tutorial

Let’s build “Java demos” together during Hacktoberfest

Let’s build “Java demos” together during Hacktoberfest

Last year I first learned about Hacktoberfest where devs are encouraged to contribute into open-source projects. I managed to pass the challenge, although I spent a lot of time going through many projects from first class global tools (where I didn't see how to contribute) to totally meaningless "Hello, Worlds" (where I didn't see why to contribute). In 2024, I am looking for struggle through this once again. But this time, I also wanted to place something on the other pan of the scale. I am working here and there on number of different side projects in my GitHub repo.…
Read More
Rsyslog ile Kullanıcıların Bash History Bilgilerinin Log Sunucusuna Yönelendirilmesi

Rsyslog ile Kullanıcıların Bash History Bilgilerinin Log Sunucusuna Yönelendirilmesi

1- Rsyslog Paketinin Kurulması Log paylaşımı yapması istenen linux sunucuda rsyslog paketinin kurulu olup olamdığını kontrol edelim, yoksa kuralım. Debian sistemler için: apt install rsyslog Enter fullscreen mode Exit fullscreen mode RPM tabanlı sistemler için yum install rsyslog Enter fullscreen mode Exit fullscreen mode 2- Rsyslog Yapılandırmasının Yapılaması Standart rsyslog kurulumunda yapılandırma bilgileri /etc/rsyslog.conf içinde ve /etc/rsyslog.d/ klasörünün altında .conf uzantılı dosyaların içinde yer almaktadır. Kullanıcıların komut geçmişlerine erişmek ve yönlendirmek için birkaç konfigürasyonu yapılandırma dosyasına eklememiz gerekmektedir. $ModLoad imfile $InputFileName /home/*/.bash_history $InputFileTag bash_history $InputFileFacility local0 $InputRunFileMonitor local0.* @<hedep-ip>:<hedep-port> Enter fullscreen mode Exit fullscreen mode InputFileName alanı yönlendireilecek dosya veya…
Read More
Thought-Provoking Questions Every Backend Developer Should Ask

Thought-Provoking Questions Every Backend Developer Should Ask

Whenever I embark on a backend development project, I find it essential to ask myself a set of critical questions. These questions help guide my approach to building a system that is scalable, secure, and highly performant. Here are some of the key areas I focus on and the thought-provoking questions I ask to ensure I'm building the best possible solution. 1. API Design & Usability APIs are the backbone of many backend services. They need to be both functional and easy to use, but they also require speed, security, and resilience against abuse. Some of the questions I ask…
Read More
Data Scraping: A JSON-derful Adventure!

Data Scraping: A JSON-derful Adventure!

Data scraping, often referred to as web scraping, is the process of extracting data from websites. In recent years, JSON (JavaScript Object Notation) has become a popular format for data exchange, making it a prime target for scraping. This guide provides an overview of data scraping, its history, its main uses, and how popular companies utilize it today. A Brief History of Data Scraping The origins of data scraping can be traced back to the early days of the interwebs when people needed to extract information from static HTML pages. Early web scrapers were simple scripts written in languages like…
Read More
Mastering C# Fundamentals: Parsing Strings

Mastering C# Fundamentals: Parsing Strings

Meta Description:Learn how to convert strings to other data types in C# using Parse() and TryParse(). Discover the differences, practical examples, and best practices for safely handling user input. Introduction: Parsing strings into other data types is a fundamental part of working with user input in C#. Whether you need to convert a string to a number, a boolean, or a date, C# offers methods that help you achieve this safely and effectively. In this article, we'll explore how to use Parse() and TryParse() to convert strings into other types, including int, decimal, bool, and DateTime. Using Parse() to Convert…
Read More
Performing Backups in Linux: Tools and the 3-2-1 Strategy

Performing Backups in Linux: Tools and the 3-2-1 Strategy

This article covers the tools and methods involved in performing a full Linux backup and a few of the tricks I use. Here’s a backup checklistCompleteness. Backups should include all the critical components of your project: databases, site files, configuration files, and multimedia content. Regularity is key to minimizing data loss. The frequency by which you back up depends on the pace of change on your site. As a rule, this ends up being daily to weekly. Secure storage. Backups must not be stored on primary servers. It is better to use cloud storage or dedicated physical media. Encryption. Data…
Read More
Understanding and Configuring Oracle Access Control Lists (ACLs) for Email Sending Using UTL_MAIL

Understanding and Configuring Oracle Access Control Lists (ACLs) for Email Sending Using UTL_MAIL

Introduction This article is based on real problems I had in a production environment in Oracle 11g. Oracle Database provides powerful networking capabilities, allowing PL/SQL programs to interact with external systems over the network. To enhance security, Oracle introduced Access Control Lists (ACLs) starting from Oracle Database 11g. ACLs enable fine-grained control over network access, ensuring that only authorized users and programs can communicate with specified external hosts and services. This article provides a comprehensive guide to understanding ACL capabilities in Oracle, how to configure them, and how to send emails using the UTL_MAIL package. We will walk through the…
Read More
Setting Up a Multi-Tier Web Application Locally: A DevOps Guide

Setting Up a Multi-Tier Web Application Locally: A DevOps Guide

For any developer or DevOps engineer, setting up and managing a multi-tier web application can be a daunting task, especially when working locally. But with the right tools, the process can be automated and simplified—saving you time and headaches. Let’s dive into how I automated the setup of a multi-tier web app using Vagrant, Oracle VM VirtualBox, and Git Bash. Why Local Setup? When you're in the middle of a project, making changes directly on live servers can be nerve-wracking. What if something breaks? What if it's not easily reversible? The ability to experiment and configure the entire application stack…
Read More
Sed It Right: Mastering the Stream Editor for Text Magic

Sed It Right: Mastering the Stream Editor for Text Magic

We all feel the pain of regex's weird syntax, but hey, we're not going to let that stop us from achieving greatness! Despite its quirks, regex is a powerhouse when used in combination with sed. Let’s harness its strength! sed becomes a real powerhouse when you start using regex to match patterns more intelligently. For example, suppose you want to replace any sequence of digits with the word "[number]": sed 's/[0-9]+/[number]/g' text.txt Enter fullscreen mode Exit fullscreen mode This will replace any group of digits ([0-9]+) with "[number]" throughout the file. Regex allows you to create powerful and flexible searches,…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.