
The .htaccess file is a configuration file used by the Apache web server to override default server settings for a specific directory or subdirectory. It allows webmasters to customize the behavior of the…
Read more
Ubuntu uses UFW (Uncomplicated Firewall) as its default firewall management tool. It is a user-friendly front-end for iptables and makes it easier to configure the firewall by providing a set of predefined rules….
Read more
Chromium is an open-source web browser project developed by Google. It is the basis for the Google Chrome web browser, but there are some differences between the two. One main difference is that…
Read more
phpMyAdmin is a free software written in PHP, intended to handle the administration of MySQL over the Web. It supports a wide range of operations on MySQL and MariaDB such as Managing DBs,…
Read more
GlobalProtect VPN is the system used to connect to the Virtual Private Network (VPN). A VPN provides an encrypted connection between your off-campus computer and the campus network. Users or Employees can use…
Read more
Are you experiencing the following error when running apt update? On recent versions of Ubuntu, you may get the following error when trying to run apt-get update or apt-get install. Usually, the reason…
Read more
There are a lot of third party applications such as DriveDetect (a Seagate’s tool) through which you can easily check your Hard Disk’s serial number. In case if you don’t wish to use…
Read more
WOFF or Web Open Font Format is basically TTF with metadata and compression that is supported by browsers. Many users would like to use a WOFF font that they downloaded from a website…
Read more
In computing, the process identifier (a.k.a. process ID or PID) is a number used by most operating system kernels—such as those of Unix, macOS and Windows — to uniquely identify an active process….
Read more
In this tutorial, we will see how to make Ajax work with PHP and MySQL. We will create a small web application which will fetch the information from Database using PHP and Ajax….
Read more
On March 7, 2022, Max Kellerman from CM4All disclosed a local privilege escalation vulnerability (CVE-2022-0847) found in Linux kernel version 5.8 and newer. This vulnerability allows attackers to overwrite read-only or immutable files…
Read more
In this article we’ll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can be very common….
Read more
In this article, we will learn to configure VMWare ESXI logs to ELK stack using UDP and Syslog protocol. As we all knows, Logstash is configured through a number of plugins that support…
Read more