After hours July 21, 2023 1

Season simulator Why are there seasons?

Recently, I stumbled upon a fascinating project known as “The Nebraska Astronomy Applet Project.” It delves into intriguing questions such as…

Read More
cybersecurity July 13, 2022 0

iOS Privacy Settings Check List

Maximize Your Privacy and Battery Life: Essential iOS Settings to Consider 1. Optimize Location Services for Privacy and Battery Life To…

cybersecurity November 10, 2021 0

MySQL Error “file too short” when creating sys_exec function

I recently encountered an intriguing error message, “file too short” when attempting to elevate privileges on a Linux system through the…

Read More
Cloud May 12, 2021 0

How To Attach Multiple ENIs To EC2 Instances Without Lambda

Creating a Launch Template in AWS of a single EC2 instance with multiple elastic network interfaces (ENIs) is quite straightforward. How…

Read More
cybersecurity March 31, 2021 0

Finding vulnerabilities with Windows Exploit Suggester – NG

Windows Exploit Suggester NG (WES-NG) is a tool based on the output of Windows’ systeminfo utility which provides the list of…

Read More
Cloud January 14, 2020 0

Configuring Ansible Dynamic Inventory aws_ec2 plugin

We already know how to connect to AWS instance using SSH over AWS SSM, so we are ready to go one…

Read More
Cloud, cybersecurity January 13, 2020 0

Connecting to AWS EC2 instance using SSH over AWS SSM

It is very common that enterprise security policies don’t allow direct connections from corporate networks to EC2 instances over SSH. A…

Read More
Linux Articles October 9, 2018 0

The Linux Adventure: Finding Happiness Beyond Windows

Another work week begins, and as I open my laptop, I’m greeted by the familiar and frustrating sight: “Configuring Windows Updates,…

Read More
Linux Articles June 22, 2018 0

Installing OpenShift Origin in a Home Lab

We are going to demonstrate how quickly get us up and running with a “lightweight” OpenShift Origin environment in a virtual…

cybersecurity March 1, 2018 0

Installing Sophos UTM 9 Firewall In Home Network

If you value the security and online well-being of your home network or the safety of your children, you may be…