Install and Configure UFW on a Raspberry Pi
Install and Configure ufw on a Raspberry Pi UFW (Uncomplicated Firewall) is a simple and effective way to manage firewall rules on Linux-based systems, including Raspberry Pi. Here’s how you can i...
Install and Configure ufw on a Raspberry Pi UFW (Uncomplicated Firewall) is a simple and effective way to manage firewall rules on Linux-based systems, including Raspberry Pi. Here’s how you can i...
Configuring SSH Config File on Windows To manage multiple SSH keys in Windows, you can create or edit the SSH config file, which is typically located at C:\Users\<your_username>\.ssh\config. ...
Securing SSHD on Debian-based Linux Systems 1 Add User to Sudoers To add a user to the sudo group, you can edit the sudoers file using visudo: sudo visudo In the visudo editor, add your user t...
Step-by-step user guide on how to create an SSH alias on a local Windows machine Step 1: Open PowerShell Open PowerShell on your Windows machine. You can do this by searching for “PowerShell” in ...
Implementing version control for your existing dot files using symbolic links. Thi involves several steps but can be quite manageable. Here’s a detailed process to get you started: Step 1: Create...
How to Build a Personal Website Using Jekyll Note: This guide assumes that you are using a Windows machine. 1. What is Jekyll? Imagine you’re making a scrapbook. You have photos, texts, and decora...
理科生理中客,文科生屁股人?
从学渣到博士:一个学习方法改变我的命运,自创2.0版费曼学习法
31 logical fallacies 19 Common Logical Fallacies
Barbara Oakley | Learning How to Learn | Talks at Google