System-administration
Securing SSH With Passwordless Public Key Authentication
SSH public key authentication adds a ton of security, convenience, and scalability compared to traditional password authentication. Let's see how easy it is to setup, and whether you should use it or not.
read articleUnix Permissions - Part 3: Devising a Security Model
Securing files or systems using learnings from the previous parts of this series about Unix Permissions and their CLI apps.
read articleUnix Permissions - Part 2: chmod and Other Permission Command-line Apps
Exploring various command-line tools for working with Unix Permissions, and taking a deep dive into two of the most important ones: chmod and chown
read articleUnix Permissions - Part 1: Anatomy of Permissions
Diving into the traditional Unix permission system, which is essential for working in the command line on Linux and Unix-like systems. We will explore how the permission system works and how its individual components tie together.
read articleCustomizing Find and Replace in the Command Line
Exploring how to perform find and replace in the command line and looking into many options to customize and improve it, including making it recursive and applying it to many files and directories, previewing changes, and adding a confirmation prompt, learning general command line concepts on the way.
read articleRSYNC as a Backup Server: Simple, Powerful and Flexible
Pitching RSYNC as a self-hosted backup solution (for photos, notes, etc.) and how to implement it. I will discuss its pros and cons and provide examples of its extensibility and flexibility
read article