Tux Machines

today's howtos

Posted by Roy Schestowitz on Mar 01, 2023

=> Games: Costs, Chessboard, Steam Deck, Public Domain Game Jam, and More | Security Leftovers

How To Install Plausible Analytics on Ubuntu 22.04

=> ↺ How To Install Plausible Analytics on Ubuntu 22.04

Plausible Analytics is a free and open-source, self-hosted web analytics application that helps you to track your website visitors. It is a simple analytics alternative to Google Analytics. In this tutorial, we will install Plausible in a docker container and then install Apache as a reverse proxy for Plausible Analytics. Prerequisites Step 1.

How to Install Docker on Linux Mint 21: A Step-by-Step Guide

=> ↺ How to Install Docker on Linux Mint 21: A Step-by-Step Guide

Follow our step-by-step guide to easily install Docker on your Linux Mint 21 system and start containerizing your applications.

Install Google Chrome on RHEL/Fedora/CentOS/Rocky/AlmaLinux

=> ↺ Install Google Chrome on RHEL/Fedora/CentOS/Rocky/AlmaLinux

In this tutorial, we'll see how to install the Google Chrome browser on RHEL-based Linux distributions such as Red Hat, Fedora, AlmaLinux, Rocky Linux, and CentOS in a few short steps. Installing Google Chrome Step 1. Download the Google Chrome RPM file with the wget command: $ wget https://dl.google.com/linux/direct/google-chrome-stable_current_x86_64.rpm Step 2.

How to Install VirtualBox on Fedora 37/36

=> ↺ How to Install VirtualBox on Fedora 37/36

In this tutorial, you will learn how to install Oracle VirtualBox on Fedora Linux. VirtualBox is a very easy-to-use solution for all of your virtualization needs on Fedora, allowing you run different Linux distros, Windows, MacOS, and BSD as guest operating systems.

3 tips to manage large Postgres databases

=> ↺ 3 tips to manage large Postgres databases

The relational database PostgreSQL (also known as Postgres) has grown increasingly popular, and enterprises and public sectors use it across the globe. With this widespread adoption, databases have become larger than ever. At Crunchy Data, we regularly work with databases north of 20TB, and our existing databases continue to grow. My colleague David Christensen and I have gathered some tips about managing a database with huge tables.

Replacing postfix with dma

=> ↺ Replacing postfix with dma

I like Postfix. I’ve been a fan of it for over 20 years. I deployed it on every host for outgoing email. Lately, I’ve taken to using dma (DragonFly Mail Agent) as my preferred mail handler on jails and hosts which don’t need to deal with incoming mail, only outgoing mail. After first getting serious with it about 6 months ago, I decided to remove it from all internal hosts during the consolidation of two hosts into one.

Troubleshooting the other half

=> ↺ Troubleshooting the other half

You should know the operational state of your network because there really is no reason why you should not. The IETF and your hardware vendor of choice have worked hard to give you a whole fleet of protocols and machinery to assess all aspects of the pieces of the Internet that are under your direct control. But once you leave your own network and enter the public Internet, there is hardly anything you can do to pinpoint potential problems. And you might argue that nobody other than the network operator in question should actually be able to do that. Well, people using vital infrastructure hosted in the cloud might disagree.

Future Internet PKI schemes need to be bootstrapped through web PKI

=> ↺ Future Internet PKI schemes need to be bootstrapped through web PKI

A core element of any public key infrastructure (PKI) is identifying things, because by themselves public keys are relatively useless; you care about using public keys to talk to something or authenticate some information, and for that you need to know who you're talking to or who is giving you this information. Identifying things on the Internet can sound simple ('root of trust' everyone says in chorus) but it turns out to be very hard to do in practice in the face of attackers, misaligned incentives, mistakes, and other issues. There is exactly one Internet PKI system that is solving this problem in practice with a demonstrated ability to operate at scale and despite problems, and that is public web TLS.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/03/01/today_s_howtos.4.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
140.653022 milliseconds
Gemini-to-HTML Time
1.02234 milliseconds

This content has been proxied by September (ba2dc).