GnuPG and PGP are public key encryption programs, they are nice and convenient and helpful at avoiding sending ‘important’ content in the clear in email (SMTP is plain-text you remember, right?) Often console-based email clients can be fussy to setup to use this software. Here’s a quick guide, stolen from someone else (Stolen-content).
Once you make your new kernel, how do you put it into use?
Often when you start with an SSL certificate it has a passphrase, you may want to change that later. You may realize your webserver won’t start without entering a passphrase at the startup dialog. That’d be a bad thing for your webserver, eh? Really the problem isn’t with the certificate so much as the key, which is encrypted with a passphrase.
How many people have wanted to make an SSL certificate for one reason or another and didn’t want to pay the outrageous fees to someone to get a legittimate one, afterall if it’s just encryption you want why pay when openssl makes them free for you? Here’s how…
Ever had to move data around on a regular basis? Say to copy statistics and such from machine to machine to a central location without having some hokie psuedo user with funked up permissions? Have you the same problem as I do? Every single time you want to do this you have to google: “ssh forced command keys” and hope that link 3 doesn’t change on you? Fear not… documentation below!
Some simple statistics gathering for systems monitoring, graphicalized for your pleasure! Everyone likes graphics and they do help to make trends visible quickly. This short explanation should give some starting points and references on using Tobi Oetiker’s fine rrdtool to store and later display the data in question.
A few simple yet apparently often overlooked security measures for equipment that lives on an untrusted network.
Grep, sort, uniq, awk, sed are all worthy tools, but part of the job is deciding when one tool, or tool-set is no longer enough to accomplish your mission. When should you turn over the job to a true sorting engine, a relational database?
I dislike gallery programs as well, why I have no idea. I think I wanted to write my own sometime in the past. I may still do that in the future… something with a nice web-form to upload images, user privileges and comment capability… sometime, when I have time and don’t have other obligations.
A few quick ways to use normal unix command-line tools to parse logs for classification of problems or identification of activity. The aim of this would be to help folks find out what is causing a problem on a particular interface, not long term analysis which should be covered somewhere else. Part of it is covered in this package available on SourceForge.Net.