Linux
Time
This is a very basic operation on a Linux system, but I have to interact with it so rarely since I run chrony on all my machines. Occasionally, I find a device …
Mutt
I keep a copy of my mutt config here on the site. VimSince I use vim as my editor I also added the following line to my vim configuration file to autowrap my …
Server Naming Convention
Over the years I've found myself using many different naming schemes for servers under my control. I came across a naming convention that finally feels correct. …
Trim
found top level header in "/notes/linux/trim/" that didn't match meta title ("TRIM" != "Trim")TRIM tells an SSD which blocks are no …
GRE Tunnel
GRE (Generic Routing Encapsulation) wraps layer 3 traffic inside IP protocol 47 packets, creating a simple point-to-point tunnel between two hosts. The tunnel …
Transmission Daemon
ConfigurationFirst install the transmission-daemon. The package is typically called transmission-daemon on Debian/Ubuntu and transmission-daemon or …
Tmux
InstallationTmux is available in the package manager of most Linux distributions. Install it using whatever is appropriate for your system (e.g. apt install …
Suricata
OverviewSuricata is an open source network threat detection engine that can operate as an Intrusion Detection System (IDS), Intrusion Prevention System (IPS), …
SSHd
Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on GNU/Linux and …