User accounts can be assigned to one or more groups on Linux. You can configure file permissions and other privileges by group. For example, on Ubuntu, only users in the sudo group can use the sudo command to gain elevated permissions.
An SSH client connects to a Secure Shell server, which allows you to run terminal commands as if you were sitting in front of another computer. But an SSH client also allows you to “tunnel” a port between your local system and a remote SSH server.
If you’re a fan of using Windows PowerShell rather than the Command Prompt, you might enjoy being able to access it right from the context menu you get when you right-click a folder in Windows. Here’s how to make it happen.
With Windows 10’s Anniversary Update, Microsoft tightened the screws even further. But you can avoid the more restrictive driver-signing requirements by disabling Secure Boot.
Which of your hard drives is the fastest, and is it really as fast as the manufacturer promised? Whether you have a desktop PC or a server, Microsoft’s free Diskspd utility will stress test and benchmark your hard drives.
If you’re like most Windows users, you have lots of great little utilities that run when you start Windows. While this works great for most apps, there are some that would be nice to start even before a user logs in to the PC. To do this, you’ll need to run the app as a Windows service.
Reinstalling Windows is a good way to fix serious problems with your computer, or just to get a fresh slate. But before you reinstall Windows, you should make a list of programs you currently have installed on your PC so you know what you want to reinstall on the new system.
Say someone sent you a Word document with a lot of images, and you want you to save those images on your hard drive. You can extract images from a Microsoft Office document with a simple trick.
SSH is a lifesaver when you need to remotely manage a computer, but did you know you can also upload and download files, too? Using SSH keys, you can skip having to enter passwords and use this for scripts!
You run a respectable website that your users can trust. Right? You might want to double check that. If your site is running on Microsoft Internet Information Services (IIS), you might be in for a surprise. When your users try to connect to your server over a secure connection (SSL/TLS) you may not be providing them a safe option.
If you are a command line junkie like me, and have been testing out Windows… one of the first things you’ll notice is that there is no way to run a command from the run box in “Administrator” mode. Until now.
Many people familiar with prior versions of Windows are curious what happened to the built-in Administrator account that was always created by default. Does this account still exist, and how can you access it?
There’s nothing more tedious as a system administrator than running security updates on a dozen servers every single day. Luckily Ubuntu will let you automate stable security updates so you’re never at risk.
When you need a data set for testing or demonstration, and that set needs to represent Personally Identifiable Information (PII), you generally don’t want to use real data that represents actual people. Here, we’ll walk you through how you can use PowerShell to generate a list of random names and phone numbers for just such an occasion.
We currently enjoy many wonderful bits of technology such as the internet, mobile phones, radar, and more, but how much of it was ‘predicted’ ahead of its time by science fiction authors? You just might be surprised! PBS Digital Studios looks at the predictions that came to pass, and which author was the most accurate of all.
The rsync protocol can be pretty simple to use for ordinary backup/synchronization jobs, but some of its more advanced features may surprise you. In this article, we’re going to show how even the biggest data hoarders and backup enthusiasts can wield rsync as a single solution for all of their data redundancy needs.
Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s probably some way that iptables can be a great use to you. Read on as we show you how to configure the most versatile Linux firewall.
GitHub is a website and service that we hear geeks rave about all the time, yet a lot of people don’t really understand what it does. Want to know what all the GitHub hubbub is about? Read on to find out.
Anybody who wants to test their connection speed can easily do so from a speed test web site — but that isn’t very geeky. Here’s how to do a test from the terminal prompt instead.
Have you ever found yourself manually opening WinSCP to the same server you’ve just SSHed into with mRemoteNG? Or wishing you were able to extract the password from the mRemoteNG connection? HTG will guide you on how to unlock mRemote’s true power.
We’ve previously written about hosting your own FTP server, but data is transferred in cleartext, making it unsuitable for confidential file transfers. In this guide we’ll go over the secure version of FTP – SFTP, and why it makes for an excellent way of transferring files to other people across the internet.
Have you ever had a need to connect to multiple machines of multiple types (RDP,SSH,VNC & more) simultaneously? Have you found that retyping the credentials is a pain? Take the HTG tour of mRemoteNG.
By default, Hyper-V tries to figure out which Virtual Machines were powered on at the time that your PC had its power cut. It uses this list to automatically turn Virtual Machines back on when your PC powers on. Here is how to change what gets switched back on.
If you are a one man development team, you probably don’t really have the need for a full blown version control system, yet creating source code backups for each released version is undoubtedly important.
Domain users are not allowed to sign in with a Pin by default. However, using a little bit of GPO, we can change that.