Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?
In this article, we will explain how to create an e-mail account specific to your domain or private to your company in the form of firstname.lastname@example.org.
For companies, you can also receive email from Google as G Suite, from Microsoft as Office 365 or Exchange, or from alternative...
In Xenforo or similar sites, it takes a long time to become a member of the sites you want to become a member of.
Instead, you can sign up right away with your Google or Facebook account. So you don't have to worry about activation or remembering your password.
First, let's go to the link below...
The biggest problem of webmasters is Spam problem.
Spam members, spam messages, spam mails, spam ads are quite a headache.
Google has a nice app for this: reCAPTCHA
reCAPTCHA v3 is the latest version and completely free.
Here you can find link of recaptcha: reCAPTCHA
You can sign in with...
Google hasn't offered the Maps app for free since 2016. It was obvious that distributing such a wonderful service for free would also stop at some point.
This error is because you have to create an API.
Google is actually somewhat right. The site that uses maps 1-2 times in a week and the site...
In the internet world, the purpose is usually the purchase decision. There are those who see a product for the first time, and those who wait for a campaign or a decision for months and years.
There are rational and emotional viewers when making a purchase decision.
In fact, every person is...
The fact that you pay for Google G Suite and start using a corporate email address does not mean that your emails will not end up in the spam or junk folder.
We also recommend patching the following checks:
Imagine that you send an offer, the other party says that there is no mail, but you are...
Log files are one of the most important parts of a system. With log files, you can find people who log into the system, program error messages, error types, wrong jobs and take action. Many problems are solved by log file inspections.
In CentOS, log files are saved in /var/log folder.
Yum and Epel packages are very rich but not sufficient.
For example, you may not be able to install the ffmpeg package the way you want with yum install ffmpeg.
In this case, the only way to install the software you want is to download the archive files containing the source codes to your server...
On Linux, applications are installed as packages, as on Mac and Windows. On CentOS, package installations are done with the Yum tool. The Yum tool provides ease of use. Because when installing the packages, the package is already defined which file will be taken from where and how and where it...
Some operations may need to be performed repeatedly automatically. In this case CRON is used in linux. For example, regular update check, regular update, regular backup, regular file scanning are done with CRON.
CRONs are set in minutes, hours, days, months and business days. CRONs are saved in...
There are runlevels on both Windows and Linux. These are called Runlevels.
Runlevel 0: System is in halt mode. All services running at this level are killed. The system shuts itself down safely. When init 0 is written to the terminal, this level is passed.
Runlevel 1: Switches from multi-user...
There are usually too many users on Linux.
In Windows, there is usually 1 Administrator and 1 or more users.
Linux's Administator is the root user.
UID : User ID --> User ID
GID: Group ID--> Group ID
In Linux, we make users with the command useradd and groupadd .
In Linux, directory write, access and read permissions are indicated by the letters RWX.
The first 3 characters are for the file owner.
2. 3 characters are for the group you have
The last 3 characters are global permissions. It's for everyone.
r : read permission.
w : write permission.
There are 2 types of links in Linux. Hard Link (ln) --> When the link is given, it is as if the file was copied. The link still works when the source is deleted. It takes up too much space. Soft Link (ls)--> It is the process of creating a path that we know.
In Linux, find, grep, ded and locate commands are used as search functions.
find /ruzgar -name com : Lists the directories with the name com in the ruzgar folder.
find . -name "*.jpg" : With this command, we will list the jpg files where we are.
find . -user ruzgar : This command...