You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you’ve adopted Linux, chances are you might have done so for development purposes. After all, it has everything you need to program in most languages, and do so for (almost) free.
So earlier this year I reviewed the PineBook Pro. I was pretty impressed with it at the time, but am I still enamored with this $200 laptop? I’ve now been using it for at least 90 days. I know that because I haven’t rebooted it in 90 days. Really.
Alpine linux is a linux distribution primarily made for the deploying application on linux distribution and is a rising competitor for the Ubuntu. Alpine Linux is designed for security, simplicity and resource effectivity. It is designed to run directly from RAM.
The Linux kernel is widely considered the pillar of some of the most popular projects among the open-source community. As the central module of the O.S, the system’s stability, performance, and security rely heavily on the kernel.
In this article, you will walk through the creation of a simple Bash shell script to send messages to Telegram messenger using the Curl command. Then you will use this script to send a notification on every ssh login into your server.
I’m sorry Linux. It’s not me, it’s you. The “year of the Linux desktop” never came to fruition. It was always next year, year after, some year. Now, it’s almost a running joke.
As a developer, I love working with the terminal. The plain, simple, and in my opinion the best way to interact with the computer (also it makes you look geeky)
Since the early days of Unix, the shell has been part of the user's interface with the operating system. The first Unix shell (the Thompson shell) had very limited features, mainly I/O redirection and command pipelines. Later shells expanded on that early shell and added more and more capabilities, which gave us powerful features that include word expansion, history substitution, loops and conditional expressions, among many others.
One of the most common tool to develop software is container. This guide helps you to configure correctly podman and docker-compose on Windows using WLS2.
Send visual feedback and reminders from scripts, using notify-send and at commands on Linux. Also how to get MacOS to do it as well, through some jury-rigging.
Containers provide a way to run your application by packaging it with every dependency it needs. This article will look at Linux containers and their uses.
Normal development flow requires continuous patching the production database with local changes normally made automatically by the orm software, this method is not perect but deceptively simple, all we'll use is standard Unix commands, and is good enough for us.
AlmaLinux Cloud Images include aarch64 support for AWS AMIs, OpenNebula x86_64 and aarch64, and aarch64 support for Generic (cloud-init) Cloud image/OpenStack.
How to create a quick shell programming script for system administrators to check system status, logged in users, available memory, and free disk space.
WebP lets you compress your images as efficiently as possible, reducing the size of your web page while preserving quality. You can convert from the terminal
Linux is growing and evolving even after 30 years since its birth, but the core ideas behind it remain the same, which opens the doors to new horizons.
Linux is one of the best-known and most used operating systems in the world. Here are 6 essential commands which can make you better at using Linux systems.
In the first part of this tutorial, we've built a simple Linux shell that prints a prompt string, reads input, then echoes the input back to the screen. This isn't very much impressive now, is it?
Install Deb-Multimedia Repositories on Debian and Kali Linux. In this tutorial I will share a little bit about how to install and use Deb-Multimedia repos in Debian distributions and their derivatives.
This post will show you how you can run an arbitrary piece of code in your nano VM. This post assumes that you already have a nano VM running (here). A full version of the program can also be found here (gitlab).
A terminal is a command line interface used to interact with computers. With MacOS, Linux and even sometimes windows, interacting with the terminal is a pretty common practice for developers. But, not so much with Android.
It is the geeky thinker who uses an operating system along with programming and scripting languages to solve problems and automate tedious and monotonous tasks.
The Go programming language has become quite popular over the past few years. Why? The primary reason is that it has become the language of choice for distributed and highly scalable servers. Go was based on C and brings code efficiency to the table, which generates faster software and apps for businesses.
Are you one of that guy who just loves the three finger swipe in Windows and almost always ends up using windows for basic web surfing and media consumption? You have tried so hard to install touchegg which promised you the three finger gesture but still failed up anyway. These and many other small reasons have been one of the many reasons that I have been using a dual booted system (Windows & Ubuntu) for the past few years.
A brief guide on how to create encrypted containers in Linux using Cryptsetup, giving you tools for keeping your most important files and data protected.
Linux, best OS for developers. Linux, Windows, Ubuntu, macOS, Powerful yet resource-friendly, free, open-source, Command-Line, distro and desktop environment
If you are a Linux admin or developer, chances are pretty good that you have to work on a remote server or two. When it comes time to log into those remote machines, there’s only one tool for the job—SSH (aka Secure Shell).
The highly anticipated new release 7.0 of Vinchin Backup & Recovery will be coming soon! Numerous new features are coming your way including NAS backup, physica
Among the incredible writers in our diverse community, we discovered Jeremy Morgan from the United States. Jeremy has been nominated for five different Noonie awards, including IoT Writer of the Year. Learn more about Jeremy below and don't forget to vote for him at NOONIES.TECH.
The lightweight Kubernetes OS that is known as k3OS has quickly been gaining popularity in the cloud-native community as a compact and edge-focused Linux distribution that cuts the fat away from the traditional K8s distro. While k3OS is picking up steam, it is still on the bleeding edge and there is still a bit of a shortage of learning material out there for it.
This article will teach you how to set up Ubuntu 20.04 LTS on a Vagrant virtual box. It will also show how to configure the Virtual box to suit your preferences
Bash is a language that is quite useful for automation no matter what language you write in. Bash can do so many powerful system level tasks. Even if you are on windows these days you are likely to come accross bash inside a cloud VM, Continuous Integration, or even inside of docker.
I spend a lot of time working on the bash command line, and I've come to highly value the availability of my custom set of shortcuts, preferences, and tricks, r
You know that feeling when you work really hard on something for really long and it feels like nobody really notices? Hacker Noon’s Annual Tech Industry Awards, the 2020 Noonies, are here to help with that. Nominate YOUR best people and products today at NOONIES.TECH. Speaking of the best people and products in technology, here’s a quick intro to 2020 Noonie Nominee, Luciano Strika, from Argentina, who’s been nominated in the Future Heroes and Technology categories.
Why should one use Linux these days? My brief but pleasant history with the latest versions of GNU/Linux inspires me to share my thoughts on the matter.
We are a hundred days deep in the Lambda Quadrant part of the galaxy, resting on a deep space Moonad, myself and my crew, my parter and my
lovematch, our infant son, and a cat. We study the properties and relations of Haskell abstract entities, enjoying meditating the pure functional programming vibe. It is deep work and we take time and turns. We also watch the second season of Star Trek Discovery and enjoy seeing the bright stars of its universe.
I'll start off by dating myself... it was the year 2000. I was in college and the brand new Mini Disk MP3 player had just come out. Superior audio to CD's and the ability to hold hundreds of songs on 1 little disk. Being a broke college kid, it took me about 6 months to make the purchase. Just when I got used to looking cool with my MD player, a wild flash of cool came across the analog airways via a commercial from a company that was only recently regaining its cool with a crappy multicolor desktop PC called the iMac. Of course, I'm talking about Apple. The product was the iPod. I was defeated and nearly threw away my MD player on the spot.
Thanks to the rise of portable devices like the Steam Deck, Linux is gaining more popularity as an operating system than ever before. The platform is built by users, for users, aiming to give them complete control over the software and features on their machine. Unfortunately, this means they’ll have access to fewer popular applications that are available on Windows and Mac — possibly including VPNs. Those having trouble with figuring out how to start should take a look at the 5 best VPN services on Linux, though they might be surprised at how many options they truly have.
he web server has a crucial role in web-based applications. Since most of us leave it to the default configuration, it can leak sensitive data regarding the web server.
This article is part of a series of case studies exploring the skills of senior software developers . In each case study, we look at a specific challenge faced by a senior developer and investigate the reasoning the developer used towards finding a solution.
Java has been a developer staple for quite some time. In fact, Java is one of the most popular programming languages on the market. Part of the reason for that is Android.
The Metasploit Project is a computer security project written in ruby that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.
Can you use your command-line shell history as a second brain? Should you? Here are some ideas to help leverage the humble Ctrl-r key to supercharge your work.
Let's suppose you need to send a file to multiple hosts and you can not do it manually and you need to do it now. Below I talk you through three strategies you can use to send files in emergencies.
In this article, you'll learn how to build the latest Linux Kernel for RISC-V 64 architecture and deploy it with minimal environment: busybox command-line.
AWS, Azure, and Google Cloud are three cloud services that are the creations of three large worldwide corporations with a global customer base and a constant commitment to improving their services andproducts.
Hard links and symbolic links have been available since time immemorial, and we use them all the time without even thinking about it. In machine learning projects they can help us, when setting up new experiments, to rearrange data files quickly and efficiently in machine learning projects. However, with traditional links, we run the risk of polluting the data files with erroneous edits. In this blog post we’ll go over the details of using links, some cool new stuff in modern file systems (reflinks), and an example of how DVC (Data Version Control, https://dvc.org/) leverages this.
Learning the basics of the Linux Command Line helps users get the most out of their machine while streamlining the experience of using the open-source OS
Learn linux command by playing Leviathan wargame from OverTheWire. This wargame doesn’t require any knowledge about programming - just a bit of common sense and some knowledge about basic *nix commands.
Did you ever wonder how a hacker can compromise a system? This Behind the Scenes (BTS) walkthrough takes us through a possible scenario using a known exploit.
If your work needs you to use Linux, these Bash Tips can save you plenty of time and effort in your day-to-day operations while streamlining your processes.
Introduction: What is Router OS?The operating system of MikroTik RouterBOARD hardware is MikroTik RouterOS. For those who prefer using a PC as their router,the software may be downloaded and installed on that machine, transforming it into an all-purpose router with all the functionality listed above.Since RouterOS is based on the Linux v2.6 kernel, we wanted to make it as simple as possible to set up and operate, so MikroTik developed it. By setting up your own vps routeros, you may create a safe, private connection between your devices and the Internet, as well as to your other resources.For how to install routeros, go to and get the CD image of RouterOSto get started now. No restrictions apply to the free trial version.
I am on Microverse working with a lot of people new to Software Development with Linux (I use this word to refer to Linux OS and all his derivatives or distros), and in web development we use certain tools and pipelines that are more difficult to set up in Windows. So I found that most of the people new to Linux struggle to set up the tooling and basic commands for the first time.
Ansible is a Configuration Management and Application Deployment system that is designed to streamline the process of controlling a large number of servers, basically for administration and operational processes. In other words, it allows you to control several remote machines in an automated fashion from a location.
This Slack discussion, featuring myself in some sleep-deprived rambling, occurred in hackernoon's official #protips channel, and has been [barely] edited for readability.
When I just started developing PHP applications I used Mamp or Xamp to set up a local Lamp stack. Later this became Vagrant in combination with VirtualBox and eventually Docker.
In case you missed our latest update, Elimo Engineering designed a small, powerful Linux System-on-Module, designed for low cost and fast system integration. It’s FOSS and OSHW and sports all of the following:
What are the pros and cons of using Linux for your medical device? We wrote an expert article for you, answering all those questions, take a look at it here.
Most of the programmers use programming languages such as C,C++, Python, Javascript. They use shell for many tasks . But most of them don’t know that they can program with shell for automating stuff that we find ourselves doing over and over again.
Reader, I have a confession. I’m really into bad 1980's cartoons. You know, the ones that are little more than animated toy commercials? I’ve learned so many life lessons from those hours in front of a flickering analog TV.
For some time now I've been using zsh as my default Unix shell, which is an extended Bourne shell with many improvements, including some features from bash, ksh and tcsh. One of my favorite shells is fish shell. It's easy to set-up and many of the features that I use comes pre-installed, as it is not POSIX supported it has a much readable (fish) syntax for scripting.
This is part IV of a tutorial on how to build a Linux shell. You can read the previous parts of this tutorial from the following links: part I, part II, part III.
This is an augmentation article to the one which Mr. Karim has elaborated upon in couchbase blog. If you haven’t read that article it’s better to take a look at it also, so that we can elaborate on in-depth concepts in this article based on what you have learnt from that article. As clear from the title this piece is aimed to dive deep into creating robust solutions for such tools being integrated with basic system design principles. As however cool these hacker like tools may look they must be robust and should be able to scale up to the organizations need. This article can be interpreted as a case-study for Prometheus and Grafana integration with Couchbase-Exporter.
This is part V of a tutorial on how to build a Linux shell. You can read the previous parts of this tutorial from the following links: part I, part II, part III, part IV.
The Pinebook Pro is a $200 laptop that runs a couple of ARM processors, and it promises a lot. Does it deliver? After what seemed like an eternity waiting, mine arrived here’s what I think.
Linux is a free software that enables you perform tasks with ease. This is a detailed beginner guide that shows you how Linux works and how you can use it.
Let’s say hypothetically you wanted to download all of the high quality Super Nintendo ROMs from a website. The site simply has a list of links that take you to the file itself. Since this is a flat tree, you could run a basic wget command with the URL ala:
I loved POP OS as my daily driver for Linux for work and home. Its simplicity of design and linear workflow mechanism is much easier to follow and maintain.
You probably have programs that you run repetitively each time you turn on your Linux system. In this article, we still learn to automate these scripts on boot.
[212. 7 Reasons Why You Should Switch
To Linux](https://hackernoon.com/7-reasons-why-you-should-switch-to-linux-rp6f3wd6)
Your current computer or laptop shows the same performance no longer? This is absolutely no reason to choose new hardware and invest money in buying a cut edge device. We know a much more attractive solution. It is Linux!
I am a lazy DevOps Engineer. So whenever I came across the same task more than 2 times I automate that. Although now we have many automation tools, still the first thing that hit into our mind for automation is bash or shell script.
Linux follows tough rules when it comes to permission. Being a root user or sudo user gives you permission to do almost anything which normal user don’t have. Several commands need sudo keyword to run and each time you try to run sudo, Linux asks for a password, today we will configure a passwordless sudo.
If you told me twenty years ago that Nvidia GPU's would still be a pain in the you-know-what to get working in Linux to this very day, I wouldn't believe you.
Firecracker is a Virtual Machine Monitor, written in Rust that Amazon Web Services use to power it’s Serverless Compute services — Lambda and Fargate. Firecracker makes use of Linux’s Kernel-based Virtual Machine virtualisation infrastructure to provide its products with MicroVMs.
Recently I decided that it was time to bite the bullet and start using Windows 10 on at least one of my main computers. I'm pretty new here, so you probably don't know that I'm a big fan of Linux.
It never fails that the CNCF seem to always be cooking up something interesting in their ecosystem. In my free time, I always seem to find myself in a habit of playing in the Sandbox to see what new cutting edge tools I can add to my collection. It is my goal today to introduce you to a project at the Sandbox stage known as "Buildpacks".
I was casually doing a security audit on my blog recently and decided to look a little deeper into my security logs. With a bit of Linux command line kung fu, some Golang, and Google sheets, I was able to get a pretty good idea of where the attacks are coming from.
If you want to know how capabilities sets are determined or applied to Unprivileged and Privileged Program Binary. You may find this article interesting.
As of today, a program is an interface, a bridge between a computer and a user. There is another word that has been labeled to it, which is called an application. An application would be a good use of anyone's time in making themselves productive. Well, considering the smartphone count in regards to the personal computer count, there are more mobile applications than desktop applications. This leaves a very big grey area for the desktop users, in finding applications that are productive.
These days, a lot of businesses are concentrating on integrating a cloud-based system into their IT infrastructure because they are more dependable, and strong.
Most people associate a virtual machine (VM) with something slow and complex. Here I will show you two things - 1. VMs are not slow and 2. VMs can be super simple to use.
A lot of people have this mistaken notion that unikernels have this 'unhackable' characteristic about them. This is untrue. They absolutely are hackable depending on what is deployed and how they are configured.
Looking to get into development? Have a soft spot for old console based RPG games? Why not build Umoria! A Rouge clone created in a day of limited graphics - but nevertheless a very addicting game for the time. I would say one of the more memorable games that got me interested in coding (game was so hard I wanted to reverse engineer the save format).
A Step by Step Guide to understand how to configure and install the Oracle Cloud Infrastructure Command Line Interface on Windows Subsystem For Linux 2
Shells.com lets anyone access their cloud computer from any device with a browser so you can have a Linux desktop on your Apple iPad or your Windows machine.
It feels like yesterday when the Raspberry Pi foundation released the first-in-line Single Board Computer (SBC) to the market. Back in 2012, Raspberry Pi wasn't alone in the SBC growing market, however, it was the first to make a community-based product that brings the hardware and the software eco-system to a beautiful harmony on the internet.
This is a guide to creating self-signed SSL certificates using OpenSSL on Linux. It provides easy “cut and paste” code that you will need to generate your first RSA key pair. After creating your first set of keys, you should have the confidence to create certificates for a variety of situations. RSA keys are used everywhere these days and knowing how to generate them is an essential skill to posess for system admins, and an easy procedure for the hobbiest to pick up.
Some of you may have noticed that it’s been a while since my last article, despite winning this year's IoT Noonies award (btw thanks to all of you who voted, that means a lot to me!).