πŸ“Š Analytics
πŸ“€
βœ“ Font applied successfully
πŸ” All
πŸ–ΌοΈ Images
🎬 Videos
🌐 Resolve IP
πŸ“° Articles

No videos found

No videos available in the uploads directory. Check the connection to the server.

LAMP installation for Debian Mint and Ubuntu

LAMP installation for Debian Mint and Ubuntu

The Complete LAMP Stack Guide: Debian, Ubuntu & Mint From zero to a fully functioning web server. Install, secure, and deploy with single commands. What is LAMP & Why It Matters LAMP is the foundational stack that powers over half the internet: Linux (Operating System) Apache (Web Server) MariaDB/MySQL (Database) PHP (Programming Language) This guide covers Debian 12+, Ubuntu 22.04+, and Linux Mint 21+ with modern package versions and security best practices. Part 1: The One-Command Installation Update your system first: sudo apt update && sudo apt upgrade -y The magic command: sudo apt install apache2 mariadb-server php libapache2-mod-php php-mysql php-cli php-curl php-gd php-mbstring php-xml php-zip -y What this installs: apache2: The Apache web server (version 2.4+) mariadb-server: Modern drop-in replacement for MySQL (version 10.11+) php: PHP 8.1+ (8.2/8.3 on newer systems) with core functionality libapache2-mod-php: Apache module to process PHP files php-mysql: PHP module for MariaDB/MySQL connectivity Plus essential extensions: cURL, GD graphics, MBstring, XML, Zip Part 2: Verification & Basic Configuration Test Apache (Web Server): sudo systemctl status apache2 # If not running: sudo systemctl start apache2 # Enable auto-start: sudo systemctl enable apache2 Open your browser to http://localhost or your server's IP address. You should see the Apache default page. Test PHP: Create a test file: echo "<?php phpinfo(); ?>" | sudo tee /var/www/html/phpinfo.php Visit http://localhost/phpinfo.php. You'll see a detailed PHP configuration page. Delete this file after testing: sudo rm /var/www/html/phpinfo.php Configure MariaDB (Security Hardening): Run the interactive security script: sudo mysql_secure_installation Follow prompts to: Set a strong root password (different from your system password) Remove anonymous users (Y) Disallow root login remotely (Y) Remove test database (Y) Reload privilege tables (Y) Part 3: Creating Your First Website 1. Set Proper Permissions: sudo chown -R $USER:$USER /var/www/html sudo chmod -R 755 /var/www/html 2. Create a Virtual...

Installing NPM and Gemini and Claude CLI

Installing NPM and Gemini and Claude CLI

Power Up Your Terminal: Install Node.js, Claude Code & Gemini CLI Transform your command line into an AI-powered development workstation. A complete guide from zero to hero. Your AI Terminal Arsenal Why settle for one AI assistant when you can have a team? This guide installs the powerhouse combo for modern developers: πŸ€– Claude Code: Anthropic's agentic assistant for complex, context-aware coding tasks. 🧠 Gemini CLI: Google's interface to the massive-context Gemini models, perfect for analysis. Both run on Node.js, which we'll install first. Part 1: Installing Node.js & npm Node.js is the JavaScript runtime that powers these tools. npm (Node Package Manager) is how you install them. Check if You Already Have It: node --version npm --version If you see version numbers (Node.js 18+ is ideal), you can skip to Part 2. If you get an error, proceed. Installation Methods: Recommended: Official Installer (Easiest) Visit the official Node.js website. Download the LTS (Long Term Support) version for your operating system (Windows, macOS, Linux). Run the installer, accepting all default settings. This installs both `node` and `npm`. For macOS/Linux (via Package Manager): # macOS with Homebrew brew install node # Ubuntu/Debian curl -fsSL https://deb.nodesource.com/setup_lts.x | sudo -E bash - sudo apt-get install -y nodejs # Fedora sudo dnf install nodejs Verify Your Installation: node --version # Should show v18.x.x or higher npm --version # Should show 9.x.x or higher Part 2: Installing Claude Code Claude Code is installed globally via npm, making the `claude` command available anywhere in your terminal. The Installation Command: npm install -g @anthropic-ai/claude-code The `-g` flag means "global." First-Time Setup & Authentication: Run the tool for the first time: claude It will prompt you to enter your Anthropic API key. If you don't have a key, go to console.anthropic.com, create an account, and generate a...

Hardening Linux With Commands

Hardening Linux With Commands

The Operator's Manual: Ready-To-Run Linux Hardening Commands Copy, Paste, and Fortify. A practical command-line guide. Critical Pre-Flight Check WARNING: Run these commands on a new system or in a test environment first. Some steps are disruptive. Always have backups and console access. #1 Mindset: You are the administrator. Understand what each command does. # View this command's manual before running it man [command_name] Part I: Foundation & First Lockdown 1 Update & Minimize: # Debian/Ubuntu sudo apt update && sudo apt upgrade -y sudo apt autoremove --purge -y # RHEL/CentOS/Fedora sudo yum update -y sudo yum autoremove -y 2 Create Your Admin User: sudo adduser sysadmin sudo usermod -aG sudo sysadmin # Debian/Ubuntu # sudo usermod -aG wheel sysadmin # RHEL/CentOS 3 Secure SSH (On Your Local Machine): ssh-keygen -t ed25519 -f ~/.ssh/server_access -C "sysadmin@$(hostname)" 4 Copy Key & Lock SSH: # ON YOUR LOCAL MACHINE, copy the key to the server ssh-copy-id -i ~/.ssh/server_access.pub sysadmin@YOUR_SERVER_IP # SSH into the server as 'sysadmin', then run: sudo sed -i 's/^#*PermitRootLogin.*/PermitRootLogin no/' /etc/ssh/sshd_config sudo sed -i 's/^#*PasswordAuthentication.*/PasswordAuthentication no/' /etc/ssh/sshd_config sudo sed -i 's/^#*PubkeyAuthentication.*/PubkeyAuthentication yes/' /etc/ssh/sshd_config echo "AllowUsers sysadmin" | sudo tee -a /etc/ssh/sshd_config sudo systemctl reload sshd Part II: System Fortification 5 Setup Firewall (UFW): sudo ufw --force enable sudo ufw default deny incoming sudo ufw default allow outgoing sudo ufw allow 22/tcp comment 'SSH' # CHANGE PORT if you modified SSH sudo ufw status verbose 6 Harden Password Policy: # Install password quality module sudo apt install libpam-pwquality -y # Debian/Ubuntu # sudo yum install libpwquality -y # RHEL/CentOS # Edit PAM config (might differ slightly by distro) echo "password requisite pam_pwquality.so retry=3 minlen=12 difok=3 ucredit=-1 lcredit=-1 dcredit=-1 ocredit=-1" | sudo tee -a /etc/pam.d/common-password sudo sed -i 's/^PASS_MAX_DAYS.*/PASS_MAX_DAYS 90/' /etc/login.defs sudo sed -i 's/^PASS_MIN_DAYS.*/PASS_MIN_DAYS 7/' /etc/login.defs sudo sed -i 's/^PASS_WARN_AGE.*/PASS_WARN_AGE...

Hardening Linux Environments

Hardening Linux Environments

The Fortress & The Garden: A Philosophical Guide to Hardening Linux A 50+ Step Journey to Building a Resilient Server Introduction: The Administrator's Mandate In the digital landscape, your Linux server exists in a state of perpetual tension. It is both a fortress that must repel invaders and a living gardenβ€”a dynamic system that requires careful cultivation, pruning, and nourishment to thrive securely. Hardening is not a checklist to be completed, but a continuous state of mindful administration. This guide is structured as a journey from the foundation to the parapets, moving from philosophy to concrete command. Part I: Laying the Foundation – Philosophy & Initial Conquest 1 Embrace the Mindset: Internalize the Principle of Least Privilege (PoLP). 2 Document Relentlessly: Create a secure, offline record of every change. 3 Start with a Minimalist Canvas: Begin with a minimal installation. 4 Conquer the Network: Know your server's address and hostname intimately. 5 Claim Your Throne Securely: Use SSH with key-based authentication from the first login. 6 Establish a Sovereign Identity: Set your server's hostname correctly. 7 Build the Outer Wall: Configure the system's basic firewall before enabling services. 8 Install the Sentry: Use ufw (Uncomplicated Firewall). Enable it with default denials. 9 Create the Master Keys: Generate a strong, unique SSH key pair for yourself. 10 Plant Your Flag: Copy your public key to the server. Part II: Constructing the Inner Keep – System Integrity & Access Control 11 Depose the Tyrant: Disable direct root login via SSH (PermitRootLogin no). 12 Banish the Weak: Disable SSH password authentication (PasswordAuthentication no). 13 Narrow the Gate: Change the default SSH port from 22 to a non-standard one. 14 Appoint Trusted Lieutenants: Create a dedicated, unprivileged user account for daily work. 15 Delegate Power Wisely: Add your new user to the sudo...

Surviving Day! Modable Voxel Adventure

Surviving Day! Modable Voxel Adventure

Creating a game with ai has been an interesting experiment. World lag is almost fixed. Welcome to the last Demo for Surviving Day! Its a feature rich example of the game that is being made. Players can build computer networks, build cities, explore and mine and cut down forests, play with an advanced economy, and marvel at shaders that really made the game stand out. Modding is being figured out as we speak. That and Multiplayer. Leave a comment about what you think when well in this demo and what could be improved! All bug reporting will help! There is also a new satellite players can launch to use with receivers at other computers :D Download Demo