How-Tos

ifcr 026 thumb
video

How to boost R Markdown interactivity with runtime Shiny

In this episode of Do More With R, Sharon demonstrates how to turbocharge R Markdown interactions with runtime shiny

nwht 023 thumb
video

How to use the lsblk command: 2-Minute Linux Tip

In this episode of 2-Minute Linux Tips, learn the lsblk command. It provides information on block devices -- such as hard disks where you read and write one block of data at a time.

nwht 022 thumb
video

How to use the chown command: 2-Minute Linux Tip

Learn how to use the chown command. It changes a file’s owner or both owner and group.

nwht 021 thumb
video

How to use the chmod command: 2-Minute Linux Tips

Learn how to use the chmod command – the command for changing permissions on files. The only tricky part is understanding that there are two ways to represent file permissions.

ifcr 025 thumb
video

How to customize ggplot with bbplot

Overwhelmed by all the ways you can customize a ggplot2 data visualization? With add-on packages like the BBC’s bbplot, you can use themes created by design professionals – or tweak them to make them your own.

ifcr 024 thumb3
video

How to reshape data with tidyr’s new pivot functions

See examples of tidyr’s new pivot_longer and pivot_wider functions.

nwht 019 thumb
video

How to run command loops: Linux Tip

Being able to run command loops is one of the features of Linux that makes it easy to automate repetitive tasks. In this 2-minute Linux tip, learn about looping -- in scripts and on the command line.

thumb
video

How to use tidy eval in R

Do you want to use ggplot2, dplyr, or other tidyverse functions in your own functions? This easy example shows how

nwht 020 thumb
video

How to use the nmcli command: Linux Tip

Nmcli is a command-line tool for controlling NetworkManager and getting the status of network interfaces. Learn about using the command on this episode of 2-Minute Linux Tips.

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

thumb 2
video

How to write your own R package

When you hear “R package,” you may think something to share with other people. But an R package can also be a good way to organize your own work

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

ifcr 021 thumb3
video

Run Python in R code

While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R

cssg 014 thumbnail
video

Updating Spectre, Meltdown and Foreshadow mitigations

Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.

8 ingredients dr
video

8 ingredients of an effective disaster recovery plan

How to keep your business running in the event of an emergency or disaster.

managed security service providers

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary.

nwht 018 thumb
video

Linux tip: How to use the hostnamectl command

In this Linux tip, we look at the hostnamectl command. It’s a command that provides information on a particular system – including but not limited to its hostname – and even allows you to make some changes.

Windows security and protection [Windows logo/locks]

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them.

cssg 013 thumbnail
video

How to harden Windows workstations and servers from attack

Use these basic settings to make it harder for attackers to Windows hardware.

nwht 017 thumb2
video

Linux tip: How to use the pstree command

In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.

Load More