Xtreme Delusions: A Legend In My Own Mind

Though your personal data is important and can be irreplaceable, few people ever think about protecting it with a backup strategy. Hard disk failures, viruses, and even accidental deletions could destroy you data forever. In order to protect my data, and in the continued belief that overkill is just enough, I do hourly backups and have 3 months of data at my fingertips. In this article I am going to cover the local backups. In a future article I will cover the remote backup strategy using a passwordless SSH

More »

Trying to modify a collection of files and directories can be time consuming. Here is a batch file that will do the work for you. Specify the path and/or files (this examples specifies all files and directories in the current location) and change the called function to do the specified work. Will even handle spaces in the file or directory names.

More »

When you are installing new applications to your Unix server it is almost always better to use some soft of package management tool. Compiling from source allows you to custom tailor the application to your hardware, but most applications do not provide a means for uninstalling.
Another issue with installing from sources is that you do not have a central repository to list all your installed applications. src2pkg is the best of both worlds, compile from source and install via the package management system.

More »

If you run a lot of Ethernet cable, it is usually cheaper to build your own. Building Ethernet cables in bulk is easy and inexpensive. All you need is a crimper, jacks, cable, and a pair of scissors or cable cutter/stripper.

More »

Sometimes you will need to create an account that does not ask for a password, this is usually done for network administration. Creating an account without a password is a severe security violation and opens your sever up to attack. To get around this, create an account with a very strong password and then use public key encryption for logging in. If a user attempts to log in, they will need to know the password. However, you can log in with out a password by using the encrypted keys. You can further increase your security by ONLY allowing a login with the encrypted keys, but that is for another post.

More »