Try using your trusty computer without a mouse; when you’re ready, move to CLI-only.
You can do it.
linux@payload:>
8 steps to refurbish an old computer with Linux
We live in a remarkable era. It wasn't so long ago we were all chained to the "upgrade treadmill," forced to buy expensive new personal computers every few years.Today, with the benefit of open source software, you can break out of that cycle. One way is to refurbish old computers and keep them in service. This article tells you how.
How to Install Jetty on Ubuntu 22.04
In this tutorial, we are going to explain to you in step-by-step detail how to install Jetty on Ubuntu 22.04Mastering loops with Jinja templates in Ansible
A significant part of this initiative was to dynamically create configuration templates for routers, based on variable input.Create an Apache-based YUM/DNF repository on Red Hat Enterprise Linux 8
You can create your own local repository on your local server and use it as a single user, or allow access to other machines on your LAN using a web server or FTP.Basic troubleshooting with telnet and netcat
SSH has replaced telnet for remote access needs, and these days when you hear about telnet, it is usually when somebody is using the client as a generic network troubleshooting tool. That's because, in troubleshooting sessions, sysadmins turn to telnet and netcat to test connectivity to service offerings.A sysadmin's guide to configuring an email server
Statistics show that nearly 2,840,000 emails are sent every single second. One thing most people don't understand is how email works, or more importantly, where it actually resides. This is knowledge that you will need in the future, so best to learn it now.Linux sysadmin basics: Troubleshooting known_hosts failures
SSH is easy to use, but when something causes your known_hosts to backfire on you, it can be frustrating.Configuring Ansible
Now, for Ansible to communicate with a managed node, you need to configure the control node and the managed nodes with a user account, and give that user account privilege escalation to run commands without having to enter a password.How to Update Firmware in Your Linux Machine
Firmware is stored on the read-only memory of a device and gives instructions to the hardware about how it should be operated. Firmware can't be modified or deleted by the end-user just like other softwareHow to Install phpPgAdmin on Ubuntu 22.04
In this tutorial, we are going to show you how to install phpPgAdmin on Ubuntu 22.04 OS. ~ PostgreSQL can be managed through the command line, but for novice users, the better option is phpPgAdmin web-based GUI.
security@payload:>
Basic security principles for containers and container runtimes
None of the discussions resulted in the identification of a vulnerability or exploit by their definitions, but the talks did elevate the importance of basic security principles that apply to containers, and just about everything else we do with technology.How SSH establishes secure communication
Anyone who wanted to read the info could sniff the network and the info was compromised ~ Absolutely, and the solution is to send it via the Secure Shell. So, I want to communicate securely using encrypted messages.How To Protect SSH with Fail2Ban on Ubuntu 22.04
In this tutorial, we are going to show you how to protect SSH with Fail2ban on Ubuntu 22.04. Step 1. ~ We need to update the system packages to the latest versions available and will proceed with installing fail2ban.Hack and enter! The “secure” garage doors that anyone can open from anywhere
Cybersecurity researcher Sam Sabetan yesterday went public with insecurity revelations against IoT vendor Nexx home alarms and remotely switchable power plugs.Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation's Crown Jewels
Critical infrastructure attacks are a preferred target for cyber criminals. ~ Critical infrastructure is the physical and digital assets, systems and networks that are vital to national security, the economy, public health, or safety.
cryptocurrency@payload:>
Twitter seems to have blocked all interaction with tweets containing Substack links
Elon Musk's free speech movement hits a speed bump as Twitter blocks interaction with countless crytpo, blockchain and Web3 blogs.Historical Bitcoin price fractal hints at rally toward $50K
Bitcoin's price in 2023 is mirroring a 2015 fractal that saw BTC price doubling from $350 to $700 in seven months. Could rally toward $50,000 in 2023, according to a historical price fractal highlighted by popular market analyst Mags.Germany plans to issue electronic shares on blockchain, boost startups
Under the the German government is pushing for more welcoming regulations for startups working with financial innovation. Key goals of the legislation include capital markets digitalization through the issuance of electronic securities on a blockchain and improved portability of crypto assets.Texas lawmaker introduces resolution to protect Bitcoin miners and HODLers
The Lone Star State is already home to many crypto and blockchain firms as well as miners taking advantage of the regulatory-friendly environment. A member of the Texas House of Representatives, has introduced a resolution aiming to have the legislature say the "Bitcoin economy is welcome" in the state.Ethereum projects unite to protect users from MEV-induced high prices
Over 27 prominent Ethereum projects joined hands to launch a solution that aims to tackle and minimize the amount of value extracted from their users, Ethereum's invisible tax.