www.booleanworld.com Open in urlscan Pro
188.114.96.3  Public Scan

Submitted URL: http://booleanworld.com/
Effective URL: https://www.booleanworld.com/
Submission Tags: tranco_l324
Submission: On June 01 via api from DE — Scanned from NL

Form analysis 1 forms found in the DOM

GET https://www.booleanworld.com/

<form role="search" method="get" class="search-form" action="https://www.booleanworld.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

Skip to content
 * Home
 * Contact Us

Search for:


BOOLEAN WORLD




ARRAYS IN C PROGRAMMING WITH EXAMPLES

Arrays in C allow you to store multiple items of the same data type, such as a
list of integers. Arrays form the basis for many data structures and allow you
to build advanced...


ARRAYS IN C PROGRAMMING WITH EXAMPLES

Arrays in C allow you to store multiple items of the same data type, such as a
list of integers. Arrays form the basis for many data structures and allow you
to build advanced...


HOW TO ADD, REMOVE AND MODIFY USERS IN LINUX

As a Linux administrator, it is essential to know how to add users, modify users
and delete users in a Linux system. It is a good practice to have different
accounts for different users...


BUILDING RECURSIVE DESCENT PARSERS: THE DEFINITIVE GUIDE

Parsers are programs that help process text. Compilers and interpreters use
parsers to analyze programs before processing them further, and parsers for
formats like JSON and YAML process text into the programming language’s
native...


HOW TO SET UP SSH KEYS ON A LINUX/UNIX SERVER

SSH (Secure SHell) is a network protocol that allows you to securely execute
commands on and transfer files to a remote server. Typically, most servers
running SSH are configured to use password-based authentication; however,...


CURL COMMAND TUTORIAL WITH EXAMPLES

cURL is a command line tool and a library which can be used to receive and send
data between a client and a server or any two machines connected over the
internet. It supports...


OPENVZ VS KVM VS XEN – VIRTUALIZATION TECHNOLOGIES EXPLAINED

There are many different virtualization technologies available in the market,
such as OpenVZ, KVM and Xen. You may have come across these terms when trying to
while trying to buy a Virtual Private Server...


HOW TO DOWNLOAD FILES AND WEB PAGES WITH WGET

The wget command allows you to download files over the HTTP, HTTPS and FTP
protocols. It is a powerful tool that allows you to download files in the
background, crawl websites, and resume interrupted...


HOW TO KILL A PROCESS IN LINUX

In an operating system, there are many programs, which may be either run by an
user or by the OS itself (such as system services). Such programs which are
running on the system are...


A GUIDE TO THE LINUX “FIND” COMMAND

The find command allows users to search for files and take actions on them. It
is part of the “findutils” package and comes bundled with all distributions.  It
is highly flexible, allowing you to...


AN INTRODUCTION TO LINUX FILE PERMISSIONS

Linux is a multi-user operating system, and it ensures the security of files
with the concepts of “ownership” and “permissions”. You can use these concepts
to control who can access and modify files. In...


HOW TO INSTALL AND USE GLANCES TO MONITOR LINUX SYSTEMS

Monitoring a system is essential for keeping things running smoothly. Glances is
a Python-based tool which provides information on various aspects of the system,
such as running processes, I/O, memory and so on. It...


A GUIDE TO MONITORING SERVERS WITH NAGIOS

Monitoring is an essential part of managing infrastructure. It helps you to
ensure that your business keeps running smoothly, by alerting you to problems as
they occur. Nagios is a very popular open-source application...


RAID LEVELS 0, 1, 4, 5, 6, 10 EXPLAINED

As businesses grow, demand arises for more reliable infrastructure that can
handle critical systems. An important component in stable and scalable
infrastructure is proper memory management. In this article, we will look at
RAID...


HOW TO INSTALL AND USE PROMETHEUS FOR MONITORING

  Monitoring is an important part of managing applications deployed on servers.
They help you ensure applications run smoothly, as well as troubleshoot any
problems that may arise. In this article, we will look...


HOW TO MONITOR NETWORK TRAFFIC ON LINUX USING VNSTAT

Developers and sysadmins may need to monitor various network parameters, such as
bandwidth consumption and the traffic flowing in/out. There are many tools
available for this purpose, one of them being vnStat. It is...


HOW TO SET UP BASIC HTTP AUTHENTICATION ON NGINX

Files placed on a web server are publicly accessible by default. If you want to
protect files from unauthorized access, you can make use of HTTP basic
authentication. It is a simple authentication method,...


BUILDING CROSS-DISTRIBUTION LINUX APPLICATIONS WITH FLATPAK

Fragmentation has been a problem for quite some time in the Linux ecosystem. A
variety of distributions exist today, with their own package managers and their
own notions of what a “base system” consists...


GETTING STARTED WITH DOCKER – PART 2

Docker has changed the way developers run, organize and deploy their code and
infrastructure. In the docker series articles, we will be understanding how
Docker works, installation and running code, deployment, container management
and more....


A GUIDE TO THE LINUX “TOP” COMMAND

The top command allows users to monitor processes and system resource usage on
Linux. It is one of the most useful tools in a sysadmin’s toolbox, and it comes
pre-installed on every distribution. Unlike...


HOW TO CONFIGURE NGINX AS A LOAD BALANCER

For very small websites, a single server running a web application is usually
enough. However, this doesn’t work well for larger websites. In such cases, we
make use of “load balancing”, a technique that...

 * 
 * Next Page »

Follow:

 * 
 * 
 * 




RECENT POSTS

 * Arrays in C Programming with Examples
 * How to Add, Remove and Modify Users in Linux
 * Building Recursive Descent Parsers: The Definitive Guide
 * How to Set up SSH Keys on a Linux/Unix Server
 * cURL Command Tutorial with Examples



Privacy Policy | Terms of Service | Copyright © 2024 booleanworld.com. All
rights reserved.

 * 
 * 
 * 


✕


🍪 PRIVACY & TRANSPARENCY

We and our partners use cookies to Store and/or access information on a device.
We and our partners use data for Personalised advertising and content,
advertising and content measurement, audience research and services development
. An example of data being processed may be a unique identifier stored in a
cookie. Some of our partners may process your data as a part of their legitimate
business interest without asking for consent. To view the purposes they believe
they have legitimate interest for, or to object to this data processing use the
vendor list link below. The consent submitted will only be used for data
processing originating from this website. If you would like to change your
settings or withdraw consent at any time, the link to do so is in our privacy
policy accessible from our home page.

864 Partners are included for the above purposes.



Manage Settings Allow Necessary Cookies & Continue Continue with Recommended
Cookies

Vendor List | Privacy Policy