Blogging
Python Generate Secure Password
Requirements How to come up with a randomly generated password or key is a common problem or challenge when programming, or just in security. On top of just randomly generating …
Read MoreLinux SOCKS Proxy for SSH
How To Setup In one SSH session run: ssh -N -D 7080 username@server.foo.com If you SSH to localhost (IP Address 127.0.0.1) on port 7080, this command forwards that port/request to …
Read MoreInstalling Thycotic SDK Client TSS on Linux
What is Thycotic TSS? The SDK CLI application allows the host to retrieve following after initialization without the need of storing any passwords locally on the host. Tokens Secrets Secret …
Read MoreLinux: How to Delete Files Older than Number of Days
Let’s say that you have a requirement to only keep 90 days worth of files for one or more reasons: Compliance for ISO 27000 Reduce the amount of disk space …
Read MoreWordPress Images – Soft Versus (Vs) Hard Crop
Are you having trouble getting your images the correct size? After altering them time after time only to find them displaying incorrectly on your WordPress site? The answer could be …
Read MoreWhy the Apple HomePod is Neat Compared to Other Home Assistants
Siri and Its Range When we compared the Amazon Echo side by side to the HomePod, the results were that Siri can understand you better than Alexa. Especially, when you …
Read More