How Tos
Python Generate Secure Password
Requirements How to come up with a randomly generated password or key is a common problem or challenge when programming, or just in security. On top of just randomly generating …
Read MoreLinux SOCKS Proxy for SSH
How To Setup In one SSH session run: ssh -N -D 7080 username@server.foo.com If you SSH to localhost (IP Address 127.0.0.1) on port 7080, this command forwards that port/request to …
Read MoreInstalling Thycotic SDK Client TSS on Linux
What is Thycotic TSS? The SDK CLI application allows the host to retrieve following after initialization without the need of storing any passwords locally on the host. Tokens Secrets Secret …
Read MoreLinux: How to Delete Files Older than Number of Days
Let’s say that you have a requirement to only keep 90 days worth of files for one or more reasons: Compliance for ISO 27000 Reduce the amount of disk space …
Read MoreInstalling New Sod in A Overgrown Landscaped Area
Our house had a lot of landscaping. That is great, if you enjoy taking care of it. Instead, the decision was made to remove all of this because it was …
Read More