Tag: HTTP

Introduction to Internal Structure of A Debian Package

Among the benefits of knowing the structure inside of a Debian package is knowing more about system. For those don't understand, Debian package is a .deb archive file packaged for Debian family system. You will understand more later, in some aspects, how apt-get and dpkg work. …

How to Create Custom Permalinks in WordPress

Do you want to create custom permalinks in WordPress for posts, pages, and other post types? Recently one of our readers asked if it was possible to create custom permalinks in WordPress. Permalinks aka your page URL structure plays an important role in SEO. In this …

How to set up Apt caching server on Ubuntu or Debian

If you often create guest VMs or containers on your Linux computer, you will go through package installation many times across different VMs/containers. In that case, your time may be better spent on something more productive than just waiting to finish installing packages. While server provisioning …

How to monitor OpenFlow messages with packet sniffer

As a key enabler for software-defined networking (SDN), OpenFlow was initially introduced in the academia as a way to enable innovation on production networks which had traditionally been built with closed and proprietary networking hardware. OpenFlow offloads the high-level routing/forwarding decisions (control plane) from networking devices …

How to install and configure Solr 5.5 on Ubuntu 14.04

How to install and configure Solr 5.5 on Ubuntu 14.04 What is Apache Solr? Apache Solr is an open source enterprise-class search platform written in Java which enables you to create custom search engines that index databases, files, and websites. It has back end support for …

How to Install PostgreSQL 9.5 on Ubuntu (12.04 - 15.10)

How to Install PostgreSQL 9.5 on Ubuntu (12.04 - 15.10) PostgreSQL is a relational database management system, it is a fully ACID compliant enterprise-class database system with support for stored procedures in many programming languages such as Python, Java, C/C++, Ruby, Perl, or even with its …

How To Set Up The Raspberry PI Zero

IntroductionThis guide will show you how to set up the Raspberry PI Zero. The Raspberry PI Zero is an amazing little single card computer which retails for about the same price as a couple of pints of beer. The above image shows you just how small …

How To Set Up The Raspberry PI 2 Model B

IntroductionThis article is fairly late onto the scene but my original articles about the Raspberry PI are all becoming a little bit long in the tooth and so it is time to revisit them and make them relevant for 2016 and beyond. In this guide I …

Review Of Makulu Linux Aero Edition

Introduction I last reviewed Makulu Linux back in May 2014 when it was still at version 6. I summed up my feelings towards Makulu Linux by stating that I can't wait for versions 7, 8 and 9 and that I had the warm glow with Makulu …

Install Linux Spotify Client 1.x (Stable) On Ubuntu Systems

Linux Spotify Client 1.x (Stable Release) for Linux Ubuntu. How to install Spotify Linux Client in Ubuntu 15.04, Ubuntu 14.04, Ubuntu 14.10 and Ubuntu 15.10. The Linux Spotify Client lets you stream music on Ubuntu Systems. Linux Spotify 1.0.23 Known Linux specific issues in 1.0.23 Improper …

Terraforming your AWS Infrastructure

Writing your infrastructure as though it were code is a huge step forward from the days of past. In a single step, you will be documenting your entire stack while orchestrating the creation of its infrastructure. A second, even larger benefit, is the ability to version …

Tails Linux 2.0 ISO CD/DVD

Tails (The Amnesic Incognito Live System) version 2.0 has been released. It is a Debian-based security-focused Linux distribution, and it is designed to increase privacy and anonymity online. This release fixes many security issues, and users should upgrade as soon as possible. What is so special …

Here are hackers' 10 favourite passwords

Jane McCallion News 1 Mar, 2016 Heisenberg network reveals stolen credentials most commonly used by cyber criminals Hackers' most popular passwords to use as they try to break into IT systems have been laid bare by security firm Rapid 7. 'X' tops the list of the …