Tux Machines

today's howtos

Posted by Roy Schestowitz on Apr 14, 2023

=> Games: Sidescrolling, China, Landnama, and Abandoning Windows | Android Leftovers

Using ncdu to view your disk usage while grasping those TiB, GiB, MiB and KiB file sizes

=> ↺ Using ncdu to view your disk usage while grasping those TiB, GiB, MiB and KiB file sizes

The ncdu command provides a very convenient way to review your files and the disk space you're using on your Linux system, but the file sizes may appear a little strange at first.
The ncdu command provides a fast and very easy-to-use way to see how you are using disk space on your Linux system. It allows you to navigate through your directories and files and review what file content is using up the most disk space.

How to Create a Wireless Hotspot on Linux Using linux-wifi-hotspot

=> ↺ How to Create a Wireless Hotspot on Linux Using linux-wifi-hotspot

Wireless hotspots allow you to share your Wi-Fi connection with others without revealing your password. Here's how to create a Wi-Fi hotspot on Linux.

How to Install Krita on Linux

=> ↺ How to Install Krita on Linux

Want to get started with 2D designing and raster drawing on Linux? Install Krita, a cross-platform and open-source drawing software for Linux.

Building a new Microserver

=> ↺ Building a new Microserver

Back in 2011, I bought an HP Proliant Microserver G6 for £250. Last week I upgraded to... A Proliant G8 for £270. Nice! Hurrah for Moore's Law!
Of course, setting it up is a bit of a mare. So here's a tangled mess of notes to hopefully remind me what to do...

The chain of landing web pages that I saw for a phish spam today

=> ↺ The chain of landing web pages that I saw for a phish spam today

The email was a 'X has shared a file with you' email with a link to a page on what claimed to be a travel company's Sharepoint aka OneNote site (under '<...>-my.sharepoint.com', which you probably aren't going to be able to block). Based on the URL, this may have been a page created by and for a particular user, instead of a corporate page, meaning that just this user had their Sharepoint access compromised. This page said: [...]

Easily Accessing All Your Stuff with a Zero-Trust Mesh VPN

=> ↺ Easily Accessing All Your Stuff with a Zero-Trust Mesh VPN

Probably everyone is familiar with a regular VPN. The traditional use case is to connect to a corporate or home network from a remote location, and access services as if you were there.
But these days, the notion of “corporate network” and “home network” are less based around physical location. For instance, a company may have no particular office at all, may have a number of offices plus a number of people working remotely, and so forth. A home network might have, say, a PVR and file server, while highly portable devices such as laptops, tablets, and phones may want to talk to each other regardless of location. For instance, a family member might be traveling with a laptop, another at a coffee shop, and those two devices might want to communicate, in addition to talking to the devices at home.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/04/14/today_s_howtos.2.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
139.925891 milliseconds
Gemini-to-HTML Time
0.593855 milliseconds

This content has been proxied by September (ba2dc).