How to install and use PuTTY on Linux Ubuntu, Mint or Debian

SSH is one of the pillars of remote and secure communication between computers, and one of the most well-known and used is PuTTY. Known for its popularity on Windows, PuTTY can also be a useful tool for Linux users.

We’ll show you how to install this powerful tool on some of the most popular Linux distributions:...

featured dns flush.jpg

Domain Name System (DNS) caching is a mechanism used to speed up the resolution of domain names to IP addresses. When you type a domain name into a web browser - URL Address, the browser first needs to find out the IP address of the server hosting the website before it can connect to it. This is done through the domain...

scp-command-featured.webp

We often need to move files from a local machine to a remote server or vice versa, especially when managing or deploying code on servers. One efficient way to do this is through Secure Copy Protocol (SCP), a tool that’s built into the SSH (Secure Shell) protocol. This guide will walk you through how to use SCP on...

featured-extensions.webp

An .APPLICATION file is a ClickOnce Deployment Manifest file that runs over .NET Framework.

This article describes what an APPLICATION file is and how to open one or convert one to a different format.

The .application is meant to run on Windows Systems, so,...

If you want to set up the Best environment for software development in Linux Mint (or Ubuntu and other Debian based distros), this is the right article for this.

Every software developer organizes their development environment for programming using a mix of technologies and tools to use to program, improve productivity...

Are you running out of space on your Linux system? Here are several ways to clean your system to free up space in Ubuntu and other Linux distributions based on Debian as Linux Mint.

Over time, the hard drive of any operating system can be disorganized as programs are added and removed. If you have 1 TB (a Terabyte) of...

Linux is a multiuser operating system, and thanks to this several people may be authenticated and working on a particular machine at the same time.

To ensure safety, as good practice users do not share credentials in the same account, and each person will have their own access user. This means that best practices...