How to export Firefox’s history to a text file – philwilson.org
System & Network Admin
Exporting History from Firefox
I have found recently that Firefox in Linux (Mint 17.3) is very sluggish, I do have Chrome on my system as well but I prefer Firefox for various
How to Backup and Restore Firefox Profile On Linux
A backup of your Firefox profile enables you to save all your browser data (extensions, history, settings, etc.) on your local machine or any other storage.
Trying Tailscale.
Like most folks working in infrastructure engineering in 2014, I really enjoyed Google’s BeyondCorp whitepaper. My foremost personal interest was grounded in the fact that Uber’s contemporaneous security implementation didn’t include a VPN, so it was interesting to see a well-thought description of fostering security without over-reliance on a hardened network for employee devices. I had a second, longer-term, personal interest as well, which was never again having to argue with a coworker about why they needed to log into the VPN before accessing a secure resource.
Fault-Tolerant SFTP scripting - Retry Failed Transfers Automatically | Linux Journal
Linux iptables Firewall Simplified Examples - Like Geeks
Learn about iptables firewall, Chains, Policies, Adding, Deleting, Replacing, Saving and Listing Rules, Block ICMP Packets, Blocking Bad Flags, SYN Flooding
How to move away from RSA for SSH keys
How to move away from RSA for SSH keys - Xe's Blog
How to Assign Specific CPU Cores to an Application in Windows - Make Tech Easier
Processor affinity is the process of allocating CPU cores to specific apps. We show you how to assign a specific CPU core to a Windows app.
auto-encrypt
Automatically-provisioned TLS certificates for Node.js servers using Let’s Encrypt.
tweets with most likes by @tylercowen in the year 2022
Visual guide to SSH tunneling and port forwarding
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you.
Topics: use ca
Age: Simple, Modern, and Secure File Encryption Tool
It’s simple! Just create a key and start encrypting your files securely
CastleDB - The structured static database
50+ Useful Git Commands with Examples for Beginners
This guide highlights the usage of useful Git commands for handling distributed version control on Git-repository management systems like GitHub and GitLab.
Cutover
How To Run a Cron Job Every 10, 20, and 30 Seconds in Linux
In this article, we will show you a simple trick to help you run a cron job every 10, 20, and 30 seconds or x seconds in Linux.
Open. Friendly. Community Driven. | PINE64
The comments section on the blog will be closed starting December 21 as the website receives an overhaul. In the meanwhile, there is a dedicated thread on the PINE64 Forum to discuss this month'
Docker multi-stage build with Poetry
File structure
WordPress, Fediverse and Caching – Dustin's Blog
Share secrets with public cryptography
Share secrets with public cryptography Software Development, API development, Indutrial IOT
EICAR test file - riskless method to test your antivirus and firewall
Disclaimer: There are more meaningful, and more advanced solutions to test your security solutions, but for a quick, simple, and riskless test, the upcoming test files are more than enough.
EICAR test
Linux - How to work with complex commands
It can frustrate to work on complex commands in the terminal. I'll present you some tips on how to manage them. If you have another tip, I'd appreciate a quick message.
Use backslash\ to add a line b
nginx - simple and native authentication function
Important disclaimer: This solution is not secure! - It is fine for a quick and temporary solution for your local network, but it is not a secure solution for important ressources that are available o
ssh - How to use public key authentication on Linux
Disclaimer:
Read the whole post before you start. This will help you avoid a lock-out
Generating a secure key pair
SSH keys use asymmetric cryptographic algorithms that generate a pair of separate
SSH server hardening
We all know that it is important to secure your machines. I am going to show you some ways to do so. Some are trivial and should be set immediately, and some require some more work. Part 2 will follow
Building Go programs with Nix Flakes
Building Go programs with Nix Flakes - Xe's Blog
What is the total amount of public IPv4 addresses?
Yes, I am needing to know what the total number possible IPs in the public IPv4 space.
I'm not sure where to even get a neat list of all the IP address ranges, so could someone point me to a reso...
Hands-on Linux firewall rules with iptables
In this article you will learn a combination of common scenarios with iptables, one of the most popular tools for configuring the Linux kernel firewall.
illumos
Bulwark Passkey
Software-based WebAuthN/2FA