Chrome 110 will automatically discard background tabs. Here’s how to stop it.

System & Network Admin
How I do automated accessibility testing for my website
Follow along with this example of performing accessibility tests in GitLab with Pa11y and Cypress on a Jekyll website.
Postgres Full Text Search vs the rest
Comparing one of the most popular Postgres features against alternatives
How to install an SSL Certificate on Postfix?
This guide provides detailed instructions on how to generate a CSR code and install an SSL Certificate on the Postfix mail transfer agent…
Pure Aloha In Computer Networks: A Comprehensive Guide - XALGORD
Learn all about Pure Aloha in computer networks, from its protocol and collision avoidance mechanism to its advantages, disadvantages, and applications.
ExifTool - Read, Write, and Edit Meta Info of Multimedia
ExifTools is a very powerful-yet-easy-to-use application for reading, writing, and editing metadata of multimedia files in Linux systems.
TabFS
A browser extension that mounts your browser tabs as a filesystem on your computer.
Cyclic Redundancy Check (CRC): Ensuring Accurate Data Transmission In Computer Networks - XALGORD
Cyclic Redundancy Check (CRC) ensures accurate data transmission in computer networks, including its basics, implementation, applications, strengths, and weaknesses.
High-Level Data Link Control (HDLC) In Computer Networking - XALGORD
Discover everything you need to know about High-Level Data Link Control (HDLC) in computer networking.
Binary Synchronous Communications Protocol (BISYNC) In Computer Networks - XALGORD
Binary Synchronous Communications Protocol (BISYNC) in computer networks - its architecture, operation, applications, advantages, and implementation.
Point-to-Point Protocol (PPP) In Computer Networks: Features, Functionality, And Applications - XALGORD
This in-depth article explores the Point-to-Point Protocol (PPP) in computer networks, covering its features, functionality, and applications in WANs and ISPs.
How to Protect Your Server With Fail2Ban in Linux - Make Tech Easier
Follow this guide to use Fail2ban on your Linux server to protect it by banning IP addresses that show signs of malicious activity.
Network Devices In Computer Networks: A Comprehensive Guide To Routers, Switches, Modems, And More - XALGORD
This in-depth article explores the various types of network devices in computer networks, including routers, switches, modems, and more.
cRARk - freeware RAR password recovery (Win, Linux, Mac, GPU)
mask_attack [hashcat wiki]
Line Configuration In Computer Networks: A Comprehensive Guide - XALGORD
Learn about line configuration in computer networks with this detailed guide. Discover the types, pros and cons, and how to choose the best for your network.
Data Link Layer In Computer Networks - XALGORD
This article provides a comprehensive overview of the various services offered by the data link layer in the OSI model of computer networks.
An overview of single-purpose Linux distributions
Many people, when they are installing a Linux distribution for a single
purpose such as
running containers, would prefer an install-and-forget
type of deployment. At FOSDEM 2023 in Brussels, several
projects of this minimal Linux distribution type were presented. Fedora
CoreOS, Ubuntu Core, openSUSE MicroOS, and Bottlerocket OS
all tackle this problem in their own way. The talks at FOSDEM gave an
interesting overview of how these projects differ in their approaches.
Simulate an unreliable network connection with tc and netem on Linux
Side note: Using a secondary network interface is recommended since the following commands could make a remote machine unreachable.
This a blog post about the basics of netem and tc on how to modify
auto-encrypt-localhost
Automatically provisions and installs locally-trusted TLS certificates for Node.js https servers in 100% JavaScript (without any native dependencies like mkcert and certutil).
Basics Of IP Addressing: An In-Depth Guide To Classes, Subnetting, Gateways, DNS, IP Types & IPv6 - XALGORD
Understand the basics of IP Addressing, including IP classes, subnetting, default gateways, DNS, static & dynamic IP addresses and the evolution to IPv6.
Chimera Linux
Learn Expect by writing and automating a simple game
Code a "guess the number" game in Expect. Then, learn the real power of Expect with a separate script to automate playing the game.
Avoiding stampeding Mastodons – Dustin's Blog
Dotfiles Management - mitxela.com
Recover Lost PDF Passwords with pdfcrack (Linux)
Forgetting the password to your important PDF documents can be disastrous. pdfcrack is a Linux command line tool that can crack the password of any PDF file
vault docker - docker compose example with Hashicorp Vault - Mister PKI
Learn how to use and install vault docker image to run in a local environment with docker compose. Hashicorp vault examples and tutorials.
Easily Self Host Vaultwarden Using Docker Compose - Tech Addressed
In this tutorial, we'll compare Vaultwarden to Bitwarden and why you would consider using it instead of Bitwarden as well as everything you need to know to get Vaultwarden deployed quickly and easily in your homelab environment using Docker Compose.
How To Setup & Configure A Nginx Reverse Proxy - Tech Addressed
If you run multiple services on your network - especially using Docker - hosting a Nginx reverse proxy is an invaluable tool for making accessing those services easier. With this guide, you'll have Nginx setup and configured in no time. While the bulk of the information regarding configuring Nginx will apply to any Nginx install, the scripts / instructions specific to installing the software will only work on Debian / Ubuntu.
Run your own private CA & ACME server using step-ca - smallstep
Use the ACME protocol to get certificates from step-ca. ACME radically simplifies TLS and HTTPS by letting you obtain certificates automatically.