In the previous post we saw how to install CentOS as a guest operating system in VirtualBox. At the end of the post we talked about installing the guest additions necessary to optimize the functioning of the guest operating system within VirtualBox. If you try you may run into this error: “Kernel headers not found…
Good morning folks! In my previous post I promised that we would create a new virtual machine in our VirtualBox installation. There are many free options and today I want to show you how to install CentOS 8, which is a Linux distribution based on RedHat. Create an empty virtual machine To begin, open the…
Few days ago, performing a Plesk Panel update, I got the following error: “The GPG keys listed for the “dell-system-update_dependent” repository are already installed but they are not correct for this package. Check that the correct key URLs are configured for this repository.” It was quite strange, since Plesk update always worked with problems until…
Today I want to show the steps needed to install the Imagick extension for PHP on Linux CentOS. First of all access to your Linux shell (in my case, since it is a remote server, I use SSH). Take root privileges typing the command su and then insert the password requested by the system: [adminxxx@yourserver…
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.