CATEGORY

Featured

Setup Lamp in Slackware 15.0

So Slackware is already in release candidate available, this release is coming with many changes on the core and on the packages, ...

Install Prometheus and Node Exporter on CentOS / RHEL 8

Prometheus is a free software application used for event monitoring and alerting. It records real-time metrics in a time series database built using a...

Microservices with Python3

Introduction They were interested in microservices. How can microservices use them for increased agility and scalability? Microservices are architectural style and pattern structures which application as...

Understand Cyber Security and Cryptography

Understanding Symmetric cryptography To understand cyber security and cryptography we will continue further today. In the previous chapter, we discussed the basics elements. Also In...

How to Installing, updating, and uninstalling the AWS CLI version 2 on Windows

In this tutorial, we are going to cover the following three points Installing aws cli on windows Installing the existing aws cli on...

How to Install Odoo 14 on Ubuntu

Introduction Odoo is a suite of business management software tools including, for example, CRM, e-commerce, billing, accounting, manufacturing, warehouse, project management, and inventory management. The...

Mining Bitcoin with Centos 8

Introduction Bitcoin is peer-to-peer technology to operate with no central authority or banks; the network collectively connects managing transactions and issuing bitcoins. BTC is open-source publicly,...

Understand Cyber Security and Cryptography

What is Cryptography? So Cyber Security and Cryptography both are key elements to protect communication over the internet. We are in an era of undercommented...

How to Upgrade CentOS 7 to CentOS 8

Introduction In this tutorial guide You will learn how to upgrade your Linux server from CentOS 7 to CentOS 8. Just follow these steps: Install the...

Network Security Rocky Linux/Centos/RHEL 8

Introduction Hardening network security devices minimize the risk of unauthorized access into a network’s infrastructure. Vulnerabilities in device management and configurations exploit weaknesses for a...

Latest news