Delete Lines Matching Specific Pattern in a File using VIM
This guide will take you through how to delete lines matching specific pattern in a file using VIM. Linux system admins work with files day
This guide will take you through how to delete lines matching specific pattern in a file using VIM. Linux system admins work with files day
In this tutorial, you will learn how to install Kali Linux 2021.3 on VirtualBox. Kali Linux is an Advanced Penetration Testing Debian-based Linux distribution used for Penetration
In this tutorial, you will learn how to configure remote logging with Rsyslog on Ubuntu 18.04. Configuring remote logging with Rsyslog on Ubuntu allows you
In this demo, we are going to learn how to install DokuWiki on Ubuntu 22.04. DokuWiki is an opensource software written in PHP that allows users to
Welcome to our guide on how to install AnyDesk on Fedora 30/29/CentOS 7. We have covered the installation of AnyDesk on Ubuntu 18.04 in our
In this tutorial, you will learn how to setup rsyslog server on Ubuntu 20.04. Rsyslog is a multi-threaded implementation of syslogd (a system utility providing
In this tutorial, you will learn how to setup Apache Guacamole OpenLDAP authentication. Apache Guacamole is a clientless HTML5 web based remote desktop gateway which
In this tutorial, you will learn how to install Nikto web scanner on Rocky Linux 8. Nikto is a Perl based open-source web vulnerability scanner that can
Nothing is more frustrating than investing in a service that doesn’t meet your expectations. Penetration testing is an important step in ensuring the security of
Can a Laptop be Controlled Remotely? Yes, a laptop can be controlled remotely through the use of remote control software. Remote control technology allows users