In this tutorial, we discuss the Apache .htaccess file and the many ways it can be modified and configured to suit your specific needs. We will be reviewing how to configure .htaccess redirects, rewrites, and add other customizations.
Let’s say you have decided to change domain names or have one web address on your site that you want to redirect to a completely different location. Using a .htaccess redirects, you can send visitors to the new page or site automatically!
In this tutorial, we are going to examine Jenkins and what its purpose is. We will begin by installing it on an Ubuntu 20.04 server and then start the software, enable the service, configure it, and finally, create a user with administrative privileges.
Jenkins is an open-source software written in Java and Scala. This software allows users the ability to automate almost any task and, it saves significant time that can be better utilized addressing other issues. When automating tasks with Jenkins, users can optimize their workflow by quickly automating the jobs that servers cannot do themselves. In this tutorial, we will learn how to install Jenkins on CentOS 8. We will also explore what its purpose is and share several benefits that Jenkins offers. We will then configure it to run on our CentOS 8 server.
Bashtop is a command-line based resource monitor written in bash, which depicts usage and statistics for the CPU processor(s), RAM, hard disks, network sources, and other running processes. It also contains a customizable menu and a fully responsive terminal user interface.
A newer version of bashtop is now available that is written in Python called bpytop. This CLI version is much faster and consumes only about 1/3 the resources as the original bashtop. It is less CPU intensive and includes more features, such as:
With the recent announcement by CentOS 8 regarding the switch from CentOS 8 to CentOS Stream, this commonly used Linux distribution is being relegated to a mid-stage development version of RHEL. In essence, CentOS 8 becomes an early rolling-release distro for RHEL. As CentOS moves from being a follow-up distribution to the stable version of RedHat, to be, in effect, a prerelease version of RHEL, many users are looking for alternatives to replace their current operating systems with a long-term stable platform apart from RHEL and IBM who owns RedHat.
This article will discuss the methods to send information securely over email using GPG/PGP as the main encryption tool. The difference between PGP and GPG is mainly that PGP is a proprietary solution controlled by Symantec, and GPG is the open-source standard that is defined by RFC 4880. Functionally, each format is virtually identical due to GPG being the offspring of the original PGP standard. Because there are numerous email clients, specific GPG settings will vary. For this tutorial, we will use Gmail and Thunderbird as examples.
Ansible is an open-source tool that uses playbooks to enable configuration management, software provisioning, and application deployment. It is primarily written in Python and was released in 2012. Ever since then, it has saved countless hours of often menial work of deploying and maintaining IT infrastructure. Overall, Ansible is very consistent, secure, reliable, and it requires a minimal learning curve. Simply put, Ansible is a powerful tool for automating apps and infrastructure. You can read more about general Ansible information in our recently published article.
In this tutorial, we will look at several methods that are used to compromise a website. In today’s world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business.