Python List Functions

Python List Functions – The Definitive Guide

Python list is a sequence of values, it can be any type, strings, numbers, floats, mixed content, or whatever. In this post, we will talk about python list functions and how to create, add elements, append, reverse, and many other python list functions.   Create Python Lists There are several ways to create a python […]

Python Modules

How to Import, Create, Install, Upgrade, Alias and Reload Python Modules

One of the significant advantages when using Python is the large amount of the available modules, we can say that there are python modules for almost everything you need. You need to work with robots, or some hardware in a spaceship, you will find a python module for that. In this post, we will talk […]

Python programming basics

Python Programming Basics with Examples

Python is a popular and a powerful scripting language that can do everything, you can do web crawling, networking tools, scientific tools, Raspberry PI programming, Web development, video games, and much more. With python programming, you can do even system programming regardless the platform you are using. Two days ago, a Russian friend was searching […]

develop ios apps using Swift
IOS Development

Develop iOS Apps Using Swift

In the previous post, we talked about iOS language basics and we saw how easy it is to work with Swift language. In this post, we will learn how to work with Xcode and how to develop iOS apps using Swift. Today we will start with a hello world app, so let’s get started.   […]

iOS Swift Tutorial
IOS Development

iOS Swift Tutorial – Learn Language Basics

Swift is a very easy programming language to learn as its syntax is easy to follow. In this iOS Swift tutorial, we will cover some of the Swift language fundamentals and we will see how EASY it is to develop using Swift programming language. Before we start building iOS apps, we need to understand the […]

expect command

Expect command and how to automate shell scripts like magic

In the previous post, we talked about writing practical shell scripts and we saw how it is easy to write a shell script. Today we are going to talk about a tool that does magic to our shell scripts, that tool is the Expect command or Expect scripting language. Expect command or expect scripting language is […]

shell script

How to write practical shell scripts

In the last post, we talked about regular expressions and we saw how to use them in sed and awk for text processing, and we discussed before Linux sed command and awk command. During the series, we wrote small shell scripts, but we didn’t mix things up, I think we should take a small step further […]

regex tutorial

Regex tutorial for Linux

In order to successfully work with the Linux sed editor and the awk command in your shell scripts, you have to understand regular expressions or in short regex. Since there are many engines for regex, we will use the shell regex and see the bash power in working with regex. First, we need to understand […]

awk command

30 Examples for awk command in text processing

In the previous post, we talked about sed command and we saw many examples of using it in text processing and we saw how it is good in this, but it has some limitations. Sometimes you need a more advanced tool for manipulating data, one that provides a more programming-like environment, giving you more control […]

sed linux

31+ Examples for sed Linux command in text manipulation

In the previous post, we talked about bash functions and how to use them from the command line directly and we saw some other cool stuff. Today we will talk about a very useful tool for string manipulation called sed or sed Linux command. Sed is one of the most common tools that people use […]

Linux Mail Server
Server Administration

Install, Secure, Access and Configure Linux Mail Server

If you want to send or receive an email, you should have a mail server capable of sending and receiving emails across the Internet. In this post, we will discuss Linux mail server and how the SMTP (Simple Mail Transfer Protocol) works as well as other mail-related protocols, like Post Office Protocol (POP) and Internet […]

Linux Proxy Server
Server Administration

Block, Modify Content, Anonymize and Authenticate Users Using Linux Proxy Server

Linux proxy server or proxy server generally is a server that caches the internet. The client connects to the proxy server with a request, the proxy server will connect to the internet or another caching server and cache the pages retrieved, then return the cached pages to the client. A proxy server has many advantages. […]

Linux samba server
Server Administration

Install, Access, Mount and Authenticate Linux Samba Server

Linux samba server is one of the powerful servers that helps you to share files and printers with Windows-based PCs and other operating systems, it’s an open-source implementation of the Server Message Block/Common Internet File System (SMB/CIFS) protocols.   How SMB Works To understand Linux/Samba/Windows relationship, you need to understand the relationships of the operating […]

Linux Virtual File System
Server Administration

Linux Virtual File System

The Linux virtual file system or virtual file system generally is a layer that sits on the top of your actual file system which allows the user to access different types of file systems, you can think of virtual file system as an interface between the kernel and the actual file system. That means you […]

Linux Web Server
Server Administration

Install, Configure, and Troubleshoot Linux Web Server

In this post, we will talk about Linux web server and how to install it and configure it to serve you content to others. A web server is a system that manipulates requests via HTTP protocol, you request a file from the server and it responds with the requested file, which might give you an […]

hard drive encryption
Tech Tips

Hard Drive Encryption

Hard drive encryption is a process of converting your readable data into something unreadable to protect it. With hard drive encryption, you will prevent unauthorized access to your data. There are two types of hard drive encryption: Software-based encryption Hardware-based encryption In this post, we will talk about the software-based solutions. Most implementations of hard […]

clipboard actions managers
Tech Tips

Clipboard Actions Copy Paste in Windows

Viewing the clipboard actions ( copy paste ) in Windows is a very easy thing to achieve, but before we talk about how to do that, we need to know a very important thing about clipboard viewers. Clipboard Managers Are Risky Some clipboard viewers send the copied data over the internet, not for bad purposes, but […]

process large files using PHP
Web Development

Process Large Files Using PHP

If you want to process large files using PHP, you may use some of the ordinary PHP functions like file_get_contents() or file() which has a limitation when working with very large files. Memory Limitation These functions rely on the memory_limit setting in php.ini file, you may increase the value but these functions still are not […]

use non-Composer Laravel Package
Web Development

Install and Use Non-Composer Laravel Packages

If you want to use a package in Laravel, you simply add a single line in composer.json file and the job is done. This is because the package is available in, what if the package that you want to use is a non-Composer Laravel package? Maybe available on a git repo or a private […]

laravel subdomain routing
Web Development

Create and Use Dynamic Laravel Subdomain Routing

Many websites give their users a custom subdomain for their profiles or pages, so instead of accessing the user’s profile at, the user can access his profile page at  which is much better. In this post, we will see how to make dynamic Laravel subdomain routing easily. Configure DNS To make this trick, […]

Laravel Spam Protection
Web Development

Protect Forms using Honeypot Laravel Spam Protection Technique

Laravel framework has a powerful protection from CSRF, XSS, and SQL injection, but there is no built-in Laravel spam protection. If you need to protect your form from spam bots, you can use something like Akismet or reCaptcha which provide strong spam protection. OK, but your users maybe don’t like it because of the nag […]

prevent sql injection
Web Development

Prevent SQL Injection

How to Prevent SQL Injection Attacks? Before we talk about how to prevent SQL injection, we have to know the impact of SQL Injection attack which is one of the most dangerous attacks on the web. The attacker can steal your data or even worse, the whole web server can be stolen from one SQL injection vulnerability. I wrote this post to […]

Subscribe to Our Newsletter

Follow On Twitter

Find us on Google Plus

Subscribe To RSS