perfmon Counters for CPU #Usage and #Optimization.
Monitoring #CPU #Performance #Counters:
1. System, #Counter: Processor Queue Length. This Performance Monitor counter displays the number of threads waiting to be executed in the queue, which all the processors on your system share.
2. Processor, Counter: % Processor Time.
3. Processor, Counter: Interrupts/sec and Performance Object; Processor, Counter: % DPC Time.

Install WebsitePanel on Windows

This article will guide you on steps to #install #WebsitePanel on #Windows. Also, we saw how to fix some common errors of WebsitePanel.
WebsitePanel began as #DotNetPanel, which its creators made only for the Windows web technology platform as a Windows #hosting panel. The initial DotNetPanel developers contributed a great deal to WebsitePanel. And now #Microsoft has added to their legacy by investing in WebsitePanel’s future.
WebsitePanel is a Multi-Tenant, Enterprise Hosting Automation Tool with support for Private #Cloud Servers. It enables you to centralize the management of your hosting infrastructure and share resources across multiple customer accounts.
1. Save time and money spent on system management.
2. Simplify deployment processes.
3. Administer everything from a single interface.

Manage Docker Volumes using Docker Compose

This article will guide you on steps to use #Docker #Compose for manging Docker #Volumes.
When you execute a docker-compose command, the volumes #directive in docker-compose. yml file mounts source directories or volumes from your computer at target paths inside the container. If a matching target path exists already as part of the container image, it will be overwritten by the mounted path.
A #Dockerfile is a text document that contains all the commands a user could call on the command line to assemble an image. Using docker build users can create an automated build that executes several command-line instructions in succession. This page describes the commands you can use in a Dockerfile .
List of Docker #Commands:
i. docker run – Runs a command in a new #container.
ii. docker start – Starts one or more stopped containers.
iii. docker stop – Stops one or more running containers.
iv. docker build – Builds an image form a Docker file.
v. docker pull – Pulls an #image or a repository from a registry.

Rsync from Linux to Windows share

This article will guide you on how to use #Rsync to transfer #files from #Linux to #Windows share.

cwRsync is an implementation of rsync for Windows. rsync uses a file transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. #cwRsync can be used for remote file backup and synchronization from/to Windows systems.

Syntax of rsync #command:

1. -v, –verbose Verbose output.

2. -q, –quiet suppress message output.

3. -a, –archive archive files and directory while synchronizing ( -a equal to following options -rlptgoD).

4. -r, –recursive sync files and directories recursively.

5. -b, –backup take the backup during synchronization.

Could not load file or assembly Microsoft ReportViewer WebForms

This article will guide you on ways to resolve Could not load #file or #assembly 'Microsoft.ReportViewer.WebForms' #error occurs when #ReportViewer files are missing from the #bin folder.
You need to reference both Microsoft.ReportViewer.WebForms and Microsoft.ReportViewer.Common and set the CopyLocal property to true. This will result in the dll's being copied to our bin #directory (both are necessary).

Backup Active Directory Domain Controller

This article will guide you on how to #backup #active #directory domain controller.
A System State backup generally includes a copy of any installed device #drivers and related files, most of the Windows directory, the #Windows #Registry, the Active Directory configuration (where applicable) and system files under Windows File Protection.
In production it is best practice to have at least 2 domain controllers per domain. If you factor in each child domain and the other domains that could easily scale up fast if you have two in each one.
To Configure Windows Backup Users on a Domain Controller:
1. Expand Active Directory "Users > Computers > Users".
2. Right-click the appropriate user who will be performing backups and click Properties.
3. On the Member Of tab, click Add to add the Backup Operators group to the User.
4. Click OK.

Deploy Node js Application to DigitalOcean Server

This article will guide you on how to  deploy node.js application to #DigitalOcean Server.  

To Deploying #Node . js application to DigitalOcean — Setting up the #server:

1. Getting familiar with Digital Ocean and creating your first #droplet.

2. Setting up #SSH and connecting to your server from your local #machine.

3. Setting up a simple Express.js web-server in local machine.

4. Using #Git to deploy your code to server.

Plesk DNN install Service Unavailable error

This article will guide you on how to install DNN for our customers. In order to fix the Service Unavailable Error we should check whether the Dedicated application pool option is enabled in Plesk before DNN install.

A 503 Service Unavailable Error is an HTTP response status code indicating that a server is temporarily unable to handle the request. This may be due to the server being overloaded or down for maintenance.

Find the Source of Account Lockouts in Active Directory


This article will guide you on steps to find the source of Account Lockouts in the Active Directory #domain.

The most common underlying cause for #AD account lockouts, beyond users forgetting their password, is a running application or background service on a device that is authenticating with stale credentials. 

To Track Source of Account Lockouts in #Active #Directory:

1. Search for the #DC (Domain Controller) having the PDC Emulator Role. 

2. Look for the Event ID 4740. 

3. Put Appropriate Filters in Place. 

4. Find Out the Locked Out Account Event Whose Information is Require. 

5. Open the #Event Report, to Find the Source of the Locked Out account.

SQL server Error 1053

This article will guide you on different methods of fixing error #1053 SQL server which occurs when attempting to pause or stop the SQL Server service in the #Windows Services Console. 

The most common cause of this error is when one of the files needed by sql server was not on a shared resource, and Sql Server, once failed to the other node, couldn't access it.

The #SQL #Server Agent error log may include a path or a file name that is not correct.

In this case, verify that the path and file name for SQLAgent.out is valid:

1. In SQL Server Enterprise Manager, expand the Management folder.

2. Right-click SQL Server Agent, and then click Properties.

3. Under Error Log, make sure that the path that is specified next to File Name is valid.

4. Make sure that the file name is SQLAGENT.out.

Directadmin Unable to write users httpd conf configuration

This article will guide you on how to fix the #error, Unable to write user's httpd.conf in Directadmin which occurs when we try to add a #domain in #DirectAdmin. 

The httpd. conf file is the main configuration file for the Apache web server. It's highly recommended to run Apache in standalone type for better performance and speed. ServerRoot "/etc/httpd" The option ServerRoot specifies the directory in which the configuration files of the Apache server lives.

Before you edit httpd.conf, you should first copy the original file to something like httpd.conf-old, for example. 

By creating a #backup, you can recover potential mistakes made while editing the new configuration file.

Windows update encountered an unknown error 80072efe

This article will guide you on the different methods to get rid of #Windows #update encountered an unknown #error #80072efe.

You may get the error because there are corrupted files on your #computer. You can run System File Checker, which can scan and repair the corrupted issues, Close the Command Prompt window and restart your #computer. Then open Windows Update and see if the error is fixed.

To fix Windows Update encountered an unknown error:

1. Right click on the #taskbar and select Properties.

2. Click the Customize.

3. On the Notification Area Icons window, make sure Always show all icons and notifications on the taskbar is checked and click OK.

4. At this point, try running Windows Update again and the updates should begin to install properly.

Windows update encountered an unknown error 80072ee2

This article will guide you on different methods to resolve #Windows update encountered an unknown error 80072ee2 which occurs while Windows tries to search for Updates via Windows #Update. 

#Error #80072ee2 is a windows update error which is caused when the files on your system are corrupt or the updates are stuck. Before you continue with the fix below, make sure that your internet is working on the PC affected by this error since it will need to connect to the windows update servers to push updates back.

To fix Windows Update encountered an unknown error Code #80243004 – Windows Update encountered an unknown error:

1. Right click on the taskbar and select Properties.

2. Click the Customize.

3. On the Notification Area Icons window, make sure Always show all icons and notifications on the taskbar is checked and click OK.

4. At this point, try running Windows Update again and the updates should begin to install properly.

Windows System error 5 has occurred Access is denied

This article will guide you on different methods to fix #Windows #System #error 5 has occurred Access is denied which is generally caused by #NTFS permissions, but it can also be caused by other issues like a corrupt user profile, encryption on the file or if the file is in use.

A system error refers to an instruction which cannot be recognized by an operating #system or goes against the procedural rules. A system error code refers to the exact error number with which you can track down the details.

To fix Access is denied message on Windows 10:

1. Take ownership of the directory. 

2. Add your account to the #Administrators group. 

3. Enable the hidden Administrator account. 

4. Check your #permissions. 

5. Use Command Prompt to reset permissions. 

6. Set your account as administrator. 

7. Use Reset Permissions #tool.

Plesk Multi Server How to install it

This article will guide you on how to install #Plesk #Multi #Server which will enable us to work with a single Plesk user interface to run hosting services on multiple #servers. A multi-server environment can support more #connections and services, helps to keep the system running, and can also cost significantly less each month than continually adding resources to a single server.

Plesk Multi Server is most useful for the following types of business:

1. Web design and development studios that also host the clients web sites;

2. Small and medium-sized shared hosting providers;

3. Larger hosting providers for #reselling to customers, who are small and medium-sized shared #hosting #providers.

How to Install OpenNMS on CentOS 8

This article will guide via a step-by-step procedure to #install OpenNMS in #CentOS. 

OpenNMS is a free, Open Source network monitoring system that can be used to #monitor tens of thousands of unlimited devices with a single #instance.

It will discover and monitor the services or nodes automatically in your #network, or you can assign a particular service to monitor by OpenNMS.

To configure #OpenNMS:

1. Install OpenNMS Horizon. Add yum repository and import GPG key. 

2. Initialize and set up #PostgreSQL. Initialization of the PostgreSQL database will start.

3. Initialize and start OpenNMS Horizon. 

4. First Login and change default password.

How to Install Python on Windows

This article will guide you on steps to install #Python and #PIP on #Windows. If you would like to download and install Python on your #computer you can do for free at python.org.

To install Python on Windows:

1. Select Version of Python to #Install. 

2. Download Python Executable #Installer. 

3. Run Executable Installer. 

4. Verify Python Was Installed On Windows. 

5. Verify Pip Was Installed. 

6. Add Python #Path to #Environment Variables which is Optional.

How To Install MariaDB on Ubuntu Focal Fossa

This article will guide you on steps to install #MariaDB from the #Ubuntu #repositories and from the official MariaDB repositories. You can install MariaDB in two different ways.

To install MariaDB on Ubuntu, follow these steps:

1. Update #packages index. sudo apt update.

2. Once the packages list is updated, install MariaDB by issuing the following command: sudo apt install mariadb-server.

3. The MariaDB service will start automatically.

The default data directory for the MariaDB database server is /var/lib/mysql. The configuration file of MariaDB database server is /etc/mysql/mariadb. conf. d/50-server.

Different methods to fix DHCP Server Errors

This article will guide you on the different methods to resolve DHCP server error. A #DHCP error means the server on your network that provides an Internet Protocol (#IP) adress for devices is not able to assign your #device an IP adress.

Two things can cause a DHCP #error. 

i. One is the configuration on the computer or device that allows a DHCP server to assign it an IP. 

ii. The other is the configuration of the DHCP server. DHCP errors occur when the DHCP server or #router on a network cannot automatically adjust the device's IP address to join the #network.

Steps to install Yarn on Windows

This article will guide you on steps to install #Yarn in Windows via #MSI Installation, Chocolatey Installation, and Scoop Installation. msi file that when run will walk you through installing Yarn on Windows. If you use the installer you will first need to install Node. js.

Yarn global install locations:

1. On #Windows %LOCALAPPDATA%\Yarn\config\global for example: C:\Users\username\AppData\Local\Yarn\config\global.

2. On #OSX and non-root Linux  ~/.config/yarn/global.

3. On #Linux if logged in as root /usr/local/share/.config/yarn/global.

yarn install is used to install all dependencies for a project. This is most commonly used when you have just checked out code for a project, or when another developer on the #project has added a new dependency that you need to pick up.

How to Check Server Load on a Windows Server

This article will guide you on how to check server load in windows. Windows #Task Manager allows users to analyze the server load issues on the #Windows servers.

Load expresses how many processes are waiting in the queue to access the computer processor. This is calculated for a certain period of time, and the smaller the number the better. 

Signs of #Server #Overload includes:

The following signs indicate that your web server has possibly become overloaded: 

Displaying error codes. Your server returns an #HTTP #error code, such as 500, 502, 503, 504, 408, and so on. 

Delaying serving requests.

Restore Active Directory from backup

This article will guide you on how to restore active directory from backup. Back up Active Directory on a regular basis

You should back up your Active Directory regularly with an interval that doesn't exceed 60 days. #AD services presume that the age of the Active #Directory backup cannot be more than the lifetime of AD tombstone objects, which by default is 60 days.

Deploy Laravel using Nginx on Ubuntu

This guide will help to set up Laravel with #Nginx on #Ubuntu 16.04. Laravel is the most popular, free, and open-source #PHP #framework in the world, known for its expressive and elegant syntax.
To move laravel project from localhost to production server, do:
1. Zip your #laravel app files.
2. Export your app's #database then set it up on your server.
3. After you have uploaded your laravel app files, open the . env file found on the root.
4. That's it!, now check your live #site.

Steps to Install GoAccess on Ubuntu

This article will guide you on how to #Install GoAccess on Ubuntu which is a command-line tool and how to use it for analyzing server #logs.
With #GoAccess, you are able to #SSH into any web server you control and view or analyze relevant statistics quickly and securely. Apart from the command-line dashboard interface, it's also capable of displaying the #statistics in other formats such as HTML, JSON, and CSV, which you can use in other contexts or share with others.

Windows update error 0x80041014

This article will guide you on steps to resolve Windows update error #0x80041014 which occurs due to different reasons.
To use the troubleshooter to fix problems with #Windows Update, use these steps:
i. Open #Settings.
ii. Click on #Update & #Security.
iii. Click on Troubleshoot.
iv. Under the "Get up and running" section, select the Windows Update option.
v. Click the Run the #troubleshooter button. Source: Windows Central.
vi. Click the Close button.

Missing DLL files errors on Windows 10

This article will guide you on how to resolve #Windows Missing DLL files. A recent #application #installation sometimes overwrites an existing DLL file with an incompatible or invalid DLL file. A malicious #program has deleted or damaged a #DLL file.
To add a missing . DLL file to Windows:
i. Locate your missing . dll file at the DLL Dump site.
ii. Download the file and copy it to: "C:\Windows\System32".
iii. Click Start then Run and type in "regsvr32 name_of_dll. dll" and hit enter.

Process to install Docker on Windows

This article will guide you on the steps to install docker on Windows by setting up a Linux virtual #machine to run as a guest in Windows 10 Home.
Docker Desktop is an easy-to-install application for your #Mac or Windows environment that enables you to build and share containerized applications and microservices. Docker Desktop includes Docker #Engine, Docker CLI client, Docker Compose, Notary, #Kubernetes, and Credential Helper.
You can download #Docker #Desktop for Windows from Docker Hub. This relates to installing Docker Desktop on #Windows 10 Pro, Enterprise, and Education.

Create a Nagios log server instance in Amazon EC2 cloud

This article will guide you on how to create a #Nagios log server instance in the amazon ec2 #cloud. To enable these reports, simply enable Detailed Billing Reports With #Resources and Tags for your account. Then open up the Reports tab of the Billing #Console. From there you can look at the EC2 Instance Usage Report and the #EC2 Reserved Instance Utilization Report.

Method to Install Software From Source on Ubuntu

This article will guide you on steps to #install #software from #source on #Ubuntu. The Complete #command is apt-get which is the easiest way to install files/Softwares #packages.

Once installed, on the command line, you can use dpkg --listfiles packagename . For instance, dpkg --listfiles firefox . 

If you want to see what files a package contains without installing it, then you can install apt-file and use that.

Using Bpytop to monitor Linux and FreeBSD Resources

This article will guide you on how to use Bpytop Monitoring for Linux & FreeBSD Resources.

#Bpytop is a great utility which is useful on your #Linux, #macOS, and #FreeBSD as a #resource #monitor. It is much faster than bashtop and works pretty well as Python 3 is standard on many Unix boxes.

Process to install node js Windows

This article will guide you on how to install Node.js and verify its installation. Additionally, you will also learn how to uninstall it. #Node . js is a runtime environment that allows software developers to launch both the #frontend and #backend of web apps using #JavaScript. Although JS underpins all the processes for app assembly, as a backend #development #environment, Node. js, differs from the frontend environment.

Send NXLogs with SSL TLS to Nagios Log Server

This guide will guide you on how to send NXLogs with SSL/TLS to #Nagios #Log #Server. Encryption ensures that the traffic between the #Windows machine and Nagios Log Server is not sent in plain text.

Monitoring Performance Counters in Nagios XI Using NCPA

This article will guide you on how to configure #Nagios XI to monitor performance counters by monitoring Performance Counters in Nagios XI is possible using #NCPA as well as use cases where real-time monitoring actually provides no benefit at all, and may also be both a distraction and a detriment to monitoring #teams and #admins.

Mails not sending from windows live mail a mobile device or Outlook

This article will guide you on the different methods to fix #Outlook sending #email errors. You can also check with your email address provider and make sure your mail #server #settings are up to date.

How to Run AWS Amazon DynamoDB Steps to do it

This article will guide you on how to set up #Amazon DynamoDB which can be downloaded as an executable .jar file.

#DynamoDB uses hashing and B-trees to manage #data. Upon entry, data is first distributed into different partitions by hashing on the #partition key. Each partition can store up to 10GB of data and handle by default 1,000 write capacity units (WCU) and 3,000 read capacity units (RCU).

Selecting the number of vCPUs and Cores for a Virtual Machine

This articles will guide you when selecting the number of vCPUs and Cores for a Virtual Machine which depends on the operating system used and some other factors.

Basically, When Selecting the Number of #vCPUs and #Cores for a Virtual Machine, you can use all CPU #resources allocated to a virtual machine, it must see one 8 core #processor, 2 vCPUs with 4 cores each or 1 vCPU with 4 cores in two threads instead of 8 vCPUs.

How to resolve error Couldnt Update the System Reserved Partition on Windows

This article will guide you on the steps to resolve the #Windows #error Couldn’t Update the System Reserved #Partition on Windows. #System Reserved Partition is a hidden partition with the #NTFS file system, which is not assigned a drive letter by default. 

Install Moodle on Windows Server Steps to do it

This article will guide you on the process to #install, secure, and #configure and #backup #moodle. Moodle is a free online learning management system, or #LMS. 

You can download the #software onto your own web server.

Match Windows Disks to VMWare VMDK Files

This article will guide you on the steps to match #windows #disks to #VMWare #VMDK files. 

Repair EFI GPT Bootloader on Windows 10

This article will guide you on different methods to repair #EFI / #GPT #bootloader on the #Windows server. You can use Use #diskpart #command.

Restrict anonymous login and ban IP address of attacker Windows

This article will guide you on the steps to Restrict anonymous login and ban #IP address of attacker by using Local Group Policy Editor in #Windows which allows us to prevent anonymous login and #IPBan helps to ban IP of #attacker. 

VPN Error 806 Steps to fix it

This article will guide you on the steps to resolve #VPN #error 806 which occurs when the connection between our #Windows #computer and the VPN server has been established but the VPN remains incomplete. 

OpenVPN dns leak How to fix it

This article will guide you on the steps to fix #OpenVPN DNS leak issue. 

A DNS leak occurs when the browser sends a #DNS request directly, thus ignoring the #VPN.  Although the link will seem encrypted or anonymous, the ISP will be able to track your online.

Microsoft Security Essentials Update issues

This article will guide you on the methods to fix the automatic #update #errors with #Microsoft #Security #Essentials.

Microsoft Security Essentials works automatically with Microsoft Update to ensure that the #virus and #spyware definitions are kept up to date in the server.

The trust relationship between this workstation and the primary domain failed in Windows

This article will guide you on the methods to fix #Windows error "The trust relationship between this #workstation and the primary #domain failed" message which occurs when the session login is attempted through #RDP Remote Desktop Protocol, #ICA, or directly at the console. 

Measure storage performance and IOPS on windows

This article will guide you on the steps to measure storage performance and #IOPS on a #Windows server.

To calculate the IOPS range, use this formula: Average IOPS: Divide 1 by the sum of the average latency in ms and the average seek time in ms (1 / (average latency in ms + average seek time in ms).
IOPS calculations;
1. Rotational speed (aka spindle speed). 
2. Average latency.
3. Average seek time.

RDP authentication error The Local Security Authority cannot be contacted

This article will guide you on the steps to take to fix #Windows Remote Desktop error  (#RDP)"An authentication error has occured: The Local Security Authority cannot be contacted" by applying different approaches.

Advantages of using our Server Management Services

Ibmi Media Server administrators will help you install, configure, and maintain various types of hardware and software, which often involves creating user accounts, carrying out backup and recovery functions, and monitoring the performance of servers at all times. Our Support Experts will take care of configuring, managing, and implementing operating systems.

Outlook error 0x800ccc19 Steps to fix it

This article will help resolve Outlook error which happens while sending or receiving messages in MS Outlook which says "A time out occurred while communicating with the server 0x800ccc19".

Install ioncube on Directadmin control panel

This article will guide you on the steps to set up the Ioncube loader and fix DirectAdmin Ioncube errors such as incorrect timezone and misconfiguration in the php.ini file which cause errors after installing the Ioncube loader in DirectAdmin.

Monitoring RDS Bandwidth Usage by Users with Perfmon

This article will guide you on the steps to take to monitor RDS Bandwidth Usage by Users with Perfmon.

Check who deleted file folder from Windows Server 2016 with audit policy

This article will guide you on the steps to find out who deleted the file/folder in the Windows server.

Tuning Windows Performance for Use in Virtual Environment

This article will guide you on the steps to perform tuning Windows Performance for use in Virtual Environment by optimizing performance, CPU, memory, and so on.

Copy Files or Folders via GPO

This article will guide you on how to Copy Files or Folders via GPO by automatically copying specific files or folders to all domain computers. 

Install DHCP Server Client on Centos

This article will guide you on the steps to install and configure a DHCP server on CentOS 8.

Blocking IP Addresses Using Windows Firewall

This article will guide you on the steps to block the IP in the Windows firewall.

Set up LDAP Client on Ubuntu

This article will guide you on the steps to set up LDAP client on Ubuntu.

How to install PHP on Windows

This tutorial will guide you on the process to install PHP on a Windows server which allows you to build and test a web application safely without affecting the live website data.

RDP file transfer How to do it

This article will guide you on steps to transfer files Using Remote Desktop in Windows.

Rebuild OST file How to do it

This article will guide you on the steps to rebuild the OST file.

Diskpart failed to clear disk attributes

This article will help you fix the problem of diskpart failure to clear the disk attributes.

Windows Time Service Not Running error 0x80070002

This guide will help you to fix "Windows Time Service Not Running" error by applying different methods.

Backup Hyper V Virtual Machines

This article will guide you on how to perform backup of Hyper-V Virtual Machines and how it works.

Synchronization Issues Between OST and Microsoft Exchange Server

This article will guide you on the steps to fix synchronization issues between OST and Exchange Server.

Reduce Windows edb size

This article will guide you in using different methods to reduce Windows.edb file size by simply defragmenting, removing, and re-creating, moving the windows.edb file into another drive and so on.

An Operating System Wasnt Found in the process of booting Windows

This guide will help to fix the error "An Operating System Wasn’t Found when booting Windows" which occurs if there is no operating system bootloader found on the current disk.

Remote Desktop client disconnected and could not connect to the remote computer

This article will guide you on the steps to resolve the error Remote Desktop client after it loses connection and disconnects cannot reconnect to the same session by configuring keep-alive connection interval policy.

Windows update error 0x80070013

This article will guide you on the different methods to fix this Windows error which affects Windows Update processes.

Windows no Longer Detects a HomeGroup on this Network

This article will help to fix "Windows no Longer Detects a HomeGroup on this Network" issue.

Remote desktop cant connect to the remote computer

This article will guide you on how to fix RDP error "Remote desktop can't connect to the remote computer" which occurs due to various reasons such as wrong login credentials, connectivity issues, or the use of HTTP/UDP protocol.

Metered Connection Warning in Outlook

This article will help to fix "Metered Connection Warning in Outlook" which is a memory usage issue.

Windows Server error The disk is offline because of a policy set by an administrator

This article will help to fix Windows Server error : The disk is offline because of a policy set by an administrator which relates to SAN Policy

Windows Update Error 0x80010108 How to fix it

This article will guide you on how to fix Windows Update Error 0x80010108 which occurs sometimes in the process of updating Windows.

Installing Hyper-V Role in Windows 10 VM under VMWare ESXi

This article will guide you on the steps to follow to install Hyper-V Role in Windows 10 VM under VMWare ESXi.

BSOD Error 0x0000007B on Boot on Windows Server 2008 R2 How to fix

This article will guide you on how to fix Windows error 0x0000007B which generally occurs due to a number of reasons like issues with device drivers , viruses, and data corruption.

Steps to remove Hidden Network Adapters in Windows

This article will guide you on the steps to remove Hidden Network Adapters in Windows which causes issues while assigning a previously used static IP address for a new network interface.

Process to disable NTLM Authentication in Windows Domain

This article will guide you step by step on how to disable NTLM authentication which makes the Windows domain less vulnerable.

Setting up VLAN Interfaces on Windows Server 2016

This article will help to configure VLAN in Windows Server 2016.

RDP authentication error has occurred How to fix it

This article will guide you on methods to fix "RDP authentication error has occurred" which occurs after installing the latest security updates on Windows 10 desktop.

0x80092004 NET Framework Install Error on Windows Server Quick fix

This guide will help you to fix "0x80092004: NET Framework Install" Error on Windows Server which occurs in the process of installing .NET Framework using online and offline installers on Windows Server.

RDP outdated entry in the DNS cache How to fix it

This article will guide you the steps to fix "RDP outdated entry in the DNS cache" error in the process of establishing connection to the RDS farm running Windows Server 2008 R2 using the standard RD client.

Deleted files keeps reappearing on desktop windows hot to fix

This article will guide you on how to fix deleted files keeps reappearing on desktop windows which occurs as a result of corrupted Recycle Bin folder on Windows.

CPUs are not running at its full capacity in Windows how to fix

This guide will help you with the troubleshooting steps you need to follow to fix this CPU capacity issue in Windows.

Fix high memory usage by Metafile on Windows Server 2008 R2

This guide will help you to fix high memory usage issue by Metafile on Windows Server 2008 R2.

Open Files in Windows Server SMB Share

This guide will help you to View and Close Open Files in Windows Server SMB Share which generally happens if the desktop software does not work as expected, the user logs off incorrectly, or when the user opened a file and forgot to close it.

Remote desktop cannot verify the identity time or date difference between computer and remote computer

This guide will help to resolve error Remote desktop cannot verify the identity time or date difference between computer and remote computer which occurs while trying to connect to a remote server in the AD domain via RDP.

Event 8193 VSS error on Windows server 2012 r2 How to fix it

This guide will help to fix Event id 8193 on windows server 2012 r2 by applying different tips. This error generally indicates an “access denied” message or “security structure is invalid”.

WSUS Windows Error 0x80244010 How to fix it

This article will guide you on how to fix WSUS Windows Error 0x80244010 which occurs as a result of different reasons including, generic glitch, corrupt file in the WU temp folders and system file corruption.

Remote Desktop error code 0x104 Steps to fix it

This article will guide you on how to fix Remote desktop error 0x104 which occurs while trying to connect to the target system on the same or a different network.

Remote Desktop Connection An Internal Error has Occurred

In this article, we discussed about the different ways to fix Remote Desktop Connection Error: Internal Error has Occurred which is generally caused by issues in the RDP settings or its local group policy security.

Windows error code 0x80070005 How to fix it

This guide will guide you on the steps to solve windows error code 0x80070005 by applying different tips.

Enable Disable SMB v 1 0 in Windows How to

This article will guide you on how to Enable/Disable SMB v 1.0 in Windows, enable or disable SMB using Powershell.

Windows error 0199 security password retry count exceeded

This article will guide you on how to fix windows error 0199 by applying different methods.

Windows update error 0x80240008 tips to fix

This article will help to fix "Windows update error 0x80240008" which implies that the Windows update we are trying to download has already been downloaded.

Folder Keeps Reverting to Read Only on Windows 10 Process to fix

This article will guide you on the methods to fix "Folder Keeps Reverting to Read Only on Windows 10".

Fix Hyper V VM Stuck in the Stopping Starting State

Basically, if our virtual machine running on Hyper-V is stuck for some reason, the only way out is to forcibly kill the process responsible for this VM on the host OS.

Solution to Windows defender or security essentials error 0x80073b01

Windows defender or security essentials error 0x80073b01 means that there is an interference between Windows Defender and another security program present on the computer.

Windows update error code 643 Different methods to fix

Windows update error code 643 generally happens when there is corruption in the .NET framework and in cases of software conflicts.

Windows error code 0x800706ba

This article will help to fix "Windows error code 0x800706ba" which occurs in the process of updating Windows 10.

Windows error code 0x800f0922 how to fix it

This article will help you tackle Windows error code 0x800f0922 which occurs due to the absence of some crucial Dot Net features on the computer, low System Reserved partition space, and failure to connect to the Microsoft Windows Update server.

Dynamic resizing of virtual disks in windows server 2012 r2 Steps to resize

This article will guide you on how to perform dynamic resizing of virtual disks in Windows server 2012 r2.

Windows Update Error 0x8007012f

This article will guide you on how to fix Windows Update Error 0x8007012f which occurs when you try to install any kind of Windows update.

RDS User Profile Disks on Windows

In this guide, we learnt that RDS User Profile Disks is an alternative to roaming profiles and folder redirection in the RDS scenarios. Also, we saw how to configure it.

VHD set shared virtual disks on hyper v 2016 Steps to configure

In this guide, we learnt the concept of VHDS on hyper-v 2016 and how to configure a new VHD Set (VHDS).

Solution to Windows Unexpected Store Exception Error

This article will guide you on how to fix An Unexpected Store Exception Error In Windows 10 which happens due to hardware failures.

Steps to upgrade PHP on Windows

This article will guide you on how best to perform upgrade of PHP on Windows.

Windows Error 0x80073712

This guide will help to solve Windows error 0x80073712 which is usually triggered due to a damaged Windows component store and makes security updates to fail.

An Operating System Wasnt Found when booting Windows

This article will help to solve An Operating System Wasn't Found when booting Windows which happens when there is no operating system boot loader found on the current disk.

Preparing to configure windows stuck

This article will help to fix Windows to get stuck with the message “preparing to configure windows” which occurs when there are corrupted update files or when the integrity of files has been modified. 

Licensing Mode for Remote Desktop Session Host is not Configured

This article will guide you on the error "Licensing Mode for Remote Desktop Session Host is not Configured" which occurs when the RDS host is running in grace period.

Windows could not connect to the GPSVC service

This article will help you fix "Windows could not connect to the GPSVC service" which occurs when GPSVC service is not running in the computer system.

Windows error 0x80244022

This article will guide you on how to fix "Windows error 0x80244022" which occurs in the process of updating a Software.

Fix remote desktop services is currently busy rdp error

This article will guide you on how to fix "remote desktop services is currently busy" which usually occurs when there is an error in the operation of the Remote Desktop Services, a bug in the csrss.exe process,  and so on.

The system administrator has restricted the type of logon that you may use

Basically, this article will guide you through how to resolve the error "The system administrator has restricted the type of logon that you may use". This happens when the RDP connections require Network Level Authentication (NLA). Also it occurs when the user is not a member of the Remote Desktop Users group.

DHCP failover failed error 20010

This article will show you how to resolve DHCP failover error 20010.

How to fix DHCP error 0x79

This guide will help you to fix DHCP error 0x79 which shows that a predefined IP address on the computer and your device has assigned this IP address to some other device.

How to fix the error failed to add or remove role windows server requires restart

In this article, you will get the complete tip to fix error "unable to add or remove role: windows server requires restart" by granting SeServiceLogonRight to NT SERVICE\ALL SERVICES.

DHCP Server installation error 0x800f0922

In this article, you will see the complete guide to follow in order to fix DHCP server install error 0x800f0922 when trying to install DHCP on a Windows Server.

Windows Server Defender Antivirus

This article will guide you on how to install Windows Defender Anti-Virus.

How to use PowerShell to identify Azure unassociated resources

With the PowerShell tool, we can easily find unassociated resources in Azure.

How to fix CHKDSK stuck when scanning and repairing a drive on Windows

Methods to fix CHKDSK stuck issue which occurs when the hard drive file system is corrupted or in cases when there are bad sectors and fragment files on the disk.

How to optimize azure cache for redis

Factors such as memory pressure, high CPU usage, Bandwidth limitations, and Server loads on server side can result in poor performance of Azure Cache for Redis and the Server in general.

A fix to Windows Socket Error 10060

Windows Socket error 10060 is a connection error experienced while using proxy and when the connection cannot  process with the expected time.

Solve error Windows has detected file system corruption on disk

Four (4) Method to fix "Windows has detected file system corruption" System restore error.

Solution to SSLPassPhraseDialog builtin is not supported on Win32 error

Easy way to fix  SSLPassPhraseDialog builtin is not supported on Win32 error in relation to Apache web server.

Solve microsoft exchange server 2013 event id 4027 error

Best approach in fixing Microsoft exchange server 2013 event id 4027 error.

How to fix SSL error err sslversion or cipher mismatch

The error ERR_SSL_VERSION_OR_CIPHER_MISMATCH occurs when a user's browser cannot establish a secure connection with a web server that uses #HTTPS and SSL. 

The issue may lie in the server configuration or locally on a user's #computer.

Also, the ERR SSL VERSION OR CIPHER MISMATCH error could be caused by certain security settings. 

Applying changes to the SSL might help you solve the annoying ERR SSL VERSION problem. 

Sometimes switching to another browser can be the easy fix you need.


To Fix ERR_SSL_PROTOCOL_ERROR:

1. Set correct system date, time & region.

2. Clear Chrome's cache and cookies.

3. Disable #QUIC Protocol.

4. Disable extensions.

5. Remove your system's hosts file.

6. Clear SSL State.

7. Lower your internet security and privacy level.

8. Disable your security tools for a moment.


Error such as Err_ssl_version_or_cipher_mismatch tend to pop up when there is a inappropriate configuration in the SSL certificate.

How to use Ubuntu 20.04 LTS Focal Fossa via GNOME desktop and command-line interface (CLI) ?

This article covers how beginners can better understand the desktop environment and some basic commands of ubuntu. To know more about Ubuntu, you can visit the official website of ubuntu.

Install Remmina Desktop Client on Manjaro Linux - Step by step guide ?

This article covers the installation process of Remmina Desktop Client on Manjaro Linux. In fact, Remmina is a remote desktop client written in GTK+, aiming to be useful for system administrators and travellers, who need to work with lots of remote computers in front of either large monitors or tiny netbooks.

Install UNetbootin on Linux Mint 20.3 - Step by step guide ?

This article covers the procedure of installing the Universal Netboot Installer on a Linux Mint 20.3 system. In fact, you will be able to create live USBs of your desired operating systems.

Verify Linux Mint 20.3 ISO - How to do it ?

This article covers the procedure of verifying the Linux Mint 20.3 ISO. In fact, It is recommended to download the latest version ISO file to avail benefits of latest features and check the downloaded Linux Mint ISO for errors before installing the OS.

The ISO image File of latest version should always be downloaded from the official website of Linux Mint Operating System https://linuxmint.com. In some cases, it may be possible that the ISO file may be corrupted while downloading or it may have been tampered while the file was being downloaded over network, or it may be possible that you have sourced the ISO file from some other unreliable source. In any case, the user must assure himself that the ISO you are using is error free and authentic i.e. exactly the same copy as provided by Linux Mint.


What is Integrity and Authenticity in Linux Mint?

  • Integrity: Integrity means that the ISO image file was properly downloaded and that the local file is an exact copy of the file present on the download servers. An error during the download could result in a corrupted file and trigger random issues during the installation.
  • Authenticity: Authenticity means that the downloaded ISO image was signed by Linux Mint, and thus it isn’t a modified or malicious copy made by somebody else.

Run Linux Mint 20 in Virtual Box - How to do it ?

This article covers the process of running Linux Mint 20 in a virtual box. In fact, As VirtualBox supports Windows, MAC, and Linux, you can virtualize Linux mint irrespective of the operating system that you have, because you can run VirtualBox and virtualize Linux mint with it. 

Use the Netcat Command to Read and Write Data Across the Network on Ubuntu 20.04

This article covers information about the usage of Netcat with TCP and UDP protocol and some other uses like scanning ports, sending files, and creating a web server. In fact, Netcat is a basic Linux utility that uses the TCP/UDP protocols for reading and writing data across network connections. It's intended to be a dependable backend tool that may be operated directly or simply by other applications and programs. 

Configure Your Linux Firewall to Best Protect Your Data Center - How to do it properly on Ubuntu LTS 20.04 ?

This article covers protecting our data center by configuring a firewall by using two approaches; configure your Linux firewall using GUFW and configure your Linux firewall using UFW. In fact, Data security is a serious concern in this era of technology, but there are various ways available to protect your data. Configuring the firewall on your Linux system is one of the most popular strategies. A firewall is a type of network software that helps us protect against data breaches by applying various rules.

Open a Terminal in Linux Mint 20.3 - Steps to follow ?

This article covers the different ways with which you can instantly launch the terminal on Linux Mint.

Install Ubuntu 20.04 LTS - Step by step guide ?

This article covers the installation procedure of Ubuntu 20.04 on your system. In fact, Ubuntu 20.04 (codenamed Focal Fossa) was released on April 23, 2020. It’s a Long-Term Support (LTS) release, meaning that it will receive support and updates until April 2025.


New Features of Ubuntu 20.04 includes:

  • Linux Kernel 5.4 – This version of the Linux kernel adds support for a wider range of processors. It also includes improvements for boot speed, power-saving, and USB-C, plus several security features.
  • Gnome 3.36 – Gnome has been updated and improved. System animations should be smoother and have a lower impact on CPU usage.
  • ZFS 0.8.3 file system –  Improved performance and native encryption.
  • Dark theme
  • Redesigned login screen.
  • Newer versions of popular programming languages – Python 3.8, OpenJDK 11, PHP 7.4, Glibc 2.31, Rustc 1.41, GCC 9.3, Ruby 2.7.0, Perl 5.30, Golang 1.13.


How to Create a Bootable USB Drive on Ubuntu ?

By using the Create startup disk tool:

  • Open a search dialog, and type create startup.
  • If it's not installed, the Software Center will offer the option to install it – choose the option for USB drive, then open the utility.
  • In the top pane, click Other, then browse and select the Ubuntu 20.04 .iso file you downloaded.
  • In the bottom pane, select your USB drive.
  • Click Make startup disk.

Use Rsync on your Ubuntu 20.04 Linux system - Step by step guide ?

This article covers the basics of rsync command, how to transfer and sync files locally as well as remotely. In fact, Rsync is the most efficient, accessible, and secure ways to sync files between operating systems and servers.


How to Install Rsync On Linux System ?

1. Install Rsync Alma Linux, Fedora, Rhel, Rocky Linux based distributions:

$ sudo yum install rsync -y

2. Install Rsync Debian, Linux Mint, Ubuntu based distributions:

$ sudo apt install rsync -y


Rysnc Commands includes:

  • -a, –archive: archive files and directory while synchronizing ( -a equal to following options -rlptgoD)
  • -b, –backup : take the backup during synchronization
  • -l, –links: copy symlinks as symlinks during the sync
  • -d, –delete: deletes extraneous files from the destination location.
  • -e, –rsh=COMMAND: mention the remote shell to use in rsync
  • -h, –human-readable: display the output numbers in a human-readable format
  • -u, –update: don't copy the files from source to destination if destination files are newer
  • -r, –recursive: sync files and directories recursively
  • -n, –dry-run : perform a trial run without synchronization
  • –p, –progress: show the sync progress during transfer
  • -z, –compress: compress file data during the transfer
  • -q, –quiet: suppress message output
  • -v, –verbose : verbose output

Install Anaconda on Ubuntu 20.04 - Step by step guide ?

This article covers how to install and use Anaconda on your Ubuntu system. Anaconda is a free and open-source Python and R programming language distribution. The Python interpreter is included, as are several data science and machine learning packages.

Run .sh File Commands All in Once in Linux

This article covers how to run sh files using the terminal as well as using the command line or terminal. In fact, the .sh file is nothing but the shell script to install given application or to perform other tasks under Linux like operating systems.


How do I run .sh file shell script in Linux?

The procedure to run the .sh file shell script on Linux is as follows:

  • Open the Terminal application on Linux or Unix.
  • Create a new script file with .sh extension using a text editor.
  • Write the script file using nano script-name-here.sh.
  • Set execute permission on your script using chmod command : chmod +x script-name-here.sh .
  • To run your script : ./script-name-here.sh
  • Another option is as follows to execute shell script: $ sh script-name-here.sh OR bash script-name-here.sh .

Install Smartctl on Ubuntu 20.04 - Step by step guide ?

This article covers the complete steps to install smartctl on Ubuntu 20.04. In fact, the smartmontools package contains two utility programs (smartctl and smartd) to control and monitor storage systems using the Self-Monitoring, Analysis and Reporting Technology System (S.M.A.R.T.) built into most modern ATA and SCSI hard disks. It is derived from the smartsuite package, and includes support for ATA/ATAPI-5 disks. It should run on any modern Linux system.


How to Install smartmontools Using apt-get on Ubuntu / Debian system ?

1. Update apt database with apt-get using the following command:

$ sudo apt-get update

2. After updating apt database, We can install smartmontools using apt-get by running the following command:

$ sudo apt-get -y install smartmontools

Customize the Fonts in Google Chrome - Step by step guide ?

This article covers how to easily customize the fonts of your Google Chrome browser according to your choice. In fact, you can make your Google Chrome browser look just the way you like.


How to Change the default font for Google Chrome ?

  • Click on the Ellipsis button (three vertical dots in the top-right corner) and select Settings.
  • In the Appearance section, click on Customize Fonts.
  • Here you would find different types of fonts used on your Google Chrome browser, the primary one being Standard Font.
  • Change its type to the one you prefer and restart the browser.

Speed up Google Chrome - Step by step guide ?

This article covers how you can easily speed up your Google Chrome browser and hence enhance your browsing experience to the fullest.


How to Turn off or stop unwanted processes on Google Chrome ?

Extensions are small programs you can add to Chrome on your computer that let you do more. If you're not using all your extensions, you can turn them off to speed up Chrome:

  • On your computer, open Chrome.
  • At the top right, click More More and then More tools and then Extensions.
  • Turn off or remove the extension.


How to make Chrome open pages faster ?

You can turn on network action predictions ("page prefetch") to make Google Chrome open webpages faster. When the setting is on, Chrome preloads the links you might open:

  • On your computer, open Chrome.
  • At the top right, click More More and then Settings.
  • Click Privacy and security and then Cookies and other site data.
  • Turn on Preload pages for faster browsing and searching.

Linux wget Command - Explained with Examples

This article covers the wget command which downloads files served with HTTP, HTTPS, or FTP over a network. In fact, Wget is a free GNU command-line utility tool used to download files from the internet. It retrieves files using HTTP, HTTPS, and FTP protocols.



Wget command options includes:

  • -V, --version: Display the version of wget, and exit.
  • -h, --help: Print a help message describing all the wget's command-line options, and exit.
  • -b, --background: Go to background immediately after startup. If no output file is specified via the -o, output is redirected to wget-log.
  • -e command,
  • --execute command: Execute command as if it were a part of the file .wgetrc. A command thus invoked is executed after the commands in .wgetrc, thus taking precedence over them.


How to Check if wget is Installed?

To check, open the terminal window and type in:

$ wget

If the output displays wget command not found you need to download and install the tool manually. Below you will find the installation instructions for Ubuntu/Debian, CentOS, and Windows.

To install wget on Ubuntu or Debian releases, use the command:

$ sudo apt-get install wget

To install wget on CentOS or Fedora, type the following command:

$ sudo yum install wget


How to Install wget on Windows ?

  • Download wget for Windows and install the package.
  • Add the wget bin path to environment variables (optional). Configuring this removes the need for full paths, and makes it a lot easier to run wget from the command prompt:
  • Open the Start menu and search for "environment".
  • Select Edit the system environment variables.
  • Select the Advanced tab and click the Environment Variables button.
  • Select the Path variable under System Variables.
  • Click Edit.
  • In the Variable value field add the path to the wget bin directory preceded by a semicolon (;). If installed in the default path, add C:Program Files (x86)GnuWin32bin.
  • Open the command prompt (cmd.exe) and start running wget commands.

Create a Live USB for Manjaro Linux on Windows 10 - Step by step guide ?

This article covers how you can create a bootable USB for Manjaro Linux on Windows 10. In fact, All you need is a USB drive, a Linux ISO file, and an ISO burning tool to create a live bootable USB.

Install Rundeck on Ubuntu 20.04 - Step by step guide ?

This article covers how to install Rundeck on Ubuntu 20.04 for task automations in the system. In fact, Rundeck is a free open-source software for automation services. With Rundeck, you can create simple to complex tasks on either the local machine or on a remote server.

lsblk Command in Linux - Explained with examples

This article covers how to use the lsblk command in Linux. In fact, lsblk prints all block devices (except RAM disks) in a  tree-like format  by  default.   Use  lsblk --help to get a list of all available columns.

The lsblk command in Linux lists block devices. 

Following is Lsblk's syntax:

$ lsblk [options] [device...]

Lsblk can be used to retrieve a vast range of information about all the block devices attached to the system.


How to make lsblk display info about device owner, group, and mode ?

This can be achieved using the -m command line option:

$ lsblk -m

Make a Bootable USB for Linux Mint from Windows 10 - Step by step guide ?

This article covers how to easily create a bootable usb for Linux Mint. In fact, we can create a bootable USB for any other Operating System. All we need is an ISO image of that OS, a Universal USB Installer, and a USB drive and we are good to go.

To see how to create a bootable USB using Ventoy, visit: https://LinuxReels.com/resource/499-create-a-bootable-usb-drive-using-ventoy


Install Geary Email Client on Ubuntu 20.04 - Step by step guide ?

This article covers how to install and configure the Geary email client on Ubuntu 20.04. In fact, Geary is one of the best Email Client apps for Ubuntu. 


Main features of Geary includes:

  • Insert images inline features added when you will compose rich-text messages.
  • Multiple spell-checker Addons added.
  • Provides an Improved interface when you will insert links in rich text messages.
  • Offer message archiving advantages for Yahoo! Mail and Outlook.com.
  • Comes with a very good interface.
  • Easy Saving for remote inline images.
  • Distribution via Flatpak is possible.
  • The user interface, layout, and design were updated.
  • Improved designing when moving and labeling conversations at the same time.
  • It offers to unfold the starred messages when you are in a conversation.
  • The keyboard navigation is awesome.
  • Application keyboard shortcut help (Ctrl + ?) added.
  • Advanced security when displaying any messages.
  • Internal bug fixed.

Host Command in Linux - Explained With examples

This article covers how to use the host command in Linux. In fact, host performs DNS lookups, converting domain names to IP addresses and vice versa. When no arguments or options are given, host prints a summary of its command line arguments and options.

Install WildFly on Ubuntu 20.04 - Step by step guide ?

This article covers how to successfully install and configure WildFly on Ubuntu 20.04. Infact, WildFly offers you an administration dashboard to manage single or multiple domains efficiently.

Install MPV Player on Linux Mint 20 - Step by step guide ?

This article covers the process of installing the MPV player on a Linux Mint 20 system. In fact, Mpv supports a wide variety of video file formats, audio and video codecs, and subtitle types.

Install Kubelet on Linux Mint 20 - Step by step guide ?

This article covers how to install Kubelet on a Linux Mint 20 system via the Snap Store. In fact, With the help of this amazing technology, we can easily manage the Kubernetes nodes. 

Install NumPy on Ubuntu 20.04 LTS - Step by step guide ?

This article covers how to install Numpy on Ubuntu 20.04. In fact, NumPy(Numerical Python) is a library for the Python programming language, adding support for large, multi-dimensional arrays and matrices, along with a large collection of high-levelmathematicalfunctions to operate on these arrays.

Install ipcalc on Linux Mint 20 - Step by step guide ?

This article covers the installation and usage of ipcalc on Linux Mint 20. In fact, With the help of this tool, you can easily find out the Netmask, wildcard, network, host ranges, broadcast address, etc. associated with any given IP address. 


Main uses of ipcalc includes:

Validate IP address.

Show calculated broadcast address.

Display hostname determined via DNS.

Display network address or prefix.


How to install ipcalc in Linux ?

To install ipcalc, simply run one of the commands below, based on the Linux distribution you are using:

$ sudo apt install ipcalc  

The ipcalc package should be installed automatically under CentOS/RHEL/Fedora and it is part of the initscripts package, but if for some reason it is missing, you can install it by using:

# yum install initscripts     #RHEL/CentOS
# dnf install initscripts     #Fedora


To find more about the ipcalc usage, you can use:

# ipcalc --help
# man ipcalc

Install Linux kernel 5.15 on Ubuntu 20.04 - Step by step guide ?

This article covers how to install the Linux kernel 5.15 on Ubuntu 20.04 LTS Focal Fossa system. In fact, The Linux kernel is the main component of a Linux operating system (OS) and is the core interface between a computer's hardware and its processes. 


How to check Updates for Kernel 5.15 ?

To keep your kernel 5.15 up to date, you will use the apt update and upgrade commands to pull updates from the PPA repository just like any other package on your Ubuntu system.

To check for updates and upgrade.

$ sudo apt update && sudo apt upgrade

Remember, for any kernel updates, and you will need to reboot your system.

Install Kanboard on Ubuntu 20.04 LTS - Step by step guide ?

This article covers the process of installing Kanboard open source project management on your Ubuntu 20.04 LTS Focal Fossa. In fact, Kanboard is a free and open-source project management software that helps you visualize and limit your work in progress to focus on your goal. It follows the Kanban methodology and is specially designed for those people who want to manage their projects efficiently and simply. Kanboard also provides support for reports and analytics and can be integrated with external services. 

Install GoAccess on Ubuntu 20.04 LTS - Step by step guide ?

This article covers the process of installing the GoAccess real-time web log analyzer on Ubuntu 20.04 LTS Focal Fossa system. In fact, GoAccess is a free and open-source weblog analyzer tool used for the analysis of logs in real-time. You can analyze logs through a web browser or terminal. 

GoAccess provides very useful statistics to system administrators including, top visitors, bandwidth, referring sites and URLs, operating systems, IP location, reverse DNS, geolocation, HTTP status code, and much more.

Load testing on your web server using Siege ( Benchmarking Tool )

This article covers how to test load in web servers using siege benchmarking tool. In fact, Siege is an HTTP load testing tool that you can use to send hundreds of concurrent visitors on your website at once to check how it will perform under pressure and how much availability your server can provide.


How to Install Siege on Ubuntu Linux system ?

It is a very easy task to install Siege on our Ubuntu server. Execute the following command to install siege on Ubuntu:

$ sudo apt-get install siege -y

rm command in Linux - Explained with examples

This article covers how to use the rm command in Linux. In fact, the rm command is used for removing/deleting files and directories.


How to remove directories using rm command?

If you are trying to remove a directory, then you need to use the -r command line option. Otherwise, rm will throw an error saying what you are trying to delete is a directory:

$ rm -r [dir name]

For example:

$ rm -r testdir


How to make rm prompt before every removal ?

If you want rm to prompt before each delete action it performs, then use the -i command line option: 

$ rm -i [file or dir]

For example, suppose you want to delete a directory 'testdir' and all its contents, but want rm to prompt before every deletion, then here's how you can do that:

$ rm -r -i testdir

man command in Linux - An overview with examples ?

This article covers how to use the man command in Linux. In fact, the man command allows users to view the reference manuals of a command or utility run in the terminal. The man page (short for manual page) includes a command description, applicable options, flags, examples, and other informative sections.


How to Enable Case-Sensitivity using man command ?

To search for manual pages using case-sensitivity, use the -I option. The syntax is:

$ man -I [command name]

The man default setting is to ignore case when looking up manual pages. To go back to default settings and ignore case, use the -i option.


How to Use man in Linux ?

In the terminal window, type man followed by the Linux command name which man page you want to see.

The output of the command displays the available man page headings for the specified command.

The list of possible headings includes:

  • Name: The name of the command.
  • Synopsis: The command's syntax.
  • Configuration: Configuration details for a device.
  • Description: A description of the command.
  • Examples: Several examples demonstrating the use of the command.
  • Defaults: The default functions of the command and how they can be overridden.
  • Options: A list of options and flags that the command accepts.
  • Exit Status: A list of possible exit status values for the command.
  • Environment: A list and description of environment variables that affect the command.
  • Files: A list of files used by the command.
  • See also: Commands related to the described topic.
  • Authors: The people who wrote or maintain the command.
  • History: Command development history.
  • Notes: Various notes, including permissions required, dependencies, etc.
  • Bugs: Any known issues in this program version.

Install Wireguard on Ubuntu 20.04 LTS - Step by Step guide ?

This article covers the process of installing Wireguard VPN on Ubuntu 20.04 LTS Focal Fossa system. In fact, WireGuard is an open-source and security-focused virtual private network designed for simplicity and ease of use. If you are looking for a lightweight and fast VPN then the WireGuard VPN is the best choice for you.

Install Cacti Monitoring on Debian 10 - A step by step guide ?

This article covers the process of installing Cacti Monitoring on Debian 10 Buster system. In fact, Cacti is a free and open-source, web-based network monitoring, and graphics tool which provides a fast poller with advanced graphic template creation and multiple data collection methods. 

For additional help or useful information, we recommend you check the official Cacti Monitoring website.

Monitor Network Traffic Using netstat Command in Linux

This article covers how to monitor network traffic using the netstat command. In fact, Netstat is a popular command for everything related to network analysis.

We explored the uses of the netstat command on the Linux system. 


To install netstat, run the following on Debian and its derived distributions:

$ sudo apt install net-tools

On RedHat and its derived distributions, run:

$ yum install net-tools

To get the network load overview, you can call both netstat and ss with the flag -s. netstat gives the output in more depth, while ss gives a summary of the load:

$ netstat -s

Install HyperTerminal on AlmaLinux/Rocky 8

This article covers the process of installing HyperTerminal on AlmaLinux. In fact, Hyper is an open-source fully extensible web-based, electronic-based terminal built on HTML/CSS/JS. It is an application that connects computers to other remote systems. It is a highly customizable lightweight terminal accessible across all platforms.

For additional help or useful information, we recommend you check the official Hyper website.


Install Odoo on Debian 10 Buster

This article covers how to install Odoo on your Debian 10 Buster system. In fact, a few popular applications for Odoo include CRMs, eCommerce, accounting, inventory, point of sale, and project management. These applications are all fully integrated and can be installed and accessed through a web interface. Using Odoo's web interface can make it easier to automate and manage your company's processes.

For additional help or useful information, we recommend you to check the official Odoo website.

Install Netdata on Linux Mint 20

This article covers how to install Netdata on a Linux Mint 20 machine and then use this service for measuring the performance of your system. In fact, Netdata is a free and open-source real-time monitoring and troubleshooting tool for cloud servers, containers, applications, and on-premise IT infrastructure. You can view the results in a highly interactive web-dashboard.

Install Pinta on Ubuntu 20.04 LTS

This article covers how to install, launch, and remove pinta on Ubuntu 20.04 LTS. In fact, Pinta is more like a Microsoft Paint and with this your painting made simple.


How to install Pinta on Ubuntu ?

1. Install PPA:

$ sudo add-apt-repository ppa:pinta-maintainers/pinta-stable

2. Update System with Package list:

$ sudo apt-get update

3. Install Pinta:

$ sudo apt-get install pinta

Create a Backup ISO File using Mkisofs in Linux Mint 20

This article covers how you can create a backup ISO file in Linux Mint 20 using Mkisofs. After installing this tool on your system, you can create backups of any desired files very conveniently.

The basic syntax of Mkisofs command is: $ mkisofs -o [filename.iso] [ directory_path]

Set / Unset Environment Variables in Linux

This article covers how to set and unset both local and persistent environment variables in Linux. In fact, every time you start a shell session in Linux, the system goes through configuration files and sets up the environment accordingly. Environment variables play a significant role in this process.

Environment variables are a set of key value pairs stored on your Linux and used by processes in order to be able to perform specific operations. with the export command but also by modifying some system files to make them persistent.


How to Set Environment Variables on Linux using export ?

The easiest way to set environment variables is to use the export command:

$ export VAR="value"


How to Unset Environment Variables on Linux Using unset command ?

To unset an environment variable, use the unset command with the following syntax:

$ unset <variable>


Common Set of Environment Variables on Linux:

  • USER : the current username of the user using the system;
  • EDITOR : the program run to perform file edits on your host;
  • HOME : the home directory of the current user;
  • PATH : a colon separated list of directories where the system looks for commands;
  • PS1 : the primary prompt string (to define the display of the shell prompt);
  • PWD : the current working directory;
  • _ : the most recent command executed on the system (by the user)
  • MAIL : the path to the current user’s mailbox;
  • SHELL : the shell used in order to interpret commands on the system, it can be many different ones (like bash, sh, zsh or others);
  • LANG : the language encoding used on the system;
  • DESKTOP_SESSION : the current desktop used on your host (GNOME, KDE)
  • HISTFILESIZE : number of lines of command history stored in the history file;
  • HISTSIZE : number of lines of history allowed in memory;
  • UID : the current UID for the user.

Install an SSL Certificate in Tomcat for a Java project in Linux

This article covers how to generate CSR files and install CA signed SSL certificates in Tomcat for Java projects.


The need to create a self-signed certificate ?

  • It allows you to learn to create a keystore and certificate, which is good practice for getting an actual SSL/TLS certificate provided by a Certificate Authority.
  • It allows you to use a certificate right away and make sure it works successfully.
  • It's free.

Best 4 Open-Source Remote Desktop Tools for Linux

This article covers the best remote desktop tools for accessing Linux systems remotely. These are the best 4 RDP clients or tools that ensure optimal performance and provide seamless access to Linux-based computer systems. The 4 best RDP tools are Zoho Assist, Remmina, TigerVNC, and XRDP.

Install and Configure Grsync on Linux Mint 20

This article covers how to install and configure as well as its advanced and extra options to create better backups in your Linux Mint system. In fact, Grsync is an open-source simple, great, and easy to use graphical user interface for the popular rsync command-line tool.

To install Grsync on your system, simply run the following command:

$ sudo apt install grsync

Install Gatsby on Ubuntu 20.04

This article covers how to install Gatsby static site generators on Ubuntu 20.04 Linux system. In fact, Gatsby fetches all the data, renders the entire website into static HTML, CSS, JS files with the data available at that time. As it generates the static files, Gatsby applications can be deployed in anywhere.

Install w3m Browser on Ubuntu 20.04 - Easy steps to follow ?

This article covers how to install, run, and remove a fantastic, multi-color, and terminal-based browser w3m for Ubuntu 20.04 LTS terminal. In fact, If you're looking for text-based web browser To use it from the terminal and Lynx does not convince you, W3M can be a good alternative. This is a modern text-based terminal web browser for Gnu / Linux it has a lot to offer. 

Customize the Terminal on Ubuntu 20.04 - how to do it ?

This article covers how to resize and reconfigure our Ubuntu terminal. 

Install CUPS Print Server on Linux Mint 20 - Best Method ?

This article covers steps to install the CUPS print server on a Linux Mint 20 system. In fact, Linux uses the Common UNIX Printing System, also known as CUPS. CUPS uses the Internet Printing Protocol (IPP) to allow local printing and print sharing. The /etc/cups/ directory stores all the configuration files for printing. However, these files can be easily managed with the Printer Configuration Tool in Linux. Once it is installed on your system, you can use it very effectively for managing multiple printers and computers that wish to use those printers.

Redirect Stderr to Stdout in Bash - How to get it done ?

This article covers how to redirect stderr to stdout in Bash. When redirecting the output of a command to a file or piping it to another command, you might notice that the error messages are printed on the screen. In Bash and other Linux shells, when a program is executed, it uses three standard I/O streams. Here, A file descriptor is just a number representing an open file. The input stream provides information to the program, generally by typing in the keyboard. The program output goes to the standard input stream and the error messages goes to the standard error stream. By default, both input and error streams are printed on the screen.

Install Django on Alma Linux | Rocky Linux - Step by Step Process ?

This article covers how to install Django on  Alma Linux | Rocky Linux. In fact, Django is the most popular Python web framework designed to help developers build secure, scalable, and maintainable web applications.


How to Install Python on Debian 10 Buster ?

1. Before we install any software, it's important to make sure your system is up to date by running the following apt commands in the terminal:

$ sudo apt update
$ sudo apt upgrade

2. Install Python and necessary dependencies.

Now install Python dependencies on your system using the following command:

$ sudo apt install python3 python3-pip tree

3. Confirm the Python installation and check the Python version by typing the following command:

$ pip3 -V

Find DHCP Server IP Address in Linux Using CLI - Step by Step guide ?

This article covers the different ways of finding the IP address of your DHCP server in a Linux system. We have already dealth with how to install and configure DHCP server on Linux.


Linux System IP Scanning commands:

Scanning for IP address lets you have better control over your network. With a few commands, you can quickly map out the devices in your network and the IP addresses that they are using.

  • ipconfig: This command displays all network settings assigned to one or all adapters in the computer. You can find information such as your own IP, subnet, and Gateway. For Linux and MacOS is "ifconfig".
  • arp -a: When you issue the "arp -a", you’ll get IP-address-to-mac conversion and the allocation type (whether dynamic or static) of all devices in your network.
  • Ping: It helps determine connectivity between two hosts and find the IP address of a hostname.

Install MariaDB on Rocky Linux 8 - Step by Step Process ?

This article covers step-by-step installation procedure of the MariaDB server on Rocky Linux 8. In fact, MariaDB was developed as a "drop-in" replacement for MySQL. As such, both software packages are functionally equivalent and interchangeable.

To enable MariaDB service to start on boot time and start the service using the following commands:

$ sudo systemctl enable mariadb
$ sudo systemctl start mariadb

To verify the running status of MariaDB, run the below command:

$ sudo systemctl status mariadb

Install Cacti on Ubuntu 20.04 LTS - Step by Step Process ?

This article covers step by step procedure for installing the Cacti monitoring tool on Ubuntu 20.04 LTS. In fact, Cacti is a free and open-source RRD tool-based network monitoring tool that monitors network devices such as servers, routers, and switches. Cacti uses the SNMP protocol to gather data from remote systems. Data gathered is then stored in a MySQL database. 

One of the most essential tasks that any IT operation team has to keep in mind is continuous monitoring of their IT infrastructure. The concept of monitoring ensures that systems such as servers are functioning and working as desired.

Install Duplicity on CentOS 8 - Step by Step Process ?

This article covers how to install the free backup software duplicity on the CentOS 8 system. Now you will be able to maintain your critical data backups and prevent data loss. In fact, Duplicity is backup tool used to create Bandwidth-efficient and Encrypted backup in Linux based distributions. To connect to a file server for storing backup ssh, scp and sftp protocols are preferable methods, then rsync and ftp used for local file access.

Route Command in Linux with examples

This article covers how to use the route command in a Linux system with examples. Linux provides the ip route command in order to manage the routing table. The routing table is used to set routes for different destination IP addresses. Even there is a default route in most of the cases which are used to sent IP packets to the other networks we may need to add new routes via the command-line interface by using the ip route add command.


Important Linux commands:

  • arp — Manipulate the system ARP cache.
  • ifconfig — View or modify the configuration of network interfaces.
  • ip — Display and manipulate information about routing, devices, policy routing and tunnels.
  • netstat — Print information about network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.

SS Command in Linux with examples

This article covers how to use the ss Command on Linux. In fact, the ss command is a modern replacement for the classic netstat. You can use it on Linux to get statistics about your network connections. 

ss displays statistics for Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Unix (interprocess), and raw sockets. Raw sockets operate at the network OSI level, which means TCP and UDP headers have to be handled by the application software, not by the transport layer. Internet Control Message Protocol (ICMP) messages and the ping utility both use raw sockets.

Install Kubectl on Linux Mint 20 - Best Method ?

This article covers how you can install Kubectl on your Linux system and use it to operate your Kubernetes clusters if you are fond of using the command-line interfaces. Infact, Kubectl tool is very efficient in terms of cluster management and application deployment. 

Kubectl is a command-line tool for Kubernetes. It allows us to execute Kubernetes operations via the API. We can use Kubectl to deploy apps, check logs as well as manage all the other resources of the cluster.

Kubernetes uses an HTTP-based REST API which is the actual Kubernetes user interface employed to manage it. This means that every Kubernetes operation is represented as an API endpoint and can be carried out based on an HTTP-request sent to the endpoint. 

Install AnyDesk on Linux Mint 20 - Step by Step guide ?

This article covers how to install AnyDesk on your Linux system which can be used as a remote desktop application for interacting with different devices and controlling them remotely. Anydesk application can be installed on Windows, Linux and macOS.

Rkhunter for Scanning Backdoors, Rootkits, and Local Exploits in Your Ubuntu Linux System - How to use it ?

This article covers an easy procedure to install rkhunter, configure, scan the system and view log to identify actual backdoor, rootkits, and local exploits. In fact, Rkhunter (Rootkit Hunter) is an open-source Unix/Linux based scanner tool for Linux systems released under GPL that scans backdoors, rootkits, and local exploits on your systems. It scans hidden files, wrong permissions set on binaries, suspicious strings in the kernel, and so on. 

To scan the entire Linux  file system, run the Rkhunter command as a root user:

$ rkhunter --check

Install NtopNG on Linux Mint 20 - Step by Step Process ?

This article covers easy steps to install the NtopNG utility on your Linux Mint 20 system. Once it is installed on your system, you can start using it for network traffic monitoring after configuring it according to the specifications of your machine.

To check whether NtopNG is installed or not, run the command:

$ systemctl status ntopng

To start NtopNG service, execute the command:

$ systemctl start ntopng

Install Siege Benchmarking Tool on Ubuntu 20.04 - Step by Step Process ?

This article covers how to install Siege benchmarking tool on Ubuntu Linux System using two methods: using the APT and the tar.gz package. Siege allows you to test a web server with n number of users t number of times. Siege offers three modes of operation: Regression, internet simulation, and brute force.

Once the Siege is installed, you can verify the installed version of Siege using the following command:

$ siege --version

Install Siege on Linux Mint 20 - Step by Step Process ?

This article covers how to quickly install the Siege tool on your Linux system and use it to test any specific web server. Siege is an open-source multi-threaded regression test and benchmark utility with a primary focus on load testing and benchmarking. It can stress test a single URL with a user-defined number of simulated users or read many URLs into memory and stress them simultaneously. The program reports the total number of hits recorded, bytes transferred, response time, concurrency, and return status.


To Install Siege Benchmarking Tool on Ubuntu / Debian,

1. Check and update your Ubuntu 20.04 operating system:

$ sudo apt update && sudo apt upgrade -y

2. Install Siege execute the following command:

$ sudo apt install siege -y

3. Confirm the siege version to make sure it's installed and to compare it to the current version from Siege's official website:

$ siege --version

Install Grafana on Ubuntu 20.04 - Step by Step Process ?

This article covers how to install Grafana on Ubuntu OS using two methods: using the APT repository and the .deb package. Grafana is multi-platform open-source analytics and interactive visualization web application that integrates with complex data from sources like Prometheus, InfluxDB, Graphite, and ElasticSearch. It provides charts, graphs, and alerts for the web when connected to supported data sources. It is expandable through a plug-in system.


Features of Grafana:

  • Data Visualization: Allows for fast and flexible visualization with many options and settings.
  • Dynamic Dashboards: Provides the ability to create dynamic and reusable panels with templated variables.
  • Metrics Exploration: Explore your data with ad-hoc queries and dynamic drill-down by splitting the view and comparing different time ranges and sources.
  • Data Logs: Provides tremendous opportunities to use data metrics in a log with labels and filters saved, which can be studied, viewed, and broadcasted.
  • Extensive Alert Capabilities: Visually define alert rules for your most important metrics. Grafana will continuously evaluate and send notifications to systems such as Slack, PagerDuty, VictorOps, and OpsGenie.
  • Mixed Data Sources: Mix different data sources on the same graph and for each query.

Use pkill Command in Linux System - An overview ?

This article covers how to use the pkill command in Linux. pkill is basicity a wrapper around the pgrep program that only prints a list of matching processes.

The syntax for the pkill command is as follows:

$ pkill [OPTIONS] <PATTERN>

The matching <PATTERN> is specified using extended regular expressions.

For more information about pkill command, visit the pkill man page or type man pkill in your terminal.


Other Linux commands:

  • ps — Report the status of a process or processes.
  • killall — Kill processes by name.
  • kill — Send a signal to a process, affecting its behavior or killing it.

View and Delete Terminal History in Ubuntu 20.04 - Best Method ?

This article covers how to view / preserve or delete terminal history on Ubuntu Linux System. Terminal history can be a benefit in case you want to revisit/recall the past commands. But it can be a security risk because they can show system tools, configurations, and settings. 

The history mechanism in Ubuntu keeps track of terminal commands you executed.

To view your command line history, Open the Ubuntu terminal and Type :

$ history

This will display the list of previous bash commands you executed in the terminal.


To delete your Ubuntu terminal history, Type:

$ history -c

This will clear your Ubuntu terminal history. Also, you need to know that command line history is user independent, means every user has their own separate history. When you execute history -c command, it will only clear terminal history of the current user.

Install Gitea on Linux Mint 20 - Best Method ?

This article covers the installation procedure of Gitea on a Linux Mint 20 system. With Gitea, you can track time, issues, repository branching, file locking, merging, etc.

Use tcpdump Command in Ubuntu 20.04 - Best Method ?

This article covers how to use the tcpdump command for troubleshooting and analyzing the network on your Linux system. tcpdump is the world's premier network analysis tool—combining both power and simplicity into a single command-line interface.

Basically, tcpdump is a valuable tool for anyone looking to get into networking or information security.

The raw way it interfaces with traffic, combined with the precision it offers in inspecting packets make it the best possible tool for learning TCP/IP.

Protocol Analyzers like Wireshark are great, but if you want to truly master packet-fu, you must become one with tcpdump first.

Install Gitea on Ubuntu 20.04 - Best Method ?

This article covers how to install Gitea on Ubuntu 20.04 LTS. Gitea is a self-facilitated open-source git worker written in Go. It is a fork of Gogs . Gitea incorporates a store record supervisor, venture issue following, clients administrations, notices, implicit wiki, and considerably more. 

To Install Git on Linux, run the commands: 

$ sudo apt update
$ sudo apt install git

To Confirm Git Installation, execute the command: 

$ git --version

Install Swift on Ubuntu 20.04 - Best Method ?

This article covers how to install Swift on Ubuntu 20.04 LTS. Swift is a programming language developed from C and objective-C which uses variables to store and refer to values. Constants are used throughout.

Install VeraCrypt on CentOS 8 - Best Method ?

This article covers how to install VeraCrypt on CentOS 8. VeraCrypt is free open-source disk encryption software for Windows, Mac OS X, and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast, to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory and does not involve temporary unencrypted files.


Features of VeraCrypt:

  • Creates a virtual encrypted disk within a file and mounts it as a real disk. 
  • Encrypts an entire partition or storage device such as USB flash drive or hard drive. 
  • Encryption is automatic, real-time(on-the-fly) and transparent. 
  • Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. 
  • Encryption can be hardware-accelerated on modern processors. 

Create a Bootable USB Drive Using Ventoy - Best Method ?

This article covers how to Create Multiboot USB from Linux Using Ventoy. A bootable USB is commonly used as an operating system installer. To create bootable USB download appropriate .iso,.dmg or .img file and then copy/unpack to a USB.

Commonly, at a time one ISO image is used in a USB and have to reformat drive each time to boot another Operating system. This will end up with many bootable USB drives to keep.

The idea is to get the USB drive ready for multibooting. Then you can copy the ISO images of the operating systems that you want in the first partition. Ventoy will then search for them and list them in alphabetical order on the GRUB menu.

Install Elasticsearch on CentOS 8 - Best Method ?

This article covers the installation and basic configuration of Elasticsearch on the CentOS system. For how to use Elasticsearch, visit the Quick start guide available on its website. Elasticsearch is an open source search and analytics engine that allows you to store, search, and analyze big volumes of data in real time. Elasticsearch powers millions of Applications that rely on intensive search operations such as e-commerce platforms and big data applications. 

Elasticsearch supports RESTful operations. This means that you can use HTTP methods (GET, POST, PUT, DELETE, etc.) in combination with an HTTP URI (/collection/entry) to manipulate your data. The intuitive RESTful approach is both developer and user friendly, which is one of the reasons for Elasticsearch's popularity.

Top 6 Free and Open-Source Alarm Clocks

This article covers the best clock applications that work most efficiently on the Linux platforms and their distributions and are absolutely free, open-source, and reliable.

Alarms are one of the most required utilities in these times. It would not be wrong to say that if there are no alarms, suddenly there will be a giant halt to productivity. Many information technology firms and software solutions developers have proposed high-functioning clock platforms that not only offer a sleek, simple, and easy clock utility but also offer amazing and most efficient alarm features along with a list of other vast features enhancing overall user experience. 

Install Duplicity on Ubuntu 20.04 - Best Method ?

This article covers the process to install duplicity on Ubuntu 20.04 and how to use it. Duplicity is an open-source tool that helps people create backups of their data. It basically just encrypts the user's data and stores it into a remote server. It's a very convenient and smart way to back up data, as it does not only store the data but also any changes made to it in the long run. This attribute makes Duplicity very space-efficient.


To Install Duplicity on Ubuntu 20.04 LTS,

1. Update the Package Repository:

$ sudo apt-get update -y

2. After updating the repository, consider running the following command to install duplicity:

$ sudo apt-get install -y duplicity

3. Verify the Installation:

$ apt-cache policy duplicity

Linux Touch Command Examples - How it works ?

This article covers a few basic examples of the touch command. For more information use 'man touch' to view the manual page. In fact, the touch command is a standard command used in UNIX/Linux operating system which is used to create, change and modify timestamps of a file.


Touch Command Options

  • -a to change the access time only.
  • -c if the file does not exist, do not create it.
  • -d to update the access and modification times.
  • -m to change the modification time only.
  • -r to use the access and modification times of file.
  • -t creates a file using a specified time.

Change SSH Port on Ubuntu 20.04 Linux System - Best Method ?

This article covers how to change the ssh port on Ubuntu Linux server. You can easily change the SSH Port for Your Linux server. For better security, consider using SSH passwordless authentication with SSH public/private key pair.

The ssh port defined in sshd_config file. This file located in /etc/ssh/sshd_config location.

To open the new port run the following commands on Fedora/CentOS/RHEL/Oracle Linux using FirewallD:

$ sudo firewall-cmd --permanent --zone=public --add-port=2222/tcp
$ sudo firewall-cmd --reload


How to Restart the sshd service ?

Type the following command on a CentOS/RHEL/Fedora Linux:

$ sudo service sshd restart

OR if you are using CentOS/RHEL/Fedora Linux with systemd:

$ sudo systemctl restart sshd

OR if you are using Ubuntu/Debian/Mint Linux:

$ sudo service ssh restart

OR if you are using Ubuntu/Debian/Mint Linux with systemd:

$ sudo systemctl restart ssh

Or if you are using FreeBSD Unix, enter:

$ sudo service sshd restart

Download a File on Ubuntu Using the Command Line on Ubuntu 20.04 system

This article covers Both wget and curl which are the free and open-source command-line utilities used for the non-interactive downloading of files. Remember, although both the utilities can download files from the web; they do differ a lot in terms of functionalities.

url can be used to transfer data over a number of protocols. It supports many protocols including HTTP, HTTPS, FTP, TFTP, TELNET, SCP, etc. using Curl, you can download any remote files. It supports pause and resumes functions as well.

To Install curl,

Launch command line application in Ubuntu that is Terminal by pressing the Ctrl+Alt+T key combinations. Then enter the below command to install curl with sudo:

$ sudo apt install curl

Linux Whereis Command examples

This article covers the whereis command which is useful for Locating the binaries and manual pages for various commands. Sometimes, while working on the command line, we just need to quickly find out the location of the binary file for a command.  


Linux whereis command syntax

The whereis command lets users locate binary, source, and manual page files for a command. Following is its syntax:

$ whereis [options] [-BMS directory... -f] name...

Install Django on Ubuntu 20.04 - Best Method ?

This article covers the different methods of Installing Django on Ubuntu 20.04. With it, you can easily perform creation of Django applications, superuser creation, and removal of Django. 

Django is a full-featured Python web framework for developing dynamic websites and applications. Using Django, you can quickly create Python web applications and rely on the framework to do a good deal of the heavy lifting.


How to install Django from Ubuntu repositories ?

1. First, update your local package index with apt:

$ sudo apt update

2. Next, check which version of Python you have installed. 18.04 ships with Python 3.6 by default, which you can verify by typing:

$ python3 -V

Install Emacs Editor in Debian 10 - Best Method ?

This article covers the different methods to install Emacs on Debian OS. Emacs is a widely used open-source text editor for Linux. It exists for many years now and can be used for basic word processing, code editing, and scripting, etc.


How to Install Emacs editor on Debian ?

1. To start the installation process, login with root and update the package repository with the following command.

$ apt-get update

2. Next, run the following command on the terminal and wait for the operation to complete. This can take several minutes. When you are asked for confirmation, press Y from your keyboard.

$ apt-get install emacs

Install Putty on CentOS 8 - Best Method ?

This article covers how to Install putty on CentOS 8. With putty, you can easily connect your Linux system to a remote system. Putty is a free and open source ssh & telnet client. Putty is available for Windows, Linux, Unix and macOS. Using putty, we can access the remote servers and switches over ssh protocol. It can also be used to take serial console of remote systems.


How to perform Putty Installation on CentOS / RHEL / Fedora ?

Putty package is available in the default CentOS and RHEL repositories. So, to install putty run:

$ sudo yum install putty -y

Or

$ sudo dnfs install putty -y

Install GitLab in Ubuntu 20.04 - Best Method ?

This article covers how to install GitLab on your local devices or server. Also, you will learn how to integrate the GitLab CE into our local Ubuntu system. GitLab CE, or Community Edition, is an open-source application primarily used to host Git repositories, with additional development-related features like issue tracking. It is designed to be hosted using your own infrastructure, and provides flexibility in deploying as an internal repository store for your development team, a public way to interface with users, or a means for contributors to host their own projects.

Linux Stat Command Examples

This article covers how to use the Linux stat command. Basically, The stat command gives important information about filesystems. stat command is a useful utility for viewing file or file system status. It retrieves information such as file type; access rights in octal and human-readable; SELinux security context string; time of file birth, last access, last data modification, last status change in both human-readable and in seconds since Epoch, and much more. Also, It has an option to specify a custom format instead of the default, for displaying information.

Chmod Command in Ubuntu 20.04 - How it Works ?

This article covers both the symbolic and numeric mode of the chmod command. Control who can access files, search directories, and run scripts using the Linux's chmod command. This command helps modifies Linux file permissions.

In Linux, who can do what to a file or directory is controlled through sets of permissions. There are three sets of permissions. One set for the owner of the file, another set for the members of the file's group, and a final set for everyone else.


To change directory permissions in Linux, use the following:

  • chmod +rwx filename to add permissions.
  • chmod -rwx directoryname to remove permissions.
  • chmod +x filename to allow executable permissions.
  • chmod -wx filename to take out write and executable permissions.



We can use the -l (long format) option to have ls list the file permissions for files and directories.

$ ls -l


chmod Numerical Shorthand:

  • 0: (000) No permission.
  • 1: (001) Execute permission.
  • 2: (010) Write permission.
  • 3: (011) Write and execute permissions.
  • 4: (100) Read permission.
  • 5: (101) Read and execute permissions.
  • 6: (110) Read and write permissions.
  • 7: (111) Read, write, and execute permissions.

Most Useful Nginx Commands in Linux System

This article covers most used Nginx commands. You can learn more about Nginx command line at Nginx documentation.

Nginx is one of the most popular web servers in the world. So whether you're currently using it or not, chances are, if you're a web developer chances are you'll likely come in contact with it at some point. 

Also, Nginx is well known for its simple configuration, and low resource consumption due to its high performance, it is being used to power several high-traffic sites on the web, such as GitHub, SoundCloud, Dropbox, Netflix, WordPress and many others.


To start the Nginx service, run the following command. Note that this process may fail if the configuration syntax is not OK:

$ sudo systemctl start nginx #systemd

OR

$ sudo service nginx start   #sysvinit


To enable Nginx auto-start at boot time, run the following command:

$ sudo systemctl enable nginx #systemd

OR

$ sudo service nginx enable   #sysv init


How to Show Nginx Command Help ?

To get an easy reference guide of all Nginx commands and options, use following command.

$ systemctl -h nginx

Install Android Studio on Ubuntu 20.04 LTS - Step by Step Process ?

This article covers how to install Android Studio using different methods. Also, you will learn how to remove Android Studio in case you don't need it anymore. Android Studio is the most widely used software for android mobile application development. Android Studio is developed by Google and it can run on different operating environments like Windows, macOS, and Linux. Most of the current popular android applications are developed on Android Studio. This tool has various built-in features that provide a stable and fast environment for developing applications.


How to Install Android Studio through snap ?

You can install the android studio using snap on your Ubuntu system using the following command:

$ sudo snap install android-studio --classic

You can also install android studio using the below-mentioned command:

$ sudo snap remove android-studio

Check Ubuntu Version using Different Methods

This article covers how to check OS version using different methods. You can get more information of Ubuntu releases at official site of the Ubuntu Releases.

If you are using Ubuntu 16.04 then you can Upgrade using this guide Upgrade Ubuntu 16.04 to Ubuntu 18.04 LTS.

Ubuntu is a free, open-source Linux-based operating system, which has a long list of release versions. Finding out which Ubuntu version is running on your system can be important when troubleshooting issues or searching for installation guides.


To check the Ubuntu version, use the following command in terminal:

$ lsb_release -a

This will display you some details about your distribution including Ubuntu version:

Distributor ID: Ubuntu
Description: Ubuntu 20.04 LTS
Release: 20.04
Codename: focal

Wget Command Examples on Linux Command Line

This article covers different wget command for different operations along with options. Wget is a command line utility in linux to download files from the internet. It provides many features such as downloading multiple files, resuming stopped downloads, limiting the bandwidth, downloading in the background and can be used for taking mirrors of the site. Wget supports HTTP, HTTPS and FTP protocol to connect server and download files.

You can learn more about Wget visit the GNU wget Manual page.


How to Install wget on Ubuntu | Debian ?

If your operating system is Ubuntu, or another Debian-based Linux distribution which uses APT for package management, you can install wget with apt-get:

$ sudo apt-get install wget

Use the Dig Command in Linux - Doing it right ?

This article covers how to query various DNS records. The dig command in Linux is used to gather DNS information. It stands for Domain Information Groper, and it collects data about Domain Name Servers. The dig command is helpful for diagnosing DNS problems, but is also used to display DNS information.

By default, dig sends the DNS query to name servers listed in the resolver(/etc/resolv.conf) unless it is asked to query a specific name server.


How to Install Dig on Linux ?

1. On Debian and Ubuntu, run:

$ apt-get install dnsutils

2. On CentOS 7, run the command:

$ yum install bind-utils

3. Once installed, check the version, to make sure the setup was completed successfully:

$ dig -v


Dig Syntax

In its simplest form, the syntax of the dig utility will look like this:

dig [server] [name] [type]


i. [server] – the IP address or hostname of the name server to query.

If the server argument is the hostname then dig will resolve the hostname before proceeding with querying the name server.

It is optional and if you don't provide a server argument then dig uses the name server listed in /etc/resolv.conf.

ii. [name] – the name of the resource record that is to be looked up.

iii. [type] – the type of query requested by dig. For example, it can be an A record, MX record, SOA record or any other types.

By default dig performs a lookup for an A record if no type argument is specified.

Install Apache Cassandra on Ubuntu 20.04 - Step by Step Process ?

This article covers how to install Apache Cassandra on Ubuntu 20.04 LTS. Apache Cassandra is an open-source non-relational database that delivers high performance, linear scalability, and continuous availability. All these features make Cassandra an ideal platform for mission-critical data.

To learn more about Apache Cassandra, visit its official documentation site.


How to install Java on Ubuntu ?

1. To check whether Java is installed, run the command:

$ java -version

2. To install OpenJDK, execute the following apt command:

$ sudo apt install openjdk-8-jdk

3. Once again, confirm that Java is installed by running the command:

$ java -version


How to Install Apache Cassandra in Ubuntu ?

1. First, install the apt-transport-https package to allow access of repositories via the https protocol:

$ sudo apt install apt-transport-https

2. Next, Import the GPG key using following wget command as shown:

$ wget -q -O - https://www.apache.org/dist/cassandra/KEYS | sudo apt-key add -

3. Then add Apache Cassandra's repository to the system’s sources list file as shown:

$ sudo sh -c 'echo "deb http://www.apache.org/dist/cassandra/debian 311x main" > /etc/apt/sources.list.d/cassandra.list'

4. Before installing Apache Cassandra, you need to update the package list first:

$ sudo apt update

5. Then install the NoSQL database using the command:

$ sudo apt install cassandra

6. Usually, Apache Cassandra starts automatically. To confirm its status, run the following command:

$ sudo systemctl status cassandra

7. Additionally, you can verify the stats of your node by running the command:

$ sudo nodetool status

Change the SSH Port on Ubuntu 20.04 Linux Server

This article covers how to change SSH port on your Linux system. SSH (Secure shell) is a cryptographic network protocol used to connect to a remote server securely and it transfer the data in encrypted form between the host and the client.

The default TCP port for SSH is 22, and by changing this default port to the other, it can prevent automated bots and malicious users from being brutally forced into the server.

Before changing the default SSH port number, can check the current port with the below command:

# netstat -ntlp | grep ssh


To change the SSH port:

1. Open the main SSH daemon configuration file /etc/ssh/sshd_config:

# vi /etc/ssh/sshd_config

2. Now search line begins with Port 22 and add hashtag (#) in front of that line. 

3. Then add a new Port line below with the custom port.

Note: Replace the sample port number with the custom port number that needs to be set.

4. Save and exit.


How to Restart the SSH daemon for the changes to take effect ?

Run the below commands to restart the SSH daemon and verify that the port changed:

# systemctl restart sshd
# netstat -ntlp | grep ssh

Install Virt-Viewer on Linux Mint 20 - Step by Step Process ?

This article covers how to install Virt-Viewer on a Linux Mint 20 system. virt-viewer is a minimal tool for displaying the graphical console of a virtual machine. The console is accessed using the VNC or SPICE protocol. The viewer can connect to remote hosts to lookup the console information and then also connect to the remote console using the same network transport.


Functions of Virt Viewer: 

  • Connect to KVM virtual machines remotely via the SPICE remote desktop protocol.
  • Automatically adjust display resolution of the KVM virtual machines.
  • Use multiple monitors for the KVM virtual machines.
  • Passthrough USB devices from your computer to the KVM virtual machines.
  • Share folders from your computer to the KVM virtual machines.


To install Virt Viewer on Linux:

1. First, update the APT package repository cache with the following command:

$ sudo apt update

2. To install Virt Viewer on Ubuntu 20.04 LTS, run the following command:

$ sudo apt install virt-viewer --no-install-recommends --no-install-suggests

Then, confirm the installation, press Y and then press <Enter>.

Install PHP 7.3 on Ubuntu 18.04 - Step by Step Process ?

This article covers how to install PHP 7.3 on Ubuntu 18.04 server. Also, you will learn how to configure PHP with Apache and Nginx web servers. 


How to Install PHP 7.4 on Ubuntu ?

Use the following set of commands to enable PPA for PHP 7.4 in your Ubuntu system and install it. You can use this version for production use also.

$ sudo apt-get install software-properties-common
$ sudo add-apt-repository ppa:ondrej/php
$ sudo apt-get update
$ sudo apt-get install -y php7.4

Now use the following command to check installed php version on your system.

$ php -v 


How to Install PHP 7 Modules ?

You can install the required PHP modules on your system as below command:

$ sudo apt-get install php7.2-mysql php7.2-curl php7.2-json php7.2-cgi php7.2-xsl

Install Geary on Linux Mint 20 - Step by Step Process ?

This article covers how easy it is to install Geary on a Linux Mint 20 system. However, if you do not want to use this email client anymore, then you can remove it from your Linux system all the more conveniently.

Geary is a GTK-based mail app that lets you read, find and send email through a modern interface replete with GNOME Shell desktop integrations (notifications, GNOME Online Accounts, etc). 

One major reason for using Geary over, say, Mozilla Thunderbird or Evolution is that it's built around  “conversations” rather than individual mails.


To Install Geary on Ubuntu

Add the Geary Team PPA to your software sources:

$ sudo add-apt-repository ppa:geary-team/releases
$ sudo apt install geary

Force User to Change Password at Next Login on Ubuntu 20.04 - Step by Step Process ?

This article covers how to force a user to change their password in any Linux Distribution.

If we create a user account with the default password, we can use this trick to force the user to change their account's default password when they first login to their account. 

This will hopefully improve the security of their account. 

We can achieve this in two ways.

1. Using passwd command

2. Using chage command

Top 5 Email Clients 2021

This article covers the best and most efficient cross-platform compatible email clients. Some of the listed are open-source and free, while others offer subscriptions. 

The type of email service most compatible for every user depends on their needs and requirements from an email service client. 

For example, people or organizations more inclined towards security assurance from a platform may prefer Inky over Thunderbird, which offers numerous advanced features but may fall behind Inky in terms of meeting user's security needs. Other listed platform also offers various unique and advanced features along with easy and interactive user interface assuring utmost performance and customer satisfaction. 

Despite the ones listed here, there are many other cross-platform compatible email clients offering different features, however, we believe, that the email clients listed in the article outperform many of the existing cross-platform email service providers due to their assured reliability, user experience, and diverse features.

Test your Internet Speed through Command-Line in CentOS 8 - How to do it ?

This article covers the different methods through which you can install the Speedtest utility on your CentOS 8 system. 

Also, we have also shown how to test the internet speed through the Speedtest-cli utility and how to generate URLs to share with others.


To Install Speedtest-cli on CentOS 8:

1. Open the terminal to make sure that Python is installed and working properly. Type the following command to check Python version:

$ python --version

If python is not installed on your system then first you will install python on your system. 

For this purpose, you need to run the below-mentioned command on the terminal to install python on CentOS 8.

$ sudo yum install python2

2. Download the speedtest_cli.py file using 'wget' command:

$ wget -O speedtest-cli https://raw.githubusercontent.com/sivel/speedtest-cli/master/speedtest.py

After successfully saved the downloaded file, you will type the following command on the terminal:

$ chmod +x speedtest-cli

Install Moodle on Red Hat Enterprise Linux 8 - Step by Step Process ?

This article covers how to download, configure, and install Moodle powered by the LAMP stack on RHEL 8.

Moodle is the world’s most popular learning management system for building robust online learning sites.

How to open HTTP and HTTPS for Moodle Learning Platform in CentOS 8 ?
To open HTTP and HTTPS services in the firewall to allow traffic to the NGINX web server, run the commands below:

# firewall-cmd --permanent --zone=public --add-service=http 
# firewall-cmd --permanent --zone=public --add-service=https

# firewall-cmd --reload

Top 5 Open-Source Text Editors

This article covers a list of all the top-performing text editors that are open source and cross-platform compatible.
They are rated best by many of the reviewers and users, therefore, deciding on one text editor that is best to meet all user requirements simply depends on the user demand and need from the text editing tool, which can differ from user to user.
Atom being top of our list of best text editors makes it so due to its modern yet simple user interface and a vast list of features.
However, the rest of the listed text editors, i.e., Vim, Gedit, Bracket, and VS Code too offer significant commendable features and enhanced user experience thereby making it to our list of best performing source code editors.
Hence, we believe, any of the text editors adopted from the list, will certainly result in a better user experience for the developers from across all the different platforms.

Top 5 Media Players 2021

This article covers the best media player such as PotPlayer, KMPlayer, Plex, VLC, etc. with great features.
From the time when only a handful of media players existed to this date, numerous media players with varying and advanced features have overflowed the market.
Deciding among this flood of media player choices, where each delivers best, is a difficult task. Still, in this article, we have managed to sketch out a fair summary of the top-performing cross-platform media players.
VLC being on top of our list is the most compatible and user-friendly media player that supports almost all the audio and video formats.
Other media players listed offer advanced audio and video tools and advanced configuration tools to enhance the overall user experience and ensure a satisfied customer base. VLC, MPV player, SM Player, Audacious, and MPlayer are all the best cross-platform media players to exist which are capable to satisfy any user requirement and also assure the platform's sustainability and reliability.

Top 5 Web Browsers 2021

This article covers the topmost web browsers that are best in terms of privacy, speed, compatibility, updates, and support. The browser that has proved to be the best amongst its competitors is Mozilla Firefox which has answered the utmost concern of many, i.e., privacy.
Mozilla Firefox despite offering efficient mechanisms to ensure user data privacy also provides speed and efficiency making it top our list of best 5 web browsers. Chrome is very popular across the globe still tops the list of many reviewers but its speed and privacy features are no way near to Mozilla Firefox, as per our opinion.
However, it still comes on second of our list of top 5 web browsers and other web browsers giving Mozilla Firefox a tough competition is also discussed.

We believe, the web browsers that are based on or have shifted to the state-of-the-art Chromium-based platform have instantly revitalized their game for which Google Chrome must take the credit as Google was the first one to adopt the paradigm.
Nevertheless, the browser wars are never-ending, and it is still a question if Mozilla can continue to enhance and top our list and other reviewer's list in the future as well.

Install Amazon Web Service CLI on Linux Mint 20 - Step by Step Process ?

This article covers how to install the AWS CLI very conveniently on your Linux Mint 20 system and use it for managing the Amazon Web Services very efficiently.
The AWS or Amazon Web Service command line interface is a command line tool for manage our Amazon web services.
AWS CLI provides direct access to the Amazon Web Services public API.
As it is a command line tool, it can also be used to create scripts to automate your Amazon web services.

To the AWS CLI on Ubuntu With APT:
1. First we update the package listing cache with the following command in the terminal (Ctrl + Alt + T):

# sudo apt-get update

2. Now we are going to install the AWS CLI using the command:

# sudo apt-get install awscli

3. We will can check if AWS CLI is working correctly with the following command:

# aws --version

Install Neofetch on Ubuntu 20.04 - Step by Step Process ?

This article covers the installation method of the Neofetch shell script on a Ubuntu 20.04 system. After installing this script on your system, you can easily execute it to display your system's information on the terminal.
However, you can uninstall this script any time you want if you do not feel like using it anymore on your Ubuntu 20.04 system.
Neofetch is a command line system information tool which supports almost all operating systems.

It displays the system information in the terminal along side the operating system's logo.

To Install Neofetch in Ubuntu / Linux:
Execute the commands:

# sudo apt-get update
# sudo apt-get install neofetch

Install Putty on Ubuntu 20.04 LTS - Step by Step Process ?

This article covers how you can install Putty on your Ubuntu OS. Now you can use your Putty SSH client on Linux to connect to remote systems. For more help regarding Putty, visit its user manual.


PuTTY is a popular terminal emulator for Windows, but it is not only limited to Windows operating system. 

Being free and open source, it is popular among Linux users too. PuTTY supports a wide range of protocols such as serial, SSH, Telnet, rlogin, SCP, SFTP etc. 

Sysadmins generally use PuTTY as an SSH and telnet client whereas the Maker community widely uses PuTTY for interfacing with the serial ports on their hardware. 

PuTTY ships with a command line tool named "psftp", the PuTTY SFTP client, which is used to securely transfer files between computers over an SSH connection. 


To install PuTTY on Ubuntu:

1. In order to install Putty, you will need to ensure that the Universe repository is enabled on your Ubuntu system. If it is not already enabled, you can enable it by using the following command in Terminal:

$ sudo add-apt-repository universe

When prompted for the password, enter the sudo password.

2. After enabling the Universe repository, now you can install Putty on your system. Issue the following command in Terminal in order to do so:

$ sudo apt install putty

When prompted for the password, enter the sudo password.

Install Ansible on Ubuntu 20.04 LTS - Step by Step Process ?

This article covers how to install and configure Ansible on Ubuntu 20.04. Ansible is a widely used automation tool in DevOps and used by thousands of developers and sysadmins to configure and deploy applications on servers.

It saves time and minimizes the effort required to handle a multitude of servers in a complex IT infrastructure. 


To install Ansible on Ubuntu:

1. First, refresh your system’s package index with:

# sudo apt update

2. Following this update, you can install the Ansible software with:

$ sudo apt install ansible

Press Y when prompted to confirm installation.


To check if Ansible is able to connect to these servers and run commands via SSH:

From your local machine or Ansible control node, run:

$ ansible all -m ping -u root

This command will use Ansible's built-in ping module to run a connectivity test on all nodes from your default inventory, connecting as root.

The ping module will test:

i. if hosts are accessible;

ii. if you have valid SSH credentials;

iii. if hosts are able to run Ansible modules using Python.

Compress PDF File in Ubuntu - Step by Step Process ?

This article covers how you can compress the PDF file size in Linux and its distributions like Ubuntu. 

Although applications like LibreOffice Writer allow you to convert your business documents into portable and secure PDFs, sometimes the files they produce are too large and unwieldy. These huge files may hog network bandwidth, waste space on company storage devices or be too big to share as email attachments. 

Fortunately, Ubuntu provides a complicated, but efficient method to reduce the size of your PDFs using the standard Ghostscript library of command line utilities.


How to use Ghostscript command to compress PDF file in Linux Systems ?

You can use Ghostscript command line tool for compressing a PDF file. 

Most Linux distributions include the open source version of Ghostscript already. 

However, you can still try to install it just to make sure.

On Debian/Ubuntu based distributions, use the following command to install Ghostscript:

$ sudo apt install ghostscript

1. Start a Ubuntu terminal session and navigate to the folder containing the PDF file you want to shrink.

2. PDF is in the Documents folder, type "cd Documents" (without the quotation marks) at the terminal prompt and press "Enter."

3. Type the Ghostscript command to reduce the size of your PDF file. For example, if your file is named "mydoc.pdf" and you want the reduced version to be called "mydocsmaller.pdf," type the following command at the terminal prompt as a single line:

gs -sDEVICE=pdfwrite -dCompatibilityLevel=1.4 -dPDFSETTINGS=/screen -dNOPAUSE -dQUIET -dBATCH -sOutputFile=mydocsmaller.pdf mydoc.pdf

This command instructs the Ghostscript GS utility to take the file "mydoc.pdf" and create a version 1.4-compatible, low-resolution PDF file called "mydoc_smaller.pdf" that is optimized to be displayed on your PC screen rather than printed on paper.

Turn-on Dark Mode in Mozilla Firefox - Step by Step Process ?

This article covers how you can enable dark mode in Mozilla Firefox web browsers. 

Mozilla recently added support for dark mode. You can activate it in four easy steps.

Let me show you how.

But you can enable dark mode in Firefox today, on any operating system, and without installing any third-party themes. This works on Windows 7, Windows 10, macOS, and Linux.


To Enable dark mode in Mozilla Firefox web browser:

1. In Firefox, go to the the top right corner and open the menu by clicking the hamburger menu.

2. Click on the “Addons” menu entry. You could also use the Ctrl+Shift+A keyboard shortcut. On the “Addons” page you will see a list of the extensions that you have installed or disabled.

3. Now we need to switch to the themes page. You can do that by clicking “Themes” on the left hand of the screen.

4. You will see the “Dark” theme. Click on the “enable” button to immediately activate the dark mode.

Install Ruby on Ubuntu 20.04 - Step by Step Process ?

This article covers the method of installing Ruby on a Ubuntu 20.04 system.

Also, if you want to remove this programming language from your Ubuntu 20.04 system, then you can also do this by the method that we mentioned in this guide.


To Update RubyGem Package Manager:

RubyGems is a Ruby Package Manager, coming with the gem command-line tool. It's automatically installed when we install Ruby on the system.

To update the RubyGem to the latest version, run the following command.

$ gem update --system


How To Install Ruby on Rails on Ubuntu ?

Here, we will install the latest version of Ruby on Rails through the RubyGem package manager.

Install Ruby on Rails using the gem command below:

$ gem install rails

Once all installation is completed, check the Ruby on Rails version:

$ rails --version


To Install and Configure PostgreSQL on Ubuntu System:

1. Install the PostgreSQL database server to the Ubuntu 20.04 using the apt command below:

$ sudo apt install postgresql postgresql-contrib libpq-dev -y

2. Once all installation is completed, start the PostgreSQL service and add it to the system boot:

$ systemctl start postgresql
$ systemctl enable postgresql

Install Gitlab on CentOS 8 - Step by Step Process ?

This article covers how  to setup Gitlab on CentOS Linux.

Gitlab is an application tool that is used for source code management. It allows you to plan your development process; code, and verify; package software, and release it with an in-built continuous delivery feature; automate configurations management, and monitor software performance.


To be able to access the GitLab interface you'll need to open ports 80 and 443. 

To do so run the following commands:

$ sudo firewall-cmd --permanent --zone=public --add-service=http
$ sudo firewall-cmd --permanent --zone=public --add-service=https
$ sudo firewall-cmd --reload



To install Postfix service to send notification emails, and enable it to start at system boot, then check if it is up and running using following commands:

# yum install postfix
# systemctl start postfix
# systemctl enable postfix
# systemctl status postfix

Install Nmap on Ubuntu 20.04 - Step by Step Process ?

This article covers different methods to install Nmap on Ubuntu. If you want to learn how to use nmap, visit our guide on 15 Mostly Used Nmap Commands for Scanning Remote Hosts .

Nmap works by sending data packets on a specific target (by IP) and by interpreting the incoming packets to determine what posts are open/closed, what services are running on the scanned system, whether firewalls or filters are set up and enabled, and finally what operating system is running.


To install Nmap on Ubuntu:

1. Make sure the software packages on your Ubuntu system are up-to-date with the command:

$ sudo apt-get update

2. To install NMAP on Ubuntu, run the command:

$ sudo apt-get install nmap

The system prompts you to confirm and continue by typing y and pressing Enter.

3. To verify the installation was successful and to determine the current version of Nmap:

$ nmap --version

Reset MySQL Root Password on Red Hat Enterprise Linux 8 - Step by Step Process ?

This article covers how to reset or change your MySQL root password on Red Hat Enterprise Linux 8.

MySQL is an open source relational database management system (RDBMS) with a client-server model for creating and managing databases based on a relational model.


To Reset the MySQL root password:

You must run the commands in the following steps as the root user. 

Therefore, you can either log in directly as the root user (which is not recommended for security reasons), or use the su or sudo commands to run the commands as the root user.

To reset the root password for MySQL, follow these steps:

1. Log in to your account using SSH.

2. Stop the MySQL server using the appropriate command for your Linux distribution:

For CentOS and Fedora, type:

$ service mysqld stop

For Debian and Ubuntu, type:

$ service mysql stop

3. Restart the MySQL server with the —skip-grant-tables option. To do this, type the following command:

$ mysqld_safe --skip-grant-tables &

4. Log into MySQL using the following command:

$ mysql

5. At the mysql> prompt, reset the password. To do this, type the following command, replacing new-password with the new root password:

UPDATE mysql.user SET Password=PASSWORD('new-password') WHERE User='root';

6. At the mysql> prompt, type the following commands:

FLUSH PRIVILEGES;
exit;

7. Stop the MySQL server using the following command.

You will be prompted to enter the new MySQL root password before the MySQL server shuts down:

$ mysqladmin -u root -p shutdown

8. Start the MySQL server normally. To do this, type the appropriate command for your Linux distribution:

For CentOS and Fedora, type:

$ service mysqld start

For Debian and Ubuntu, type:

$ service mysql start

Install Netdata Monitoring Tool on Ubuntu 20.04 - Step by Step Process ?

This article covers how to install and configure Netdata on Ubuntu 20.04 LTS and different metrics visualized in it. Netdata provides an excellent solution for monitoring your single node in real-time. You can configure alarms and notifications which can be triggered when a certain event or threshold is exceeded.


To install Netdata on Ubuntu:

1. You can install netdata on Ubuntu by running the following commands.

$ sudo apt update 
$ sudo apt install netdata 

Press 'y' if confirmation prompted by the installer.

2. Edit netdata configuration file in your favorite text editor.

$ sudo vim /etc/netdata/netdata.conf 

3. After modifying its configuration file, you can Save your file and restart netdata service:

$ sudo systemctl restart netdata 

15 Key Nmap Commands for Scanning Remote Hosts - Check them out now ?

This article covers Nmap commands that you can use to get started with scanning your remote hosts. There are hundreds upon hundreds of Nmap commands and Nmap scripts  that are used for scanning hosts and probing for any vulnerabilities.

Nmap, or Network Mapper, is an open source Linux command line tool for network exploration and security auditing. With Nmap, server administrators can quickly reveal hosts and services, search for security issues, and scan for open ports.

The Nmap tool can audit and discover local and remote open ports, as well as network information and hosts.

With the right Nmap commands, you can quickly find out information about ports, routes, and firewalls.

Install Atom Text Editor on Debian 10 - Step by Step Process ?

This article covers how to install Atom text editor on the Debian system. Atom is a very powerful text editor.

The Atom user interface is very clean and it has support for many important features such as split view, Git integration and so on. Atom is cross platform. It runs on Linux, Windows and macOS.


To Enable snaps on Debian and install Atom:

Snaps are applications packaged with all their dependencies to run on all popular Linux distributions from a single build. They update automatically and roll back gracefully. 

1. Enable snapd

$ sudo apt update
$ sudo apt install snapd
$ sudo snap install core

2. To install Atom, simply use the following command:

$ sudo snap install atom --classic


To Update Atom Text Editor on Debian:

You can update the Atom when a new version is available. You can update it through your desktop standard Software Update tool. 

Alternatively, you can update by running the following commands in your terminal:

$ sudo apt update
$ sudo apt upgrade

Install VirtualBox on CentOS 8 - Step by Step Process ?

This article covers the complete installation guide of VirtualBox on the CentOS 8 system.

Oracle VirtualBox is a virtualization software solution that allows you to create and run virtual machines on a single hardware machine.

With VirtualBox, your existing operating system stays unaffected by the virtual environment.


To Start VirtualBox on Linux:

Use the command:

$ VirtualBox

The VirtualBox manager interface will prompt you.

Alternatively, you can use the graphical interface and access the application:

Application >> System Tools >> Oracle VM VirtualBox

Install Atom Editor on Ubuntu 20.04 - Step by step process ?

This article covers the different methods to install Atom editor on Ubuntu 20.04 system. Atom is an open-source text and source code editor for Windows, Linux, and macOS, developed by GitHub. 

It is called "A hackable text editor for the 21st century" due to being a highly customizable text editor.


To Install Atom Editor using Snap:

1. First, install the Snap package manager on your system if it is not already installed.

$ sudo apt update && sudo apt install -y snapd

2. Then, install Atom editor with the snap command.

$ sudo snap install atom --classic

Install and Use Curl Command on Ubuntu 20.04 - Step by step process to implement it ?

This article covers how to set up curl command on your Ubuntu 20.04 LTS machine. curl command is a tool to download or transfer files/data from or to a server using FTP, HTTP, HTTPS, SCP, SFTP, SMB and other supported protocols on Linux or Unix-like system.


To Install cURL for Ubuntu Linux:

1. Update your Ubuntu box, run: 

$ sudo apt update && sudo apt upgrade

2. Next, install cURL, execute: 

$ sudo apt install curl

3. Verify install of curl on Ubuntu by running: 

$ curl --version

Setup Git Server on Ubuntu 20.04 - Step by Step process ?

This article covers how to install and configure a Git server on Ubuntu. Git is basically a Version control system which allows you to keep track of your software at the source level. With Git, You can easily track changes, revert to previous stages, and branch to create alternate versions of files and directories.


To install Git on Ubuntu Server:

1. Run the following commands as sudo user:

$ sudo apt update && sudo apt install git

2. To install the git package on CentOS servers type:

$ sudo yum install git

3. Next, create a new user that will manage the Git repositories:

$ sudo useradd -r -m -U -d /home/git -s /bin/bash git

The user home directory is set to /home/git

All the repositories will be stored under this directory.

Install Memcached on Ubuntu 20.04 - Step by step process ?

This article covers how you can install Memcached on Ubuntu 20.04. Memcached has proved to be a very reliable caching system since its inception in 2003 and continues to be a favorite among developers in speeding up web applications. 

Memcached is a high-performance, distributed memory object caching server. It is free and open source software intended for use in speeding up dynamic web applications by mitigating database load.


To install and configure memcached on Ubuntu:

1. Update your Ubuntu server:

$ sudo apt update
$ sudo apt upgrade

2. Install memcached server on Ubuntu:

Run apt command as follows:

$ sudo apt install memcached

3. Configure memcached server:

Edit config file named /etc/memcached.conf using a text editor such as nano command or vim command:

$ sudo nano /etc/memcached.conf

OR

$ sudo vi /etc/memcached.conf


How to restart, stop, reload memcached server on Ubuntu:

To Stop service - $ sudo systemctl stop memcached

To start Service - $ sudo systemctl start memcached

To restart Service - $ sudo systemctl restart memcached

To check the status - $ sudo systemctl status memcached

Install Microsoft PowerShell in Ubuntu 20.04 - How to perform this task ?

This article covers the different methods for installing Microsoft PowerShell on Ubuntu which includes installation via package repository, via .deb package, and via snap. 

PowerShell for Linux is published to package repositories for easy installation and updates. 

As superuser, register the Microsoft repository once. 

After registration, you can update PowerShell with sudo apt-get install powershell.


To install PowerShell on Ubuntu 20.04:

PowerShell for Linux is published to package repositories for easy installation and updates.

So do the following;

1. # Update the list of packages.

$ sudo apt-get update

2. # Install pre-requisite packages.

$ sudo apt-get install -y wget apt-transport-https software-properties-common

3. # Download the Microsoft repository GPG keys.

$ wget -q https://packages.microsoft.com/config/ubuntu/20.04/packages-microsoft-prod.deb

4. # Register the Microsoft repository GPG keys.

$ sudo dpkg -i packages-microsoft-prod.deb

5. # Update the list of products.

$ sudo apt-get update

6. # Enable the "universe" repositories.

$ sudo add-apt-repository universe

7. # Install PowerShell.

$ sudo apt-get install -y powershell

8. # Start PowerShell.

$ pwsh

As superuser, register the Microsoft repository once.

After registration, you can update PowerShell with sudo apt-get install powershell.


To remove PowerShell from Ubuntu:

Run the command,

$ sudo apt-get remove powershell


How to Launch PowerShell on Linux or Mac?

1. Open a terminal and run the "powershell" command to access a PowerShell shell environment. 

2. This works on both Linux and Mac–whichever you're using. 

3. You'll see a PowerShell prompt beginning with "PS", and you can run PowerShell cmdlets just as you would on Windows.

Install Flask on Ubuntu 20.04 - Step by Step process to implement it ?

This article covers how to install Flask on Ubuntu 20.04. Flask is a powerful web framework for any developer. Unlike Django , by default Flask doesn’t include ORM, form validation, or any other functionalities provided by third-party libraries. Flask is built with extensions in mind, which are Python packages that add functionality to a Flask application.

Flask packages are included in the official Ubuntu repositories and can be installed using the apt package manager. 

This is the simplest way to install Flask on Ubuntu 20.04, but not as flexible as installing in a virtual environment. 

Also, the version included in the repositories may lag behind the latest version of Flask.


To install Flask on Ubuntu 20.04:

1. Ubuntu 20.04 ships with Python 3.8. You can verify that Python is installed on your system by typing:

$ python3 -V

2. The recommended way to create a virtual environment is by using the venv module, which is provided by the python3-venv package. Run the following command to install the package:

$ sudo apt install python3-venv

3. Create a new directory for the Flask application and switch into it:

$ mkdir flask_app && cd flask_app

4. Run the following command inside the directory to create the virtual environment:

$ python3 -m venv venv

The command will create a directory called venv, which contains a copy of the Python binary, the Pip package manager , the standard Python library, and other supporting files. You can use any name you want for the virtual environment.

5. To start using the virtual environment, you need to activate it with the activate script:

source venv/bin/activate

6. Now that the virtual environment is activated, use the Python package manager pip to install Flask:

$ pip install Flask

7. To verify the installation, run the following command, which prints the Flask version:

$ python -m flask --version

Install Pepper Flash on Ubuntu 20.04 - How to do it ?

This article covers how to install the Pepper Flash plugin for the Mozilla Firefox browser on Ubuntu 20.04. After the successful installation of this plugin, we can easily use it for enjoying feature-rich content while browsing. 

We have also shared with you the method of removing this plugin from your system whenever you feel like it at the end of this guide.


How can I install Pepper Flash Player on Ubuntu? 

How can I setup Flash Player for Chromium web browser on Ubuntu?  

Pepper Flash Player is maintained by Google and is newer than Adobe Flash Player. 

Pepper Flash Player can be used with Chromium web browser.

The Pepper Flash Player is available on the Canonical Partners Repository. 

This repository is disabled by default on Ubuntu . 

1. Enable it by running the command:

$ sudo add-apt-repository "deb http://archive.canonical.com/ $(lsb_release -sc) partner"

2. Then, Update your package list after enabling the repository

$ sudo apt update

3. You can then install Pepper Flash Player in your Ubuntu 18.04 Desktop.

$ sudo apt -y install pepperflashplugin-nonfree

4. To update Pepperflash, use:

$ sudo update-pepperflashplugin-nonfree --install

5. After the installation of Pepper Flash Player on Ubuntu, make sure Flash is allowed to run in:

chrome://settings/content/flash

Use Picture-in-Picture Mode in Google Chrome - How to do it ?

This article covers how to enable Picture-in-Picture mode (PiP) in the Google Chrome browser on Ubuntu 20.04. Users need to know notice that in case if they close their browser window, it will also close the smaller window. 

Also, you will learn how to disable the PiP mode in the Google Chrome browser.


How do I enable picture in picture on Chrome?

Here's how it works: open Chrome, go to a website that contains a video and play it fullscreen. 

From there, press the Home button to go to your Android Home Screen and the playing video will automatically transition to Picture-in-Picture. 

That's all!


What is picture in picture mode?

PIP is a special type of multi-window mode mostly used for video playback. 

It lets the user watch a video in a small window pinned to a corner of the screen while navigating between apps or browsing content on the main screen. 

Your app controls when the current activity enters PIP mode.

Assign Multiple IP Addresses to Single NIC in Linux Mint 20 - How to Do it ?

This article covers how to assign multiple IP addresses to a single interface in Mint OS. By following our guide carefully, you can either assign the IP address temporarily or permanently to your network interface.

NIC stands for network interface controller or network interface (controller) card. WNIC is wireless network interface controller or wireless network interface (controller) card. IP Addresses belong to network interfaces, not to the computer itself.


To Restart network service using command:

# systemctl restart network

To Verify the new IP address using command:

# ip addr


How configure multiple IP address in CentOS ?

Now, in order to add additional IP addresses you'll need to edit the configuration file (from hereon called “config file”) for this specific interface. On CentOS 7, the interface config files are located in /etc/sysconfig/network-scripts/ and they are all prefixed with ifcfg-.


How remove secondary IP address Linux?

To add or remove additional IP adresses and keep the configuration persistent, we need to Edit the corresponding /etc/sysconfig/network-scripts/ifcfg-eth[x] configuration file and add/remove as many additional IPADDR[n] and PREFIX[n] entries as additional IP addresses are required.


To configure a static IP address on CentOS  / RHEL :

1. Create a file named /etc/sysconfig/network-scripts/ifcfg-eth0 as follows:

DEVICE=eth0.

BOOTPROTO=none.

ONBOOT=yes.

PREFIX=24.

IPADDR=your_ip_address

2. Restart network service: systemctl restart network.


How do I login as a different user in Linux?

To change to a different user and create a session as if the other user had logged in from a command prompt, type "su -" followed by a space and the target user's username. Type the target user's password when prompted.


What is Nmcli in Linux?

nmcli is a command-line tool which is used for controlling NetworkManager. nmcli commnad can also be used to display network device status, create, edit, activate/deactivate, and delete network connections. Typical Uses: Scripts: Instead of manually managing the network connections it utilize NetworkMaager via nmcli.


Difference between the output of ifconfig and ipconfig:

Functionality: The ipconfig command displays all the currently connected network interfaces whether they are active or not. 

On the other hand, the ifconfig command displays only the enabled network interfaces that are connected to the system.

Create and Run a Shell Script in CentOS 8 - Step by step process to do it ?

This article covers how to create and run a simple shell script in CentOS 8 system. With this, you can easily create and run even complex scripts and automate repetitive tasks. 

If you are using other Linux distributions, you can visit our posts on how to create and run a shell script in Ubuntu , Debian , and Linux Mint .


An SH file is a script programmed for bash, a type of Unix shell (Bourne-Again SHell). It contains instructions written in the Bash language and can be executed by typing text commands within the shell's command-line interface.


To write and execute a script:

1. Open the terminal. Go to the directory where you want to create your script.

2. Create a file with . sh extension.

3. Write the script in the file using an editor.

4. Make the script executable with command chmod +x <fileName>.

5. Run the script using ./<fileName>.

Create and Run a Shell Script in Debian 10 -Step by step process to do it ?

This article covers how to easily create a shell script and automate repetitive jobs in #Linux. Shell scripts are just a series of commands that you add in a file and run them together.  


To write and execute a #script:

1. Open the #terminal. Go to the directory where you want to create your script.

2. Create a file with . sh extension.

3. Write the script in the file using an editor.

4. Make the script executable with command chmod +x <fileName>.

5. Run the script using ./<fileName>.


#Shell is a #UNIX term for an interface between a user and an operating system service. 

Shell provides users with an interface and accepts human-readable commands into the system and executes those commands which can run automatically and give the program's output in a shell script.

Assign Multiple IP Addresses to Single NIC in Ubuntu 20.04 LTS - How to do it ?

This article will guide you on how to assign multiple IP addresses to a single NIC in Ubuntu OS. Now you can allocate multiple IP addresses to a single NIC.

To change your IP address on #Linux, use the "ifconfig" command followed by the name of your network interface and the new IP #address to be changed on your computer. 

To assign the subnet mask, you can either add a "netmask" clause followed by the subnet mask or use the CIDR notation directly.

The ifconfig command can be used from the #command line either to assign an address to a #network interface or to configure or display the current network interface configuration information. 

The ifconfig command must be used at system startup to define the network address of each interface present on a machine.


To determine my IP address in Linux :

1. ifconfig -a.

2. ip addr (ip a).

3. hostname -I | awk '{print $1}'.

4. ip route get 1.2.

5. nmcli -p device show.


To add secondary IP address permanently on Ubuntu system, just edit /etc/network/interfaces file and add the requires IP details. 

Verify the newly added IP address. # ifconfig eth0

Install VirtualBox on Ubuntu 20.04 LTS - Step by step process ?

This article will guide you on the different methods to #install #VirtualBox on Ubuntu 20.04 system. Now, you can create your first guest Linux machine or Windows environment on your Ubuntu system. 

#Xen is a popular, open-source virtual machine application that is officially supported by #Ubuntu. 

It provides high performance, but only supports a small number of host and guest operating systems. 

Ubuntu is supported as both a host and guest operating system, and Xen is available in the universe software channel.

If you want to explore more about the working of the Virtualbox then, you can visit the Official documentation of Virtualbox use from this page .

VirtualBox can be installed on #Windows, Linux, macOS, Solaris, and FreeBSD.


To find the #Linux version:

1. Open the terminal application (#bash shell).

2. For remote server login using the ssh: ssh user@server-name.

3. Type any one of the following command to find os name and version in Linux: cat /etc/os-release. lsb_release -a. hostnamectl.

4. Type the following command to find Linux kernel version: uname -r.

Methods to Find Your Public IP address in Ubuntu 20.04 LTS ?

This guide will help you to Find Your Public IP address in #Ubuntu 20.04 LTS. 

ipconfig stands for Internet Protocol Configuration, while ifconfig stands for Interface Configuration.

The #ifconfig command is supported by Unix-based operating systems.

The ipconfig command displays all the currently connected network interfaces whether they are active or not.

The presence of a #public IP #address on your router or computer will allow you to organize your own server (VPN, FTP, WEB, etc.), remote access to your computer, video surveillance cameras, and access them from anywhere in the global network.


To Find Local / Public IP Address in #Ubuntu 20.04:

1. Open Settings and navigate to Network in left pane.

2. Click on the gear icon under connected wired network.

3. In the pop-up it shows the detailed information including your IP address.


To find my IP address and port number in Linux:

i. All you have to do is type “netstat -a” on Command Prompt and hit the Enter button. 

ii. This will populate a list of your active TCP connections. 

iii. The port numbers will be shown after the IP address and the two are separated by a colon.

How to uninstall programs from Linux Mint ?

This article will guide you on methods to remove or #uninstall a program in #Linux #Mint 20. 

To uninstall a program, use the "apt-get" command, which is the general command for installing programs and manipulating installed programs.

If you want to remove a package, use the apt in the format; sudo apt remove [package name]. If you want to remove a package without confirming add –y between apt and remove words.

To uninstall an RPM package:

1. Execute the following command to discover the name of the installed package: rpm -qa | grep Micro_Focus. This returns PackageName , the #RPM name of your Micro Focus product which is used to identify the install package.

2. Execute the following command to uninstall the product: rpm -e [ PackageName ]


To clean up broken #packages in #Ubuntu:

i. Find your package in /var/lib/dpkg/info , for example using: ls -l /var/lib/dpkg/info | grep <package>

ii. Move the package folder to another location.

iii. Run the following command: sudo dpkg --remove --force-remove-reinstreq <package>

Step by Step process to install and configure Zabbix monitoring server on Ubuntu ?

This article will guide you on how to install and configure the Zabbix server on #Linux. You have also learned how to install and configure the Zabbix agent on the Zabbix server and the client #machines. Now you can easily keep track of the servers and monitor their health.

Zabbix server is the central process of #Zabbix software. The server performs the polling and trapping of data, it calculates triggers, sends notifications to users.

The server can itself remotely check networked services (such as web servers and mail servers) using simple service checks.

You can now start the Zabbix server and agent by running the commands:

sudo systemctl start zabbix-server.

sudo systemctl start zabbix-agent.

Step by step process to install and configure Odoo ERP on Ubuntu 20.04 LTS ?

This article will guide you on how to install and configure the Odoo14 on #Ubuntu 20.04 system. Also you will learn how to install required #PostgreSQL and wkhtmltopdf packages on your system. 

1. Odoo Community Edition is the free basic version of Odoo supported by open source software. 

2. #Odoo #CRM (Customer Relationship Management) system is a powerful browser-based sales software designed to increase organisational efficiency. Odoo, contains all of the applications that your sales, marketing, accounts department and management teams need in the one place.

3. Once all dependencies are set up, Odoo can be launched by running odoo-bin , the command-line interface of the server. It is located at the root of the Odoo Community directory.

4. Once Odoo installed, you can verify the service is up and running and is enabled to automatically start at system #boot. 

5. By default, Odoo listens on port 8069 and you can verify it using the netstat or ss tools. 

This is another way to confirm that Odoo is up and running.

Steps by step process to install VLC media player on Ubuntu 20.04 LTS ?

This article will guide you on different installation methods for the VLC. We have also seen how we can uninstall this streaming #software from the system when it is not needed.

VLC Media Player is one of the most well known and arguably best media players available for any platform, including Windows. #VLC can also help you convert video files from one format to another, save YouTube videos for offline playback, and record your own videos using your webcam.

Using #Linux #Terminal to Install VLC in #Ubuntu:

1. Click on Show Applications.

2. Search for and launch Terminal.

3. Type the command: sudo snap install VLC .

4. Provide the sudo password for authentication.

VLC will be downloaded and installed automatically.

Step by step process to install Zimbra on Ubuntu 18.04 LTS ?

This article will guide you on how to #install Zimbra on Ubuntu. Zimbra is an open-source #mail server that offers several features. It is recommended to install it in a #machine that has enough memory, processor, and disk space available. 

To install and configure #Zimbra mail server:

1. Install System Packages.

2. Configure System #Hostname.

3. Add a Static IP Address.

4. Disable Unwanted Services.

5. Install Zimbra Collaboration Suite Open Source Edition.

6. Zimba Initial Configuration.

Step by step process to configure Squid Proxy Server on Ubuntu 20.04 LTS ?

This article will guide you on how to configure Squid #proxy server on a Linux system. There is a lot more you can do with Squid proxy server. 

Although primarily used for HTTP and FTP, #Squid includes limited support for several other protocols including Internet Gopher, SSL, TLS and HTTPS. Squid does not support the #SOCKS protocol, unlike Privoxy, with which Squid can be used in order to provide SOCKS support.

The squid. conf file defines the configuration for squid. The configuration includes (but not limited to) HTTP port number, the ICP request port number, incoming and outgoing requests, information about #firewall access, and various timeout information.

To connect Squid proxy:

i. Tools>Options>Advanced>Network>Settings.

ii. Select Manual proxy configuration and tick the 'use this proxy server for all protocols' box.

iii. Under HTTP Proxy: add the squid listening IP address, 10.0. 0.1. In the Port: section add the squid listening port 3128.

iv. Click OK to save the changes.

Steps to install XAMPP Server on Linux Mint 20 ?

This article will guide you on steps to install #XAMPP on Linux Mint 20. You will also learn the method of uninstalling XAMPP web server whenever you feel like it.

The #htdocs folder can be found in /opt/lampp/ . You can navigate to your root folder from the file manager (nautilus by default), by clicking on Other locations from the sidebar, then #Computer . From there you can find the opt folder that contains the lampp folder.

To install xampp in MX #Linux:

1. Click XAMPP for Linux. It's in the middle of the page.

2. Allow the download to complete.

3. Open #Terminal.

4. Change over to the "Downloads" directory.

5. Make the downloaded file executable.

6. Enter the installation #command.

7. Enter your password when prompted.

8. Follow the installation prompts.

Step by step process to install MariaDB on Linux Mint 20 ?

This article will guide you on steps to install #MariaDB on the #Linux operating system. 

MariaDB offers more and better storage engines. NoSQL support, provided by Cassandra, allows you to run SQL and NoSQL in a single database system. MariaDB also supports TokuDB, which can handle big data for large organizations and corporate users.

As a columnar database, MariaDB ColumnStore stores table data in columns rather than rows. Data partitioning by columns is also called Vertical Partitioning.

MariaDB is a drop in place replacement for #MySQL, but you can also install it alongside MySQL. 

To install MariaDB on #Ubuntu 18.04, follow these steps:

1. Update packages index. sudo apt update.

2. Once the packages list is updated, install MariaDB by issuing the following command: sudo apt install mariadb-server.

3. The MariaDB service will start automatically.

Enable dark mode in latest LibreOffice under Ubuntu 20.04 LTS

This article will guide you on how you can enable the dark mode across all the applications of #LibreOffice in #Ubuntu 20.04. Also, it also gives you the direction of reverting back to its regular mode whenever you want. To Enable #Dark #Mode in LibreOffice on Ubuntu, Linux : 1. Open LibreOffice. 2. From menu, click Tools -> Options. 3. Go to Application Colors, select document background as Black. 4. If you would like to change to a dark icon #theme, change it from View options on the left side for better visibility of the #toolbar icons.