Latest Articles

Backup Options for Raspberry Pi

Just about every Raspberry Pi I used suffered the same fate: the micro SD card died. It is generally accepted that the expected lifespan...

Affordable Linux Server

A friend asked me what server I would recommend to run Linux. Yes, a very broad query. After a few followup questions we've determined...

Linux Blog Directory

A curated list of Linux and Unix blogs from around the world.

Home-Brew Ransomware Defense

The first well-known case of ransomware was documented in 1989. The so-called AIDS Trojan was delivered on a floppy disc; encrypted data; demanded $189.00...

Validating HTTPS Cache Peers for Squid

I have a squid proxy server that uses a long list of authenticated cache peers in a round-robin configuration. The process looks something like...

Analyzing atop Logs with atopsar

I have discussed atop previously but concentrated primarily on how to run it and how to collect data. Now I'd like to spend some...

Appending Filenames

If you google how to append, say, current timestamp to the filename in Bash, almost every suggestion boils down to something really basic along...

Selecting Time Ranges from Logs, Part 2

A couple of years ago I wrote an article about selecting specific time ranges from log files. I proposed two options: either convert all...

Automatically Block Frequent Visitors

I had a few similar scripts floating around this site, but this one is a bit more all-inclusive and better organized. The script will...