Fault-Tolerant SFTP scripting - Retry Failed Transfers Automatically | Linux Journal
System & Network Admin
Linux iptables Firewall Simplified Examples - Like Geeks
Learn about iptables firewall, Chains, Policies, Adding, Deleting, Replacing, Saving and Listing Rules, Block ICMP Packets, Blocking Bad Flags, SYN Flooding
How to move away from RSA for SSH keys
How to move away from RSA for SSH keys - Xe's Blog
How to Assign Specific CPU Cores to an Application in Windows - Make Tech Easier
Processor affinity is the process of allocating CPU cores to specific apps. We show you how to assign a specific CPU core to a Windows app.
auto-encrypt
Automatically-provisioned TLS certificates for Node.js servers using Let’s Encrypt.
tweets with most likes by @tylercowen in the year 2022
Visual guide to SSH tunneling and port forwarding
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you.
Topics: use ca
Age: Simple, Modern, and Secure File Encryption Tool
It’s simple! Just create a key and start encrypting your files securely
CastleDB - The structured static database
50+ Useful Git Commands with Examples for Beginners
This guide highlights the usage of useful Git commands for handling distributed version control on Git-repository management systems like GitHub and GitLab.
Cutover
How To Run a Cron Job Every 10, 20, and 30 Seconds in Linux
In this article, we will show you a simple trick to help you run a cron job every 10, 20, and 30 seconds or x seconds in Linux.
Open. Friendly. Community Driven. | PINE64
The comments section on the blog will be closed starting December 21 as the website receives an overhaul. In the meanwhile, there is a dedicated thread on the PINE64 Forum to discuss this month'
Docker multi-stage build with Poetry
File structure
WordPress, Fediverse and Caching – Dustin's Blog
Share secrets with public cryptography
Share secrets with public cryptography Software Development, API development, Indutrial IOT
EICAR test file - riskless method to test your antivirus and firewall
Disclaimer: There are more meaningful, and more advanced solutions to test your security solutions, but for a quick, simple, and riskless test, the upcoming test files are more than enough.
EICAR test
Linux - How to work with complex commands
It can frustrate to work on complex commands in the terminal. I'll present you some tips on how to manage them. If you have another tip, I'd appreciate a quick message.
Use backslash\ to add a line b
nginx - simple and native authentication function
Important disclaimer: This solution is not secure! - It is fine for a quick and temporary solution for your local network, but it is not a secure solution for important ressources that are available o
ssh - How to use public key authentication on Linux
Disclaimer:
Read the whole post before you start. This will help you avoid a lock-out
Generating a secure key pair
SSH keys use asymmetric cryptographic algorithms that generate a pair of separate
SSH server hardening
We all know that it is important to secure your machines. I am going to show you some ways to do so. Some are trivial and should be set immediately, and some require some more work. Part 2 will follow
Building Go programs with Nix Flakes
Building Go programs with Nix Flakes - Xe's Blog
What is the total amount of public IPv4 addresses?
Yes, I am needing to know what the total number possible IPs in the public IPv4 space.
I'm not sure where to even get a neat list of all the IP address ranges, so could someone point me to a reso...
Hands-on Linux firewall rules with iptables
In this article you will learn a combination of common scenarios with iptables, one of the most popular tools for configuring the Linux kernel firewall.
illumos
Bulwark Passkey
Software-based WebAuthN/2FA
UEFI vs. BIOS: Which One You Should Use - Make Tech Easier
The initial startup firmware is a crucial part of your computer's booting process. Learn about UEFI and how it stacks up vs. the older BIOS.
How to Check Linux OS Name, Kernel Version, and Information
In this article, we will explain how to find out the Linux distribution name, kernel version, release version, hardware name, and other Linux system information
What's the Difference Between apt remove and apt purge?
Both apt remove and apt purge commands are useful in uninstalling a package, but the apt purge removes any configuration files associated with the package.
Authenticator: An Open-Source App to Replace Authy on Linux
A free and open-source app for two-factor authentication codes on the Linux desktops.