OLAP vs Time-Series Databases: The SQL Perspective | QuestDB
Fish - The User-Friendly Interactive Shell for Linux
The Fish is a command-line shell that is designed to be user-friendly, interactive, and provide additional features compared to traditional shells like Bash.
Diff`ing Files with Difftastic
What is Difftastic? Difftasic is a CLI tool that allows you to compare files based on their syntax rather than rely on line-by-line matching. For example, this means that if you had the following files, Difftastic would not detect any differences. $ cat vlans_1.json { "vlans": [100, 200,
How to Install an iSCSI Storage Server on Ubuntu 22.04
iSCSI stands for Internet Small Computer System Interface is a Storage Area Network protocol that can be used to share block devices such as HDD/SSD p...
How to monitor permission, ownership or any other change to a particular directory or file - Red Hat Customer Portal
How to monitor the permission change and ownership change of a particular directory or file? How to configure auditd to find how a file was modified in Red Hat Enterprise Linux? What tool can audit files at a directory level? How do I monitor files or directories using auditd in Red Hat Enterprise Linux ? How do I monitor a file or directory to see which user or program has accessed or modified data ?
Monitoring Linux File Access With auditd | Baeldung on Linux
Explore the comprehensive auditd package in Linux.
The hidden gems of moreutils - Jiri Pospisil
001 make
null
How To Install cifs-utils on Debian 12
Learn how to install cifs-utils on Debian 12 with this tutorial. cifs-utils is Common Internet File System utilities
How to Install Jellyfin Media Server on Debian 12
Jellyfin is free software for building a media server. It lets you collect, manage, and stream your media files from multiple devices or clients. This...
Using Zeroconf on Linux: What Is It Good For? - Practically Networked
How ServerName and ServerAlias Work in Apache | Baeldung on Linux
Learn how to use the ServerName and ServerAlias directives to configure virtual hosts on an Apache web server.
OpenTelemetry support
Analyze telemetry data for builds
-d --name jaeger -p "6831:6831/udp" -p "16686:16686" --restart unless-stopped jaegertracing/all-in-one
Docker Containers Security
Docker is now widely used in DevOps due to its ease of use and intuitive user experience. In this series, you'll learn everything there is to know about Docker, from its internals to exploiting misconfigurations to securing your Docker environment.
How to Create Your Own Docker Base Images From "Scratch"
Docker images are created from a Dockerfile that defines a base image and a series of instructions that add your own filesystem layers.
Debootstrap - Debian Wiki
SSH over HTTPS
Docker container build driver
The Docker container driver runs BuildKit in a container image.
Creating your Own Base Image for Docker
Have you ever wondered what it's like to create a docker base image that users can import and build on? This tutorial will show you how to make your own Docker base images from scratch in two different approaches.
Firewalld: An Easier Way to Manage Linux Firewalls
Tired of iptables? With firewalld, you can easily open ports, block IP addresses, manage zones, and even add a GUI for easier management.
How to run an MS-DOS-based web server (seriously) #MSDOS #Networking #VintageComputing
Bryan Lunduke posts a guide on running a DOS-based web server. Yes, DOS. And, while DOS may not be the high-up-time, massively scalable Web Server platform of the future… it’s still a heck of…
czkawka
Multi functional app to find duplicates, empty folders, similar images etc.
Using Nginx as a Forward Proxy | Baeldung
Learn how to use Nginx as a forward proxy for any requested location.
Database Fundamentals
NixOS has one fatal flaw
This short from my Ship It! apperance created a firestorm of comments from folks who were unsatisfied with the lack of explanation behind my conclusion. Let me explain…
Uniting the Linux random-number devices
Blocking in the kernel's random-number generator (RNG)—causing a process to
wait for "enough"
entropy to generate strong random numbers—has always been controversial. It has also led to
various kinds of problems over the years, from timeouts and delays caused
by misuse in user-space
programs to deadlocks and other problems in the boot
process. That behavior has undergone a number of changes over the last few
years and it looks possible that the last vestige of the difference between
merely "good" and "cryptographic-strength" random numbers may go away in some
upcoming kernel version.
Logo alt="" height="100%" width="2em" style={{display: "inline", verticalAlign: "middle"}} / Klunok | Klunok
Klunok is a smart versioning and automatic backup daemon for Linux.
Git Prompt Kit
A collection of configurable, fast Git status components for custom zsh themes
Understanding System Log Management Using Logrotate | Linux Journal
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine’s correlation, it just makes recon effortless.