How to Install Bitcoin-node on Debian 9 Stretch Linux

Objective

The objective is to install latest Bitcoin-node binaries on Debian 9 Stretch Linux.

Operating System and Software Versions

  • Operating System: – Debian 9 Stretch
  • Software: – Bitcoin 0.14.1

Requirements

Privileged access to your Debian system will be required.

Difficulty

EASY

Conventions

Read more

LEMP ( Linux, Nginx, MariaDB, PHP ) stack Docker image deployment

About

The automated build docker LEMP image “linuxconfig/lemp” can be used as a testing and also as a production environment for a dynamic PHP applications. It comprises of Debian GNU/Linux, lightweight and yet powerful Nginx webserver, MariaDB relational database management system and PHP scripting language.

Deployment

The deployment of “linuxconfig/lemp” docker image is a fairly simple procedure. Let’ start by creating a sample PHP website with a MariaDB connection handle:

<?php
$dbh = mysqli_connect('localhost', 'admin', 'pass');
if (!$dbh) {
    die('Could not connect: ' . mysqli_error());
}
echo 'Connected successfully to MariaDB database';
mysqli_close($dbh);
?>

Read more

How to manage ACLs on Linux

Objective

Introduction to the management of ACLs ( Access Control List ) on Linux

Operating System and Software Versions

  • Operating System: – Linux distribution agnostic

Requirements

  • Root access on a working Linux installation
  • Knowledge of Discretionary permission system
  • A filesystem which supports ACLs (e.g xfs, ext2, ext3, ext4), mounted with the ‘acl’ option
  • Having the ‘acl’ package installed

Difficulty

MEDIUM

Conventions

Read more

first remote VNC session linux debian

Quick VNC server/client setup on Debian Linux Jessie 8

In this config we will show a quick VNC server/client configuration on Debian Linux Jessie 8. Visit the following page on how to configure VNC on Debian 9 Stretch Linux.

We will be using vnc4server to start a VNC server and xvnc4viewer client to connect remotely. First perform a server installation on the server you wish to remotely connect to:

# apt-get install vnc4server

Next, setup your password. Login as a user you will eventually use to create a remote VNC session and set your password consisting of 6 – 8 characters:

$ vnc4passwd 
Password:
Verify:

Read more

How to verify Checksums in Linux

Objective

Verify the integrity of ISO downloads using GPG keys.

Distributions

This will work with any Linux distribution.

Requirements

* A working Linux install with root access.
* GPG

Difficulty

Easy

Conventions

  • # – requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ – requires given linux commands to be executed as a regular non-privileged user

Read more

How to Encrypt directory with EncFS on Debian 9 Stretch Linux

Objective

The following article will explain how to encrypt directory using EncFS on Debian 9 Stretch Linux

Operating System and Software Versions

  • Operating System: – Debian 9 Stretch
  • Software: – encfs version 1.9.1

Requirements

Privileged access to may be required to perform EncFS installation.

Difficulty

EASY

Conventions

Read more

Introduction To Linux File Permissions

Linux Permissions, How Do They Work?

The Linux permission system for files can appear somewhat confusing to new Linux users. There’s a system of letters or numbers all jumbled together in a seemingly unordered mess.

In reality, it’s quite simple, once you understand how it’s broken down.

Directories, Links, Read, Write, and Execute

Start off by going to a folder in your home directory. The Downloads folder is usually a good option. Once you’re there, run ls -lah.

$ cd ~/Downloads
$ ls -lah

Read more

Python Exception Handling

Introduction

Python will let you know when you get your syntax wrong. It’ll immediately fail and not allow your program to run.

What about when your code has a different type of problem? Those are called exceptions, and they tend to be harder to catch. It’s up to you to recognize situations where hey might come up and catch them to prevent your program from crashing altogether.

Imagine a scenario where you need user input. Do you want your program to crash every time a user mistypes something or enters something erroneous? That’s far from ideal. Since you know there could be a problem there, you can tell Python to look out for one, and recover gracefully.

Read more

How to Manipulate HTTP With cURL

Objective

Learn how to use cURL to make HTTP requests to interact with online content.

Distributions

All GNU/Linux distributions

Requirements

Just cURL. It’s available in every distribution’s repository.

Difficulty

Easy

Conventions

# – requires root access either via su or sudo.

$ – run as your regular user

Introduction

cURL is a command line multi-tool for interacting with the web. cURL is capable of acting like a web browser, downloading files, accessing APIs, and even signing you into online accounts. cURL can be scripted, and it handles everything from a simple command line interface.

Read more

How to remove KVM-based Virtual Machines on Redhat Linux

Objective

The following instruction will explain how to completely remove KVM-based Virtual Machines on Redhat Linux from command line using virsh command.

Operating System and Software Versions

  • Operating System: – Redhat 7.3
  • Software: – libvirtd (libvirt) 2.0.0

Requirements

Privileged access to your Redhat Linux installation will be required.

Difficulty

EASY

Conventions

Read more

Configuring Virtual machine automatic start on Redhat Linux host

Objective

The objective is of this article is explain how to automatically start virtual machine using default Redhat’s KVM based hyper-visor configuration.

Operating System and Software Versions

  • Operating System: – Redhat 7.3
  • Software: – libvirtd (libvirt) 2.0.0

Requirements

Privileged access to your Redhat Linux installation will be required.

Difficulty

EASY

Conventions

Read more