Posts by Tag

Linux

1 minute read

Setting up a Samba share on Debian Linux allows you to share files across different operating systems within your local network. This is useful in both homelabs and work environments when you want ...

5 minute read

System76 is an American computer maker known for their first-class Linux support and repairable, high-performance machines. While their laptop line up is composed of chassis built by the Taiwanese ...

1 minute read

If you try to install Jekyll on a base install of Windows Subsystem for Linux (WSL), you’ll run into a few errors. This is because we need to be able to build Jekyll, but the required compilers, li...

3 minute read

BASH aliases are a handy way to create shortcuts for commands you use frequently or may otherwise be long and tedious to remember. I’ll briefly explain how to create BASH aliases and then show you ...

2 minute read

A number of years ago I wrote a little utility that generates Diceware passwords. “Big deal!”, you might think. But my utility has a unique feature. It generates passwords using quantum random data...

Back to Top ↑

Bash

3 minute read

BASH aliases are a handy way to create shortcuts for commands you use frequently or may otherwise be long and tedious to remember. I’ll briefly explain how to create BASH aliases and then show you ...

Back to Top ↑

Windows

less than 1 minute read

Windows includes a simple Visual Basic script that checks if Windows is properly activated. You can run the script by opening the Run box (WIN+R) or a Command Prompt and entering slmgr /xpr. This w...

1 minute read

If you try to install Jekyll on a base install of Windows Subsystem for Linux (WSL), you’ll run into a few errors. This is because we need to be able to build Jekyll, but the required compilers, li...

Back to Top ↑

Tools

2 minute read

A number of years ago I wrote a little utility that generates Diceware passwords. “Big deal!”, you might think. But my utility has a unique feature. It generates passwords using quantum random data...

Back to Top ↑

Python

2 minute read

A number of years ago I wrote a little utility that generates Diceware passwords. “Big deal!”, you might think. But my utility has a unique feature. It generates passwords using quantum random data...

Back to Top ↑

Review

5 minute read

System76 is an American computer maker known for their first-class Linux support and repairable, high-performance machines. While their laptop line up is composed of chassis built by the Taiwanese ...

Back to Top ↑

Batch

Back to Top ↑

FAQ

less than 1 minute read

Synchronization is about duplication and timing, whereas orchestration is about effort and effect. Syncing devices ensures they all perform the same task in the same way and at the same time. This ...

Back to Top ↑

PowerShell

less than 1 minute read

Windows includes a simple Visual Basic script that checks if Windows is properly activated. You can run the script by opening the Run box (WIN+R) or a Command Prompt and entering slmgr /xpr. This w...

Back to Top ↑

Debian

1 minute read

Setting up a Samba share on Debian Linux allows you to share files across different operating systems within your local network. This is useful in both homelabs and work environments when you want ...

Back to Top ↑

Ars Technica

less than 1 minute read

The astonishing hubris of Synology’s decision to require their self-branded hard drives, which are merely white-labeled WD Reds, is an egregious incursion on user’s right to choose. The best decision users can make is to refuse to use Synology products.

Back to Top ↑

Thurrott

less than 1 minute read

Rectangles with round corners don’t seem like a big deal today, but before the technique for drawing them on a computer diplay was invented by Bill Atkinson, some, including the inventor himself, had deemed it impossible. Bill was a pioneer of the GUI and his techniques will forever influence human interfaces.

Back to Top ↑

Independant Research

less than 1 minute read

It has long been know that Meta/Facebook has gone to great lengths to get their “pixel” tracker embedded in every possible web page. But their latest abuse of users demonstrates a gross lack of ethical judgement. By exploiting the ability of browsers to connect to locally hosted services, Meta knowingly and willfully ignored every indication that a user wanted privacy by breaking out of sandboxed environments, bypassing history/cookie preferences and DNS sink-holes, and tracking user activity even in privacy mode.

Back to Top ↑