Linux Learn Tips and Tricks - Page 12
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Learn how to use some of the lesser-known features of gdb to inspect and fix your code:
Are you a DevOps professional? If so, are you aware that breaking down silos and becoming a champion for security will help you, your career, and your organization? Learn more:
How much do you know about Chmod? Chmod, which sets read, write, and execute permissions, is one of the most important Linux security commands.
Wondering how to speed up a debugger? Here are some tips to consider while building one for Python:
In my previous article, I explained how to make Python modular by using functions, creating modules, or both. Functions are invaluable to avoid repeating code you intend to use several times, and modules ensure that you can use your code across different projects. But there's another component to modularity: the class.
If you're using Python for any amount of development, you have probably issued a command in a terminal, even if only to launch a Python script or install a Python module with pip.
Nowadays, Wi-Fi is a “need” for almost everyone. Whether you are visiting a mall or dining in a restaurant, waiting at the airport or spending time at the library, you can easily access the internet through public Wi-Fi networks from any location free of cost. But are these networks secure? Is it safe to carry out your daily tasks while on public Wi-Fi?
Python is one of the most popular programming languages in use today—and for good reasons: it's open source, it has a wide range of uses (such as web programming, business applications, games, scientific programming, and much more), and it has a vibrant and dedicated community supporting it. This community is the reason we have such a large, diverse range of software packages available in the Python Package Index (PyPI) to extend and improve Python and solve the inevitable glitches that crop up.
People tend to play fast and loose with security terminology. However, it's important to get your malware classifications straight because knowing how various types of malware spread is vital to containing and removing them.
More and more businesses are deploying applications, operations, and infrastructure to cloud environments – but many don't take the necessary steps to properly operate and secure it.
Building and deploying lightweight apps is becoming an easier and more reliable process with the emergence of unikernels. While limited in functionality, unikernals offer many advantages in terms of speed and security.
While companies are quick to integrate new technologies to stay ahead of their competitors, every new technology also comes with risks. Malware, phishing and other cyberattacks are an all-too-common occurrence — especially following the implementation of newer technologies.
I've always been interested in web development and software architecture because I like to see the broader picture of a working system. Whether you are building a mobile app or a web application, it has to be connected to the internet to exchange data among different modules, which means you need a web service.
How to Secure your WordPress in 2019. WordPress is the most widely used Content Management System in the internet world. Because of its popularity and Open Source, many hackers began to target WordPress websites.
Is there a hotter topic in technology than securing your computer? Some experts will tell you that there is no such thing as perfect security.
Recently, we published apollthat askedreaders to vote on their favorite open source backup solution.
Enterprises are rushing into their DevOps journey through agile software development with cloud-native technologies such as Linux containers, Kubernetes, and serverless. Continuous integration helps enterprise developers reduce bugs, unexpected errors, and improve the quality of their code deployed in production. However, this doesn't mean all developers in DevOps automatically embrace agile for their daily work in application development, testing, and debugging. There is no magical way to do it, but the following four practical steps and best practices will put you well on your way to becoming an awesome agile developer.
It is 3 pm on a Friday afternoon. Why? Because it is always 3 pm on a Friday when things go down. You get a notification that a customer has found a bug in your software. After you get over your initial disbelief, you contact DevOps to find out what is happening with the logs for your app, because you remember receiving a notification that they were being moved.
When coming up to speed as a Linux user, it helps to have a cheat sheet that can help introduce you to some of the more useful commands.
Crouton allows installing Ubuntu or Debian in a chroot environment on any Chromebook model, without removing Chrome OS.