Configure IP Network with ‘nmtui’ Tool

An alternative for the nmcli is the nmtui, short for Network Manager Text User Interface, the nmtui is yet another handy tool that allows you to easily configure your network interfaces in Linux distributions using a graphical display by invoking the nmtui command straight from the terminal or even putty. To configure a network interface […]

Share:
Continue Reading

Install FFmpeg on Fedora 28/27/26

FFmpeg is a cross-platform solution for streaming audio and video as well as recording and conversion. It’s also useful to convert multimedia files between various formats. FFmpeg includes libavcodec audio/video codec library in it. This article will describe you to how to install FFmpeg on Fedora 27/26/25/4/23 systems using DNF. Also provides basic uses of […]

Share:
Continue Reading

Auto backup Web Server to Google Drive

Rclone is a command line program to sync files and directories to and from: Amazon Drive Amazon S3 DigitalOcean Spaces Dropbox Google Cloud Storage Google Drive Mega Microsoft Azure Blob Storage Microsoft OneDrive And more here  Install Rclone mkdir -p /home/backup #Linux 64 bit: cd /home/backup wget https://downloads.rclone.org/v1.41/rclone-v1.41-linux-amd64.zip unzip rclone-v*.zip \cp rclone-v*-linux-amd64/rclone /usr/sbin/ rm -rf […]

Share:
Continue Reading

Generate SSH Public and Private Keys on Linux

SSH allows for both password based authentication, as well as public key authentication. Public key authentication is generally regarded as being more secure, as it isn’t as prone to brute force login attempts (if you disable password based authentication). The private key can also have a passphrase associated with it, which makes public key authentication […]

Share:
Continue Reading

Generate SSH Public and Private Keys on Linux

SSH allows for both password based authentication, as well as public key authentication. Public key authentication is generally regarded as being more secure, as it isn’t as prone to brute force login attempts (if you disable password based authentication). The private key can also have a passphrase associated with it, which makes public key authentication […]

Share:
Continue Reading