Author
The author

Ariffud Muhammad

Ariffud is a Technical Content Writer with an educational background in Informatics. He has extensive expertise in Linux and VPS, authoring over 200 articles on server management and web development. Follow him on LinkedIn.

More posts by Ariffud Muhammad

The netstat command in Linux

netstat (short for network statistics) is a command-line tool for monitoring network connections, diagnosing issues, and gathering important...

How to run DeepSeek on a Hostinger VPS using n8n

DeepSeek is an AI chatbot model released in January 2025 by a Chinese company of the same name. It quickly gained traction for its ability to answer...

How to use the telnet command in Linux

Telnet (short for teletype network) is a command-line tool that facilitates remote communication and network testing. It was widely used for managing...

How to use the Linux ls command

The ls command lists files and directories in Linux and Unix-like operating systems. It is an essential tool for navigating and managing files which...

Kali Linux tutorial: Essential commands, managing Kali tools, running scans, and more

As a security-focused operating system, Kali Linux lets you perform various tasks, such as penetration testing, digital forensics, and network...

How to update Kali Linux: Upgrading packages to the latest version

Updating Kali Linux is important for maintaining a secure and efficient system. As a rolling release operating system, Kali Linux provides frequent...

Ollama GUI tutorial: How to set up and use Ollama with Open WebUI

By default, Ollama runs large language models (LLMs) through a command-line interface (CLI). However, you can pair Ollama with Open WebUI – a...

Ollama CLI tutorial: Running Ollama via the terminal

As a powerful tool for running large language models (LLMs) locally, Ollama gives developers, data scientists, and technical users greater control and...

How to install Kali Linux on a VPS

Kali Linux is an open-source operating system primarily used for penetration testing and security auditing. One of its key advantages is its hardware...

123410 >