How to Uninstall Software Packages on Ubuntu
In this article we will show you how to uninstall software packages using the graphical Ubuntu Software Center and through the command-line, using the apt or...
WeiterlesenIn this article we will show you how to uninstall software packages using the graphical Ubuntu Software Center and through the command-line, using the apt or...
WeiterlesenSwappiness is a Linux kernel property that sets the balance between swapping out pages from the physical memory to the swap space and removing pages from...
WeiterlesenIn this article, we will show you how to remove a file in GNU/Linux systems using the unlink command.
WeiterlesenVirtualBox is an open-source cross-platform virtualization software which allows you to run multiple guest operating systems simultaneously. This tutorial explains how to install the latest VirtualBox...
WeiterlesenGoogle Chrome is the most popular web browser in the world. In this tutorial, we will go through the steps of installing Google Chrome web browser...
WeiterlesenIn this tutorial, we will show you two ways to add apt repository on Ubuntu and Debian systems. The first method is by using the add-apt-repository...
WeiterlesenThis article explains how to use the command line to check what version of Python is installed on your Linux, macOS, or Windows machine.
WeiterlesenOn Ubuntu, the easiest way to grant sudo privileges to a user is by adding the user to the sudo group. Members of this group will...
WeiterlesenNFS is a distributed file system protocol that allows you to share remote directories over a network. In this tutorial, we will show you how to...
WeiterlesenThis tutorial explains how to delete MySQL/MariaDB user accounts. In MySQL you can remove one or more users and assigned privileges with the DROP USER statement.
WeiterlesenThe DNS nameservers (resolvers) are servers which are used by other devices to perform DNS lookup for a requested domain. In this guide, we’ll explain how...
WeiterlesenThe rename command renames the given files by replacing the search expression in their name with the specified replacement.
WeiterlesenI’ve never thought of myself as a “car person.” The last new car I bought (and in fact, now that I think about it, the first new car...
WeiterlesenWith rsync you can transfer files and directories over SSH from and to remote servers. In this tutorial, we will explain how to copy files with...
WeiterlesenThis article explains how to remove untracked files in Git. Tracked files are the ones that have been added and committed and git knows about.
WeiterlesenPip is a package management system that allows you to install Python packages. In this guide we will explain how to install pip on Debian 10...
Weiterlesenapt is a command-line utility for installing, updating, removing, and otherwise managing deb packages on Ubuntu, Debian, and related Linux distributions.
WeiterlesenNode.js is a cross-platform JavaScript run-time environment built on Chrome’s JavaScript designed to execute JavaScript code on the server-side. In this tutorial, we will show you...
WeiterlesenThis article explains how to find out the ports in use and which services are listening on which ports using the netstat, ss and lsof commands....
WeiterlesenIn CentOS you have two options to grant sudo access to a user. The first one is to add the user to the sudoers file. The...
WeiterlesenIn this article, we’ll talk about how to find and replace strings with sed.
WeiterlesenOne of the most common arithmetic operations when writing Bash scripts is incrementing and decrementing variables. This is most often used in loops as a counter,...
WeiterlesenA hostname is a label assigned to a machine that identifies the machine on the network. This tutorial will walk you through the process of changing...
WeiterlesenKnowing the IP address of your device is important when troubleshooting network issues, setting up a new connection or configuring a firewall. This article explains several...
WeiterlesenSSH tunneling or SSH port forwarding is a method of creating an encrypted SSH connection between a client and a server machine through which services ports...
WeiterlesenThe du command, short for disk usage reports the estimated amount of disk space used by given files or directories. It is practically useful for finding...
WeiterlesenSection 3.2 of Ilyas et al. (2019) shows that training a model on only adversarial errors leads to non-trivial generalization on the original test set. We...
WeiterlesenRefining the source of adversarial examples
WeiterlesenAn experiment showing adversarial robustness makes neural style transfer work on a non-VGG architecture
WeiterlesenAn example project using webpack and svelte-loader and ejs to inline SVGs
WeiterlesenAn example project using webpack and svelte-loader and ejs to inline SVGs
WeiterlesenThe main hypothesis in Ilyas et al. (2019) happens to be a special case of a more general principle that is commonly accepted in the robustness...
WeiterlesenSix comments from the community and responses from the original authors
WeiterlesenLinux offers several different methods for removing directories. In this article, we will explain how to delete directories in Linux using the rmdir, rm, and find...
Weiterlesencp is a command-line utility for copying files and directories on Unix and Linux systems.
WeiterlesenIn this article we will talk about how to use the ps command to list the currently running processes and display information about the about those...
WeiterlesenSquid is a full-featured caching proxy supporting popular network protocols like HTTP, HTTPS, FTP, and more. In this tutorial we will explain how to set up...
WeiterlesenGit is the world’s most popular distributed version control system used by many open-source and commercial projects. This tutorial explains how to install and configure Git...
WeiterlesenThis tutorial will take you through the steps necessary to create a bootable Linux USB stick on Windows, macOS and Linux machines.
Weiterlesen