Language Selection

English French German Italian Portuguese Spanish

Contact TM

Tux Machines is run by Bytes Media, but it is originally the Web site of Susan Linton, better known as "srlinuxx".


Bytes Media

Use this address or this form (requires logging in) for any queries related to the site.


Susan Linton

Due to an increase in spammers, I've had to disable the convenient mailto link and the feedback form. I apologize for the inconvenience.

Thank you,
-srlinuxx

Globe

More in Tux Machines

Intel Graphics and oneAPI

  • Intel Offers New Xe Graphics Details, Product Updates At 2020 Architecture Day

    This week Intel held their 2020 Architecture Day, albeit virtual due to the COVID-19 pandemic. A lot of interesting technical information was shared on both the hardware and software sides. Here are some of the interesting highlights.

  • Intel Is Using IGC In Their Windows Drivers, Internal Prototype For Mesa

    At Intel's Architecture Day this week the company was talking about work on their new Windows graphics driver that is being timed for Xe but supporting existing generations of hardware as well. One of the interesting takeaways was seeing the Windows driver is now using the open-source "IGC" back-end.

  • Intel oneAPI 1.0 "Gold" Is Coming Later This Year

    Recently I wrote about it looking like oneAPI 1.0 was lining up and now there is further confirmation of the first production release of this Intel software collection indeed coming this year. After oneAPI was announced in late 2018 at Intel's Architecture Day, it was released in early form last year and the various software components making up this collection of interfaces to exploit the potential of Intel's diverse hardware offerings have continued to advance.

Laravel for Programming (New Series)

  • Why Should I Use Laravel Framework
  • Composer Error while installing Laravel “Failed to decode response: zlib_decode(): data error
  • Mysql update or insert multiple rows – Raw Laravel SQL
  • Laravel update model with unique validation rule for attribute

    I have a Laravel User model whre I added unique validation rule on username and email. Now when I update my User through my Repo, and I want to re-validate my model, I get an error.

  • Laravel – Eloquent “Has”, “With”, “WhereHas”

    with() is generally used with eager loading, which is a quick way to pull related models. Basically, it means that, along with the main model, Laravel will preload the listed relationship(s). This is beneficial when you need to load additional data and want to avoid making N+1 DB bad practices. With eager loading, you run only one additional DB query instead of potentially hundreds of additional queries.

  • Getting a 500 Internal Server Error on Laravel 5+ Ubuntu 14.04

    This is the first time I am installing Laravel on Ubuntu and I am already running into issues, 500 errors. I have done it before, numerous times on Windows OS and never had an issue. This 500 internal server usually happens when your “mod_rewrite” module is not turned on.

  • Ajax Laravel 419 POST Error

    I would really be thankful if someone could help me with this. I am trying to make an Ajax call but I am getting 419 POST error.

  • Creating a Radio Button Input Field

    You want to create a radio button field for your Blade template.

  • Decoding HTML Entities to a String
  • 13 Best Laravel Helpers To Consider Using

    Laravel comes with a ton of useful global helper functions. If you haven’t used them so far, this is the best time to start. Over the years of me using the Laravel, 10 of those emerged as the most useful, making the development a lot easier. Sometimes we don’t really see how we can apply some methods until we see an example. So let’s get down to it and see the top 10 helpers I often use the most. These go for Laravel 5.*, however those on Laravel 6.* can bring these back using the following package https://github.com/laravel/helpers. You can also check out the official documentation for all laravel helper functions.

  • How to use Laravel with Socket.IO

    Websockets are cool. They are really helpful if you want to show real-time activities from your users (or perhaps some queue jobs). Now, if you are afraid of the word “Websockets”, don’t be. I will lay down the instructions on how you can use it and will be around to answer your questions if you need to. I had this challenge where I needed it to show a list of people who are currently viewing a specific URL in Laravel. So I started thinking. Part of me wanted to do a quick hack (luckily that’s not the strongest side of mine). Whilst the other wanted to build something cool, reusable and long-lasting.

  • Guide To Injecting Dependencies Into Controllers

    Laravel’s facades present a simple interface to the most useful classes in Laravel’s codebase. You can get information about the current request and user input, the session, caches, and much more. But if you prefer to inject your dependencies, or if you want to use a service that doesn’t have a facade, you’ll need to find some way to bring instances of these classes into your controller. All controller methods (including the constructors) are resolved out of Laravel’s container, which means anything you typehint that the container knows how to resolve will be automatically injected.

  • How to Upload Multiple Files via Ajax (VueJs and Laravel 5.5) - File Management

    When I first started using VueJs, it was a nightmare to find a decent tutorial on how to upload a single file using Ajax, let alone a tutorial explaining how to manage multiple files. I have been dealing a couple of years with file management, mostly using VueJs and Laravel, so I thought writing a tutorial like this could help a lot of developers implement one of the coolest things in applications, which is real-time asset management. First off, you will find many solutions online that are good but those who are early beginners will definitely struggle. What I will cover here is writing your frontend and backend code that will allow you to upload multiple files. Additionally, I will give you a few tricks on how to apply this stuff to different situations.

Kali Linux and Pentesting

  • Kali Linux USB Sticks

    The main aspiration of the Kali Linux bootable USB device is to serve the purpose of initiating live Kali Linux. Its essence is to provide the portability of Kali Linux, and you can carry it with you inside of your pocket. It assists in running your kali Linux in any system available near you, making kali Linux accessible to you at your accord. One of the main vantage that it provides is the customize feature. You are free to customize your very own operating system to carry it in the Kali Linux USB stick. The user just needs to follow the procedure to customize its OS image on the kali Linux USB stick. It is very system friendly, imposing no harm to the system you install it in. You just need to plug out the USB drive to get back to the original operating system of the host. Every model of kali Linux USB stick has a different chipset, making dongles compatible with the overall Kali Linux. It is rarely possible to get all features in a single USB stick as some are focused on size, while others are based on the reading/ writing cycles and speed. Here is the buying guide that can help you in selecting the best USB stick compatible with your system needs depending on its usage.

  • KALI LINUX DNS RECONNAISSANCE

    DNS Reconnaissance is an information-gathering part for a penetration testing. It is used where penetration testing is being performed. It can gather and collect all types of information on the records and target server. It does not affect any IP addresses; therefore, it is best to use for checking on or disclose the information of any network. This is only possible for those networks or organizations that do not check upon the DNS traffic. So, the types of enumeration that perform include zone transfers reverse lookups domain and host brute force standard record, enumeration, catch snooping, zoom working, and also Google Luca.

  • Metasploit in Kali Linux 2020

    The internet is full of lurkers with malicious intents who want to access networks and exploit their data while evading detection. It only makes sense to ensure a network’s security by measuring their vulnerabilities. Penetration testing or ethical hacking is how we test networks or servers for pregnable targets by pinpointing all possible breaches that a hacker might use to gain access, thus reducing security compromises. Penetration testing is often conducted through software applications, the most popular of which is Kali Linux, preferably with the Metasploit framework. Stick till the end to learn how to test a system by executing an attack with Kali Linux.

  • Post exploitation with Meterpreter

    This is an introduction to the Meterpreter payload plugin within Metasploit. In this short tutorial, we will discuss how to use it to apply post exploitation to a WINDOWS OS system once you’ve already breached it using the Eternalblue exploit. We will limit ourselves to accessing the windows system and exploring it, and all the things that we are going to do will focus on accessing information and user credentials. Introduction to Meterpreter Meterpreter is an attack payload in the Metasploit framework that lets the perpetrator control and navigate the victim computer through a command shell. It can prove to be a very versatile tool when it comes to penetration testing. It is a post-exploitation tool that is based on in-memory DLL injection, meaning it gets the injected DLL running by creating a new process that calls for the system to run the injected DLL. It can give you access to an invisible command shell on a victim machine, letting you run executables and profile networks. It was originally written for Metasploit 2.x and is upgraded for Metasploit 3.

  • Pen testing web applications with Metasploit’s “Wmap scanner”

    “Scanning” involves all methods and techniques for identifying live systems like networks or servers to uncover its operating system and architecture. These techniques are used to identify any vulnerable points in a network that can be exploited. This is a beginner’s tutorial on using the WMAP plugin incorporated in the Metasploit framework to scan for vulnerabilities in web applications. We will use the web application DVWA as a target to demonstrate the scanning process done using WAMP. DVWA is short for “damn vulnerable web application,” and the app is specially designed to used by cybersecurity novices to test and sharpen their penetration skills.

Python Leftovers

  • sphinxcontrib-spelling 5.2.1

    sphinxcontrib-spelling is a spelling checker for Sphinx-based documentation. It uses PyEnchant to produce a report showing misspelled words.

  • Python Community Interview With Bruno Oliveira

    Welcome to Real Python, Bruno. I’m glad you could join us. Let’s start in the same manner we do with all our guests: How’d you get into programming, and when did you start using Python?

  • How to use AJAX with Django

    AJAX is an acronym for Asynchronous JavaScript and XML. It is a group of inter-related technologies like JavaScript, DOM, XML, HTML, CSS etc. AJAX allows you to send and receive data asynchronously without reloading the web page. At some point in your project development process, you will need AJAX to execute some task. One fine example could be checking username availability on the signup form. We will discuss the same scenario here and will guide you through the step by step process of using AJAX with Django.

  • How to create management commands in Django

    You must have used createsuperuser command in your Django application at one or another time. If not then I am sure you must have used makemigrations or migrate commands in your project. Yes? Yes. So these commands, also called as management commands are used to execute some piece of code from the command line. In this article, We will see how to create your own command.

  • Python Development Environment on macOS Mojave & High Sierra

    While installing Python and Virtualenv on macOS Mojave & High Sierra can be done several ways, this tutorial will guide you through the process of configuring a stock Mac system into a solid Python development environment.

  • How to Learn Python for Data Science In 5 Steps

    Before we explore how to learn Python for data science, we should briefly answer why you should learn Python in the first place. In short, understanding Python is one of the valuable skills needed for a data science career. Though it hasn’t always been, Python is the programming language of choice for data science.

  • Conservancy and PyPy's great work together

    PyPy joined Conservancy in the second half of 2010, shortly after the release of PyPy 1.2, the first version to contain a fully functional JIT. In 2013, PyPy started supporting ARM, bringing its just-in-time speediness to many more devices and began working toward supporting NumPy to help scientists crunch their numbers faster. Together, PyPy and Conservancy ran successful fundraising drives and facilitated payment and oversight for contractors and code sprints. Conservancy supported PyPy's impressive growth as it expanded support for different hardware platforms, greatly improved the performance of C extensions, and added support for Python 3 as the language itself evolved.

  • A new chapter for PyPy: Transitioning away from a Charitable Model

    PyPy has been a member project of Software Freedom Conservancy since 2010 and although it's been a mutually successful partnership, nothing lasts forever — especially in software. Today, Conservancy and PyPy announce that they are winding down their ten year relationship. PyPy will remain free software, but the community's structure and organizational underpinnings will change. Conservancy provides a fiscal and organizational home for projects that find the freedoms and assurances that come along with a charitable home advantageous for their community goals. While this framework was a great fit for the early PyPy community, that community has changed such that this is no longer the case. PyPy's leadership are exploring non-charitable options for its next phase of growth.

  • PSF GSoC students blogs: Week 9
  • PSF GSoC students blogs: Week 11 Check in!
  • PSF GSoC students blogs: Weekly Check In - 10