Latest Articles

Selecting Time Ranges from Logs, Part 2

A couple of years ago I wrote an article about selecting specific time ranges from log files. I proposed two options: either convert all...

Automatically Block Frequent Visitors

I had a few similar scripts floating around this site, but this one is a bit more all-inclusive and better organized. The script will...

Detecting Blurry Photos with ImageMagick

Here's a typical scenario: I go to a birthday party where everyone knows I'm a shutterbug, so I have to bring my camera. As...

Working with iptables Logging

Most commonly iptables is used to allow, block, or redirect connections. However, it also has a logging feature that can be very useful for...

Copying File Attributes Across Servers

To make long story short, had to fix someone's chmod -R 777 /. A late-night copy-paste fail, it would seem. Needless to say, console...

Longwood Gardens, August 2019

Longwood Gardens is an American botanical garden. It consists of over 1,077 acres of gardens, woodlands, and meadows in Kennett Square, Pennsylvania, United States...

Analyzing Network Performance

Much of network performance analysis will be comparative in nature. Thus, seeing the output of multiple commands side by side can be quite useful....

Copying Data in a Restricted Environment

Consider this not-so-hypothetical scenario: you have some data on server_a that you would like to copy to server_b. Unfortunately, these two servers cannot communicate...

Raising Dead Services

I suppose you may say all of this can be just as easily be done via systemd service config files. Well, yes and no....