<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dev Programming</title>
    <description>The latest articles on DEV Community by Dev Programming (@devprogramming).</description>
    <link>https://dev.to/devprogramming</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F838342%2F31668d6f-aa2d-47ca-bdd3-d70e0e0b1815.jpeg</url>
      <title>DEV Community: Dev Programming</title>
      <link>https://dev.to/devprogramming</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/devprogramming"/>
    <language>en</language>
    <item>
      <title>My 100 Hour Rule for Bug Bounty !</title>
      <dc:creator>Dev Programming</dc:creator>
      <pubDate>Thu, 21 Aug 2025 03:38:11 +0000</pubDate>
      <link>https://dev.to/devprogramming/my-100-hour-rule-for-bug-bounty--27lj</link>
      <guid>https://dev.to/devprogramming/my-100-hour-rule-for-bug-bounty--27lj</guid>
      <description>&lt;p&gt;In this post, I share my 100-Hour Rule - how I structure every minute of hunting into focused phases, avoid the sunk cost trap, and boost my chances of finding high-value vulnerabilities while staying ready for the next big target.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpp1yc4a5h0wemgyfa0i4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpp1yc4a5h0wemgyfa0i4.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Heloo there, fellow hackers, security enthusiasts, and aspiring bounty hunters! If you've ever dived into the world of bug bounties, you know it's a thrilling mix of detective work, technical wizardry, and sheer persistence. But after three solid years grinding in this space - submitting reports, dealing with triages, and celebrating those occasional payouts - I've honed a simple yet powerful productivity hack that keeps me good and maintained. I call it the 100-Hour Rule, and it's become my go-to strategy for maximizing impact while dodging the burnout that's all too common in this game.&lt;/p&gt;

&lt;p&gt;In this article, I'll break it down step by step: why I created it, how I apply it in practice, and the real, tangible ways it's transformed my approach. Think of this as a factual deep dive, grounded in real-world bug bounty dynamics, with tips drawn from established best practices in the community. No fluff - just actionable insights to help you level up your hunts. Let's get into it.&lt;/p&gt;

&lt;h1&gt;
  
  
  Why I Created the 100-Hour Rule: A Lesson in Time and Sanity
&lt;/h1&gt;

&lt;p&gt;Bug bounty hunting isn't just about finding vulnerabilities; it's a marathon of reconnaissance, testing, and reporting in an ecosystem that's constantly evolving. Platforms like HackerOne, Bugcrowd, and plethora of other hunting platforms that host thousands of programs from companies big and small, each with their own scopes, rules, and payout structures. But here's the harsh reality: not every program is a goldmine, and without boundaries, you can easily sink endless hours into fruitless pursuits.&lt;/p&gt;

&lt;p&gt;I came to know about these kinda challenges after watching content about challenges like the "75 Hard" program - a rigorous 75-day regimen designed to build mental toughness through daily habits like workouts, reading, and water intake and I saw people are customizing by their own rules and choices. It got me thinking: why not apply a similar disciplined structure to bug bounties? I was tired of my rookie mistakes, like spending weeks on bloated enterprise programs with massive scopes (think of numbers of subdomains and endpoints), only to emerge empty-handed, frustrated, and mentally drained.&lt;/p&gt;

&lt;p&gt;Enter the 100-Hour Rule: a self-imposed cap where I dedicate no more than 100 hours to any single bug bounty program. If, by the end of that time, I haven't uncovered a meaningful vulnerability - something reportable like small to big, or even a subtle business logic error - I cut my losses and move on. No extensions, no excuses. If I found any small vulnerabilities and then I stack it down to the list where if I didn't find any big vulnerabilities in singular or conjuction way then I moved onto testing these small bugs, retriggering to confirm whether it exist or not and also checked out previously submitted reports if public to gain more information to get on.&lt;/p&gt;

&lt;p&gt;This isn't arbitrary; it's rooted in productivity principles from fields like software development and project management. For instance, the Pareto Principle (80/20 rule) often applies here: 80% of your results come from 20% of your efforts. By capping at 100 hours, I'm forcing myself to focus on high-yield activities early on, respecting the fact that bug bounties are inherently competitive and time-sensitive. Programs evolve - vulnerabilities get patched, scopes change - and lingering too long increases the risk of duplicates or diminished returns.&lt;/p&gt;

&lt;p&gt;Factual note: According to HackerOne's annual reports, the average time from vulnerability discovery to report submission can vary, but top hunters emphasize efficiency. In 2023, the platform paid out over $100 million in bounties, but only to those who targeted smartly, not exhaustively.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0f0961rtjmunfolwwuc4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0f0961rtjmunfolwwuc4.png" alt=" " width="794" height="561"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  How I Make the Most of Those 100 Hours
&lt;/h1&gt;

&lt;p&gt;With a strict deadline looming, every minute counts. The 100-Hour Rule turns vague "hunting" into a structured operation, much like agile sprints in software engineering, as the fact I practiced some kind continuous work because I've attended tens of hackathons. I divide my time into phases: reconnaissance (20–30 hours), deep diving (50–60 hours), and reporting/polishing (remaining time). My goal is to squeeze the maximum output toward the specific program I've targeted, making sure every minute is put to use.&lt;/p&gt;

&lt;p&gt;I once saw a vlog by Stok and NahamSec where they sat for 10–15 hours straight in one place, just trying to find vulnerabilities. But personally, I really admire tomnomnom - he's the kind of person who goes all-in to hunt those high-payout vulnerabilities.&lt;/p&gt;

&lt;p&gt;I've built myself a stack of tasks to follow the 100-Hour Rule efficiently, and the moment I start, I instantly turn on my Pomodoro timer to track every second. That urgency and discipline create a kind of pressure that actually sharpens focus - because if you don't stay locked in, you might miss at least one vulnerability you could've found.&lt;/p&gt;

&lt;p&gt;Here's how I optimize each step, with detailed tactics backed by community-proven methods.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Skip the Low-Hanging Fruit Frenzy and Hunt the Overlooked
&lt;/h2&gt;

&lt;p&gt;In bug bounties, "low-hanging fruit" refers to obvious, easily detectable issues like open redirects, missing rate limits, or basic XSS in user inputs. These are the quick and easy wins that attract hordes of hunters, especially in popular programs from tech companies. But chasing them is a trap: the competition is fierce, payouts are often minimal (e.g., $500-$1,000 for low-severity finds), and duplicates are rampant - HackerOne data shows that up to 40% of submissions get rejected as duplicates.&lt;/p&gt;

&lt;p&gt;Most of the time you would you realize that working on duplicates could be beneficial sometime because anything can lead it to newer vulnerabilities.&lt;/p&gt;

&lt;p&gt;Instead, I prioritize under-the-radar vulnerabilities that require creativity and persistence. Here's a detailed playbook:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Misconfigurations in Infrastructure&lt;/strong&gt;: These are goldmines because they're often overlooked in automated scans. For example, I check for exposed AWS S3 buckets using tools like S3Scanner or by manually inspecting bucket policies via the AWS CLI (if in scope). A real-world case: In 2022, a hunter earned $10,000 from Uber for an S3 misconfig leaking user data. I allocate 10–15 hours here, enumerating assets with tools like Amass for subdomain discovery.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Leaked Secrets via Code Repos&lt;/strong&gt;: Using Gitleaks or TruffleHog, I scan public GitHub repos linked to the target (via domain searches). This has uncovered API keys, passwords, and tokens leading to critical access. Pro tip: Combine this with GitRob for broader repo analysis. One of my P1 (Priority 1, critical severity) finds was a leaked JWT secret allowing account takeovers - payout? Over $5,000. From leaks, you could find any employees private email which they might have used it as login into the internal dashboard or something for this you can use dorking or other things.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Subtle Logic Flaws&lt;/strong&gt;: These aren't caught by scanners; they require understanding the app's business logic. For instance, in e-commerce programs, I test for race conditions in payment flows (e.g., using Burp Suite's Turbo Intruder to send parallel requests). Or in social platforms, IDOR where user IDs can be manipulated to access private data. I dedicate time to mapping the app with tools like Insomnia or my favorite tool cURL for API endpoints.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Undocumented Endpoints&lt;/strong&gt;: Many apps have hidden APIs not listed in docs. I use tools like Feroxbuster for directory brute-forcing or analyze JavaScript files with LinkFinder to extract endpoints. Funny enough, these "unsexy" spots have yielded my biggest bounties because they're less trafficked.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By focusing here, my 100 hours yield unique finds. Community wisdom from hackers like @zseano or @NahamSec echoes this: depth over breadth wins in mature programs.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Steer Clear of the Crowds for Better Odds
&lt;/h2&gt;

&lt;p&gt;Popular programs (e.g., those with 1,000+ hunters on Bugcrowd) are like crowded fishing spots - everyone's casting lines, and the big catches are rare. Stats from Intigriti show that in high-competition programs, the duplicate rate can exceed 50%.&lt;/p&gt;

&lt;p&gt;My strategy: Target niche or underhyped programs. I scout via platforms' directories, filtering for "new" or "private invite" ones, or those in sectors like fintech or healthcare where scopes are focused. Tools like Firebounty or you can directly find the private program using dorking that help aggregate programs by payout potential and activity levels.&lt;/p&gt;

&lt;p&gt;In practice, if a program's hall of fame lists hundreds of reports in the last month, I skip it. Instead, I aim for ones with thinner competition, it's not that I don't like competition, it just I don't wanna to go to the overcrowded places - my hit rate jumps from 10% to 30–40%. This aligns with economic principles: lower supply of hunters means higher value per effort.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Know When to Walk Away Gracefully
&lt;/h2&gt;

&lt;p&gt;Not every program aligns with your skills - and that's completely fine. If the scope excludes mobile apps and you're came out as an Android expert, you're already fighting uphill. Or if the scope is heavy on mainframes (rare, but it happens), forcing yourself to keep going will only burn time and energy. One of the most important lessons I've learned is knowing when to stop. That's why at the 100-hour mark, I step back and review my progress. I ask myself: Have I found anything that's been triaged as valid? If the answer is no, then it's time to pivot.&lt;/p&gt;

&lt;p&gt;Before I move on, I make sure to document every bit of my findings - patterns, potential leads, weird behaviors in endpoints - in an Obsidian template I specifically built for this purpose. This way, even if this hunt doesn't pay out now, I have a detailed record I can revisit for future hunts or similar programs. I document these kinda things when I was playing the THM CTFs, I started with recon and the process goes on and I even document tools I've used while playing or finding ^FLAGS^.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feat89o8se92nrjmb8rsf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feat89o8se92nrjmb8rsf.png" alt=" " width="800" height="187"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This approach keeps me clear of the sunk cost fallacy - the cognitive bias where you keep throwing more time, effort, and resources into something that's already going nowhere. Psychologically, it's liberating. Bug bounties are probabilistic by nature, much like poker. Sometimes the cards just aren't in your favor, and forcing it only drains your focus for the next hand. Walking away at the right time preserves energy, sharpens your mindset, and keeps you ready for the moment a truly rewarding opportunity comes along.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Rule Has Been a Game-Changer
&lt;/h2&gt;

&lt;p&gt;Adopting the 100-Hour Rule shifted me from reactive to proactive hunting. Here's the factual breakdown of its benefits, supported by insights from bug bounty pros and productivity research.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Better Time Management&lt;/strong&gt;: I log hours with tools like Toggl, treating each program as a "project." This mirrors freelance models, where fixed budgets prevent scope creep. Result? I've tripled my program throughput, from 5–6 per quarter to 15+.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Smarter ROI&lt;/strong&gt;: Energy is finite. By capping time, I allocate it to high-potential targets. Data from YesWeHack indicates top earners focus on 10–20 programs yearly, not hundreds. My payouts have increased 2x, averaging $2,000+ per valid report.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Built-In Motivation and Urgency&lt;/strong&gt;: The deadline creates "Parkinson's Law" in action - work expands to fill time, so limits compress it productively. I hustle harder, using techniques like Pomodoro (25-minute focused bursts) to maintain momentum.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Clearer Headspace and Burnout Prevention&lt;/strong&gt;: Bug bounties can be mentally taxing - rejections sting, isolation creeps in. The rule enforces breaks, aligning with WHO guidelines on work-life balance to avoid burnout. No more guilt over "failures"; it's data for future hunts.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  CONCLUSION
&lt;/h2&gt;

&lt;p&gt;Bug bounty success isn't solely about elite hacking skills - though those help. It's about strategic time management, focused effort, and mental resilience in a field where 90% of submissions might fail (per Bugcrowd stats). The 100-Hour Rule has turned my chaotic hunts into efficient, rewarding sprints, helping me bag consistent bounties without sacrificing my well-being.&lt;/p&gt;

&lt;p&gt;Is this rule for everyone? Maybe not - if you're a specialist in one niche, deep dives might suit you better. But if you're juggling multiple programs or feeling overwhelmed, give it a shot. Tweak it to 50 hours for smaller scopes or 200 for massive ones.&lt;br&gt;
What's your strategy?&lt;/p&gt;

&lt;p&gt;Guard it fiercely, hunt smartly, and the vulnerabilities will reveal themselves.&lt;/p&gt;

&lt;p&gt;Happy hunting, folks! 🚀&lt;/p&gt;

</description>
      <category>productivity</category>
      <category>bugbounty</category>
      <category>programming</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Why do I still prefer VIM for programming instead of other text editors ?</title>
      <dc:creator>Dev Programming</dc:creator>
      <pubDate>Wed, 10 Aug 2022 16:08:52 +0000</pubDate>
      <link>https://dev.to/devprogramming/why-do-i-still-prefer-vim-for-programming-instead-of-other-text-editors--3on8</link>
      <guid>https://dev.to/devprogramming/why-do-i-still-prefer-vim-for-programming-instead-of-other-text-editors--3on8</guid>
      <description>&lt;p&gt;Nevertheless, despite being a command line-based text editor, VIM is a prevalent text editor among developers. VIM is fast, lightweight, customizable, configurable &amp;amp; portable, and it is accessible on almost any OS and is more popular among Linux users. One of the most interesting things about VIM is that it keeps you in the terminal, which is perhaps the most obvious benefit it has over any GUI text editor, and you can even run &amp;amp; find VIM on any server machine preloaded. You can write code through SSH on a server machine. Vim is an efficient &amp;amp; effective text editor because it sticks to what its users want: a simple yet powerful way to input and manipulate text. Vim increases your productivity by requiring you to use the keyboard and allowing you to quickly complete repetitive tasks by letting you utilise existing keyboard shortcuts as well as customise and create the new ones.&lt;/p&gt;

&lt;p&gt;The Installation process of VIM is very easy on any OS. There are no required prerequisites for Vim. It's a straightforward software package that includes all necessary dependencies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ON MAC&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;brew install vim&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ON LINUX&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;sudo apt-get install vim&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;I'm going to list the reasons for why I consistently choose VIM above other text editors and IDEs. If someone were to ask me &lt;em&gt;&lt;strong&gt;Tell me one reason why you prefer using VIM over other text editors&lt;/strong&gt;&lt;/em&gt;. I would say Memory &amp;amp; Efficiency because a lot of text editors are too heavy and slow to run on PCs or laptops with lesser hardware. There are several text editors for programming available, which is like a trap because new users sometimes install numerous text editors when they only require one. For every programming language, I see individuals installing specific editors, such as CLion for C programming, PyCharm for Python, and Sublime Text for web development.&lt;/p&gt;

&lt;p&gt;Since this is obviously your machine and you have the freedom to use it anyway you like, I have no problem with it. Even if you have the most expensive PC or laptop, you don't need a lot of text editors for different programming languages.&lt;/p&gt;
&lt;h3&gt;
  
  
  &lt;strong&gt;LIGHTWEIGHT &amp;amp; CUSTOMIZABLE&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;I used a variety of text editors when I first started programming, but as I started to evaluate my work in light of the tasks I was given, I realised that I didn't really need specific text editors for certain programming languages. Now, I only use Sublime Text and VIM since the other text editors are cumbersome, slow to open, and cluttered. VIM is a command-line-based text editor, as you all know. Despite this, VIM may be referred to as a lightweight IDE because it can do all operations exactly like other powerful IDEs and text editors.&lt;/p&gt;

&lt;p&gt;The amount of memory and processing power that Vim consumes on your machine is really low. VIM is the smallest and lightest text editor on the market. Even when editing projects with a lot of code, it is quick and lightweight and enables you to work on any system, on any server, it is simple to run VIM through SSH for remote operations. Additionally, it has immensely helpful key bindings that let you carry out any task you can think of while keeping your hands on the keyboard. However, once you get used to it, Vim is actually fairly straightforward to use.&lt;/p&gt;

&lt;p&gt;When I was using Jetbrain's IDE for my programming task, my 8GB RAM PC kept freezing, and I had to restart my machine frequently. These are the main issues you may encounter if you use powerful IDEs or text editors. My PC behaves calmly when using VIM, allowing me to experiment with the writing function and generate output without even catching a peek of the freezing problem.&lt;/p&gt;

&lt;p&gt;On VIM, customization is very simple and very adjustable. You may completely personalise VIM on your own by adding instructions to the .vimrc file, which is just a simple text file that VIM processes each time it is loaded and contains all the shortcuts and options to make your VIM more distinctive to you. The flexibility to tailor VIM to your specific typing requirements is what finally allows VIM to process text at the speed of thought. You may download any .vimrc file or design it yourself exactly as you want it to be. The .vimrc file's standard commands are as follows:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;syntax on
set number
set noerrorbells
set autoindent
set noswapfile
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;VIM offers you a plethora of plugins, and you can install them depending on your usage. VIM configuration files are also portable, so you may use them on any machine and distribute your VIM configuration file to other people. A good editor, in my opinion, should flow naturally from your thought processes; if it doesn't, you definitely aren't using the appropriate one. Find the one that best suits your style by trying them all.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;LESS POWER CONSUMPTION&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;The apparent response to this topic is that VIM's environment is lightweight. It uses less of your system's memory and resources and is the smallest and lightest text editor ever known. The question of power consumption on using a text editor depends on a lot of factors.&lt;/p&gt;

&lt;p&gt;I use VIM on MBP M1 for 10–15 hours and If I talk about other text editors or IDE power consumption, I would say 7–9 hours. VIM lasts on Dell XPS 13 for 6–7 hours easily and other text editors &amp;amp; IDEs make my laptop hotter so that I can cook my 7–8 oz of Wagyu steak or some ham on it.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;IT'S HARD BUT IT'S NOT THAT SCARY&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Every new thing might appear more difficult at the first glance, but when you patiently learn it, it appears simple and enjoyable. Many individuals who don't use VIM are accustomed to using other text editors and believe that they do not need to convert to it since they are constrained by the new 'functionalities'. A new user of VIM could become weary of learning text editor features and desire to move to another text editor that allows them to easily navigate to their needs. VIM requires time and effort to learn and use on one's own, which is the apparent cause for getting weary of it or giving it up.&lt;/p&gt;

&lt;p&gt;When I tried VIM for the first time, I quit using it after the first attempt. After reading many articles on VIM over the course of a week, I decided to give it another shot. The reason for this was a question on StackOverflow that had received over a million views asking how to exit from VIM, so it is reasonable that you might need some justification for believing that learning VIM is worthwhile. Then it dawns on me why VIM is one of the most popular text editors for programmers worldwide.&lt;/p&gt;

&lt;p&gt;You might be interested to know what resource I used to learn VIM. Nothing but an Introduction &amp;amp; Some basic commands are the straightforward response to this question. I also discovered this book's Kindle edition to expand the information about VIM. I don't suggest you buy this book; it depends on you whether buying a book is worth it or why not try a free resource. I leave it to you to choose.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4als4b3dgbq3sou6cai.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4als4b3dgbq3sou6cai.jpeg" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You may experiment with VIM for programming task since no one on the internet is pressuring you to give up your beloved IDE or Text Editor because nobody wants to go outside of their comfort zone.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;IT'S FUN &amp;amp; IT GIVES YOU THE OPPORTUNITY TO LEARN SOMETHING NEW&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;I'm struck by how enthusiastic senior devs are to describe VIM's advantages every time you'll asked. Their eagerness is very understandable considering that while learning VIM for the first time, you simultaneously feel curious and excited. I'm aware that new users may find it difficult to be productive on VIM or may feel attacked or questioned by other text editor users. It's also possible that some of your college/university friends or coworkers may think you're hysterical for using VIM or that you are a top developer.&lt;/p&gt;

&lt;p&gt;Once you have mastered the fundamentals of VIM, you may believe that you're prepared for this, but you still need to practise since VIM is not something that can be learnt by memorising a cheat sheet or tried once or twice. It's like learning something that can do whatever your five text editors can or cannot. When you started using VIM more frequently, you discovered you had experienced and arrived at your desired destination. The live project should then be used to test it. It's more crucial to practise VIM than it is to attempt it for the first time since nobody wants you to become really trapped with it. Because of this, I don't advise novice users to utilise VIM beyond their initial attempt.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;CONCLUSION&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Nowadays, everyone has a preferred text editor for programming, and each programming language has several text editors, some with more capabilities than the others, but they are all text editors that let users to create and edit plain text files or several programming language files. People are quite furious about software installation since they installed unnecessary software that uses up a lot of storage space. Certain text editors could be quite demanding on the system, resulting in abrupt freezing or departure, which can be very uncomfortable. This is why people should choose light and fast text editors for programming, which can boost their productivity. A programmer who spends most of their time on coding has a favourite text editor that they find utilising productive.&lt;br&gt;
I choose VIM for my programming workflow and I choose it because it's fast, lightweight and highly customizable &amp;amp; configurable. VIM keeps me on the keyboard for every task which strengthens and increases my productivity as a developer, because using a mouse going to slow down. I sometimes hear the question, Why are you using such a difficult text editor for programming, from acquaintances who rarely use VIM. There are several factors, many of which I've already covered. Even if I don't use VIM, knowing how to use such a superb text editor is worthwhile since, whether or not you want to switch to VIM, learning how to use it is worthwhile since you'll undoubtedly become used to it and could even prefer it in the end.&lt;/p&gt;

&lt;p&gt;Thank You for reading this article. &lt;/p&gt;

</description>
      <category>vim</category>
      <category>programming</category>
      <category>productivity</category>
      <category>bash</category>
    </item>
    <item>
      <title>Move Fast on Linux with These Keyboard Shortcuts</title>
      <dc:creator>Dev Programming</dc:creator>
      <pubDate>Tue, 29 Mar 2022 20:02:00 +0000</pubDate>
      <link>https://dev.to/devprogramming/move-fast-on-linux-with-these-keyboard-shotcuts-24g1</link>
      <guid>https://dev.to/devprogramming/move-fast-on-linux-with-these-keyboard-shotcuts-24g1</guid>
      <description>&lt;p&gt;&lt;strong&gt;Best 28 Keyboard Shortcuts will Improve you Movements and Increase Productivity on Linux.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Keyboard shortcuts for Terminal is a series of one or several keys that invoke a software program to perform a pre-programmed action. This action may be part of the standard functionality of the operating system or application program, or it may have been written by the user in a scripting language. Keyboard shortcuts are typically a means for invoking one or more commands using the keyboard that would otherwise be accessible only through a menu, a pointing device, different levels of a user interface, or via a command-line interface. Keyboard shortcuts are generally used to expedite common operations by reducing input sequences to a few keystrokes.&lt;/p&gt;

&lt;p&gt;If you’re using Linux then BASH is the default command line shell. The bash shell features has a wide variety of keyboard shortcuts you can use. These will work in bash on any operating system. Some of them may not work if you’re accessing bash remotely through an SSH or telnet session, depending on how you have your keys mapped.&lt;/p&gt;

&lt;h2&gt;
  
  
  ADVANTAGES OF USING KEYBOARD SHORTCUTS FOR TERMINAL
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Multitasking&lt;/li&gt;
&lt;li&gt;Efficiency&lt;/li&gt;
&lt;li&gt;Precision&lt;/li&gt;
&lt;li&gt;Work Faster&lt;/li&gt;
&lt;li&gt;Increase Productivity&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Shortcuts help you to be more productive and efficient with whatever tool you use. Linux terminal is not an exception. There are certain Linux terminal shortcuts that every user must know and practice. I have listed the most useful keyboard shortcuts you can use on your terminal of choice. Once you learned these shortcuts, you’ll feel how good and fast you are with using the Linux command line.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. CTRL + ALT + T
&lt;/h2&gt;

&lt;p&gt;This Keyboard Shortcut will opens a new terminal.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RcI5DHKk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ygqo4ecnfuqzyl5qw4y2.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RcI5DHKk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ygqo4ecnfuqzyl5qw4y2.gif" alt="Image description" width="880" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  2. TAB
&lt;/h2&gt;

&lt;p&gt;This Keyboard Shortcut is the handiest shortcut and time saver ever developed. It auto completes commands, file names, or directory names for you. You just have to type commands like file name, directory name and then press the Tab key. The system will either complete the string or display all available options to you.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. CTRL + C
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will aborts running programs by sending the SIGINT signal to the program that you want to interrupt and abort.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. CTRL + L
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will clean your terminal instead of type the CLEAR in your terminal to do that.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. CTRL + SHIFT + C
&lt;/h2&gt;

&lt;p&gt;As you know terminal doesn’t support CTRL + C as copy command So This keyboard shortcut will copy text or command you want from terminal.&lt;/p&gt;

&lt;h2&gt;
  
  
  6. CTRL + SHIFT + V
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will paste any command or text into you terminal.&lt;/p&gt;

&lt;h2&gt;
  
  
  7. CTRL + Q
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Quit the application in focus.&lt;/p&gt;

&lt;h2&gt;
  
  
  8. FN + LEFT ARROW KEY &amp;amp; RIGHT ARROW KEY
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will quickly move the cursor to the beginning of line and end of line instead of holding the arrow keys.&lt;/p&gt;

&lt;h2&gt;
  
  
  9. CTRL + U
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will erases everything from the current cursor position to the beginning of the line.&lt;/p&gt;

&lt;h2&gt;
  
  
  10. CTRL + K
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcuts is bit similar to above one CTRL + U which erases everything from the current cursor position to the beginning of the line and The only difference is that instead of the beginning of the line, it erases everything from the current cursor position to the end of the line.&lt;/p&gt;

&lt;h2&gt;
  
  
  11. CTRL + W
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will delete the whole word before the cursor.&lt;/p&gt;

&lt;h2&gt;
  
  
  12. CTRL + Y (Undo erased content)
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will UNDO the Shortcuts like CTRL + U, CTRL + W, CTRL + K. This shortcut is very useful and handy in case you erased wrong text or if you need to use the erased text someplace else.&lt;/p&gt;

&lt;h2&gt;
  
  
  13. CTRL + A
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Move the cursor to the beginning of the line. This shortcut is very useful when typed long command and don’t wanna use arrow key for this.&lt;/p&gt;

&lt;h2&gt;
  
  
  14. CTRL + E
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut does actually the opposite of Ctrl+A. It moves the cursor to the end of the line. You can use CTRL + A and CTRL + E to quickly move your cursor around beginning of the line or end of the line.&lt;/p&gt;

&lt;h2&gt;
  
  
  15. CTRL + F
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Move the cursor forward by one character. It is essentially the same thing as using the right arrow key, but keeps you on the home row keys.&lt;/p&gt;

&lt;h2&gt;
  
  
  16. CTRL + B
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Move the cursor backward by one character. It gives you the same result as using the left arrow key, but keeps you on the home row keys.&lt;/p&gt;

&lt;h2&gt;
  
  
  17. CTRL + R
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will locate a previously used command in Terminal. It will open up a reverse search for you and allow you to find a previously used commands that you may need to access again.&lt;/p&gt;

&lt;h2&gt;
  
  
  18. CTRL + G
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Leave the history search mode without running a command.&lt;/p&gt;

&lt;h2&gt;
  
  
  19. CTRL + O
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Send the command back to your terminal or select Enter to execute the command from the search mode.&lt;/p&gt;

&lt;h2&gt;
  
  
  20. CONTROL + Z
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Suspends what you are currently running in the background.&lt;/p&gt;

&lt;h2&gt;
  
  
  21. CONTROL + D
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will cause you to exit the current shell in Terminal or in other word this shortcut will log you out of the current terminal. If you are using an SSH connection, it will be closed. If you are using a terminal directly, the application will be closed immediately.&lt;/p&gt;

&lt;h2&gt;
  
  
  22. ALT + U
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Capitalize every character from the cursor to the end of the current word, converting the characters to upper case.&lt;/p&gt;

&lt;h2&gt;
  
  
  23. ALT + L
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Uncapitalize every character from the cursor to the end of the current word, converting the characters to lower case.&lt;/p&gt;

&lt;h2&gt;
  
  
  24. ALT + C
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will Capitalize the character under the cursor. Your cursor will move to the end of the current word.&lt;/p&gt;

&lt;h2&gt;
  
  
  25. CTRL + T
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will switch two character on a command line.&lt;/p&gt;

&lt;h2&gt;
  
  
  26. CTRL + X +E
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will put your current command line to the text editor.&lt;/p&gt;

&lt;h2&gt;
  
  
  27. CTRL + S
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will lock your terminal output.&lt;/p&gt;

&lt;h2&gt;
  
  
  28. CTRL + Q
&lt;/h2&gt;

&lt;p&gt;This keyboard shortcut will unlock your terminal output.&lt;/p&gt;

&lt;h2&gt;
  
  
  CONCLUSION
&lt;/h2&gt;

&lt;p&gt;These are the all of those keyboard shortcuts that will increase your productivity and Some of you already knew some of the keyboard shortcut and some of you are not. This article will definitely helps you to practice on terminal to be good in productivity.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>tutorial</category>
      <category>productivity</category>
      <category>linux</category>
    </item>
    <item>
      <title>Remove &amp; Block SNAP from any Linux</title>
      <dc:creator>Dev Programming</dc:creator>
      <pubDate>Tue, 29 Mar 2022 19:34:10 +0000</pubDate>
      <link>https://dev.to/devprogramming/remove-block-snap-from-any-linux-1p39</link>
      <guid>https://dev.to/devprogramming/remove-block-snap-from-any-linux-1p39</guid>
      <description>&lt;p&gt;SNAP, The package manager for Linux is developed by Canonical offers the Linux users to install the latest version of Software Packages in the fastest &amp;amp; easiest way possible because Snap downloads the whole archive, with all the prerequisites inside, and install it in a confined folder that is isolated from the system. But a Large number of developers &amp;amp; Linux users don’t like SNAP for a lot of reasons. Before Snap, PPA was the recommended way to get third-party software on Linux System which is quite the easiest way to get third-party software and it still exists. SNAP does its task by forcing its legitimate Linux users and forcing is not something that Linux Users would tolerate and that’s the reason, Most of the Linux Users left Ubuntu &amp;amp; switched to other Linux distributions who don’t have the SNAP like Linux Mint 20 edition.&lt;/p&gt;

&lt;p&gt;A Large number of developers are leaving Ubuntu because it becoming the proprietary operating system. People are using Linux not because It looks cool but These people want to be the arbiter of their own computer. Most users are switching to Linux Mint because Linux Mint removes SNAP from their 20th Editions and doesn’t come with the pre-installed SNAP in upcoming releases.&lt;/p&gt;

&lt;p&gt;Linux users either switch to others operating systems or remove the SNAP from their Linux Systems. Let’s remove the SNAP from Ubuntu or even any Linux Operating System. So Let’s make the steps easier at least for removing &amp;amp; blocking the SNAP from the Linux System.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. REMOVING SNAP PACKAGES
&lt;/h2&gt;

&lt;p&gt;In the first step, You just need to check if you’ve SNAP packages installed in your system and if there are some, then Remove it all. You need to open the terminal and type :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;snap list
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bemcDH4V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h2bw2ewe00lp2xb5pz0k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bemcDH4V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h2bw2ewe00lp2xb5pz0k.png" alt="Image description" width="708" height="165"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This command will show you the installed SNAP packages in your Linux system and after viewing the packages, remove those SNAP packages by typing the command in your terminal :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo snap remove --purge package-name
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You need to type the correct package name by seeing from the list to remove it completely. After removing all SNAP packages from Your System then You need to remove the SNAP cache by typing the command on your terminal :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo rm -rf /var/cache/snapd/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After successfully removing the SNAP packages and their Cache from the System. Now you need to Stop the SNAP service &amp;amp; Unmount the SNAP Core Service. For doing that type the command :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo systemctl stop snapd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command will stop the SNAP service from your Linux System and after then Unmount the SNAP core service. To unmount the SNAP core service, You need to get the core id and for doing that type &lt;code&gt;df&lt;/code&gt; to view the core ID, and to Unmount the SNAP core service, type the command :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo unmount /snap/core/&amp;lt;core-id&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now, This is the final step to Remove SNAP completely from Your Linux System. For doing that type the command :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo apt purge snapd* gnome-software-plugin-snap --auto-remove
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After removing SNAP completely from the Linux System then remove all of their Associated Directories by typing the command :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo rm -rf ~/snap /var/cache/snapd/ /var/snap /var/lib/snapd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  2. BLOCKING THE SNAP ON UBUNTU
&lt;/h2&gt;

&lt;p&gt;After following all those steps to remove SNAP from Linux System completely but it’ll come back when you think you can now install chromium without SNAP which is not correct but you still did that and you’ll find that you’re installing SNAP again in your Linux System like in the picture down below.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vmkFbpuH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dv6gs79095o0uy8ilfla.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vmkFbpuH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dv6gs79095o0uy8ilfla.png" alt="Image description" width="880" height="570"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Most people try to block the Installation of SNAP in their system by this command :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo apt-mark hold snapd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If that command work for somebody then proceeds with that command but for those, that command didn’t work then you need to do it in an effective way that will strictly stop installing SNAP on your Linux System. For doing that type the command :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo cat &amp;lt;&amp;lt; EOF &amp;gt; /etc/apt/preferences.d/snapd
Package: snapd
Pin: origin *
Pin-Priority: -1
EOF
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When you execute that command in your system then the possibilities are that you might see this error like in the picture down below.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KlzDYnry--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/imkwknvun7eb6u142q1n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KlzDYnry--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/imkwknvun7eb6u142q1n.png" alt="Image description" width="880" height="154"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To fix that error you need to get root and execute that command again for successful execution.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6dFM5r9_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r3tr7ne6jdj8954qa0ig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6dFM5r9_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r3tr7ne6jdj8954qa0ig.png" alt="Image description" width="880" height="437"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now, You’ve successfully removed &amp;amp; blocked the SNAP from your Linux System. Enjoy the SNAP-free Linux System but You still can’t install Chromium on Ubuntu without SNAP. If You want to install chromium without snap then add the Debian Repository to do that and before doing that please acknowledge the Linux Packaging System.&lt;/p&gt;

&lt;p&gt;Thank You for Reading This Article.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>devops</category>
      <category>beginners</category>
      <category>ubuntu</category>
    </item>
    <item>
      <title>Best Browser Extension for Online Privacy</title>
      <dc:creator>Dev Programming</dc:creator>
      <pubDate>Tue, 29 Mar 2022 16:06:39 +0000</pubDate>
      <link>https://dev.to/devprogramming/best-browser-extension-for-online-privacy-207m</link>
      <guid>https://dev.to/devprogramming/best-browser-extension-for-online-privacy-207m</guid>
      <description>&lt;p&gt;Web Browser Extension are everywhere and quiet helpful and most of us use on a daily basis for many of the specific reasons such as Privacy, Productivity, Customization. The question is What is Web Browser Extension ? How it Work and What are Those Browser Extension for which you are writing this article?&lt;/p&gt;

&lt;p&gt;Start With Basic and Common Question which is Browser Extension. Its a small software application that adds a capacity or functionality to the web browsers. A browser extension, also called a plug-in, can take advantage of the same APIs that JavaScript can on a web page, but the extension can do more because it also has access to its own set of APIs. A Browser Extensions adds a lot of useful features to the browsers and enhance the web service functionality and at the same time, extensions can be both convenient and dangerous and it poses threats to both privacy and security too. Almost all of the popular web browser supports Extensions and You can easily Install on Your browsers like Chrome, Chromium, Firefox, Edge, Brave, Safari, Opera and Many More on Internet. Almost Browsers have thousands of extensions on their specific Web Stores.&lt;/p&gt;

&lt;p&gt;The browser companies themselves make some of these extensions, make really good recommendation for users to install the best Extension and They Responsible for Their Extension while third-party software development shops are responsible for many others. Browser extensions are usually written in HTML, CSS or JavaScript. Like other types of software, browser extensions can be coded for undesirable behaviors and be misused to deliver malware. There are many incidents that show User A has been Hacked Through some Browser Extensions using backdoor, malware, botnets and There are many ways to manipulated any user’s privacy or data on their device through browser extension.&lt;/p&gt;

&lt;p&gt;So always keep one thing in your mind that what are the type of resources that the extension can access and where it’ll send the data it collects. Treat with extreme caution because any extensions can do anything. Always Check Extensions has been verified from your Specific browser company before installing any new one.&lt;/p&gt;

&lt;p&gt;The List of Useful and recommendable browser extensions for many purpose, but mostly for privacy and data protection. Here are the list of Good Extension for Your Browser :&lt;/p&gt;

&lt;h2&gt;
  
  
  PRIVACY BADGER
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SvmGciPH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rv8j7m69garmq94vj0yk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SvmGciPH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rv8j7m69garmq94vj0yk.png" alt="Image description" width="800" height="237"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Privacy Badger is a browser extension that stops advertisers and other 3rd party trackers from secretly tracking where you go and what pages you look at on the web. If an advertiser seems to be tracking you across multiple websites without your permission, Privacy Badger automatically blocks that advertiser from loading any more content in your browser. To the advertiser, it’s like you suddenly disappeared.&lt;/p&gt;

&lt;h2&gt;
  
  
  HTTPS EVERYWHERE
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cn6P5_N1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/678tihmcv482y5l8sw5b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cn6P5_N1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/678tihmcv482y5l8sw5b.png" alt="Image description" width="800" height="237"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;HTTPS Everywhere is a browser extension that encrypts your communications with many major websites, making your browsing more secure. Its forcing HTTP site which is usually insecure, to HTTPS and it ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS — the secure web protocol enabled by SSL/TLS across your entire website instead of selectively.&lt;/p&gt;

&lt;h2&gt;
  
  
  UBLOCK ORIGIN — AN AD BLOCKER
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iD_EEZ1p--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mjgzoy9iqbjpzd63dmmp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iD_EEZ1p--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mjgzoy9iqbjpzd63dmmp.png" alt="Image description" width="800" height="238"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;uBlock Origin is a free and open-source, cross-platform browser extension for content-filtering, including ad-blocking and pop up. uBlock Origin has received praise from technology websites and is reported to be much less memory-intensive than other extensions with similar functionality. uBlock Origin’s stated purpose is to give users the means to enforce their own content-filtering choices.&lt;/p&gt;

&lt;h2&gt;
  
  
  CLEAR URL
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MVItS-Yq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3vxjho2qojl29cfm4jbz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MVItS-Yq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3vxjho2qojl29cfm4jbz.png" alt="Image description" width="800" height="235"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This extension will automatically remove tracking elements from URLs to help protect your privacy when browse through the Internet. Nowadays, Website are using encoded tracking URLs to track users activity but this extension is not gonna let them do that. All that tracking code in URL is not necessary for a website to be displayed or work correctly and can therefore be removed by this extension and that is exactly what ClearURLs does.&lt;/p&gt;

&lt;h2&gt;
  
  
  LASTPASS
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--guz6C_ef--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zs23smze4fgwq5h54u8z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--guz6C_ef--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zs23smze4fgwq5h54u8z.png" alt="Image description" width="799" height="236"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;LastPass is a secure password manager that stores all of your usernames and passwords in one safe place, called a Vault. After you save a password to your Vault, LastPass always remembers it for you. When you need to log in to a website, LastPass enters your username and password for you. LastPass is inbuilt Password Protected which allow user to enter master password to enter their vaults.&lt;/p&gt;

&lt;h2&gt;
  
  
  NO SCRIPT
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MpxmXfI7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/be1l16eqo1dx1zhh5vzp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MpxmXfI7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/be1l16eqo1dx1zhh5vzp.png" alt="Image description" width="800" height="236"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NoScript are must have Browser Extension which disables things like JavaScript from running on web sites you visit. There is a small but vocal subset of users that disable JavaScript. Many of these people do so because of a perceived security benefit. There have been a few browser vulnerabilities that were exploited via JavaScript. However, this is extremely uncommon and the rare security holes in JavaScript engines have been patched very quickly. Most websites use JavaScript which makes the web we have today possible. Disabling JavaScript also prevents some types of ads from loading. But Most of websites won’t work properly so if you disable JavaScript then you may be unable to use certain features on a website. In other cases, the website may even break completely and that’s the reason that most of the website break the ability to log in, post comments, or dynamically request content, which has become incredibly common on the web today.&lt;/p&gt;

&lt;h2&gt;
  
  
  ADBLOCKER ULTIMATE
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Wr1Uym8i--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/p16c0ik1sbp9fxzzudwq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Wr1Uym8i--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/p16c0ik1sbp9fxzzudwq.png" alt="Image description" width="801" height="235"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;AdBlocker Ultimate is a web browser extension, which blocks all annoying ads, malicious websites and online trackers with no exceptions. It is available on all popular web browsers with no exceptions. Unlike its rivals it doesn’t come with a predefined whitelist. The extension provided by the company uses extensive filters to stop all kind of advertisements.&lt;/p&gt;

&lt;h2&gt;
  
  
  CONCLUSION
&lt;/h2&gt;

&lt;p&gt;That’s All of 7 Browser Extensions which is Quite Useful for Safe and Better Web Browsing. I’m not adding more extension which is later gonna be worthless and irrelevant. You must have seen, Many of User installed a dozen of Browser Extension for Their Purposes but Most of are still Irrelevant and less useful sometime.&lt;/p&gt;

</description>
      <category>productivity</category>
      <category>tooling</category>
      <category>performance</category>
    </item>
    <item>
      <title>How to Install Ubuntu 20.04 in Brief Steps ?</title>
      <dc:creator>Dev Programming</dc:creator>
      <pubDate>Mon, 28 Mar 2022 19:45:17 +0000</pubDate>
      <link>https://dev.to/devprogramming/how-to-install-ubuntu-2004-in-brief-steps--7l8</link>
      <guid>https://dev.to/devprogramming/how-to-install-ubuntu-2004-in-brief-steps--7l8</guid>
      <description>&lt;p&gt;&lt;strong&gt;The Entire Process to Install the Ubuntu in Simple Way, Anyone can Easily Install The Ubuntu.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If You want to install the Ubuntu 20.04 LTS on Your System, this article is detailed and perfect for you to Clean Install of Ubuntu. Anyone gives a Try to Linux, and when it comes to beginners, Ubuntu always comes on the top of the list. When it comes to getting things done in the tech world easily and efficiently then nothing beats Linux. It's open-source, highly secure, conveniently customizable and it comes with huge community support. The Ubuntu 20.04 LTS comes with a new shiny desktop theme &amp;amp; Most awaited inbuilt dark mode feature and It improvised the Linux Kernel. Since it's an LTS release, stability is one of the utmost importance. Anyone can use it, Beginners to Advanced users for Any Purpose like Programming, Business and many more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;System Requirements&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;2 GHz Dual Core Processor&lt;/li&gt;
&lt;li&gt;4 GB of RAM&lt;/li&gt;
&lt;li&gt;25 GB of Hard Drive Space&lt;/li&gt;
&lt;li&gt;DVD or USB Port for the Installer Media&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can install Ubuntu in Just 3 Steps by Reading This article. You will probably not be Stuck in The Process of Installing Ubuntu.&lt;/p&gt;

&lt;p&gt;Before Installing any New Operating System, You need to Backup your Data in Separate Device or System cause Installing a New Operating System will Completely Erase all of Your Data which is not Recoverable. Now Let's Start with &lt;br&gt;
Step One.&lt;/p&gt;

&lt;h2&gt;
  
  
  STEP 1 - Download the ISO File
&lt;/h2&gt;

&lt;p&gt;You've to have the ISO file of the specific Operating System to Install it on Your System.Let's start by Downloading the Ubuntu's ISO File, So go to the Ubuntu Official Site and Download the LTS version of &lt;a href="https://ubuntu.com/download/"&gt;Ubuntu&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--s7bIaSSO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lysffngrhwxf6tazx8r3.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--s7bIaSSO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lysffngrhwxf6tazx8r3.jpeg" alt="Image description" width="880" height="527"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;LTS stand for Long Term Support and LTS releases were originally intended for those users who wants a stable version of Ubuntu and get security updates for years. Ubuntu produces new releases in every six months, which is Called a Non-LTS and All of the Non-LTS releases are only 9 months of Support &amp;amp; Updates and Traditionally, average users stuck with Non-LTS releases cause of little bit of glitches and bugs. Its like a BETA version of Ubuntu. Ubuntu releases LTS version in every 2 Years and Get 5 Year of Supports &amp;amp; Updates. LTS releases are designed to be stable platforms that you can stick with for a long time. Ubuntu Release Detail in Picture down below.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--v9d4MBR2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8m96vvwwd5nombkqj7ix.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--v9d4MBR2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8m96vvwwd5nombkqj7ix.png" alt="Image description" width="779" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So If you wanna Stable Version of Ubuntu then Download the LTS Version and If You want a New Release and Features Download the Non-LTS Version, Depends on Your Preference.&lt;/p&gt;

&lt;h2&gt;
  
  
  STEP 2 - Create a Bootable Drive
&lt;/h2&gt;

&lt;p&gt;To install any Operating System, We've to create a bootable drive with ISO file to Install the New Operating System cause BIOS or UEFI are designed designed to recognize only Bootable Drives. I recommend a software to make Your drive bootable Which is &lt;a href="https://www.balena.io/etcher/"&gt;Balena Etcher&lt;/a&gt;, So download and install the Balena Etcher and Create a Bootable Drive in Just 3 Steps.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;SELECT IMAGE - Select Your ISO File&lt;/li&gt;
&lt;li&gt;SELECT DRIVE - Select Your Drive like USB Pendrive&lt;/li&gt;
&lt;li&gt;FLASH - Press the FLASH Button to Making it Bootable and Wait Until Its done&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JZjvL1rj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m4a04o3fepbhzsu5nt0p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JZjvL1rj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m4a04o3fepbhzsu5nt0p.png" alt="Image description" width="793" height="331"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Bootable Drives are very important in order to Install a New Operating System to ensure that our computer would boot properly into it's operating system. Bootable Drives are standard flash drives which contain the Operating System that we want to install in the computer. It is also helpful to us in case one of the internal hard drives fail to work or we can't boot inside our computers.&lt;/p&gt;

&lt;h2&gt;
  
  
  STEP 3 - Boot Up from USB Drive
&lt;/h2&gt;

&lt;p&gt;Now, You need to Reboot your Laptop or PC Wherever you're installing the Operating System when the screen splashes, You need to go to the BIOS Startup menu by Pressing the ESC Key.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TP_OKcOw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jyy8bqplzi3zso3zr0ro.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TP_OKcOw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jyy8bqplzi3zso3zr0ro.jpeg" alt="Image description" width="648" height="224"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then Press F9 to go the Boot Device Options and Select Your USB Drive and Press ENTER to Boot up. The boot menu key may be different depending on your computer manufacturer. Find it On the Internet or Try the Same Key As Shown in this Article.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Og225Oht--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2b756h8z0wtph6b164np.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Og225Oht--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2b756h8z0wtph6b164np.jpeg" alt="Image description" width="880" height="391"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then Your Computer will boot up with Ubuntu ISO File and Then You'll see Ubuntu Will Check the Disk for any Error, Leave it Like That until its completed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EWVD0y10--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/npl246gr40u4ewvsude3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EWVD0y10--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/npl246gr40u4ewvsude3.png" alt="Image description" width="640" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After the Disk Checking is completed, You'll see the Ubuntu welcome screen where you can choose whether you want to Try Ubuntu or Install Ubuntu. The Try Ubuntu is suited for testing if everything works such as the Wi-Fi drivers or other hardware. You will choose the Install Ubuntu for the installation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Bu5hrGin--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kup2urw9cb85xu7wgirb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Bu5hrGin--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kup2urw9cb85xu7wgirb.png" alt="Image description" width="880" height="648"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The You'll see the option to choose the keyboard layout. Simply Select Your Preference but Default is Better Which is English(US) Then click continue. This Settings can be changed later after the installation and you can also add multiple layouts in the settings menu once the installation is finished. After that You'll See the Option to connect to the WiFi. Simply Just connect to the WiFi cause Internet is the Most important thing in installation of Any Operating System cause it'll download the third party softwares for graphics and WiFi hardware and Additional Media Formats.&lt;/p&gt;

&lt;p&gt;After that Process You'll be prompted to the option to install Ubuntu as Normal Installation or as Minimal Installation. So Select the Normal Installation and You have to Mark the Both Options Down Below where One Option is Download Update while Installing Ubuntu and Install Third party Software and then press continue.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yBnYCXgf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tlmzld5p24ioahox0dcf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yBnYCXgf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tlmzld5p24ioahox0dcf.png" alt="Image description" width="640" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then You'll see the option to select how you wanna install Ubuntu on your system. Erase Disk and Install Ubuntu and Something Else and One option also come while installing when you're installing Ubuntu on Other Operating System. The Option is Install Ubuntu alongside with Windows 10 or Any other OS where you're installing.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--aysg6Wcj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/braxxx537q9tabp6ovsc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--aysg6Wcj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/braxxx537q9tabp6ovsc.png" alt="Image description" width="640" height="376"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If You want to encrypt your Disk, You can do that by clicking on Advanced Features and Make a password and Click Continue. Encryption on Disk Means, You'll get more security on Your Computer and whenever you turn on your computer, It'll ask you a Encryption Password to Unlock it to Boot and Disk Encryption Password should be different than User password.&lt;/p&gt;

&lt;p&gt;Then Make the Disk Changes and Click on continue to go Forward. In the next step, you'll simply select the country where you are. This is simply to set the time zone for your system clock, So Select that and Press Continue.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oENoq3Zs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/epkewo0cqrz77j7oma3h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oENoq3Zs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/epkewo0cqrz77j7oma3h.png" alt="Image description" width="640" height="378"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And Last Step to do is to create your user account on the system. Fill Your Full Name, Username or Password.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VI6XrIVh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hfbti9cnjm4pvfao6nm8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VI6XrIVh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hfbti9cnjm4pvfao6nm8.png" alt="Image description" width="640" height="378"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Username will be Your Computer's username and You've to fill your full name in Your Name Section and select the Require my password to Log in. After Set up your user account then click on continue button execute the installation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--r8hi5TPY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/weemuq0jvawhmz43py5c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--r8hi5TPY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/weemuq0jvawhmz43py5c.png" alt="Image description" width="574" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The last step is Sit back and Relax until the installation process is completed. The whole system process will probably take around 15–20 minutes, It depends on your system specification. After the installation is completed, System ask you to restart the computer and while restarting It'll show the Message to Remove your USB Drive and Press Enter to Restart Now.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cKFOy8Ne--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0bc0cm0ix2q7m5xg8j4j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cKFOy8Ne--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0bc0cm0ix2q7m5xg8j4j.png" alt="Image description" width="640" height="360"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After That, Once the system has been rebooted then you will get the login screen wizard to Enter your Password and Then You're able to Operate Your New Ubuntu 20.04 LTS. The Whole process is not Too hard and Anyone can Do that. I've Installed so many Linux Operating System on My Laptop and PC over the years and it is very normal that I get into problems with drivers. I think it is crucial to continue repeating this message because I still hear people saying that it is tricky to get Ubuntu to play with different hardware. True, there used to be driver issues some years ago, but I haven't experienced that in 3–4 years or So.&lt;/p&gt;

&lt;p&gt;Thanks for Reading This Article.&lt;/p&gt;

</description>
      <category>ubuntu</category>
      <category>programming</category>
      <category>beginners</category>
      <category>python</category>
    </item>
  </channel>
</rss>
