Our home office network had gradually grown to the point that no one could remember the IP addresses of all devices. All the connected PCs, phones, tablets, and other devices had to be assigned names so that, for instance, a phone could connect to a PC by referring to it … Read >
Tag: how-to
Fast and easy self-hosted software for cloud file sharing
Here is an excellent open source software package for everyone who wants to self-host a simple file sharing cloud service. Perhaps you need a file sharing system for personal use, for your family or for a small team, but above all, you want a fast and easy to use system … Read >
How to run Windows applications on Linux PC
Microsoft Windows operating system has its advantages: one of them is the vast selection of open source and commercial applications. Linux fans may argue that there are even more apps for Linux because of servers and Android (which is built on Linux). Either way, someone considering moving to Linux PC … Read >
How to install Wireguard VPN server and client on a Linux computer
Virtual Private Network (VPN) software technology was adopted years ago by enterprises for securely establishing office-to-office connections and for allowing traveling employees to access in-house applications. Since then, VPN has proved to be a useful technology for individuals who want to protect their privacy or access geographically-restricted services from other … Read >
How to set up Elastic full text search for Nextcloud
The default search function in Nextcloud is a simple program that can find a document if you happen to correctly remember a word in the file name you are looking for. If you want to search for any text in the contents of Files, Notes, Bookmarks and in other apps … Read >
How to activate secure two-factor authentication for online services
It is only a matter of time when one of the web services you are using gets hacked. A common objective for data thieves is to steal databases that include user data, such as names, passwords, phone numbers, birth dates, addresses, and credit card numbers. The data is used … Read >