Latest

Jan
24
Running Multiple Commands in Linux

Running Multiple Commands in Linux

If you are a Linux user, you may have wondered how to run multiple commands simultaneously, in sequence, in parallel or in other ways. In this post, I will show you some useful tips and tricks to do just that. Let's get started!
1 min read
Jan
18
Why Growing Knowledge and Personal Development Matters

Why Growing Knowledge and Personal Development Matters

Technology is constantly evolving and changing, as are the skills and competencies required to succeed in technology job roles. Whether
3 min read
Jan
13
How to go passwordless with yubykey, Dashlane and iPhone

How to go passwordless with yubykey, Dashlane and iPhone

Passwords are a hassle. They are hard to remember, easy to forget, and often vulnerable to hackers. That's
3 min read
Jan
04
Why You Should Switch from VMware to Proxmox in 2024

Why You Should Switch from VMware to Proxmox in 2024

If you are using VMware for your virtualization needs, you might know that their perpetual licensing model is ending soon.
3 min read
Jan
02
AI: A Friend or a Foe?

AI: A Friend or a Foe?

Artificial intelligence (AI) is transforming our lives in many ways. From personal assistants to self-driving cars and smart home devices,
2 min read
Dec
31
Using sysstat and gnuplot to analyse your Linux systems

Using sysstat and gnuplot to analyse your Linux systems

Are you looking for a way to create nice charts from sysstat data? Sysstat is a powerful tool that collects
3 min read
Dec
25
Bringing harmony to home container management with Portainer

Bringing harmony to home container management with Portainer

Getting a handle on the home server sprawl If you're anything like me, your home network has evolved
3 min read
Dec
16
How a cybercriminal group is targeting recruiters with malware

How a cybercriminal group is targeting recruiters with malware

Recruiters are always looking for the best talent to fill their vacancies. But what if some candidates who apply for
2 min read
Dec
09
What is Credential Stuffing and How to Protect Yourself

What is Credential Stuffing and How to Protect Yourself

Credential stuffing is a type of cyberattack that exploits the reuse of usernames and passwords across different websites and applications.
3 min read
Dec
09
Log4j The pain persists

Log4j The pain persists

The log4j vulnerability, also known as Log4Shell, is a serious flaw in a widely used Java logging library that allows
2 min read