-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


today's howtos


Posted by Roy Schestowitz on Feb 16, 2023,

updated Feb 16, 2023


Games: Returnal and Graphics Work

PipeWire 0.3.66 Released Today!



How to Configure Kernel Parameters Using sysctl Command


↺ How to Configure Kernel Parameters Using sysctl Command


> You can configure several parameters or tunables of Linux (the kernel) to control its behavior, either at boot or on demand while the system is running. sysctl is a widely-used command-line utility for modifying or configuring kernel parameters at runtime. You can find the kernel tunables listed under the /proc/sys/ directory.


> It is powered by procfs (proc file system), a pseudo file system in Linux and other Unix-like operating systems that provides an interface to kernel data structures. It presents information about processes and additional system information.



nmap Command Examples in Linux


↺ nmap Command Examples in Linux


> The nmap command can be used for finding devices on your network, open ports and more. Here are some common uses of nmap.



Sign up for a LinuxCloudVPS today


↺ Sign up for a LinuxCloudVPS today


> In this tutorial, we are going to show you how to install and manage multiple Java versions on a Linux server.



5 escape sequences for your Linux shell


↺ 5 escape sequences for your Linux shell


> I recently read an article about shell metacharacters by Opensource.com correspondent Don Watkins. His article made me think about all the weird things you could do with shell input. While I probably have yet to discover the extremes, I do often find shell escape sequences, like \b and \t and \f strangely useful.


> Escape sequences are a special type of terminal input. They're designed to make it possible for you to enter characters or events that you may not have on your physical keyboard. Here are my favorite escape sequences for the Bash shell.


> Metacharacters are symbols with special meanings for Bash and other shells. They aren't interpreted literally by the shell, but change how it processes input and output…



5 most Used dig Commands in Linux With Examples


↺ 5 most Used dig Commands in Linux With Examples


> The DIG command offers a vast amount of functionalities and different options.



Marco d'Itri: I replaced grub with systemd-boot


↺ Marco d'Itri: I replaced grub with systemd-boot


> To be able to investigate and work on the the measured boot features I have switched from grub to systemd-boot (sd-boot).



How to Store or Assign a Linux command in a Variable in Bash Shell Script


↺ How to Store or Assign a Linux command in a Variable in Bash Shell Script


> You can store Linux commands as variables in shell scripts by using the syntax: VARIABLE_NAME=$(COMMAND_TO_BE_EXECUTED). Once you have saved the Linux command as a variable in the shell script, you can use it anywhere in the script by calling the variable name instead of typing out the command.



How to change the hostname on Debian 11?


↺ How to change the hostname on Debian 11?


> Hello, friends. In this post, you will learn how to change the hostname in Debian 11. It is a short tutorial, but focused to newbies and even to those users who want to play with the shell.



Strengthening Wireless Network Security with Iptables


↺ Strengthening Wireless Network Security with Iptables


> In this article, we will explore the benefits of using Iptables as a security tool for wireless networks. We will cover the basics of wireless networking techniques and demonstrate how iptables can help secure your wireless network from potential threats.



Extract Color Palettes from Images Using ‘Paleta’ for Linux


↺ Extract Color Palettes from Images Using ‘Paleta’ for Linux


> To extract colors from images I will open a color picker app like Pick and use the eyedropper tool to mouse over the parts of an image I wish to pull color from. I then save the values in a text editor so I can copy/paste them into design apps (or .css files).


> But now I don’t need to.



Transcribing recorded audio and video to text using Whisper AI on a Mac


↺ Transcribing recorded audio and video to text using Whisper AI on a Mac


> I installed it and ran it on one of my video's audio tracks using the commands at the top of this post, and I was pleasantly surprised: [...]



BIOS MBR booting isn't always flawless and can be odd


↺ BIOS MBR booting isn't always flawless and can be odd


> The obvious failure mode is that if you have a system disk fail and replace it, your replaced system disk is not in its right place in the BIOS boot order. Since it's a new disk it's been put at the end, after all of the data drives. If you replaced the first system disk, you're still able to boot because you're actually booting off the other system disk.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 07:23:52 2024