How to view .HEIC image thumbnails in Void Linux thunar/nautilus/pcmanfm…file managers

Install these packages and restart file manager sudo xbps-install libheif libheif-tools Note: HEIC thumbnails in pcmanfm didn’t work for me.

July 30, 2022 · 1 min · 20 words · Akhil Jalagam

linux swap memory limits – reference guide

Table 1: Recommended system swap space in Fedora 28 documentation {.wp-block-heading} Amount of system RAM Recommended swap space Recommended swap with hibernation less than 2 GB 2 times the amount of RAM 3 times the amount of RAM 2 GB – 8 GB Equal to the amount of RAM 2 times the amount of RAM 8 GB – 64 GB 0.5 times the amount of RAM 1.5 times the amount of RAM more than 64 GB workload dependent hibernation not recommended Table 2: Recommended system swap space per the author {....

September 25, 2019 · 1 min · 108 words · Akhil Jalagam

How to use HiDPI(4K) resolution in Linux for all applications

HiDPI (High Dots Per Inch) displays, also known by Apple’s “Retina Display” marketing name, are screens with a high resolution in a relatively small format. They are mostly found in high-end laptops and monitors. update this ~/.Xresources Xft.dpi: 240 reboot or re-login to system

September 2, 2019 · 1 min · 44 words · Akhil Jalagam

How To Redirect www to non-www OR non-www to www with Apache

1. Configure DNS Records In order to set up the desired redirect, to or vice versa, you must have an A record for each name. 2. Enable the mod_rewrite module 3.1 Update site.conf or .htaccess file ( www to non-www) 3.2 Update site.conf or .htaccess file ( non-www to www) Example ServerName Documentroot /var/www/html/ RewriteEngine on RewriteCond %{HTTP_HOST} ^ RewriteRule (.*)$1 [R=301,L] </VirtualHost>

August 31, 2019 · 1 min · 67 words · Akhil Jalagam

Testing IPSEC VPN Systems with ike-scan

ike-scan is a command-line tool for discovering, fingerprinting and testing IPsec VPN systems. It constructs and sends IKE Phase-1 packets to the specified hosts, and displays any responses that are received. ike-scan does two things: Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. Fingerprinting: Determine which IKE implementation the hosts are using. There are several ways to do this: (a) Backoff fingerprinting – recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns; (b) vendor id fingerprinting – matching the vendor-specific vendor IDs against known vendor ID patterns; and (c) proprietary notify message codes....

August 23, 2019 · 1 min · 155 words · Akhil Jalagam