Blog Home
Welcome! All posts are original ideas, information I have found valuable, or items I taught myself over the years. I am mostly self educated and the blog articles reflect that.
In that same spirit, you should take everything you see on this site with a grain of salt and do your own due diligence.
Thanks for visiting.
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | |
7 | 8 | 9 | 10 | 11 | 12 | 13 |
14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 |
28 | 29 | 30 |
Recent Posts:
-
Understanding User Crontabs
Crontab is to Linux, as Task Scheduler is to Windows. Learn to set up script or commands to run at a specific time.
-
Top Windows Terminal Commands
Introduction Although PowerShell has made progress over the last few years as the preferred command line tool, I find that knowledge of the original command line is still very valuable. You can use the command line to quickly get system information or write batch scripts to automate simple tasks. Most commands can be run as…
-
Ansible Ad-Hoc Commands
Introduction Ansible gives you a powerful option to run commands ad-hoc. This negates the need to write a script, if you only need some quick information. There are two separate options for gathering data via ad-hoc. If you are running just a single command than use the ‘command’ module. If you need to run multiple…
-
Tips to Safeguard Your Digital Secrets
Introduction Password manager databases, asynchronous keys, digital signatures, and MFA recovery passcodes are designed to identify you, decrypt files, or help you recover from a failed 2FA login. Care must be taken to protect these digital items so they do not fall into unwanted hands. The below techniques are not a cure all, and other…
-
Managing Your Passwords
Forward Good password habits are essential for any person who works regularly online. Due to regulations or contracts with customers, many business are required to have specific password polices. In 2024, here are some of the most recent recommendations concerning passwords. Password Best Practices As part of a good password management practice, whether at home…
-
Run a Basic NMap Scan
Introduction NMAP (Network Mapper) is a utility for identifying all hosts on a network and what ports are open on those devices. Historical, it can also tell what the OS is of the identified hosts and what services are running on the open ports. I have not found the OS or the service identifiers to…