recentpopularlog in

ezequiel : blogpost   561

« earlier  
How to Install Adobe Acrobat Reader on Ubuntu 18.04 Bionic Beaver Linux -
The objective is to install Adobe Acrobat Reader on Ubuntu 18.04 Bionic Beaver Linux.

Please note that Adobe no longer supports Acrobat Reader for Linux. The latest native Linux version is 9.5.5 dated from 26/04/2013. From this reason you should refrain using/installing Adobe Acrobat Reader if possible to avoid potential vulnerabilities and hacker exploits.
adobe  reader  fileformats  software  linux  debian  ubuntu  ubuntu.bionic  mint  howto  installation  tips  example  sysadmin  cli  blogpost  2018  x86  amd64 
9 days ago by ezequiel
How to Migrate Your Google Account to a New One
Whether you’ve outgrown your college era email address and you want a professional one, or you want to change your firstname.maiden account to firstname.marriedname one, we’ve got you covered with a start-to-finish Google migration guide.
google  privacy  cloudcomputing  backup  remote  howto  guide  blogpost  2017 
19 days ago by ezequiel
How items are structured | Internet Archive Blogs
An item is a logical “thing” that we present on one web page on An item may be one video file along with scans of the DVD cover, one book, one audio file, or a set of audio files that represent a CD , etc.

How do you know whether your files should be in one item or separate items? You get one metadata file per item. If the same metadata describes ALL of the files (like a CD), then that’s one item. If the files are too different to have the same metadata (title, creator, description, etc.), they should be in different items.
blogpost  2011  article  cli  tool  internet  archived.version  documentation  reference  example  downloads  tips  backup 
21 days ago by ezequiel
How To Get A Global Menu In Xubuntu 16.04 Or Lubuntu 16.04 (Using TopMenu) ~ Web Upd8: Ubuntu / Linux blog
TopMenu (a global menu for MATE, Xfce and LXDE panels) is available in the official Ubuntu 16.04 repositories and it works great in Ubuntu MATE 16.04, but it doesn't work in Xubuntu 16.04 and Lubuntu 16.04 by simply installing the panel applet package.

Here's how to get TopMenu to work in Xubuntu 16.04 and Lubuntu 16.04, using the official packages, with a minor tweak.
screenshots  gtk  gtk2  gtk3  gui  ui  extension  xfce  mate  lxde  desktop  customize  configuration  installation  howto  guide  linux  x11  blogpost  2016  sysadmin  ppa  links  ubuntu  mint  xubuntu  lubuntu 
26 days ago by ezequiel
Ubuntu - Fix for Slow Wireless Internet Connection Speed after upgrading to 11.04 Natty Narwhal - HitXP
Recently Ubuntu came out with its newest version 11.04 code named Natty Narwhal, and after upgrading my earlier 10.10 version Maverick to this new Version of Ubuntu, I faced my first real issue with Ubuntu in so many years – My USB Wireless Internet Connection speed had almost come to a standstill like a slow dial up connection after upgrading Ubuntu to 11.04! The connection was n times weaker than Windows based systems running on same wireless connection. Many a times it even simply dropped Internet connections. [...]
ubuntu.natty  ubuntu  configuration  sysadmin  networking  wifi  usb  performance  powermanagement  dns  tips  issue  workaround  example  cli  scripting  linux  blogpost  2011 
29 days ago by ezequiel
Hack Correlation: Non-genuine battery in Lenovo X230
[...] Second, the battery is suited for an X220 model, not X230.
Third - and most importantly - the battery is a fake, with less than the advertised capacity.

If you still decide to continue, then read on. Some nice people have managed to decrypt the EC firmware inside the Lenovo laptops and allow for a way to rewrite it: [...]
2017  blogpost  laptop  battery  tips  howto  hacking  windows  windows10  ubuntu  linux  links  tool  screenshots  issue  workaround  bios  firmware  patches  hardwaresupport 
4 weeks ago by ezequiel
The Only Raspberry Pi 4 Kodi Tutorial You Will Ever Need
This tutorial (updated for Raspberry Pi 4) has everything you will ever need to know about using Kodi on the Raspberry Pi 4 mini computer.
raspberrypi  tutorial  osmc  libreelec  xbmc  configuration  install  installation  sysadmin  streaming  streamingaudio  howto  guide  screenshots  2020  blogpost  hardwaresupport  mediaplayer 
5 weeks ago by ezequiel
wiringPi updated to 2.52 for the Raspberry Pi 4B | Wiring Pi
Just a quick post to let you know that you’ll need a new wiringPi for the Raspberry Pi 4B.

To upgrade:

cd /tmp
sudo dpkg -i wiringpi-latest.deb

Check with:

gpio -v

and make sure it’s version 2.52. I’ll push the updated sources shortly.

It will hopefully be part of the official release soon, but for now this will do.
2019  blogpost  raspberrypi  hardwaresupport  compatibility  packages  sysadmin  debianpkg  software  cli  raspbian  links  download 
5 weeks ago by ezequiel
Television via Acestream on Raspberry PI. Now in docker containers
On Habré, AceStream was repeatedly mentioned: a technology that provides the user access to video streams using the AceStream private P2P protocol, the so-called. torrent tv. AceStream provides access to a distributed content delivery network, i.e. watching the channel, the user transmits data to other users, which allows to drastically reduce the cost of services.
2016  blogpost  acestream  install  raspberrypi  osmc  raspbian  docker.container  sysadmin  howto  links  proxy  github  screenshots  xbmc  configuration 
5 weeks ago by ezequiel
Preparing Raspberry PI for JTAG Debugging – Sysprogs Tutorials
This tutorial shows how to prepare your Raspberry PI board for debugging with JTAG (we have tested this with Raspberry Pi 1, 2 and 3). Using JTAG will allow debugging the Linux kernel using hardware like Segger J-Link. As Raspberry PI board does not have a connector with a normal JTAG layout, preparing the board for JTAG debugging involves finding the correct pins and wiring them in the correct order. Follow the steps below for a complete walkthrough:
2018  blogpost  raspberrypi  jtag  debug  howto  guide  electronics  screenshots  software  windows  links  hardwaresupport 
6 weeks ago by ezequiel
How to View Colored Man Pages in Linux
[...] By default, the man program normally uses a terminal pager program such as more or less to format its output, and the default view is normally in white color for every kind of text (bold, underlined etc..).

You can make some tweaks to your ~/.bashrc file to get nicely colored man pages by specifying a color scheme using various LESS_TERMCAP variables. [...]
tutorial  howto  configuration  terminal  colour  linux  unix  manpage  blogpost  2017  environment  example  tips 
6 weeks ago by ezequiel
Build your own Command Line with ANSI escape codes
Everyone is used to programs printing out output in a terminal that scrolls as new text appears, but that's not all your can do: your program can color your text, move the cursor up, down, left or right, or clear portions of the screen if you are going to re-print them later. This is what lets programs like Git implement its dynamic progress indicators, and Vim or Bash implement their editors that let you modify already-displayed text without scrolling the terminal.
2016  terminal  shell  cli  configuration  blogpost  tips  example  unix  linux  macosx  colour  screenshots 
6 weeks ago by ezequiel
How to configure ufw to forward port 80/443 to internal server hosted on LAN - nixCraft
I am using UFW to protect my network. How do I forward TCP HTTP port # 80 and 443 to an internal server hosted at and using UFW on Ubuntu Linux server?

UFW is an acronym for uncomplicated firewall. It is used for managing a Linux firewall and aims to provide an easy to use interface for the user. In this tutorial, you will learn how to forward incoming traffic to your server running ufw on port 80/443 to port 80/443 on another internal server hosted in your LAN/VLAN.
2017  iptables  ubuntu  firewall  networking  configuration  sysadmin  linux  cli  example  tips  blogpost 
6 weeks ago by ezequiel
Securing CoreOS with iptables | Jimmy Cuadra
[...] One of the issues I ran into was how to secure a CoreOS machine's public network. By default, a fresh CoreOS installation has no firewall rules, allowing all inbound network traffic.

In order to secure a CoreOS machine, I had to learn how to configure the firewall. I use the common iptables utility for this purpose. [...]
2015  blogpost  coreos  iptables  howto  guide  configuration  firewall  sysadmin  networking  linux 
6 weeks ago by ezequiel
Automatically Control Your Raspberry Pi Fan and Temperature - howchoo
Since the Raspberry Pi 4 was released, many have noticed that it can get pretty hot, especially when the CPU is under heavy load.
raspberrypi  electronics  howto  guide  python  gpio  images  blogpost  2020  links  hardwaresupport 
6 weeks ago by ezequiel
Four ways to connect a docker container to a local network · The Odd Bit
Update (2018-03-22) Since I wrote this document back in 2014, Docker has developed the macvlan network driver. That gives you a supported mechanism for direct connectivity to a local layer 2 network. I've written an article about working with the macvlan driver.
fedora  linux  docker  sysadmin  cli  tool  example  tips  networking  firewall  configuration  howto  blogpost  2018 
6 weeks ago by ezequiel
Setting up wireless roaming using 802.11r fast transition on OpenWRT · morph027
Ages ago, i was setting up 802.11r the complicated way using all the r0kh and r1kh lists across all access points, which worked well but was a little pita to setup.

After creating a little helper, i just discovered that recent OpenWRT builds can cope with the option ft_psk_generate_local to dynamically create the RADIUS keys and stuff. Even with Luci support, just enable 802.11r Fast Transition and Generate PMK locally, set a Mobility Domain (same across all AP’s per SSID) and a NAS ID (unique, i’d still prefer the BSSID w/o the colons) and it works out of the box.
openwrt  wifi  configuration  security  example  tips  linux  router  networking  sysadmin  cli  links  2019  blogpost 
7 weeks ago by ezequiel
WireGuard in NetworkManager – Thomas Haller's Blog
NetworkManager 1.16 got native support for WireGuard VPN tunnels (NEWS). WireGuard is a novel VPN tunnel protocol and implementation that spawned a lot of interest. Here I will not explain how WireGuard itself works. You can find very good documentation and introduction at
networking  debian  gnome  ubuntu  mint  2019  blogpost  wireguard  configuration  example  cli  howto  sysadmin  linux  vpn  security  tools  guide 
7 weeks ago by ezequiel
Linux distributions that can run on an MK802 Mini PC - Liliputing
The MK802 is a tiny computer that looks like a USB flash drive, and which ships with Google Android 4.0 and sells for around $80 or less. It’s designed to be something you can plug into a TV to surf the web, watch video, and play games on the big screen.
allwinner.a80  allwinner  hacking  hardware  hardwaresupport  debug  links  rokumagic.mk80  linux  distro  2012  blogpost 
7 weeks ago by ezequiel
NXDOMAIN, NODATA and debugging DNS for dual-stacked hosts - Cisco Umbrella Blog
TL;DR – An NXDOMAIN response means there are no records, of any DNS type, for the requested domain name. A NODATA response means there are records for the requested domain name, but none of them match the record type in your request.
2014  networking  blogpost  article  ipv6  dns  example  protocol  internet 
8 weeks ago by ezequiel
How to tune the Linux kernel for memory performance - Operating System - Aerospike Community Forum
The linux kernel attempts to optimize RAM utilization, in that it occupies unused RAM with caches. This is done on the basis that unused RAM is wasted RAM.

Over time the kernel will fill the RAM with cache. As more memory is required by the applications/buffers, the kernel goes through the cache memory pages and finds a block large enough to fit the requested malloc. It then frees that memory and allocates it to the calling application.
2019  blogpost  linux  kernel  memory  configuration  example  tips  sysadmin  cli  links 
9 weeks ago by ezequiel
CoreOS Tips and Tricks
One thing that was never clear to me when I started learning CoreOS were techniques for rapidly testing out different CoreOS features. I will spend some time walking folks through a few of tips and tricks that I have learned so far along the way learning about CoreOS.

The folks at CoreOS have an awesome repo for testing out features locally, called coreos-vagrant. If you haven’t heard of it or used it, go check it out. Another great resource for getting started with the CoreOS Vagrant project are the docs on the CoreOS website, you should be able to find most of the use cases there.

So in this post I will be going over some of what is already detailed in the docs and README but will additionally fill readers in with a few extra tips and tricks I have discovered so far along the way. I am surprised by all of the hidden secrets I frequently discover buried in CoreOS and its documentation. It is always fun to find new features and capabilities of the OS that you didn’t know existed.
coreos  tips  blogpost  2015  sysadmin  virtualisation  vagrant  cli  example  automation  linux  cloudcomputing  configuration 
9 weeks ago by ezequiel
Exploring the Google Cloud f1-micro Instance - OpsDash
The Google Cloud Platform folks recently announced an “always free” tier, which includes an “f1-micro” instance and a 30 GB magnetic disk.

So what is an f1-micro instance capable of? Let’s find out.
2019  blogpost  review  screenshots  performance  cpu  networking  benchmark  spec 
10 weeks ago by ezequiel
Linux Swappiness
My earlier post about mlockall() caused me to look a bit more into the “swappiness” setting on Linux. It turns out that by chance this was related to a problem I had been looking at at work where we unexpectedly saw some MySQL processes getting OOM killed even though the various buffer settings seemed correct.
2015  blogpost  linux  kernel  memory  documentation  links  example  tips  configuration  sysadmin 
10 weeks ago by ezequiel
The Ultimate Guide to Create Users in Linux / Unix
Creating users in Linux or Unix system is a routine task for system administrators.

Sometimes you may create a single user with default configuration, or create a single user with custom configuration, or create several users at same time using some bulk user creation method.

In this article, let us review how to create Linux users in 4 different methods using useradd, adduser and newusers command with practical examples.
2009  blogpost  sysadmin  linux  unix  tool  tools  example  tips  howto  guide 
10 weeks ago by ezequiel
Docker and IPtables - sysadmin stuff
TL;DR; By default, docker daemon appends iptables rules for forwarding. For this, it uses a filter chain named DOCKER.
2015  blogpost  firewall  sysadmin  docker  compatibility  issue  workaround  cli  example  tips  networking  linux  iptables 
11 weeks ago by ezequiel
How to fix the Docker and UFW security flaw - TechRepublic
It has been discovered the Docker doesn't always honor UFW rules. Jack Wallen demonstrates and shows how to configure Docker so that it will.

If you use Docker on Linux, chances are your system firewall might be relegated to Uncomplicated Firewall (UFW). If that's the case, you may not know this, but the combination of Docker and UFW poses a bit of a security issue. Why? Because Docker actually bypasses UFW and directly alters iptables, such that a container can bind to a port. This means all those UFW rules you have set won't apply to Docker containers.

Let me demonstrate this.

I'm going to set up UFW (running on Ubuntu Server 16.04), so that the only thing it will allow through is SSH traffic. To do this, I open a terminal and issue the following commands: [...]
2018  blogpost  firewall  sysadmin  ufw  docker  compatibility  issue  workaround  cli  example  tips  networking  linux  iptables 
11 weeks ago by ezequiel
How To Remove Docker Containers, Images, Volumes, and Networks | Linuxize
Docker allows you to quickly build, test, and deploy applications as portable, self-sufficient containers that can run virtually anywhere.
docker  sysadmin  cli  example  tips  scripting  linux  unix  blogpost  2019 
11 weeks ago by ezequiel
Create a Linux Swap File | Linuxize
Swap is a space on a disk that is used when the amount of physical RAM memory is full. When a Linux system runs out of RAM, inactive pages are moved from the RAM to the swap space.

Swap space can take the form of either a dedicated swap partition or a swap file. In most cases when running Linux on a virtual machine a swap partition is not present so our only option is to create a swap file.

This tutorial was tested on Linux systems with Ubuntu 18.04 and CentOS 7 but it should work with any other Linux distribution.
2018  blogpost  linux  memory  howto  guide  cli  sysadmin  configuration  tips  example 
11 weeks ago by ezequiel
How to Keep Alive SSH Sessions
Many NAT firewalls time out idle sessions after a certain period of time to keep their trunks clean. Sometimes the interval between session drops is 24 hours, but on many commodity firewalls, connections are killed after as little as 300 seconds. To avoid having your SSH sessions become unresponsive after e.g. 5 minutes, do the following: [...]
2010  ssh  configuration  tips  example  networking  linux  unix  windows  macosx  remote  blogpost 
11 weeks ago by ezequiel
Using HAProxy with the Proxy Protocol to Better Secure Your Database - HAProxy Technologies
The Proxy protocol is a widely used invention of our CTO at HAProxy Technologies, Willy Tarreau, to solve the problem of TCP connection parameters being lost when relaying TCP connections through proxies. Its primary purpose is to chain proxies and reverse-proxies without losing client information, and it’s used and supported by AWS ELB, Apache, NGINX, Varnish, Citrix, and many more (here’s a longer list of Proxy protocol supported technologies).
proxy  tcpip  2017  security  blogpost  haproxy  protocol  links  article  example 
12 weeks ago by ezequiel
The Four Essential Sections of an HAProxy Configuration - HAProxy Technologies
An HAProxy configuration file guides the behavior of your HAProxy load balancer. In this post, we demonstrate its four most essential sections.
haproxy  blogpost  2018  configuration  example  tips  links  tutorial  networking 
12 weeks ago by ezequiel
Configuring NGINX & NGINX Plus as Load Balancers
NGINX is a capable accelerating proxy for a wide range of HTTP‑based applications. Its caching, HTTP connection processing, and offload significantly increase application performance, particularly during periods of high load.
blogpost  http  webserver  performance  configuration  howto  tips  guide  2014  links  nginx  example  networking 
12 weeks ago by ezequiel
How to Restrict SFTP Users to Home Directories Using chroot Jail
In this tutorial, we will be discussing how to restrict SFTP users to their home directories or specific directories. It means the user can only access his/her respective home directory, not the entire file system.

Restricting users home directories is vital, especially in a shared server environment, so that an unauthorized user won’t sneak peek into the other user’s files and folders.
scripting  sysadmin  security  ssh  sftp  configuration  howto  tips  blogpost  2016  example  linux  unix  remote  tutorial 
january 2020 by ezequiel
OpenSSH moduli – ENTROPUX!
While playing around with a small and customized Debian based system, I noticed that the following log message was seen every time a user logged on via SSH:

WARNING: /etc/ssh/moduli does not exist, using fixed modulus

So what is this moduli file and why should you keep one of those around?
2014  blogpost  ssh  security  math  encryption  links  history  hacking  issue  workaround  cli  tool  howto  tips  sysadmin  example  unix  linux 
december 2019 by ezequiel
How to Start Docker Containers Automatically - codeburst
When running Docker containers in production ensuring high availability can be challenge. Unlike VMs which run untouched for months or even years, containers are meant to be used for a very short lifespan — typically a few hours or a few days at most. With this constant church, you need a way to ensure that containers that are outdated, vulnerable, or malfunctioning are retired and replaced with new containers. But doing this manually is not scalable, and is prone to human error. The better way is to automate container creation and restarts. There are a few ways you can do this. Before you dive in, take a look at this wiki page with quite a few resources on how to start Docker containers.
docker  blogpost  2018  configuration  booting  sysadmin  tips  example  links  automation  systemd  linux 
december 2019 by ezequiel
How to make your own free VPN with Amazon Web Services
Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist. They require a bit more technical know-how, but if you want something done right, you have to do it yourself.
amazon  vpn  howto  tips  article  2018  blogpost  example  linux  amazon.linux  2019  windows  firewall  networking  privacy  terminal  ssh  proxy  sysadmin  cloudcomputing  free 
december 2019 by ezequiel
Learning AWS — For the budget conscious - A Cloud Guru
So you want to get AWS certified, but you’re on a budget? Fear not, A Cloud Guru is on hand to show you how to get best value for little, or no cost at all.
2016  blogpost  free  finances  price  cloudcomputing  links  tips  moneysaving 
december 2019 by ezequiel
How To Disable Guest Account In Ubuntu - It's FOSS
Ubuntu and Linux Mint come with a default guest user account that does not require a password. In this tutorial, we shall see how to disable guest account in Ubuntu 16.04 and 14.04.
(me: the cli tool wasn't available for me; config file changes did work (put them in a new file in /etc/lightdm/lightdm.conf.d))
ubuntu.xenial  ubuntu.trusty  ubuntu  blogpost  linux  desktop  xfce  security  configuration  sysadmin  example  howto  xorg  gnome  cli  2018 
december 2019 by ezequiel
How to Customize the File Open/Save Dialog Box in Windows
Generally, there are two kinds of Open/Save dialog boxes in Windows. One kind looks like Windows Explorer, with the tree on the left containing Favorites, Libraries, Computer, etc. The other kind contains a vertical toolbar, called the Places Bar.
2011  windows  winecompatible  software  registry  windows7  configuration  blogpost  tips  howto  screenshots  links  trialware  guide 
november 2019 by ezequiel
Rust vs. C++ Comparison
[...] In order to explain why Rust is a safer and faster language than C++, we decided to create a Rust vs C++ comparison chart that clearly shows the differences between these two languages. This article will be useful for people who are familiar with C++ but are new to Rust. [...]
rust  c++  comparison  language  security  memory  blogpost 
october 2019 by ezequiel
Performance: C++ vs Rust - Knoldus Blogs
Rust doesn’t have any special feature which makes it FAST and different from C and/or C++, while it is much safer than C++ because of protection mechanisms it follows which in principle, are also doable in C++, using unique_ptr and shared_ptr and to achieve the same kind of safety that Rust has, we have to do so explicitly and set down standards and force patterns that increase the development effort. With Rust, the major part which makes it safer is that coding mistakes don’t create runtime errors — it creates compilation errors.
rust  c++  performance  comparison  development  blogpost  2018  security 
october 2019 by ezequiel
Linux Solution for badblocks: Value too large for defined data type invalid end block (5860522584): must be 32-bit value - Springfield Data Recovery
This problem arises because badblocks can only accept a LBA size (the number of sectors available to read/write on a drive) if it is a 32-bit integer. A simple solution is to run your command as follows, changing the block size from the default to 4096: [...]
harddisk  hardwaresupport  cli  tool  sysadmin  linux  issue  workaround  2019  blogpost  tips  example 
october 2019 by ezequiel
Linux Containers and Docker pstree - fREW Schmidt's Foolish Manifesto
Once in a while I find myself wanting to see the state of a container from a bird’s eye view. My favorite way to do this is with a special tool I wrote called docker-pstree. Here is how it works. (Stay tuned for angst at the end.) [...]
blogpost  docker  tool  cli  example  linux  kernel  links 
october 2019 by ezequiel
Linux Distributions Optimized for Hosting Docker ·
You can run Docker containers on any modern Linux distribution. But some specialized Linux-based operating systems are designed specifically for running Docker. If you want to host containers, these Linux platforms may be a better fit than an all-purpose Linux distribution.
2017  blogpost  distro  comparison  links  linux  docker  sysadmin  virtualisation  tips  performance 
october 2019 by ezequiel
A better YouCompleteMe Config
[...] To have semantic completion for C-family languages, you need tell the compiler how to process your files. Out of the box, YCM requires a per-project configuration file in the root of our project. Personally, I don't like to have yet another configuration file clutter my project and I'm pretty sure my colleagues would agree. Fortunately however, YCM supports you to define a global configuration file. [...]
2015  blogpost  vim  plugin  c  c++  configuration  example  script  scripting  python  howto  tips  cmake  neovim 
october 2019 by ezequiel
Chromium Notes: Ninja, a new build system
[...] And so with all of that in mind, and with a spare weekend to hack, I thought I'd try making a very simple build system; conceptually very similar to Make, but without hardly any features. [...]
buildgenerator  scripting  chromium  build  development  tool  unix  linux  windows  macosx  blogpost  2011  make  performance  google 
september 2019 by ezequiel
Why Go’s structs are superior to class-based inheritance
Go is unique from a lot of object-oriented languages in that it doesn’t have classes. Instead, Go has two awesome features that make its model of polymorphism way more powerful than classical inheritance: interfaces and struct embedding.
golang  ood  2016  example  tips  blogpost 
september 2019 by ezequiel
Which OpenGL implementation is my Qt Quick app using today? - Qt Blog
[...] It is not always obvious what is going on. Just starting a Qt Quick application and getting some output does not mean rendering is happening on the optimal path. When the application does not render at the expected speed, the very first thing to verify is if the graphics stack is the expected one. There can always be an unexpected environment variable or blacklist rule present, or the application may pick the wrong graphics stack when there are multiple ones present in the system. [...]
qt  blogpost  2017  configuration  cli  example  tips  windows  macosx  linux  opengl  library  performance 
august 2019 by ezequiel
How To Route Web Traffic Securely Without a VPN Using a SOCKS Tunnel | DigitalOcean
Sometimes you're on a network that's insecure or has an overly restrictive firewall, and you need to access a website. You want to make sure no one in the middle is watching the traffic.

One solution is a VPN, but many VPNs require special client software on your machine, which you may not have rights to install.
proxy  ssh  vpn  howto  tips  blogpost  cli  unix  linux  windows  putty  terminal  configuration  security  2016 
july 2019 by ezequiel
How to convert .bin to iso image, whithout having .cue file in Linux | XtremeFX
Sometimes you need to make an iso image out of a .bin file, where you usually use bchunk (binchunker). [...]
(me: this solution creates a small a small '.cue' file using a text editor, and does not require 'poweriso')
2008  blogpost  linux  unix  tool  cli  example  tips  howto  fileformats  cd  dvd  burning 
july 2019 by ezequiel
Adding 24-bit TrueColor RGB escape sequences to tmux - The Terminal Programmer
[...] Enable the Tc terminal capability for the outer terminal (to which tmux is attached) by setting the terminal-overrides option in tmux and subsequently detach and reattach tmux, as the following example (wherein $TERM is st-256color and % is a shell prompt) illustrates: [...]
tmux  textui  colour  terminal  howto  tips  configuration  scripting  example  2016  blogpost  links  patches  linux  unix 
june 2019 by ezequiel
How to force Docker not to bypass the UFW rules on Ubuntu 16.04
[...] So let’s just go a bit deeper and face one of the most commonly occurring problems I tried to solve a few months ago as well. If you have ever tried to make the Docker work with the UFW, then you probably know what’s the said struggle. Let’s examine it!
2017  blogpost  cli  sysadmin  ufw  firewall  configuration  howto  tips  example  linux  docker  iptables  ubuntu  ubuntu.xenial 
june 2019 by ezequiel
How to Install and Use Ace Stream Easily in Ubuntu / Mint Linux
[...] But recently, I found out a snap was released for it, and now everything is much easier in newer versions of Ubuntu or Linux Mint. So I could install it in Ubuntu 16.04. [...]
linux  mint  blogpost  howto  guide  tips  cli  example  sysadmin  2018  acestream  player  software  install  installation 
june 2019 by ezequiel
Autostart – How to run a service on Linux boot time using systemd – Better-Coding
We start defining a new service by creating my-service.service file located in /etc/systemd/system directory:

sudo nano /etc/systemd/system/my-service.service
The following listing presents the simplest configuration, which is required to run the service. As you can see it is very simple. We put only the name of the service and commands responsible for to starting and stopping our service.
docker  blogpost  2018  example  tips  linux  systemd 
june 2019 by ezequiel
Start a docker container on CentOS at boot time as a linux service | esalagea
Note: If docker daemon does not start at boot, you might want to enable the docker service
(me: very simple example that does not address errors well, integration with firewalls (ufw), reusability, etc.)
docker  blogpost  2016  example  tips  linux  systemd 
june 2019 by ezequiel
Life and death of a container – DevOpsion – Medium
Docker containers are prepared to die at any time: you can stop, kill and destroy them quickly. And when you do it, all data created during its existence is wiped out by default.
2016  blogpost  reference  faq  diagrams  docker  example  sysadmin  cli 
june 2019 by ezequiel
The Overhead of Docker Run | The Blog
We use Docker a lot. Like a lot, lot. While we love it for a lot of things, it still has a lot of room for improvement. One of those areas that could use improvement is the startup/teardown time of running a container.
performance  docker  linux  macosx  comparison  test  blogpost  2016 
june 2019 by ezequiel
Top 10 Docker CLI commands you can’t live without – The Code Review – Medium
Docker is a great tool for building microservices, allowing you to create cloud-based applications and systems. To make the most of it via your terminal, here is a run down of the top 10 Docker commands for your terminal.
howto  example  tips  cli  sysadmin  docker  linux  unix  windows  macosx  blogpost  2018 
june 2019 by ezequiel
OSMC Vs. OpenELEC Vs. LibreELEC – Kodi Operating System Comparison - Jerry_Jin - 博客园
Kodi’s two slim-and-trim kid brothers LibreELEC and OpenELEC were once great solutions for getting the most out of limited hardware. But now that even the cheapest Kodi boxes are more than powerful enough to run the deluxe Kodi operating system known as OSMC, are LibreELEC and OpenELEC are becoming irrelevant?
osmc  libreelec  openelec  article  blogpost  comparison  2018  raspberrypi  xbmc  review  links  history  player  streaming  streamingaudio  tv  sports  os 
june 2019 by ezequiel
Basics - Docker, Containers, Hypervisors, CoreOS - EtherealMind
Containers virtualize at the operating system level, Hypervisors virtualize at the hardware level.

Hypervisors abstract the operating system from hardware, containers abstract the application from the operation system.
2014  blogpost  article  info  reference  virtualisation  lxc  docker  faq 
june 2019 by ezequiel
Docker Image Insecurity · Jonathan Rudenberg
Recently while downloading an “official” container image with Docker I saw this line:

ubuntu:14.04: The image you are pulling has been verified
I assumed this referenced Docker’s heavily promoted image signing system and didn’t investigate further at the time. Later, while researching the cryptographic digest system that Docker tries to secure images with, I had the opportunity to explore further. What I found was a total systemic failure of all logic related to image security.
2014  blogpost  docker  security  article  ssl  tls 
june 2019 by ezequiel
Why I Started OpenDNS - OpenDNS Umbrella Blog
OpenDNS is a DNS service designed for you: instead of relying on all the unknown DNS providers out there to clean up their act (more on this in a future post), we act like a crossing guard in front of your house. We direct the good stuff towards you and send the bad stuff away.
blogpost  2006  security  dns  internet  free  links  contentfiltering 
may 2019 by ezequiel
Automatically loading iptables rules on Debian/Ubuntu ·
If you want your iptables rules automatically loaded every time your networking comes up on your Debian or Ubuntu server, you can follow these easy steps.
iptables  cli  howto  sysadmin  tips  backup  2009  blogpost  debian  linux  networking  firewall  security  automation 
may 2019 by ezequiel
Linux: Setup a transparent proxy with Squid in three easy steps - nixCraft
Y’day I got a chance to play with Squid and iptables. My job was simple : Setup Squid proxy as a transparent server. [...]
2006  squid  proxy  howto  blogpost  sysadmin  linux  guide  centos  debian  networking  redhat  fedora  ubuntu 
may 2019 by ezequiel
How To Forward Ports through a Linux Gateway with Iptables | DigitalOcean
In this guide, we'll demonstrate how to use iptables to forward ports to hosts behind a firewall by using NAT techniques. This is useful if you've configured a private network, but still want to allow certain traffic inside through a designated gateway machine. We will be using two Ubuntu 14.04 hosts to demonstrate this.
iptables  networking  proxy  2015  blogpost  ubuntu.trusty  ubuntu  debian  linux  cli  example  tips  howto  guide  sysadmin 
may 2019 by ezequiel
Filter Content on Your Home Network with E2guardian | | The source for Linux information
[...] E2guardian works in conjunction with another caching proxy (e.g., Squid) and offers all the features you’d need in a home network content filter: [...]
proxy  configuration  blogpost  2015  howto  guide  sysadmin  networking  linux  debian  ubuntu  raspberrypi  raspbian  installation  e2guardian 
may 2019 by ezequiel
Run Chrome/Chromium with proxy settings on Linux - Internal Pointers
[...] Fair enough: Chrome and Chromium cannot read environment parameters I set up for my proxy, so the solution lies in the command line. What follows is the generic option flag for when you invoke Chrome/Chromium from the terminal: [...]
blogpost  2016  cli  chrome.browser  chromium  configuration  proxy  howto  example  tips 
may 2019 by ezequiel
Upgrade Linux Eee PC 901 4GB SSD | Binarymist
Update 01/09/2013 Looks like the SX300 mSATA SSD is incompatible with the Eee PC 901.
That’s the device with the 4GB primary SSD and the 16GB secondary SSD.
eeepc  ssd  upgrade  harddisk  hardwaresupport  howto  tutorial  links  blogpost  2013 
may 2019 by ezequiel
Goodbye, Lua · RealMensch
[...] So why did I leave?
Five factors combined in a perfect storm to cause me to drop Lua as a game scripting language, as a server language, and as a language for my command line tools:
* LuaJIT is in permanent maintenance mode.
* Lua version fragmentation.
* JavaScript's ecosystem is awesome.
* Lua Coroutines are no longer a monopoly.
* Type annotations FTW
(me: good comments and links about performance, language design, etc.)
2016  blogpost  lua  comparison  links  forumthread  performance  compatibility  review  python  language 
april 2019 by ezequiel
Interesting Facts About Playing Cards –
So you love playing cards. And you probably know a lot about them. But there are some fascinating things about playing cards that a lot of people don't know. Have you ever studied them closely, and considered some of the details and patterns that lie hidden on their faces, waiting to be discovered?
playingcards  info  links  blogpost  2019 
april 2019 by ezequiel
Use Midnight Commander like a pro
[...] This article aims to show all the useful (YMMV) shortcuts and functionalities that are often overlooked. Most of them can be accessed using the menu (F9), but who has the time to do that? [...]
2015  mc  tips  howto  configuration  textui  linux  unix  blogpost  links 
april 2019 by ezequiel
Faster Grepping in Vim
However, we have a need for speed. How can we grep faster?
grep  vim  howto  tips  search  blogpost  2013  2016  example  tool  linux  unix  configuration 
april 2019 by ezequiel
Top 100 Mysteries & Thrillers on Goodreads - Goodreads News & Interviews
Culprits, spies, bad guys, and women with vendettas: There's something so very satisfying about spending your time with the criminal element. And by that, we mean following the clues and solving the capers when you sit down with a great mystery or thriller. Always in search of a great book, Goodreads recently set out to uncover your 100 most-loved thrillers and mysteries.
2018  books  reviews  links  blogpost  english 
april 2019 by ezequiel
We must rewrite everything
A few days ago, Simon Willison has written a very good post about node.js . Simon is very good at writing intro-technology posts that convey the essence of things very clearly. Once upon a time he encouraged me to study Django . The post about node.js also makes it clear why this is cool and what place it occupies in the modern web ecosystem. Who has not heard about node.js - start reading from this post.
russian  blogpost  2009  programming  multitasking  softwareengineering  design  example  tips  links  node.js 
march 2019 by ezequiel
Programming sometimes does not sleep well.

Any idea will come to mind, you will look at it - it seems simple and beautiful. Then you start to figure out the details, and everything seems to be going well too. And then you sit down to write code ... And then it turns out that in reality there are also other details that the brain, when speculative looking at, is conveniently omitted. The compiler, which does not have such moral flexibility, stubbornly insists that it does not, it does not work that way. And so does not work. And so, too. [...]
russian  blogpost  2009  programming  multitasking  softwareengineering  design  example  tips  links  python 
march 2019 by ezequiel
Hacking the Kobo Clara HD – 5: Setting up SSH
Last time, we set up telnet on the Clara HD and set up the USB network interface. Now we will extend this to enable SSH on the device.
kobo.reader  howto  install  guide  blogpost  links  2018  hardwaresupport  cli  example  ssh 
february 2019 by ezequiel
How to Merge Two Python Dictionaries
In a previous tutorial we learned about Python Dictionaries, and saw that they are considered unordered sets with a key/value pair, where keys are used to access items as opposed to the position, as in lists for instance.

In this quick tip, I'm going to show you how to concatenate (merge) two dictionaries together. [...]
2016  blogpost  python  programming  tips  example 
december 2018 by ezequiel
Eliminating delays on ESC in vim and zsh - John Hawthorn
While having a vim discussion on twitter with @_jaredn, I remembered that having a delay in entering normal mode after pressing ESC (switching to normal mode) really frustrates me. This delay exists because many keys (arrows keys, ALT) rely on it as an escape character. Here’s the setup I’ve used for a while for near instantaneous switch into normal mode.
2012  blogpost  links  vim  configuration  keyboard  terminal  tmux  screen  tips  example 
december 2018 by ezequiel
« earlier      
per page:    204080120160

Copy this bookmark:

to read