Tux Machines

today's howtos

Posted by Roy Schestowitz on Feb 15, 2023

=> Security Leftovers | Mozilla Thunderbird: Thunderbird 115 Supernova Preview: The New Folder Pane

Configuring Sendmail through the External SMTP relay

=> ↺ Configuring Sendmail through the External SMTP relay

Sendmail is an open-source mail transfer agent (MTA) that provides an efficient way to manage and transmit emails. However, for organizations that need to send a high volume of emails, relying solely on Sendmail may not be sufficient. This is where relaying emails through an external SMTP server can be helpful.

Getting information about MySQL databases and tables

=> ↺ Getting information about MySQL databases and tables

MySQL is a widely used database management system for managing relational databases. It is an open-source database management system, which means it is free to use and has a large community of users that contribute to its development.

MySQL Events

=> ↺ MySQL Events

Introduction MySQL is a popular open-source relational database management system that is used by many organizations to store and manage their data. One of the most powerful features of MySQL is the ability to schedule tasks to be executed automatically, known as MySQL events.

MySQL Views

=> ↺ MySQL Views

If you're working with a large database, you might have realized that it can get overwhelming to handle all the information stored in it. That’s where MySQL Views come in handy. A view is a virtual table that is created from a SELECT statement.

pgrep Command Examples

=> ↺ pgrep Command Examples

Want to look for a process and its details? The pgrep command helps you with that. Here's how to use it.

MySQL Triggers

=> ↺ MySQL Triggers

Introduction Databases are crucial to storing and retrieving data. They are essential for managing and organizing data for businesses, organizations, and individuals.

MySQL Functions

=> ↺ MySQL Functions

MySQL is a widely used open-source relational database management system. It provides a vast array of functions that can perform various operations on the data stored in the database.

Peter Czanik: Syslog-ng 101, part 7: Networking

=> ↺ Peter Czanik: Syslog-ng 101, part 7: Networking

This is the seventh part of my syslog-ng tutorial. Last time, we learned about syslog-ng destinations and the log path. Today, we learn about syslog-ng network logging. At the end of the session, we will send test messages to a syslog-ng network source.

Our current plague of revolving .top and .click spam email domains

=> ↺ Our current plague of revolving .top and .click spam email domains

Email spam is somewhat like the weather, and much like the weather I don't talk about it much any more. However, every so often something unusually unpleasant happens (in both of them). Our current irritation in spam weather is what I suspect is one particular spammer that operates using a rapidly changing flux of spam domains in .top, .click, and on some days .us, using a distinctive (but not really machine matchable) pattern of tagged envelope senders.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/02/15/today_s_howtos.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
141.791173 milliseconds
Gemini-to-HTML Time
0.77606 milliseconds

This content has been proxied by September (3851b).