Our home office network had gradually grown to the point that no one could remember the IP addresses of all devices. All the connected PCs, phones, tablets, and other devices had to be assigned names so that, for instance, a phone could connect to a PC by referring to it … Read >
Tag: guide
How to run Windows applications on Linux PC
Microsoft Windows operating system has its advantages: one of them is the vast selection of open source and commercial applications. Linux fans may argue that there are even more apps for Linux because of servers and Android (which is built on Linux). Either way, someone considering moving to Linux PC … Read >
Manual upgrade to Nextcloud version 20, 21 and 22
Update 2021-04-12: Nextcloud upgrade tested also from version 20 to version 21.
Update 2021-07-10: upgrade to version 22 was a challenge, but problems were solved. See below.
Our Nextcloud system is small but it is a vital resource for us. We have always updated the software as soon as new … Read >
Travel planning for destinations with more space than crowds
Planning a trip isn’t always easy, but it sometimes is the most fun part of the trip. Nothing can go wrong when planning. The exciting thing, of course, is the actual journey, whether it is fun or not depends on many factors. In May 2020, many travelers are considering destinations … Read >
How to set up Elastic full text search for Nextcloud
The default search function in Nextcloud is a simple program that can find a document if you happen to correctly remember a word in the file name you are looking for. If you want to search for any text in the contents of Files, Notes, Bookmarks and in other apps … Read >
WordPress security settings for beginners (without having to know technical details)
WordPress is the world’s most popular software for building web sites and for publishing on the internet. This fact makes it the number one target for hackers. Every self-hosted WordPress admin, even if only running a simple blog, should take security seriously because an unsecured WordPress site can be taken … Read >
How to activate secure two-factor authentication for online services
It is only a matter of time when one of the web services you are using gets hacked. A common objective for data thieves is to steal databases that include user data, such as names, passwords, phone numbers, birth dates, addresses, and credit card numbers. The data is used … Read >