Core Linux servers

The following is a list of Linux server software that is used in many, many situations to provide infrastructure to other services. If you want to be a sys admin you must know these. OpenSSH: This server is used to provide authenticated command line access to remote servers. Additionally it can also be used to…

Continue reading →

Podcast update

After my last post I started working on a prototype for a podcast client that supports what I am talking about. If I work at a good pace I ought to have a beta out around the end of this month.

mkcd: My favourite script

The two commands that I cannot stand to run consecutively are mkdir and cd. It’s a little thing but I despise creating a directory and then entering it with a second command so I wrote a /bin/zsh function to combine them. If you want to do the same add the following into your .zshrc file:…

Continue reading →

PSA

I just suffered a massive data loss due to using btrfs on my PC; Do not let yourself be next! Avoid btrfs at all cost!

Topics I might write about

A quick list of things that I am looking at writing about. Bug fixing on LibreOffice, KDE and other open source projects. How I get the most out of my computer (shell scripts, KDE setup, server config, etc). Draw attention to non-action graphic novels. Music history / reviews (mostly prog rock and euro metal). Pros…

Continue reading →

Custom CSS for WordPress

I was going to write an epic post about my struggles to add a custom CSS class to my WordPress theme so I can better display code and commands in my posts. As it turned out though there is a plugin for that called Simple Custom CSS. Install this by going to Plugins -> Add…

Continue reading →

Economics in action

Interesting side effect of China changing their one-child policy; There was an increased investment in diary products, raising the New Zealand dollar thus reducing the hosting bill for this website. I don’t think it will last until next month :-(

Securing SSH on Linux Part 2

In this part I will explain how to further improve the server’s security by replacing traditional passwords with public key authentication. Before deciding to follow this tutorial please consider the following problem: While replacing passwords with private/public key pairs is an enormous improvement in security it also requires specially preparing your workstation for logging into…

Continue reading →