Linux Servers – Greguti Tue, 22 Nov 2022 01:44:07 +0000 en-US hourly 1 Linux Servers – Greguti 32 32 How to record screen and audio on Windows 7 10 8? Using the free H2S Media tool Tue, 22 Nov 2022 01:44:07 +0000

For a to move back thing, Microsoft says there will be no more new versions of Windows – Windows 10 is here to stay. Microsoft also phased out service packs, instead moving to releasing two big versions each year and giving them names. If you really need to refer to a specific version of Windows, it’s easier to refer to it by its version number. Microsoft has obscured the version number somewhat in an effort to keep Windows 10 always up to date, but it’s not hard to find. Knowing which version of Windows you have might not seem so important. In most cases, you can continue to perform your daily computing tasks without worrying about it.

In late July 2020, Windows Defender began classifying hosts file changes that block Microsoft telemetry servers as a serious security risk. Versions of Windows 10 that have this color have reached their expiration date and are no longer supported by Microsoft. If you really want the latest and greatest version of Windows, then Windows 11 is where you want to be.

Step 4. Edit your Windows screen recording in Clipchamp

Using the classic shell, I pinned the snipping tool to start menu as a pretty flexible and decent app. Similar functionality is built into the Dropbox client for example. You can run the tool by pressing the Windows key, typing Snipping Tool and pressing the Enter key. You can pin the program to the taskbar or start in Windows for easier access. To do this, right-click on the icon after running it and select the pin to taskbar option. The main advantage of this method is that it only captures a program window and not the whole screen.

  • This method of VLC media player works with all versions of Windows.
  • Cd dir && command go to directory, execute command and return to current directory.
  • I will use this device name in the rest of this article.
  • One aspect of determining system efficiency is processor performance.

If you want to remove, you can follow this guide to uninstall Linux Mint from Windows 8 dual boot. I strongly advise you to read the things to do after installing Linux Mint so that you can get a good start. If you have a total of 100 GB, give 30 GB to the root.

How to Recover Ext4/Ext3 Partitions on Windows?

As you can see in the screenshots above, the experience is similar to the Snip and Sketch app in Windows 10. You can also add fun background music to the video with the “Music” feature. How to Record Screen on Android Without Apps Access your phone’s notification panel by swiping down from the top of your screen.

How to Save a Website on Windows

You can do this by searching for “Windows Update” in the Windows 10 taskbar search bar. If you just want a PC that works normally, we’ll stick with regular Windows 11 for now. However, if you really want to try Windows 11, on the “Choose your Insider settings” page that appears, select the channel you want to join, then “Confirm”.

10 Tech Gift Privacy Issues Sat, 19 Nov 2022 15:00:00 +0000
Image for article titled 10 Holiday Tech Gifts with Hidden Privacy Issues

Photo: Florence Ion/Gizmodo

the new from google the watch is the company’s latest smart device, and our crack product review team says it’s a sleek, albeit simple device.

But, of course, Google doesn’t exactly have a stellar reputation when it comes to privacy. The Pixel Watch collects a wide variety of information that the company uses for advertising and other purposes. When the device collects a variety of health information, like heart rate and menstrual cycles, just pause and ask yourself if you want to attach it. on your body.

Cameras: Nope

Microphones: Yes

Location Tracking: Yes

What data it collects: Name, email, phone number, address, birthday, gender, voice and audio recordings, biometric data, contacts, heart rate, movement, sleep data, menstrual cycle, health data, nearby devices, purchase information , data from connected Spotify accounts, historical search, details of how you use smart home products

Can you delete the data: Yes

How the company uses the data: Advertising, sharing data with third parties, combining information with third party data, developing algorithms

Mozilla says:

What’s the worst that can happen with Fitbit [which operates the Pixel Watch] and all the personal and health-related data it collects? Well, in 2021, it was reported that the health data of over 61 million fitness tracker users, including Fitbit and Apple, was exposed when a third-party company that allowed users to sync their data health from their fitness trackers did not secure the data properly. Personal information such as names, birthdates, weight, height, gender and geographic location of Fitbit and other fitness tracker users was left exposed because the company failed to protect by password or encrypted its database. This is a great reminder that yes, although Fitbit can do a good job with its own security, whenever you sync or share this data with anyone else, including third-party apps, your employer, or a data company. insurance, it could be vulnerable. I don’t know about you, but I don’t need the world to know my weight, how well I sleep and where I live. It’s really scary.

Mozilla’s review:

How to use Mastodon, the alternative to Twitter Tue, 15 Nov 2022 17:49:48 +0000

Many people are looking for a Twitter alternative after Elon Musk bought the social media site last month, changed the rules of the site on identity theft, fired half of the site staff, and announced plans to sell “blue check” verification badges for $8 a month.

One of the fastest growing alternatives is Mastodonwhich is a lot like Twitter.

But Mastodon is not a Twitter clone. It’s a free open source platformoriginally launched in 2016 by developer Eugen Rochko, and it’s made up of many different instances, or servers, instead of being run by a single company on a single domain name.

This makes signing up and finding your friends a bit more difficult.

There are also some weird little quirks. Tweets are called “toots”. Retweets are called “boosts”. Because it’s an open-source project, it doesn’t have the same level of polish as social media sites like Twitter that are professionally owned and operated.

Emails and loading can be slow. It’s a bit like using Linux versus Windows or MacOS.

Mastodon grew rapidly. In the 12 days following Musk’s purchase of Twitter, downloads of Mastodon apps on the Apple App Store and Google Play for Android increased more than 100 times previous rates to 322,000 installs during the period, according to analytics from Sensor Tower, an app analytics company.

On November 7, Mastodon founder Rochko whistled that there were over one million monthly active users of the service. That’s still far below the more than 245 million daily active Twitter users that CEO Elon Musk tweeted about this week.

Here’s what you need to know about Mastodon:

First, you need to choose a server or instance

Mastodon home page displayed on the screen of a hand-held mobile phone. It has been reported that more than 200,000 new users flocked to the social media app after Elon Musk took over Twitter.

David Bonald | Light flare | Getty Images

Because anyone can set up their own Mastodon server, there’s no central place to register like You need to find a server to register. They are called “instances” and you can think of them as email providers.

A user on one instance can interact with users on other instances, including following, replying, and boosting. All instances taken together are called “the fediverse”. (The term comes from “federated,” which refers to how the servers work together loosely – again, similar to email.)

Each instance has its own URL, which comes after your username, much like an email domain. There are more than 5,000 cases, according to a Mastodon usage tracking site, and they often follow a particular theme, such as a geographic region or topic. Some ask you to fill out a short application form with information such as your interests or why you want to join that body. Some servers are small and reserved for a small handful of friends.

There are even a quiz you can take to find which instance might be right for you.

The most popular example is, also administered by the service’s founder. Larger instances mean that many of the server’s best or shortest usernames have already been taken. There is also a list of instances you can join on Mastodon’s website.

Unlike Twitter, many of the instances Mastodon runs on are non-profit, and some fundraise for server costs and other expenses on sites like Patreon. Some instances may stop working because their administrators lose interest.

All instances have a people-only feed on this server that displays all messages posted to this instance in chronological order. But you can also just check out your personalized feed, which only shows the toots of people you follow – it’s the most Twitter-like experience.

Your username includes your server name

How to find friends

Mastodon can be a bit of a ghost town when you first log on, but there are a few ways to find your favorite old tweeters on the platform. That they post a lot is another question.

One of the easiest ways to find people to follow is to search for “Mastodon” on Twitter, where people who have created new accounts often post their new IDs. Copy and paste it into the Mastodon search box to track them.

Musk’s Twitter takeover sent thousands to Mastodon. Here’s what I found out using the app

You can also copy and paste your Mastodon ID – complete with the @ symbol and domain – into your Twitter account to have your existing followers try to join you.

There are multiple directories which list interesting people to follow on Mastodon.

If you want to try following the same people on Mastodon as you do on Twitter, there is multiple third-party apps It’s okay try importing your watchlistalthough they need access to your Twitter account, be aware that you are passing this information on to a third party.

get too much

It’s time to get going. A first post describing your interests or topics can help people find you.

Mastodon, like Twitter in its early days, gives users the choice of using different apps and interfaces to interact with toots and boosts.

Twitter migrants who miss TweetDeck, which displays multiple timelines on a desktop, should enable the Advanced Web Interface option in settings to bring up a denser interface with multiple columns.

There are also several applications for iPhone and Android devices that work no matter what instance you are on. The main Mastodon apps work fine, but there are plenty of alternative clients.

Be sure to browse the settings for features that aren’t available on Twitter, like automatic message deletions and powerful blocking and opting out features. A sensitive content feature might hide rants or NSFW messages behind a button. Mastodon’s latest version, 4.0, includes new capabilities to track hashtags, translate or edit posts, and additional content filters.

If you don’t like the instance you started on, it’s possible to export your account to another server.

Mastodon isn’t as easy to use as Twitter, nor does it have as many users generating content that will bring you back day after day. But its free and open-source approach with thousands of different servers ensures that the platform cannot be bought for 44 billion dollars.

AMD EPYC 9554 and EPYC 9654 Benchmarks – Exceptional Performance for Linux HPC/Servers Review Thu, 10 Nov 2022 19:37:07 +0000 We need your support: Have you heard of Phoronix Premium? This is what complements the advertisements on this site for our premium ad-free service. For less than US$4 a month, you can help support our site while the funds generated allow us to continue doing Linux hardware reviews, performance benchmarking, maintain our community forums and much more.

After presenting the AMD EPYC 9004 “Genoa” Series and geek out AMD’s reference platform running open source OpenBMC on Linux, it’s time to move on to benchmarking. To gauge the performance of the EPYC Genoa on Linux, AMD has kindly provided review samples of the flagship 96-core EPYC 9654 processor, the 64-core EPYC 9554 processor, and the high-frequency 32-core EPYC 9374F processor. In today’s benchmark review, I’m looking at the EPYC 9554/9654 processors while the EPYC 9374F will be featured in its own review in the coming days on Phoronix.

The EPYC 9654 is AMD’s new flagship processor with 96 cores / 192 threads, a base clock of 2.4 GHz with a boost clock of 3.7 GHz and a TDP of 360 Watts. The configurable TDP on this single 96-core part is 320 to 400 Watts.

The EPYC 9554 meanwhile is AMD’s higher-tier 64-core part over the EPYC 9534. The EPYC 9554 sports 64 cores / 128 threads with a base clock of 3.1 GHz and a boost clock of 3.75 GHz while having a TDP of 360 Watts like the EPYC 9654. Like the EPYC 9654, the cTDP is adjustable from 320 to 400 Watts. Milan’s current flagship processor, the EPYC 7763, as a reminder is 64 cores / 128 threads with a base clock of 2.45 GHz and a maximum boost clock of 3.5 GHz. Or on the Milan-X side is the EPYC 7773X with a base clock of 2.2 GHz and a maximum boost clock of 3.5 GHz while having the 768 MB of L3 cache.

The 32-core AMD EPYC 9374F high-frequency part that appears in its separate review has a base clock of 4.05 GHz and a boost of 4.3 GHz while having a TDP of 320 watts.

The EPYC 9654 has an introductory price of around $11,805, the EPYC 9554 will cost around US$9,087, and the EPYC 9374F around $4,850.

A size comparison between AMD Milan SP3 and AMD Genoa SP5.

The 5 Best VPNs for Crypto Trading Sun, 06 Nov 2022 20:21:00 +0000

Virtual private networks (VPNs) are commonly used to protect Internet users against attacks of various types. However, cryptocurrency users and traders are particularly vulnerable as bad actors seek to steal their funds.

VPNs have been suggested as a way to stay safe while trading cryptocurrencies or even just transacting with them. But what is the best VPN to stay safe while trading cryptocurrencies?

MakeUseOf Video of the day

1/7 Do You Need a VPN When Trading Crypto?

The answer is yes if you want extra protection when trading crypto. By using a VPN, you keep sensitive information such as your location, IP address, and digital activities private.

This way, it’s harder for hackers or other attackers to easily get the information they need to launch an attack on your wallet or computer. It reduces your chances of falling victim to attacks, and this is one of the reasons why you need a VPN to prevent your funds from being stolen. Here are the best VPNs you can use when trading crypto.

screenshot of nordvpn homepage

NordVPN is a highly renowned VPN with around 14 million users worldwide. He is one of the best VPN for a Chromebook and has many amazing features, some of which make it perfect for crypto traders.

First, it allows users to connect up to six devices simultaneously. This allows a typical crypto trader to monitor their trades on multiple devices at different times to make sure everything is going well.

Second, it has a dark web monitor that alerts you if someone leaks your information on the dark web. This is important because as a trader who is online most of the time, your data can be stolen and sold on the dark web. With such a monitor, you can quickly make adjustments to ensure that this information cannot be used to harm you.

NordVPN also has a browser extension that you can use on a number of browsers, including Chrome, Firefox, and Edge, to instantly secure your browsing without having to use a kill switch.

There are over 5,600 servers in 59 countries, from which you can choose the best server location. There are no limits to your protection, no geographic borders or internet censorship. You can create a Standard, Plus or Full account on NordVPN and subscribe to the biennial, annual or monthly plan.

Below is a breakdown of the fees.

Plans Complete per month more per month Standard per month
2 years $5.29 $3.99 $2.99
Annual $6.79 $5.49 $4.49
Monthly $14.29 $12.99 $11.99

screenshot of expressvpn homepage

ExpressVPN grants privacy to its users as its number one feature, which is must-have for a crypto trader because crypto transactions are supposed to be private and secure. Additionally, ExpressVPN has servers spread across 94 countries, giving its users global coverage.

You can connect up to five devices simultaneously with one account, allowing you to trade securely across multiple devices. Supported operating systems include Windows, Mac, Linux, iOS, Android, and routers. Like NordVPN, it has a browser extension for Chrome, Firefox, and Edge.

ExpressVPN supports one router, Aircove, which is the industry’s first router with built-in VPN protection. You can easily connect ExpressVPN to it and ensure the privacy of all the internet provided by this router. Thanks to its high-end encryption, you can be sure that your online information will not be stolen.

Enjoy high-speed and secure Internet browsing, with a private DNS server and no connection logs, which prevents you from being tracked online.

You can start using ExpressVPN with a 30-day money-back guarantee for the monthly plan, which costs $12.95 per month, the semi-annual plan, which costs $9.99 per month, or the annual plan, which costs $8. $32 per month.

screenshot of norton vpn home page

Norton VPN is provided by one of the oldest internet security companies in the world, Norton. The company is known for its antivirus software but also offers VPN protection to users. If you use public Wi-Fi and want to keep your online transactions private, then Norton VPN is what you need.

Le VPN keeps sensitive details like passwords, bank details, and credit card numbers private on any device you use. Additionally, you can connect up to 10 devices at once, giving you more options when it comes to using multiple screens for trading.

In addition to the usual features such as privacy, personal IP address and others, Norton VPN can detect a compromised or unsecured network and automatically secure your connected devices. There’s a no-logs policy that prohibits even Norton employees from seeing your online history, giving you complete online privacy.

It doesn’t matter where you are; Norton VPN lets you access your favorite online content without compromising your privacy.

There are different plans to choose from with Norton. You can start with a seven-day free trial and enjoy all the benefits before subscribing. The Norton subscription depends on the number of devices you can connect to the VPN. It can be one, five, or ten, and billing is annual or monthly, as shown below.

Number of devices Annual (first year) Monthly (first year)
1 $29.99 per month $4.99 per month
5 $39.99 per month $7.99 per month
ten $59.99 per month $9.99 per month

screenshot of ipvanish homepage

IPVanish offers VPN connection on multiple devices with unlimited bandwidth. Le VPN has over 2,000 servers in over 75 countries to give you complete control over your online location. Plus, with over 40,000 IP addresses shared among subscribers, you stay anonymous because no activity can be traced back to you.

It supports all sorts of devices, including iOS and Android, as well as top operating systems and even smart TVs. IPVanish also supports routers in partnership with FlashRouters so you can purchase routers with built-in VPNs for your business operations. You also benefit from high-speed and secure multimedia access.

There is an annual, quarterly and monthly plan, depending on what works for you. The annual plan includes ransomware and malware protection at $3.99 per month, the quarterly plan at $5.32 per month, and the monthly plan at $10.99 per month, but there is no free trial.

screenshot of Windscribe homepage

Last on this list but certainly not least is Windscribe, the free VPN. It is called the Free VPN because it allows mobile device users to access its VPN for free without a free trial or commitment of any kind. Additionally, each mobile device gets 10GB of free access per month, so you can trade crypto on your mobile without a subscription.

The free connection cannot be used on a laptop or any other computer, so you will need to subscribe to connect such devices, up to five per account. Windscribe primarily provides web privacy and access to geo-restricted content.

No one can track you and your browsing history remains secure. One striking thing about Windscribe is the simplicity of its user interface. There are very few features and a switch button that you can use to turn VPN connection on and off easily.

Along with a monthly and yearly plan, you can also create a custom plan that best suits your schedules and goals. Enjoy VPN protection in 63 countries around the world with ROBERT, a feature that blocks ads, trackers and malware.

Windscribe’s monthly plan is $9.00 per month, while the annual plan is $5.75 per month.

7/7 Protect yourself when negotiating; Use a VPN

Crypto trading is not only risky in terms of potential losses; hackers and thieves are actively after crypto investors. If you want to use a VPN, these are the best to ensure your privacy and security while transacting.

Subscription plans vary and some are more affordable than others, but you’re sure to find one that fits your budget and goals.

How to Install and Use Webmin on Ubuntu Linux Wed, 02 Nov 2022 15:25:00 +0000

Administering a server can be a daunting task. The good news is that there are plenty of tools out there to make your job easier. One of these tools is Webmin. This tutorial shows how to install Webmin on an Ubuntu Linux server.

What is Webmin?

Webmin is a web interface for system administration under Unix. It is similar to cPanel and Plesk but is free and open source. Use it to configure user accounts, Apache, DNS, file sharing and more.

Webmin removes the need to manually edit Unix configuration files and allows you to easily manage a system. This can save you a lot of time, especially if you are unfamiliar with the command line or need to provide web-based access to server administration for multiple users.

Webmin can also be used to monitor multiple servers from a single location. This is very handy if you are responsible for managing a large number of servers.

Added Webmin repository

Before starting, it is good to start by updating and upgrading the system.

sudo apt update && sudo apt -y upgrade

Next, install the dependencies for Webmin:

sudo apt install software-properties-common apt-transport-https wget -y.

Add the Webmin repository to the system:

sudo wget -q -O- | sudo apt-key add -
sudo add-apt-repository "deb [arch=amd64] sarge contrib"

Finally, install Webmin with the command:

sudo apt install webmin -y
Webmin Ubuntu Installer

Once the installation is complete, launch the systemctl commands to start and activate the Webmin service.

sudo systemctl start webmin
sudo systemctl enable webmin

Check the status of the Webmin service to ensure that it is operational.

sudo systemctl status webmin

You will see output similar to the following, which indicates that the service is up and running.

Webmin Ubuntu Check Status

The Webmin service listens on port 10000 by default. Run it ss command to check if it is listening.

sudo ss -ltn | grep :10000

You will see output similar to the following indicating that the service is listening on port 10000.

Webmin Ubuntu Check listening port

Access the Webmin web UI

To access the Webmin web interface, navigate to your server’s IP address followed by :10000 in your web browser:


The first time you access the Webmin interface, you will see a warning as shown below, because the SSL certificate used by Webmin is self-signed.

Webmin Ubuntu Access Web Ui

We’ll fix that later. For now, you can safely ignore this message and click the “Advanced” button.

Click “Accept the risk and continue” on the next page to enter the Webmin login page.

Webmin Ubuntu Access Web Ui Accept Cert

You will see the login page as shown. Use your root user credentials and click “Login” to log into Webmin.

Webmin Ubuntu Login Web UI

Remember that you must use your root user credentials. If you want to login as a non-root user, you will need to modify the “/etc/webmin/config” file.

After logging in, you will see the Webmin dashboard, as shown below, where you can configure various aspects of your Ubuntu system from the Webmin web interface.

Ubuntu View 3 Webmin Dashboard

Securing Webmin with SSL

  1. First, run the following command to install the Apache webserver and Let’s Encrypt Certbot tool. We use certbota tool that automates the SSL certificate setup process to generate and renew Let’s Encrypt SSL certificates.
sudo apt install apache2 certbot python3-certbot-apache -y
Webmin Ubuntu Apache Certbot 1

Start and enable the apache service.

sudo systemctl start apache2
sudo systemctl enable apache2

Check apache service status.

sudo systemctl status apache2
Ubuntu Apache Webmin Status

The best way to check if the Apache service is up and running is to request a webpage from the server by visiting the server’s IP address in your web browser.

You will see Apache2 Ubuntu default page as shown below which means apache2 service is up and running properly.

Ubuntu Apache Webmin Default Page

Point: you can also learn how to configure Apache and PHP for a high traffic site.

The next step is to configure a hostname for our Webmin server. A the hostname is a human-readable name used to identify a device on a network.

  1. Switch back to the web browser in which you accessed the Webmin web interface earlier.
  2. Select “Network -> “Network Configuration -> Hostname and DNS Client”.
Webmin Ubuntu Configure Hostname 3
  1. On the next page, enter your server’s FQDN in the “Hostname” field. FQDN stands for Fully Qualified Domain Name, the fully qualified domain name of a device. Keep the other settings as they are and click “Save” to save the configuration.
Webmin Ubuntu Configure Fqdn 3
  1. Still on the Webmin web interface, click on “Webmin -> Webmin Configuration -> SSL Encryption”.
Webmin Ubuntu Configure SSL 3
  1. Select the Let’s Encrypt tab and configure the following:
  • Host names for the certificate: enter the FQDN of your Webmin server. This is the same hostname we configured earlier.
  • Website root directory for validation file: select the “Other directory” option and enter “/var/www/html” in the input field. This is the root directory of our Apache web server.
  • Months between auto-renewal: enter 1 in the input field, which will cause the SSL certificate to be automatically renewed one month before it expires.

Keep the other settings as they are and click “Request Certificate” to generate the SSL certificate from Let’s Encrypt.

Webmin Ubuntu Generate Ssl 3

You will see a message indicating that the certificate was generated successfully, as shown.

Webmin Ubuntu Generate Ssl Success
  1. Now that the SSL certificate has been generated, we’ll test it to make sure it works correctly. In a new browser tab, navigate to the URL https://your_ip_server:10000. You will see the same Webmin login page as before, only this time it will be served over a secure HTTPS connection.

You can also verify the secure connection of the SSL certificate by clicking the lock icon next to the URL as shown.

Webmin Ubuntu Generate Secure Ssl

Create a new user with Webmin

One of the most basic tasks an administrator must perform is create a new user accounts. With Webmin, this can be easily done from the web interface.

By default, only the root user has administrative privileges on Ubuntu, so only the root user can install new software, create new users, and modify system settings.

It is recommended to avoid using the root user for day-to-day tasks. Instead, create a new user with sudo privileges and use this account for your daily tasks.

  1. Navigate to “System -> Users and Groups -> Create New User”.
Webmin Ubuntu Crate New User
  1. Configure the following basic settings for the user account:
  • username: Enter a username for the new user. You can enter any name you want, but it doesn’t have to be the same as an existing username. The name must be between 1 and 32 characters and can only contain letters, numbers, periods (.), underscores (_), and hyphens (-).
  • Real name: optionally, enter the real name of the user, which can be useful to identify the user later.
Webmin Ubuntu Create New User 1
  1. Click “Create” at the bottom to create the user.
Webmin Ubuntu Create New User 02

Once the user is created, you will see your newly created user in the user list as shown below.

Webmin Ubuntu lists a new user

Install a new package in Webmin

Another important task performed using Webmin is installing new software on your system. The web user interface helps you easily find, install and remove software packages on your system.

  1. Navigate to “System -> Software Packages”.
  2. In the “Package from APT” field, enter the name of the package you want to install in the search box and click “Install”. In this case, we install the “net-tools” package.
Webmin Ubuntu Installer Package
  1. On the next screen, click “Install Now” to confirm the installation.
Ubuntu Webmin Installation Package Confirmation

Once the package is installed, you will see output similar to the one below.

Webmin Ubuntu installer package success

Frequently Asked Questions

What should I do if I lost my root password and can’t connect to the server?

You can easily reset your root password with the command: /usr/libexec/webmin/ /etc/webmin admin password123

This command changes the password of the admin user to “password123”. Replace “admin” with your actual root username.

Why am I still getting the “not secure warning” in my browser when I try to access Webmin after configuring SSL?

Be sure to go to https://your_domain:10000 in your browser and not http://your_domain:10000. The extra “s” in https is important because it tells the browser to use a secure connection.

How can I uninstall Webmin from my server?

To uninstall Webmin, run the command /etc/webmin/ to remove all traces of Webmin from your server.

Image credit: Webmin. All screenshots by Nicholas Xuan Nguyen.

Nicolas Xuan Nguyen
Nicolas Xuan Nguyen

I’m a big fan of Linux and open source software. I’ve been using Linux for over a decade and love it. I’m also a big fan of writing. In my spare time, I like to read, play video games.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox

4 reasons why AlmaLinux is a better alternative to CentOS Sun, 30 Oct 2022 22:00:00 +0000

CentOS will reach its end of life in June 2024. As of 2022, it powers many servers around the world. In fact, in 2010 it was the most popular Linux server distribution. Based on Red Hat Enterprise Linux (RHEL), CentOS is a solid Linux operating system that powers desktop computers and enterprise servers.

News of CentOS end of life caused a lot of concern. Organizations and administrators using the operating system are sweating how to migrate their servers and IT infrastructure from CentOS. Switching server software en masse is no small feat.

Why is CentOS being phased out?

CentOS released its first version, based on Red Hat Enterprise Linux (RHEL), in 2004. Ten years later, in 2014, Red Hat acquired CentOS with the promise that CentOS would remain standalone and that Red Hat would provide technical and financial support . . This acquisition alone should have sounded the alarm.

In 2019, in its quest to accelerate its Cloud business, IBM acquired Red Hat, and with that, its strategy on CentOS also changed. The current CentOS is no longer a direct copy of RHEL but rather an upstream. A sort of testbed for RHEL, just like Fedora. In addition, the new operating system is now called CentOS feeds.

Upstream Linux distros tend to contain the latest and greatest features and have shorter release cycles. However, they do not have the level of stability required on a server or by companies, and this is where AlmaLinux comes in.

Why choose AlmaLinux?

AlmaLinux now looks a lot like CentOS used to. It is a stable and reliable operating system that is 1:1 binary compatible with RHEL. Simply put, it is similar to current stable releases of RHEL.

AlmaLinux is not only a solid replacement for CentOS but also a great alternative to RHEL. You get an enterprise-grade operating system without the service fees associated with RHEL. It is a robust and well-tested operating system.

For businesses and individuals looking a great alternative to CentOSAlmaLinux is definitely a strong candidate.

1. Strong financial support

Even though AlmaLinux is distributed free of charge, many financial resources are spent on software development, not to mention an operating system. You have to pay software developers, system administrators, and other management logistics.

Fortunately, AlmaLinux is well funded and supported. Some of the major companies supporting AlmaLinux include Amazon, Microsoft, CloudLinux, Equinix, AMD, etc. Maintaining open source software like AlmaLinux over a long period of time requires strong financial support. AlmaLinux is strongly supported by cloud service providers as it gives them a good opportunity to easily migrate from CentOS.

Apart from finances, AlmaLinux also has a large community of developers, testers and enthusiasts who contribute to the development and success of the operating system.

2. Seamless migration from CentOS

You can easily migrate your current CentOS and RHEL servers to AlmaLinux. The AlmaLinux community has developed almalinux-deploy, a migration tool to help system administrators convert their current CentOS installations to AlmaLinux.

almalinux-deploy allows you to easily migrate a complete operating system, including software and configurations from CentOS or RHEL to AlmaLinux. The whole migration process only requires your server to restart twice.

For organizations with hundreds of servers running on CentOS, the ability to easily migrate to AlmaLinux with minimal downtime is very critical for business continuity.

3. Available on servers and desktops

AlmaLinux is available in desktop and server editions. This allows organizations to develop and test software on a similar operating system base that powers their servers.

Additionally, system administration and other IT management decisions are much easier if the majority of the business uses the same operating system.

If you’ve used RHEL or CentOS before, you’ll immediately recognize their resemblance to AlmaLinux Desktop. And you won’t feel strange using it.

4. Powers a large cloud infrastructure

Although AlmaLinux is relatively new, it already powers huge cloud infrastructures and data centers around the world. It is widely used on CloudLinux and other government agencies. You can also spin AlmaLinux virtual machines on cloud services such as Azure and AWS.

A glance AlmaLinux DistroWatch The webpage also shows that AlmaLinux is gaining popularity and popularity over other RHEL derivatives.

Other CentOS Alternatives to Consider

Another big alternative to CentOS is Rocky Linux. It is also based on RHEL and is quite similar to AlmaLinux. Rocky Linux is driven by one of the pioneers of CentOS. Other early CentOS contributors are also heavily involved in the development of Rocky Linux.

Just like AlmaLinux, Rocky Linux also provides a migration tool, migrate2rocky, to help you move from CentOS and other RHEL derivatives. AlmaLinux has slightly more sponsors than Rocky Linux, and as of 2022 is more popular than Rocky Linux according to DistroWatch.

Oracle Linux is in development since 2006 and is also binary compatible with RHEL. Finally, you can also migrate to RHEL itself. You’ll have to pay a fee to use it, though, but you get much-needed server support when transitioning from CentOS.

Migrating to AlmaLinux from CentOS is easy

AlmaLinux is definitely a great alternative to CentOS and is binary compatible with RHEL. If you’re considering migrating to AlmaLinux or Rocky Linux, you should probably consider installing it on a virtual machine to get a feel for how it works. Also, you should test the migration tool in a simulated environment before using it on live servers.

]]> ManageEngine Firewall Scanner Review | Tech Radar Fri, 28 Oct 2022 08:10:55 +0000

Managing multiple firewalls, monitoring network activity, and making sense of huge amounts of traffic logs is only possible if you have security management software such as ManageEngine Firewall Analyzer (opens in a new tab) to streamline the whole process.

It is a configuration management tool that helps network administrators understand how network resources are used. Additionally, it allows them to collect, archive, and analyze security device logs and convert this data into detailed reports. The software is highly accessible and supports integration with open source and commercial technologies from other manufacturers such as Check Point, Cisco, Juniper, Fortinet, Huawei, Palo Alto, etc.