Featured | Featured article

How to Configure Ansible

When working with Ansible, the default settings aren’t always the best fit for your environment—especially in a development or test setup.

Latest Blog Posts

What Is?

What Is a Bug Bounty Program?

A bug bounty program is an established method of reporting security vulnerabilities to companies for several years running.

Java

Java Programming with Docker

For many years, Java has been the number one in the TIOBE index of the most commonly used programming languages.

Web Development

Tools for Full Stack Developers

For web application development, you need the right tools to make your work easier. Without the right tools, development would be a lot more time...

HTML & CSS

How to Create Link-Sensitive Graphics Like Image Maps with HTML

Link-sensitive graphics (also called image maps) are just links embedded within a graphic. Such an image map defined in HTML consists of three parts.

Cybersecurity

Securing Linux Using 2FA with Google Authenticator

In this blog post, we’ll show you how you can implement two-factor authentication for SSH on a Linux system.

JavaScript

How to Install Node.js on Windows, Mac, and Linux Systems

The easiest way to install Node.js on your system is to use existing packages for your system.

Video

How to Get Started with HTML for Web Design

Beginners often wonder what is needed to create web pages and learn HTML. This post will answer that question.

DevOps

Merge and Pull Requests in Git

Based on the feature branch model, the major Git platforms have extended the workflow to include merge/pull requests as integral parts.

DevOps

How to Install Docker on Windows, Mac, and Linux Systems

In this blog post, we’ll teach you how to install Docker on a Windows, Mac, or Linux system.

JavaScript

The Principle of Ajax in JavaScript

The name Ajax was first coined in 2005 by Jesse James Garrett in his essay "A New Approach to Web Applications." The idea is to use JavaScript for...