Parse Log Files with sed
Published:
When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.
Published:
When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.
Published:
I tend to spend quite a bit of my time on a command line, so I am always looking for little ways to make my life easier. Because of that, this post will be a bit of a living document that I plan to occasionally update as I discover more handy tricks. This is not a comprehensive list, nor is it intended to be one. These are shortcuts that allow me to have a smoother workflow.
Published:
Bind mounts in Linux allow you to mount one part of the file hierarchy somewhere else. I highly recommend using bind mounts in chrooted environment as it can simplify user access control.
Published:
Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!
Published:
File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.
Published:
File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.
Published:
Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.
Published:
Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.
Published:
VirtualBox offers a neat feature called “Seamless Mode” that allows you to seamlessly integrate windows from the host and guest operating systems. This feature proves to be problematic however if the host is a Windows operating system. The alternative is to run the guest as a headless VM and port forward connections from the host to the guest. This is a lightweight solution and can achieve Windows/Linux harmony (as well as can be expected).
Published:
Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.
Published:
Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.
Published:
The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all of the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this
module either via the terminal or from the Python interrupter:
Published:
In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com
Published:
Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.
Published:
When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.
Published:
Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!
Published:
Bind mounts in Linux allow you to mount one part of the file hierarchy somewhere else. I highly recommend using bind mounts in chrooted environment as it can simplify user access control.
Published:
File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.
Published:
I tend to spend quite a bit of my time on a command line, so I am always looking for little ways to make my life easier. Because of that, this post will be a bit of a living document that I plan to occasionally update as I discover more handy tricks. This is not a comprehensive list, nor is it intended to be one. These are shortcuts that allow me to have a smoother workflow.
Published:
Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.
Published:
Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.
Published:
An often underused feature of OpenSSH is the Match statement. Match statements work on OpenSSH 4.4+; applicable versions ship with RHEL/CentOS 6+ and Ubuntu 12.04+. The Match directive accepts the following options:
Published:
Linux is chock-full of documentation, the challenge however is knowing where to find that documentation. One of the first things that every Linux user ought to learn is how to view the manual pages, man <command>
, but there is more to know. The man pages are divided into 9 sections:
Published:
In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com
Published:
Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.
Published:
Linux is chock-full of documentation, the challenge however is knowing where to find that documentation. One of the first things that every Linux user ought to learn is how to view the manual pages, man <command>
, but there is more to know. The man pages are divided into 9 sections:
Published:
An often underused feature of OpenSSH is the Match statement. Match statements work on OpenSSH 4.4+; applicable versions ship with RHEL/CentOS 6+ and Ubuntu 12.04+. The Match directive accepts the following options:
Published:
Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.
Published:
Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!
Published:
Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!
Published:
In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com
Published:
Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.
Published:
The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all of the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this
module either via the terminal or from the Python interrupter:
Published:
Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.
Published:
The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all of the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this
module either via the terminal or from the Python interrupter:
Published:
File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.
Published:
Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.
Published:
An often underused feature of OpenSSH is the Match statement. Match statements work on OpenSSH 4.4+; applicable versions ship with RHEL/CentOS 6+ and Ubuntu 12.04+. The Match directive accepts the following options:
Published:
Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.
Published:
I tend to spend quite a bit of my time on a command line, so I am always looking for little ways to make my life easier. Because of that, this post will be a bit of a living document that I plan to occasionally update as I discover more handy tricks. This is not a comprehensive list, nor is it intended to be one. These are shortcuts that allow me to have a smoother workflow.
Published:
Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.
Published:
The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all of the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this
module either via the terminal or from the Python interrupter:
Published:
VirtualBox offers a neat feature called “Seamless Mode” that allows you to seamlessly integrate windows from the host and guest operating systems. This feature proves to be problematic however if the host is a Windows operating system. The alternative is to run the guest as a headless VM and port forward connections from the host to the guest. This is a lightweight solution and can achieve Windows/Linux harmony (as well as can be expected).
Published:
VirtualBox offers a neat feature called “Seamless Mode” that allows you to seamlessly integrate windows from the host and guest operating systems. This feature proves to be problematic however if the host is a Windows operating system. The alternative is to run the guest as a headless VM and port forward connections from the host to the guest. This is a lightweight solution and can achieve Windows/Linux harmony (as well as can be expected).
Published:
Linux is chock-full of documentation, the challenge however is knowing where to find that documentation. One of the first things that every Linux user ought to learn is how to view the manual pages, man <command>
, but there is more to know. The man pages are divided into 9 sections:
Published:
In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com
Published:
Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.
Published:
When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.
Published:
In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com
Published:
Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.
Published:
When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.
Published:
The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all of the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this
module either via the terminal or from the Python interrupter: