| by Arround The Web

How to Create Policies and Permissions in AWS IAM?

Head into the IAM dashboard and configure the policy by attaching the service with the permissions to allow or deny its access and then create it on the cloud.

Share Button
Read More
| by Arround The Web

How to Create Logging IP Traffic Using VPC Flow Logs?

Create an IAM role allowing the publication of these flow logs to the CloudWatch service. Create a flow log from the VPC dashboard using the IAM role.

Share Button
Read More
| by Arround The Web

How to Create a Recovery Drive for Windows

The “Recovery Drive for Windows” is created from a built-in “Recovery” tool involving a few steps, and it is used to reset the Windows to its original state.

Share Button
Read More
| by Arround The Web

How to Configure Route Tables in Amazon VPC?

Create a VPC from its dashboard with other networking resources from a single place. After that, add an internet gateway to the routing tables.

Share Button
Read More
| by Arround The Web

How to Configure and Enable the SSH Server on Rocky Linux 9

Practical tutorial on the method to easily configure and enable the SSH servers on Rocky Linux 9 to eliminate the chances of error while using the SSH server.

Share Button
Read More
| by Arround The Web

How to Check the SELinux Status on Rocky Linux 9

Simple tutorial on how to easily check and display the SELinux status on a Rocky Linux 9 machine using all the possible commands to display the SELinux status.

Share Button
Read More
| by Arround The Web

How to Check the Memory Usage on Rocky Linux 9

Tutorial on the various methods to check the memory usage on Rocky Linux 9 including the GUI and CLI methods to display the memory usage and other information.

Share Button
Read More
| by Arround The Web

How to Add a User to a Group in Rocky Linux 9

Practical guide on the simple methods to add the users to a group in Rocky Linux 9 to help you share the resources (files and services) and maintain security.

Share Button
Read More
| by Arround The Web

Complete Wipe/Reinstallation of Windows 10 Pro 20H2

The complete Windows 10 Pro 20H2 wipe is done from the Windows “Recovery Settings” by selecting “Remove Everything” and is reinstalled using a bootable media.

Share Button
Read More
| by Arround The Web

How to Add a Directory to the Path on Rocky Linux 9

How to easily add a directory to the PATH on Rocky Linux 9 and execute the file from the terminal using a quick method to remove the directory from the file.

Share Button
Read More
| by Arround The Web

How Python Functions Remove Characters From A String

The “replace()” method, “translate()” method, “re.sub()” method, and the “for” loop is used to remove/delete the characters from the input string.

Share Button
Read More
| by Arround The Web

Python List Length

The “len()” function, “for” loop, and the “length_hint()” method are utilized in Python to determine/get the length of the list.

Share Button
Read More
| by Arround The Web

Python File Seek

The “file.seek()” method is utilized in Python to move or change the position of the file handle pointer according to the specified offset value.

Share Button
Read More
| by Arround The Web

How to Remove Software Repositories from Ubuntu

From apt-add-repository to Software & Updates tool, here are several ways to remove software repositories from Ubuntu.

Share Button
Read More
| by Arround The Web

Popular Generative AI Projects Pose Serious Security Threat

Open-source projects utilizing insecure generative AI have poor security posture, resulting in an environment with substantial risk for organizations.
The post Popular Generative AI Projects Pose Serious Security Threat appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

Fluent Reader: Modern Desktop RSS Reader

Fluent Reader is a desktop news reader application built using Electron together with React and Fluent UI. Learn more here.
The post Fluent Reader: Modern Desktop RSS Reader appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

Rocky Linux Finds Solutions to RHEL Source Code Restrictions

Rocky Linux leverages UBI and cloud instances for unhindered RHEL source acquisition. Learn more about the solution here.
The post Rocky Linux Finds Solutions to RHEL Source Code Restrictions appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

Python random string generation

The “random.choices()” method of the random “module” and the “secrets.choice()” method of the “secrets” module is used to retrieve the random string in Python.

Share Button
Read More
| by Arround The Web

Canonical Releases New Ubuntu Kernel Security Updates

The new Ubuntu kernel security updates address CVE-2023-35788, an out-of-bounds write vulnerability. Learn more here.
The post Canonical Releases New Ubuntu Kernel Security Updates appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How To Design Bulk ID Cards with Different Names and Photos with Inkscape

This tutorial will explain designing with Inkscape Vector Graphics Editor to create multiple cards with different names and photos. You will need NextGenerator extension to practice this. This is useful to people who work at  office, as event orga…

Share Button
Read More