bitscoper.live

By Abdullah As-Sadeed

Latest posts

How to Install Additional Codecs on Fedora Linux

Install the packages and enjoy! sudo dnf install gstreamer1-plugins-{bad-\*,good-\*,base} gstreamer1-plugin-openh264 gstreamer1-plugin-libav --exclude=gstreamer1-plugins-bad-free-devel sudo dnf install lame\* --exclude=lame-devel sudo dnf...

How to Change Admin URI of Bludit

It is possible to change the admin URI of your lovely Bludit installation. Open the installation's bl-kernel/boot/variables.php file on your favorite text editor with appropriate privileges and edit the following value. define('ADMIN_URI_FILTER',...

How to Generate Locales on Arch Linux

Locale names are typically of the form language[_territory][.codeset][@modifier] , where language is an ISO 639 language code , territory is an ISO 3166 country code , and codeset is a character set or encoding identifier. a) Listing the Enabled...

Kubernetes vs Docker Swarm

Containerization has revolutionized the way applications are developed, deployed, and managed. Containers provide a lightweight and portable solution, allowing developers to package applications and their dependencies into a single unit. However, man...

Redis vs memcached

In the world of high-performance, distributed systems, caching plays a crucial role in improving application speed and scalability. memcached and Redis are two popular in-memory caching systems that are widely used to store and retrieve data quickly....

Memory Object Caching: memcached, Redis, and Others

Memory object caching involves storing frequently accessed data in a high-speed data storage layer to reduce the time and resources required for repeated retrieval from the original source. How It Works Memory object caching operates on the principle...

How to Setup memcached on AlmaLinux 8

a) Installing Install the required packages first. sudo dnf install memcached libmemcached b) Enabling Autostart To tell systemd to start memcached service automatically at boot, enable it. sudo systemctl enable memcached.service c) Starting Start th...

LILO vs GRUB: Contrasting Bootloaders

Bootloaders are softwares that initiate the operating system’s startup process when a computer is turned on. They are responsible for locating, loading, and launching the OS into the RAM. Bootloaders typically reside in a specific area of the storage...

HVM vs Paravirtualization: Unveiling the Rift

In the realm of virtualization, different techniques and approaches exist to simulate multiple virtual environments on a single physical machine. Two prominent methods employed in this landscape are Hardware Virtual Machine (HVM) and Paravirtualizati...

How to Change GRUB Timeout on Debian 12 Bookworm

a) Configuring GRUB Open the /etc/default/grub file on your favorite text editor with superuser privileges and edit following value. GRUB_TIMEOUT=5 It specifies the time in seconds to wait for keyboard input before booting the default menu entry. Als...

Why Open Source for Businesses and Professionals

In today’s age, the choice between open source and closed source software has become a significant decision for businesses and professionals. Open source software, which is developed collaboratively by a global community of developers, offers numerou...

SFTP vs FTPS: Clearing the Confusion

SFTP (SSH File Transfer Protocol) and FTPS (FTP Secure) are two common methods for secure file transfer, but they differ significantly: SFTP, an extension of SSH, uses a single encrypted connection, making it highly secure and resistant to intercepti...

Demystifying Variants of Kerberos

Kerberos, an authentication protocol developed at MIT, has become the de facto standard for secure network authentication. Several variants of Kerberos have emerged over time, each offering unique features and addressing specific requirements. In thi...

Podman vs Docker: A Brief Comparison

Containerization has revolutionized the way software applications are developed, deployed, and managed. Docker has been the go-to containerization tool for many years, but recently, a new player has emerged in the field – Podman. In this article, we...

Upstream Testbeds and Downstream Forks of RHEL

Red Hat Enterprise Linux (RHEL) is a popular Linux distribution used by many engineers and enterprises worldwide. It provides a stable and reliable platform for enterprise environments, with long-term support (LTS) cycles that can last up to 10 years...

From UNIX to BSD

The Berkeley Software Distribution (BSD) is a family of operating systems that has its roots in the original UNIX operating system developed by AT&T Bell Labs in the early 1970s. BSD began as a research project at the University of California, Berkel...

The UNIX Legacy of macOS

The history of macOS and its evolution from UNIX can be traced back to the early days of computing. UNIX itself was developed in the late 1960s at Bell Labs by a team of programmers led by Ken Thompson and Dennis Ritchie. The operating system was des...

Comparative Advantages of Btrfs File System

A file system is an integral part of any operating system, and its primary role is to manage and organize files and directories on a storage device. There are several file systems available in the market, such as NTFS, FAT32, exFAT, HFS+, ext4, ZFS,...

Linux Security Modules: AppArmor vs SELinux

When it comes to securing computer systems, there are many tools available to administrators. Two of the most popular are AppArmor and SELinux. Both tools are designed to provide an extra layer of security to the system by enforcing Mandatory Access...

HTTP/3 with QUIC: Improved Performance and Security

HTTP/3 is the latest version of the HTTP protocol, designed to improve web performance and enhance security. It is based on the QUIC transport protocol, which was developed by Google. QUIC (Quick UDP Internet Connections) is a transport protocol that...

Historical Development of RAM

Random Access Memory, or RAM for short, is one of the most important components of modern computer systems. It plays a critical role in enabling the fast and efficient processing of data, by providing a temporary storage location for information that...

The Evolution of Supercomputers

Supercomputers, which are among the most powerful and sophisticated computing machines ever created, have evolved significantly over the years, with the development of new technologies such as parallel processing, vector processing, and the use of ac...

UNIX: An Enduring Legacy in Computing

The history of UNIX dates back to the 1960s when AT&T’s Bell Labs began work on a time-sharing operating system for mainframe computers called Multics. The project became too complex, and AT&T eventually withdrew from it in 1969. A few developers at...

Why UNIX Lost Its Throne

UNIX is an operating system that has been around for decades, and it was once the dominant operating system in the computing world. However, over the years, UNIX has declined in popularity, and other operating systems like Linux distributions, macOS,...

VPN Protocols Demystified

Virtual Private Network (VPN) protocols are the set of rules and procedures that govern the communication between devices in a VPN network. These protocols define how data is transmitted over the network, how it is secured, and how it is authenticate...

How to Use Rootkit Hunter (rkhunter) on AlmaLinux 8

a) Installing Rootkit Hunter Install Rootkit Hunter which is available as rkhunter package. sudo dnf install rkhunter b) Updating Database Before using, you need to update the database of Rootkit Hunter. sudo rkhunter –update With the database files...

How to Setup WebDAV Server on Oracle Linux 8

WebDAV (Web Distributed Authoring and Versioning) is a part of Apache HTTP Server software. a) Installing The Apache HTTP Server Install the Apache HTTP Server. sudo dnf module install httpd b) Enabling Autostart To tell systemd to start httpd servic...

How to Setup MariaDB Database Server on AlmaLinux 8

a) Installing The MariaBD Server Install the MariaDB Server. sudo dnf module install mariadb b) Enabling Autostart To tell systemd to start mariadb service automatically at boot, enable it. sudo systemctl enable mariadb.service c) Starting Start the...

How to Setup Lynis Security Auditor on AlmaLinux 8

a) Adding Repository At first, you may need to add the official repository of the Lynis. So, create the /etc/yum.repos.d/cisofy-lynis.repo file on your favorite text editor with superuser privileges and populate it with the information below. [lynis]...

How to Setup Icecast Server on AlmaLinux 8

a) Installing Tools & Dependencies Install the Development Tools group. sudo dnf groupinstall “Development Tools” Then install the following dependencies: curl-devel libtheora-devel libvorbis-devel libxslt-devel speex-devel libshout sudo dnf install...

How to Setup dnf-automatic

a) Installing The dnf-automatic Install the dnf-automatic. sudo dnf install dnf-automatic b) Configuring Edit the /etc/dnf/automatic.conf file on your favorite text editor with superuser privileges. Here, we want the dnf-automatic to install all avai...

How to Setup Cockpit on Fedora Server

The Cockpit is a robust and feature-rich web-based Graphical User Interface (GUI) software that is purpose-built for managing and monitoring servers. Developed as an open-source software, it offers system administrators a user-friendly way to perform...

How to Host WiFi Hotspot on Lubuntu 22.04 LTS

a) Configuring Hotspot Navigate to Application Menu > Preferences > Advanced Network Configuration or right click on desktop panel\’s network icon and go to Edit Connections. Click on Add a new connection icon (+) and the next dialog box will ask you...

How to Change Port of SSH Server on AlmaLinux 8

a) Configuring The OpenSSH Server You can specify any port from 1024 to 65535. Here, we will use 26170 as the port for SSH instead of the default port 22. Edit the /etc/ssh/sshd_config file on your favorite text editor with superuser privileges and a...