Jump to content

Welcome to CodeNameJessica

โœจ Welcome to CodeNameJessica! โœจ

๐Ÿ’ป Where tech meets community.

Hello, Guest! ๐Ÿ‘‹
You're just a few clicks away from joining an exclusive space for tech enthusiasts, problem-solvers, and lifelong learners like you.

๐Ÿ” Why Join?
By becoming a member of CodeNameJessica, youโ€™ll get access to:
โœ… In-depth discussions on Linux, Security, Server Administration, Programming, and more
โœ… Exclusive resources, tools, and scripts for IT professionals
โœ… A supportive community of like-minded individuals to share ideas, solve problems, and learn together
โœ… Project showcases, guides, and tutorials from our members
โœ… Personalized profiles and direct messaging to collaborate with other techies

๐ŸŒ Sign Up Now and Unlock Full Access!
As a guest, you're seeing just a glimpse of what we offer. Don't miss out on the complete experience! Create a free account today and start exploring everything CodeNameJessica has to offer.

Blogs

Featured Entries

By: Janus Atienza Mon, 04 Aug 2025 16:09:06 +0000 cybersecurity concept, user privacy security and encryption, secure internet access Future technology and cybernetics, screen padlock. In todayโ€™s interconnected world, businesses are increasingly reliant on digital systems to operate efficiently. However, with this reliance comes an ever-growing threat: cyberattacks. One of the most common and potentially devastating forms of these attacks is account hacking. Recovering from a hacked business ac
by: Zell Liew Mon, 04 Aug 2025 13:14:45 +0000 As a front-end developer, Iโ€™ve been pretty curious about how other people code up their websites. So I tend to poke my head into design systems whenever I find one. Then, late last year, a conversation with Geoff Graham set me off thinking even deeper about theming websites. (If you donโ€™t know that dude, heโ€™s the chief editor of this site, so that guyโ€™s a pretty big deal, too.) So Iโ€™ve been watching, pondering, and exploring: How can we
By: Janus Atienza Sun, 03 Aug 2025 17:04:54 +0000 Image source: Pixabay Developers face unique security challenges that go beyond typical desktop users. Your development machine contains source code, API keys, database credentials, and often sensitive client information. A compromised developer workstation can lead to supply chain attacks, data breaches, and stolen intellectual property. Linux offers powerful security features, but they require proper configuration to be effective. This guid
by: Abhishek Prakash Sun, 03 Aug 2025 17:28:56 +0530 When your Linux system is generating thousands of log entries every minute, finding information about a specific service can feel like searching for a needle in a haystack. That's where journalctl's powerful filtering capabilities come to the rescue! To filter journalctl logs by a specific service, use the service name in the following manner: journalctl -u servicename The -u flag (short for "unit") is your primary tool for filtering logs by
by: Abhishek Prakash Sat, 02 Aug 2025 14:27:16 GMT I know that there is pretty extensive online documentation from Ubuntu available for free. But extensive can also be overwhelming too. Probably that's the reason why there is a new book on Ubuntu, unsurprisingly called "The Ultimate Ubuntu Handbook" and it gives you a good overview of the Ubuntu as a desktop, as a server and as a developer platform. This book is written by Ken VanDine, a Linux veteran with over 16 years of work experience
by: Abhishek Prakash Fri, 01 Aug 2025 17:07:03 +0530 In case you missed the announcement last week, our latest course on systemd is now available. The systemd Playbook: Learn by DoingMaster systemd the practical wayโ€”one lab at a time.Linux HandbookTeam LHBNext, I am working on an ebook on Linux commands. It will be ready by next month. Stay tuned for it.
By: Janus Atienza Thu, 31 Jul 2025 19:37:46 +0000 In todayโ€™s competitive business landscape, selecting a CRM development company is not just about finding a vendor โ€“ itโ€™s about choosing a long-term technology partner that understands your workflows, infrastructure, and growth plans. For businesses operating in Linux/Unix environments, this decision carries even more weight, as compatibility and performance directly impact day-to-day operations. For companies relying on Linux or Unix-based infr
by: Abhishek Prakash Thu, 31 Jul 2025 13:05:49 +0530 The classic way of following a log file in real time is by using the tail -f command. But you know that journalctl logs are a different entity and they are not like plain text files in syslogs. So, how do you tail jounral logs then? It's simple. You use the similar -f option: journalctl -fThe -f flag (short for "follow") works just like tail -f but for systemd journals. This shows the most recent log entries and keeps the output open, display
by: Abhishek Prakash Thu, 31 Jul 2025 04:28:12 GMT The summer holiday season starts. Time to hit the beach, mountains, or the couch ๐Ÿ˜„ My teammate Sourav is an avid gamer, and he is working on several game suggestion articles. If you play computer games, you'll find some good suggestions to enjoy your summer holidays. Diablo-like Games You Can Play With Steam on LinuxSlash, loot, and grind your way through these Diablo-like games on Linux and Steam this summer.It's FOSSSourav Rudra๐Ÿ’ฌ Let's se
by: Sourav Rudra Wed, 30 Jul 2025 13:47:12 GMT Diablo is an iconic action RPG franchise built around fast-paced isometric combat, deep character customization, and the relentless pursuit of loot. Set in a dark fantasy world plagued by demonic forces, the series challenges players to battle through hordes of monsters, uncover powerful gear, and dive deep into dungeons. Over the years, new installments of Diablo have refined and expanded on the core formula, adding skill trees, seasonal conte
by: Mรฉszรกros Rรณbert Wed, 30 Jul 2025 13:21:05 +0000 After four years, the demos in my โ€œHeadless Form Submission with the WordPress REST APIโ€ article finally stopped working. The article includes CodePen embeds that demonstrate how to use the REST API endpoints of popular WordPress form plugins to capture and display validation errors and submission feedback when building a completely custom front-end. The pens relied on a WordPress site I had running in the background. But during a forced i
by: Zell Liew Mon, 28 Jul 2025 12:42:16 +0000 Many CSS experts have weighed heavily on possible syntaxes for a new masonry layout feature last year. There were two main camps and a third camp that strikes a balance between the two: Use display: masonry Use grid-template-rows: masonry Use item-pack: collapse I donโ€™t think theyโ€™ve came up with a resolution yet. But you might want to know that Firefox already supports the masonry layout with the second syntax. And Chrome is testi
by: Chris Coyier Sun, 27 Jul 2025 15:27:51 +0000 Chris & Rachel hop on the show to talk about the expanded privacy (access) model in the 2.0 editor (in Private Beta as we speak). Private Pens have always been a big deal, but as private as they are, if someone has the URL, they have the URL, and it doesnโ€™t always feel very private. There are two new levels of privacy in the 2.0 editor: password protected and collaborators only. Passwords are an obvious choice we probably should have done lon
by: Sourav Rudra Sat, 26 Jul 2025 13:47:27 GMT Wireless file transfers are incredibly convenient, especially between Linux and Android devices. No cables, no manual configuration needed. Just quick transfers from one device to another using your local network. I know that it is faster to transfer files, specially huge ones, via cable. But if your library has thousands of photos and videos, it takes several minutes to load them. When you want to share just a few selected photos, it is easier
by: Lee Meyer Fri, 25 Jul 2025 13:48:36 +0000 Do we invent or discover CSS tricks? Michelangelo described his sculpting process as chiseling away superfluous material to reveal the sculpture hidden inside the marble, and Stephen King says his ideas are pre-existing things he locates and uncovers โ€œlike fossils in the ground.โ€ Paragraph one is early for me to get pretentious enough to liken myself to those iconic creative forces, but my work on CSS-Tricks feels like โ€œdiscovering,โ€ not โ€œinventing,
by: Abhishek Prakash Fri, 25 Jul 2025 17:17:39 +0530 I am a strong believer in micro-learning. Sure, we have long courses on huge topics like Linux and Ansible, but we also have courses on relatively smaller topics like SSH and Kubernetes Operators. Now, we have a new micro-course on systemd. Like most of our educational material, this too is a hands-on course. Meaning, you will learn by following the steps on your system. The systemd Playbook: Learn by DoingMaster systemd the practical wayโ€”one
by: Geoff Graham Thu, 24 Jul 2025 16:16:30 +0000 Brad Frost introduced the โ€œAtomic Designโ€ concept wayyyy back in 2013. He even wrote a book on it. And we all took notice, because that term has been part of our lexicon ever since. Itโ€™s a nice way to divide web designs into separate layers of concern, leaning into biology terms to help scope their context by size: Atoms Molecules Organisms Templates Pages Atoms are part of molecules, which are part of organisms,
by: Abhishek Prakash Thu, 24 Jul 2025 05:03:42 GMT I know readers in the US will find it difficult to believe but it seems that Linux desktop usage are all time high in the United States of America. That's worth a celebration ๐Ÿฅ‚ Made Linux Great Again? Linux Desktop Usage Hits Record High in the U.S.A small, yet notable bump.It's FOSS NewsSourav Rudra๐Ÿ’ฌ Let's see what else you get in this edition Firefox trying to redeem itself. A RAT making its way into Arch Linux. Intel's Linux distributio
by: Abhishek Prakash Wed, 23 Jul 2025 19:13:51 +0530 Regex (Regular Expressions) is like a super-powered search function with pattern recognition. Think of it as upgrading from "find this exact word" to "find anything that matches this flexible pattern." It's your Swiss Army knife for text manipulation. Core Concepts: Building Blocks Literal Characters The simplest regex - exactly what you type. # Find "cat" in text grep "cat" file.txt Metacharacters: The Special Operators These characters hav
by: Daniel Schwarz Wed, 23 Jul 2025 12:36:48 +0000 Chrome 139 is experimenting with Open UIโ€™s proposed Interest Invoker API, which would be used to create tooltips, hover menus, hover cards, quick actions, and other types of UIs for showing more information with hover interactions. The Interest Invoker API makes these components declarative and hover-triggered, meaning that you create them with HTML, and then the web browser handles the mouseenter and mouseleave events for you, sans JavaScript.

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions โ†’ Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.