×


Blog


Install Git on Rocky Linux 8 - Step by step guide ?

This article covers how to install and configure Git on Rocky Linux 8. In fact, Git is popular version control system designed to handle very large projects with speed and efficiency; it is used for many high profile open source projects, most notably the Linux kernel.


How To Uninstall git on Ubuntu 21.04 ?

To uninstall only the git package we can use the following command:

$ sudo apt-get remove git

We can use the following command to remove git configurations, data and all of its dependencies, we can use the following command:

$ sudo apt-get -y autoremove --purge git


Python split() Function

This article covers how to use the split() function in Python. In fact, The split() method breaks up a string at the specified separator and returns a list of strings.


split() Parameters

The split() method takes a maximum of 2 parameters:

  • separator (optional) - Delimiter at which splits occur. If not provided, the string is splitted at whitespaces.
  • maxsplit (optional) - Maximum number of splits. If not provided, there is no limit on the number of splits.


split() Return Value

The split() method returns a list of strings.


tty (/dev/tty ) vs pts (/dev/pts) in Linux

This article covers the differences between pts and tty. In fact, it also shows you how to overview the Linux system.


Install Snort on Ubuntu 20.04 - Step by step guide ?

This article covers how to install Snort on Ubuntu 20.04. In fact, Snort monitors the package data sent and received through a specific network interface. NIDS can catch threats targeting your system vulnerabilities using signature-based detection and protocol analysis technologies. NIDS software, when installed and configured appropriately, can identify the latest attacks, malware infections, compromised systems, and network policy violations.


Delete and Dispose of Files Properly in Ubuntu With Shred

This article covers how to delete files and folders in Ubuntu Linux system. In fact, Your files can be recovered and leaked with the help of data recovery software.