PostgreSQL is an advanced, open-source relational database management system. It is written in C programming language and was developed at the University of California, Berkeley in 1996. Initially, version 1.0 of Postgres95 was announced on September 5, 1995. The first non-university version of PostgreSQL was provided on July 8, 1996, by Marc Fournier at Hub.org Networking Services. Which is the first version of PostgreSQL for public use. As of today, PostgreSQL 13.3 is the latest stable version available for installation. PostgreSQL version 9.5 and lower versions are no more supported by the team. In this tutorial, you will learn, how…
Author: Rahul
Computer Uptime refers to how long a system has been up and running without any shutdown or restart. The computer uptime helps us to find the last reboot of any system. This can be helpful in many ways like troubleshooting or scripting etc. In this tutorial, we will discuss three ways to check the uptime of any Windows machine or server. 1. How to Check Windows Uptime with Task Manager A task manager is a computer program used for checking the process and services running and their details. You can also find details about the resource utilization like Memory and…
As more and more of our lives move online, it’s becoming increasingly important to protect our online privacy and security. One way to do this is through the use of SSH tunneling, a method of encrypting your internet traffic to keep it safe from prying eyes. In this beginner’s guide, we’ll explain what SSH tunneling is, how it works, and how you can set it up. What is SSH Tunneling? SSH (Secure Shell) is a network protocol that allows you to securely access and control a remote computer. SSH tunneling, also known as SSH port forwarding, is a technique that…
There are thousands of Linux distributions available that you can use. However, people can’t choose one perfect OS that they can use as an alternative to Windows 10 or 8. Now, when it comes to Windows, it’s pretty easy to use. The same isn’t applicable for Linux. Here, you will have to need basic knowledge to operate and use the operating system. Therefore, people often choose the Linux distribution that is easy to use for a Windows user. 10 Best Linux Server Distributions 10 Best Linux Desktop Distributions 5 Best Linux Distributions that Looks Like MacOS 5 Most Stable Linux…
Secure Shell (SSH) is one of the most commonly used and secured ways to connect to a remote server. It is easy to connect with a remote server with SSH but what if you want to connect with different servers and you do it frequently. It becomes difficult to remember all the IPs addresses, usernames, commands, and passwords. So to solve this problem, SSH allows you to set and use the ssh config file for different use-cases. SSH uses a system and custom or user-specific configuration file. You can customize and configure client-side connection options and can store information of…
While working with the databases, many times you may need to rename a database. For security purposes, MySQL had dropped the direct command to rename a database from MySQL 5.1.23. So there is no direct command to the T-SQL statement available for renaming a database in MySQL server. You can follow one of the below instructions to rename a MySQL database with the help of cPanel, phpMyAdmin, or command line as per the availability. After renaming the database, remember that you need to reconfigure the permission on the new database for the users. In this tutorial, you will find three…
When we talk about accessing servers remotely, the first thing that comes to our mind is SSH. It is a network protocol and a secured version of Telnet and encrypts the connection so others cannot access the information being transmitted. With advancements in the technology world, hackers are becoming more sophisticated every day. Even your SSH connection is not secure if you are using the traditional or default installation settings. Therefore, it has become necessary to secure your SSH server from unwanted data breaches and malicious attacks by taking some crucial precautions. In this article, we will introduce you to…
If you’re a web developer or a database administrator, you know how important it is to keep your MySQL user passwords secure. But, how do you quickly and easily change your MySQL user password when you need to? In this guide, we’ll show you how to easily change your MySQL user password in just a few steps. We’ll cover the basics of MySQL user passwords, how to reset your MySQL user password from the command line, how to change your MySQL user password using phpMyAdmin, and tips for creating a strong MySQL user password. Let’s get started! Changing MySQL User…
Roundcube is a web-based email client; an email client is a computer program that allows the user to read, write and manage their email. It runs on IMAP (Internet Message Access Protocol) which is a standard email protocol that allows the user to access email from anywhere, anytime. It stores emails on the server and enables the user to manage them as if they are stored on the user’s system. This helps the user in the organization and classification of different emails(This helps the user to organize and classify different emails into different folders). In this how-to guide, we will…
Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, that allows a user to access remote systems graphically. The default Windows servers allow only one remote desktop session at a time. But, in some cases, we are required to enable remote desktops for multiple users to allow access at a time. You can achieve this by making little changes to the system registry keys. Once the changes are done, multiple users can connect to your system using the RDP client. You can also limit the number of users who can connect at a time. In this tutorial, we will…