Popular Self Driving Cars – Open Source Projects

Popular Self Driving Cars – Open Source Projects

The number of open source “self driving cars” projects are growing and all are commendable efforts but also highly ambitious. Over time, the hope is that they will mature enough for us More »

Zorin OS 12.2 Linux Released

Zorin OS 12.2 Linux Released

This week, Zorin OS released the latest upgrade to its popular Linux OS. The Zorin OS 12.2 is designed specifically for Windows users in mind who can migrate to Linux without any More »

Open Source skills are most sought after – Linux Foundation Jobs Report

Open Source skills are most sought after – Linux Foundation Jobs Report

The most sought after category is Developer where a whopping 73% of the employers wanted open source talent More »

4 Git Version Control Alternatives

4 Git Version Control Alternatives

In recent years, Git has become the defacto standard for code management, especially among open source developers. Developed by Linus Trovalds himself, the maker of Linux, it has found a lot of More »

Open Source Entrepreneur – Launching a Project Successfully

Open Source Entrepreneur – Launching a Project Successfully

Being an open source entrepreneur is a long term effort and not just a weekend project. So think hard before you make the jump. More »

 

Category Archives: How To

How-to setup a simple UFW firewall on Ubuntu

We all need to install some form of firewall to secure our systems from any malicious activity. Not just our servers and VPS machines, but also our laptops which we access on public networks. UFW (Uncomplicated FireWall) is an ideal solution for setting up a firewall on your system.

UFW firewall is completely open source and is actually built on top of the iptables making it easier for us to manage and run the firewall.

This is the third article in the series on “Systems Security”. Here we discuss UFW firewall implementation on your system. The articles in the System Security series are listed below.

  1. How to setup SSH keys based authentication
  2. How to disable password based authentication
  3. How to setup UFW Firewall (current article)

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

How-to Disable Password Authentication on Linux

This how-to will explain how to disable password based authentication on Linux based systems. It is in continuation of our series on System Security. With the first one published on SSH keys based authentication. We wrote this as a lot of you sent us messages, on social media, to add tutorials on how to secure the server by disabling the password based authentication.

We recommend that the administrator should not attempt to disable password based authentication unless SSH keys are correctly setup and users can easily login using that method.

This is the second article in the series on “Systems Security”. The articles in the System Security series are listed below.

  1. How to setup SSH keys based authentication
  2. How to disable password based authentication (current article)
  3. How to setup UFW Firewall
Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

Howto Login to servers using SSH keys authentication

Using public key authentication is far more secure and smart way to manage server authentication. And it is quite easy to implement and use. Fortunately, unix/linux terminals allow users to create public/private SSH keys combination that can be used to authenticate and login to servers without any hassle.

The traditional SSH authentication using the combination of username/password is good but really not that secure anymore. The passwords can be guessed or even broken using brute force attack. At times even a compromised terminal can give away the passwords to hackers.

This is the first article in the series on “Systems Security”. The complete list of articles in the System Security series are listed below.

  1. How to setup SSH keys based authentication (current article)
  2. How to disable password based authentication
  3. How to setup UFW Firewall
Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

How to setup virtual environment with Python3

Python3 is now becoming extremely popular over the traditional Python2.7. And the reasons are varied but many. For one, the support for data science libraries in v3 is far better and greater than version 2. But for the most important and critical reason is, the popular Python 2.7 is being officially retired by 2020. Which simply means that there will be no official support for it beyond that year. So it’s time to migrate your code to the latest edition. Here in this tutorial, we will show how to setup a virtual environment for Python3 for our development purposes.

In this tutorial, we will use Anaconda. It is an open source software, primarily designed to support scientific and analytic Python (and R) packages. Over time it has grown to support  more than 700 packages in both Python2.7 and Python3.x versions. So along with the usual scientific packages like pandas, numpy, sklearn, we have the traditional offerings like Flask, Pymongo libraries supported natively. Furthermore, with the use of pip within anaconda, we can download all that is available for Python out there.

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

How to check elapsed time in Terminal

When we have processes running for a while and we want to know how long they have been running, there are a few nifty ways we can check them on Mac and Linux/Unix. Here is one such method to check elapsed time in BASH.

First grab the process ID (PID) using the following command. In the following command, we are trying to grab the process ID of mongoDB.

pgrep mongo

pgrep command tells shell prompt on Mac/Linux/Unix terminal to capture the process ID (PID) of the process we are interested. In this case it is mongoDB.

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

How to write Urdu, Arabic or Persian text on Web

Languages like Arabic, Farsi and Urdu (AFU) use Arabic fonts and write from right to left rather than the usual left to write. To make any browser display text from the right side of the browser one has to define the following within the HTML tag

html dir=”rtl” lang=”ur”

The DIR tag defines the direction writing on the screen. RTL (Right to Left) or LTR (Left to Write). The LANG tag defines the language specified. In this case it is Urdu (ur).

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

How to record calls over Skype

When it comes to finding softwares for making online video/audio calls with reasonable voice quality and no cost to anywhere around the world, there isn’t any other software application which nears the monopoly that Skype enjoys. Regardless of what operating system you have installed on your computer, Skype is compatible with all of them and is used equally by their respective users everywhere in the world. With such extensive usage and hence the wide variety of circumstances in which its used, there often occurs a need to record the calls, and as Skype doesn’t provide call recording services itself, it allows access to some third party applications to do the job.

There are a number of Softwares in market developed exclusively to satisfy the said purpose, among which a tool called Evaer seems to tender the most useful and customizable features with a fairly simple UI.

How to configure Raspberry Pi Ethernet with Static IP Address

In case if you plan to set your Raspberry Pi with a static IP address, then follow the steps listed below:

Kindly make sure that you are logged into Raspberry Pi on command line (console or SSH) before proceeding.

Configuring a Static IP Address on Ethernet Port:

The file along with path where network information is stored on a Pi running Debian (Raspbian) is:

/etc/network/interfaces

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

How to tell if your Computer is 64 bit?

Modern computers are all 64bit. Barring a few netbooks. But if you have an older system like a Pentium 4 or even Core2Duo or equivalent, you might have a 64bit system. Majority of those were 32bits but some were built for 64bit architecture.

If you want to find out if your PC/laptop is 32bit or 64 bit, do the following in Ubuntu:

  • Start a command line Terminal
  • Type the following command:

lscpu

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

Install Ubuntu on Windows Surface Pro

Microsoft’s Windows Surface Pro has been recently released and already Linux pros are booting Ubuntu and other Linux distributions on to it. After all, why not? It would be fun to carry my Ubuntu in a tablet form rather than on an old PC.

Surface Pro comes with really powerful processor. Unlike other tablets, it actually boasts an Intel Core i5 processor with 4GB of RAM. Pretty powerful for a little machine. The display is 11″ inches with a sweet 1080p HD graphics. Not really Retina quality as on Apple’s iOS devices but pretty good anyways.

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.