Upgrading ownCloud on Ubuntu

I often hear people complain that ownCloud is impossible to upgrade and I have been through that pain myself. However after repeatedly going to such extremes as uninstalling and starting from scratch I have found a series of steps that while simple are not entirely obvious. Update I has been pointed out to me on…

Continue reading →

The Fedora projects blog has a good introduction to the i3 windowing manager here. I’m definitely going to try i3 later in the day and perhaps even try going back to Fedora as well.

Maybe is a python script that allows you to simulate running commands such as rm without making any actual changes to files. I’ve just given it a test run and it seems to work very nicely.

maybe has prevented rm test_file from performing 1 file system operations:

delete /home/ryan/test_file

Do you want to rerun rm test_file and permit these operations? [y/N]

This looks like an excellent script for using on servers in particular!

Core Linux servers

The following is a list of Linux server software that is used in many, many situations to provide infrastructure to other services. If you want to be a sys admin you must know these. OpenSSH: This server is used to provide authenticated command line access to remote servers. Additionally it can also be used to…

Continue reading →

mkcd: My favourite script

The two commands that I cannot stand to run consecutively are mkdir and cd. It’s a little thing but I despise creating a directory and then entering it with a second command so I wrote a /bin/zsh function to combine them. If you want to do the same add the following into your .zshrc file:…

Continue reading →


I just suffered a massive data loss due to using btrfs on my PC; Do not let yourself be next! Avoid btrfs at all cost!

Securing SSH on Linux Part 2

In this part I will explain how to further improve the server’s security by replacing traditional passwords with public key authentication. Before deciding to follow this tutorial please consider the following problem: While replacing passwords with private/public key pairs is an enormous improvement in security it also requires specially preparing your workstation for logging into…

Continue reading →