Posts by Tags

Bash

Parse Log Files with sed

less than 1 minute read

Published:

When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.

Bash Shortcuts

2 minute read

Published:

I tend to spend quite a bit of my time on a command line, so I am always looking for little ways to make my life easier. Because of that, this post will be a bit of a living document that I plan to occasionally update as I discover more handy tricks. This is not a comprehensive list, nor is it intended to be one. These are shortcuts that allow me to have a smoother workflow.

Bind Mounts

Bind Mounts in Linux

2 minute read

Published:

Bind mounts in Linux allow you to mount one part of the file hierarchy somewhere else. I highly recommend using bind mounts in chrooted environment as it can simplify user access control.

FACLs

Backup and Restore Permissions in Linux

less than 1 minute read

Published:

Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!

FTP

(S)FTP(S) or: How I Learned to Stop Worrying and Love File Transfer

7 minute read

Published:

File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.

FTPS

(S)FTP(S) or: How I Learned to Stop Worrying and Love File Transfer

7 minute read

Published:

File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.

Fedora 21

My Adventures with Multiple Monitors on Linux

1 minute read

Published:

Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.

Gnome 3

My Adventures with Multiple Monitors on Linux

1 minute read

Published:

Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.

Headless VMs

Headless VMs with VirtualBox

2 minute read

Published:

VirtualBox offers a neat feature called “Seamless Mode” that allows you to seamlessly integrate windows from the host and guest operating systems. This feature proves to be problematic however if the host is a Windows operating system. The alternative is to run the guest as a headless VM and port forward connections from the host to the guest. This is a lightweight solution and can achieve Windows/Linux harmony (as well as can be expected).

KexAlgorithm

The Anatomy of an SSH Connection

6 minute read

Published:

Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.

Key Exchange

The Anatomy of an SSH Connection

6 minute read

Published:

Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.

Linux

What’s with this?

6 minute read

Published:

The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this module either via the terminal or from the Python interrupter:

SMTP Sender-Dependent SASL Authentication in Postfix

3 minute read

Published:

In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com

My Adventures with Multiple Monitors on Linux

1 minute read

Published:

Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.

Parse Log Files with sed

less than 1 minute read

Published:

When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.

Backup and Restore Permissions in Linux

less than 1 minute read

Published:

Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!

Bind Mounts in Linux

2 minute read

Published:

Bind mounts in Linux allow you to mount one part of the file hierarchy somewhere else. I highly recommend using bind mounts in chrooted environment as it can simplify user access control.

(S)FTP(S) or: How I Learned to Stop Worrying and Love File Transfer

7 minute read

Published:

File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.

Bash Shortcuts

2 minute read

Published:

I tend to spend quite a bit of my time on a command line, so I am always looking for little ways to make my life easier. Because of that, this post will be a bit of a living document that I plan to occasionally update as I discover more handy tricks. This is not a comprehensive list, nor is it intended to be one. These are shortcuts that allow me to have a smoother workflow.

The Anatomy of an SSH Connection

6 minute read

Published:

Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.

Getting Started with Mailgun

5 minute read

Published:

Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.

SSH Match Statements

less than 1 minute read

Published:

An often underused feature of OpenSSH is the Match statement. Match statements work on OpenSSH 4.4+; applicable versions ship with RHEL/CentOS 6+ and Ubuntu 12.04+. The Match directive accepts the following options:

Finding Help in Linux

2 minute read

Published:

Linux is chock-full of documentation, the challenge however is knowing where to find that documentation. One of the first things that every Linux user ought to learn is how to view the manual pages, man <command>, but there is more to know. The man pages are divided into 9 sections:

Mailgun

SMTP Sender-Dependent SASL Authentication in Postfix

3 minute read

Published:

In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com

Getting Started with Mailgun

5 minute read

Published:

Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.

Man Pages

Finding Help in Linux

2 minute read

Published:

Linux is chock-full of documentation, the challenge however is knowing where to find that documentation. One of the first things that every Linux user ought to learn is how to view the manual pages, man <command>, but there is more to know. The man pages are divided into 9 sections:

Match Statements

SSH Match Statements

less than 1 minute read

Published:

An often underused feature of OpenSSH is the Match statement. Match statements work on OpenSSH 4.4+; applicable versions ship with RHEL/CentOS 6+ and Ubuntu 12.04+. The Match directive accepts the following options:

Multiple Monitors

My Adventures with Multiple Monitors on Linux

1 minute read

Published:

Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.

Ownership

Backup and Restore Permissions in Linux

less than 1 minute read

Published:

Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!

Permissions

Backup and Restore Permissions in Linux

less than 1 minute read

Published:

Inevitably every Linux administrator will eventually have to alter permissions and owerships, perhaps even FACLs. But what happens when your changes go awry? The problem is amplified if you were making changes recursively!

Postfix

SMTP Sender-Dependent SASL Authentication in Postfix

3 minute read

Published:

In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com

Getting Started with Mailgun

5 minute read

Published:

Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.

Python

What’s with this?

6 minute read

Published:

The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this module either via the terminal or from the Python interrupter:

Rackspace

Getting Started with Mailgun

5 minute read

Published:

Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.

Reverse Engineering

What’s with this?

6 minute read

Published:

The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this module either via the terminal or from the Python interrupter:

SFTP

(S)FTP(S) or: How I Learned to Stop Worrying and Love File Transfer

7 minute read

Published:

File transfer is a fundamental concept of the Internet, however there are a plethora of configuration options that often lead to confusion. In this article I am going to discuss installation and configuration of FTP, FTPS, and SFTP as well as how to chroot (i.e. jail) users for these services.

SSH

The Anatomy of an SSH Connection

6 minute read

Published:

Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.

SSH Match Statements

less than 1 minute read

Published:

An often underused feature of OpenSSH is the Match statement. Match statements work on OpenSSH 4.4+; applicable versions ship with RHEL/CentOS 6+ and Ubuntu 12.04+. The Match directive accepts the following options:

SSH Encryption

The Anatomy of an SSH Connection

6 minute read

Published:

Over the last couple of days I have become increasingly interested in unraveling the mysteries behind establishing an SSH connection. The process is very intricate and some of the documentation seems scattered, so I decided to write a bit about it in the hopes that someone else may benefit.

Shortcuts

Bash Shortcuts

2 minute read

Published:

I tend to spend quite a bit of my time on a command line, so I am always looking for little ways to make my life easier. Because of that, this post will be a bit of a living document that I plan to occasionally update as I discover more handy tricks. This is not a comprehensive list, nor is it intended to be one. These are shortcuts that allow me to have a smoother workflow.

Span Wallpaper

My Adventures with Multiple Monitors on Linux

1 minute read

Published:

Using multiple monitors on my Linux laptop has introduced a couple of unique issues. The largest of which is that the laptop seems to forget my monitor configuration every time I unplug it.

The Zen of Python

What’s with this?

6 minute read

Published:

The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this module either via the terminal or from the Python interrupter:

VirtualBox

Headless VMs with VirtualBox

2 minute read

Published:

VirtualBox offers a neat feature called “Seamless Mode” that allows you to seamlessly integrate windows from the host and guest operating systems. This feature proves to be problematic however if the host is a Windows operating system. The alternative is to run the guest as a headless VM and port forward connections from the host to the guest. This is a lightweight solution and can achieve Windows/Linux harmony (as well as can be expected).

Virtualization

Headless VMs with VirtualBox

2 minute read

Published:

VirtualBox offers a neat feature called “Seamless Mode” that allows you to seamlessly integrate windows from the host and guest operating systems. This feature proves to be problematic however if the host is a Windows operating system. The alternative is to run the guest as a headless VM and port forward connections from the host to the guest. This is a lightweight solution and can achieve Windows/Linux harmony (as well as can be expected).

docs

Finding Help in Linux

2 minute read

Published:

Linux is chock-full of documentation, the challenge however is knowing where to find that documentation. One of the first things that every Linux user ought to learn is how to view the manual pages, man <command>, but there is more to know. The man pages are divided into 9 sections:

email

SMTP Sender-Dependent SASL Authentication in Postfix

3 minute read

Published:

In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com

Getting Started with Mailgun

5 minute read

Published:

Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.

logs

Parse Log Files with sed

less than 1 minute read

Published:

When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.

mail

SMTP Sender-Dependent SASL Authentication in Postfix

3 minute read

Published:

In a previous article I discussed how to use Mailgun as a relay in Postfix. This works great if you are only sending email from one website on your server, often times however you will have multiple websites sending email on a single server. In these cases, websites NOT belonging to the sender domain will say sent via SENDER_DOMAIN: wes@example.com via necrux.com

Getting Started with Mailgun

5 minute read

Published:

Mailgun is a developer-centric approach to email. It can be used to simply relay email, but it can do so much more! In this article I am going to discuss basic configuration for using Mailgun as a relay with Postfix and briefly discuss some of the additional features offered by Mailgun.

sed

Parse Log Files with sed

less than 1 minute read

Published:

When parsing log files sed is not the go-to tool for most techs, but it offers a pretty neat feature: the ability to easily search a log file for a specific date/time range.

this.py

What’s with this?

6 minute read

Published:

The Zen of Python is a well-known document in the Python community. It quite succinctly, and humorously, lays out all the guiding principles for Python’s design. The Zen of Python is never more than a few keystrokes away; it can be viewed at anytime by running the this module either via the terminal or from the Python interrupter: