Disabling Embeds in WordPress Posts and the Visual Editor

Disabling Embeds in WordPress Posts and the Visual Editor

WordPress automatically generates previews out of a number of URLs – like Youtube videos for example. If you want to disable this automatic embedding, here’s how to go about it. You can disable it in the final preview as well as the visual editor.

How to Schedule Cron Jobs Using the CLI on Linux

How to Schedule Cron Jobs Using the CLI on Linux

Creating scheduled “cron” jobs to run on a Linux CLI is even easier than creating them on the cPanel GUI! Here’s a complete tutorial from start to finish with screenshots.

How to Run a Linux Process in the Background

How to Run a Linux Process in the Background

You can only execute one command at a time in Linux. Each command has to finish before you can issue the next. But when you “background” a process, you can let it run and do other things at the same time! Find out how, with screenshots.

How to Fix “Fatal error: Allowed memory size of X bytes exhausted” in WordPress

How to Fix “Fatal error: Allowed memory size of X bytes exhausted” in WordPress

If you’re getting a “Fatal Error: Allowed memory size of x bytes exhausted” in WordPress, then this tutorial is for you! First we need to find out what the current memory limit is for your account. Second, we discuss three different ways to fix it.

How to Append Text to a File in Linux – Different Methods

How to Append Text to a File in Linux – Different Methods

Appending text to files in Linux can be a one line affair if you know what to do. This is often much easier and cleaner than opening the file in a text editor, scrolling down, adding the text and saving it. Especially if you do this task multiple times a day, it can save you a lot of time. Here’s how to do it quickly with screenshots.

How to Password Protect Files and Folders in Linux

How to Password Protect Files and Folders in Linux

Do you have some files or folders that need to be kept secret? Linux has the tools you need! For basic security, you can simply use user based permissions. For strong or advanced security, encryption is your friend. Here’s how to do both with screenshots.

Page 1 of 12112345...102030...Last »