Linux

Time

1 min read

This is a very basic operation on a Linux system, but I have to interact with it so rarely since I run chrony on all my machines. Occasionally, I find a device …

Mutt

1 min read

I keep a copy of my mutt config here on the site. VimSince I use vim as my editor I also added the following line to my vim configuration file to autowrap my …

Server Naming Convention

3 min read

Over the years I've found myself using many different naming schemes for servers under my control. I came across a naming convention that finally feels correct. …

Trim

2 min read

found top level header in "/notes/linux/trim/" that didn't match meta title ("TRIM" != "Trim")TRIM tells an SSD which blocks are no …

GRE Tunnel

3 min read

GRE (Generic Routing Encapsulation) wraps layer 3 traffic inside IP protocol 47 packets, creating a simple point-to-point tunnel between two hosts. The tunnel …

Transmission Daemon

5 min read

ConfigurationFirst install the transmission-daemon. The package is typically called transmission-daemon on Debian/Ubuntu and transmission-daemon or …

Tmux

3 min read

InstallationTmux is available in the package manager of most Linux distributions. Install it using whatever is appropriate for your system (e.g. apt install …

Suricata

7 min read

OverviewSuricata is an open source network threat detection engine that can operate as an Intrusion Detection System (IDS), Intrusion Prevention System (IPS), …

SSHd

7 min read

Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on GNU/Linux and …