Getting rid of Putty – ssh history
for ((i=1; i<=5; i++)); do history -d $(history 1 | awk '{print $1}'); done
to get rid of the last 5 lines / commands
for ((i=1; i<=5; i++)); do history -d $(history 1 | awk '{print $1}'); done
to get rid of the last 5 lines / commands
Protip: 💡You can use | pipes to preview multiple fonts at once. Backstory: There I was trying to choose a font that I can use as a logotype out of a few candidates I noticed Google fonts has no option to “select” some fonts so that I can view them all at once. So intuitively…
While optimizing our MySQL server we noticed our mysqld.log was huge in size – 1GB+ – and it was filling every moment with the below message: [Warning] [MY-013360] [Server] Plugin mysql_native_password reported: ”mysql_native_password’ is deprecated and will be removed in a future release. Please use caching_sha2_password instead’ Below article explains the issue https://support.cpanel.net/hc/en-us/articles/16550190886935-MySQL-log-warning-mysql-native-password-is-deprecated-and-will-be-removed-in-a-future-release But it…
Sometimes WooCommerce notices get stuck for different reasons, but we’ve had this particular woocommerce notice persisting in more than one woocommerce sites. To get rid of this “Critical vulnerabilities in WooCommerce” notice you have to set the notice to “actioned”. In order to that, you can either go to phpMyAdmin and do it manually like…
Moving a WordPress site from your main domain to a subdirectory (like from site.com to site.com/mirror/) is a common task for developers working on staging environments or site redesigns. However, simply copying files isn’t enough—you need to update your database to reflect the new URL structure. Here’s your comprehensive guide to making this transition smoothly….
We were promoting our codes with capital letters as a style choice But while the code “burhi” worked the code BURHİ did not because Turkish, “i” and “İ” are considered as different characters, and the lowercase of “İ” is “i”, not “ı”. T. The code should work for other international accented diacritic characters like umlauts
If you manage a Linux server, you know the drill: you check your logs and see a single IP address making 20,000 requests in an hour. Is it a legitimate crawler, a customer having a bad day, or a malicious bot searching for vulnerabilities? Manually checking every IP against threat databases is exhausting. To solve…