MySQL and things to remember
When working with mySQL there are certain things you'll need to remember, but that never sticks to your brain. Here's a list of mine:
mysql -u root -p...
My 3d printer
My 3D printer is a DIY version of the Marlin Prusa. Some of the materials I had to buy, some I had to make from plywood, and some I had to print out.
It all began when I made a CNC machine,...
Get unique IPs from Apache access log
Apache log files
Apache logs everything that is going on with the web server. The two interesting files are error.log and access.log. I'm going to use the access.log file t...
Secure the Linux server
Do this with your newly installed Linux server.
Make sure the server is up to date:
AI 1: Unraveling the Marvels of Artificial Intelligence: A Journey into the Future
Unraveling the Marvels of Artificial Intelligence: A Journey into the Future
In the realm of technological innovation, one phenomenon...
AI 2: Decoding the Core Concepts of Artificial Intelligence
Decoding the Core Concepts of Artificial Intelligence
Artificial Intelligence (AI) is not just a buzzword but a revolutionary force re...
AI 3: Breaking Boundaries: Groundbreaking Applications of Artificial Intelligence
Breaking Boundaries: Groundbreaking Applications of Artificial Intelligence
The rapid evolution of Artificial Intelligence (AI) has gi...
AI 4: Navigating the Ethical Quandaries of Artificial Intelligence
Navigating the Ethical Quandaries of Artificial Intelligence
As Artificial Intelligence (AI) continues its inexorable march into every...
Defensive Linux Security Tools
The article below is under editing.
This is a list of some of the Defensive Linux Security Tools. Some make cost som money, but most of them are free.