<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Archives - Igor Oseledko</title>
	<atom:link href="https://www.igoroseledko.com/category/sysadmin/data/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.igoroseledko.com/category/sysadmin/data/</link>
	<description>I know everything. Just not all at once...</description>
	<lastBuildDate>Tue, 31 Mar 2026 02:10:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>To Mask or Not to Mask</title>
		<link>https://www.igoroseledko.com/to-mask-or-not-to-mask/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 02:10:54 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133832</guid>

					<description><![CDATA[<p>Originally published March 31, 2020 @ 3:17 pmEffectiveness of face masks against the coronavirus has been debated to death in both popular and scientific literature. Here are the two most common mistakes made by journalists and by people who should know better. Asking the Wrong Question &#8220;Can Face Masks Prevent Coronavirus?&#8221; or &#8220;Can wearing a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/to-mask-or-not-to-mask/">To Mask or Not to Mask</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Checking Linux Account Password</title>
		<link>https://www.igoroseledko.com/checking-linux-account-password/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 03:57:45 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133824</guid>

					<description><![CDATA[<p>Originally published March 25, 2020 @ 4:48 pmOn occasion you may need to check if an account has a specific password. For example, when you build VMs, you may use some default passwords for some default accounts (i.e. root) that should be changed later by your password management application. Except that the password management application [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/checking-linux-account-password/">Checking Linux Account Password</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Coronavirus Discussion</title>
		<link>https://www.igoroseledko.com/the-coronavirus-discussion/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 21:06:25 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133761</guid>

					<description><![CDATA[<p>Originally published March 5, 2020 @ 12:42 pmJust a few words about the coronavirus. Clearly, the Internet is in need of my contribution to this topic. You might’ve noticed this: whenever there is a discussion about the coronavirus, some dolt appears out of nowhere and says something along the lines of “to put things in [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/the-coronavirus-discussion/">The Coronavirus Discussion</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Updating Lynis</title>
		<link>https://www.igoroseledko.com/updating-lynis/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Sat, 28 Feb 2026 02:22:08 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133747</guid>

					<description><![CDATA[<p>Originally published February 29, 2020 @ 5:04 pmLynis is an excellent security audit tool for Linux and various Unix derivatives. I have a small wrapper script that runs Lynis via a cron job, does a selective diff with the previous run&#8217;s output, and sends me an email. Unfortunately, Lynis does not update itself automatically and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/updating-lynis/">Updating Lynis</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Hiding Passwords</title>
		<link>https://www.igoroseledko.com/hiding-passwords/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 21:16:29 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133733</guid>

					<description><![CDATA[<p>Originally published February 21, 2020 @ 9:02 amI&#8217;ve touched on this subject previously, but suddenly felt I should repeat myself. The big issue with using passwords from command line is shell history. Regardless of how careful you are, eventually you&#8217;ll enter a password in clear text in your terminal session. It will then end up [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/hiding-passwords/">Hiding Passwords</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Backing Up WSL Images</title>
		<link>https://www.igoroseledko.com/backing-up-wsl-images/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Fri, 02 Jan 2026 15:53:28 +0000</pubDate>
				<category><![CDATA[Backups]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133471</guid>

					<description><![CDATA[<p>Originally published January 4, 2020 @ 3:19 amMicrosoft&#8217;s WSL is interesting. I&#8217;d go as far as to say that I like it. The mistake here would be to forget that your Linux image is running under Windows, with everything this entails. Making a reliable backup of this thing proved harder than I expected. I have [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/backing-up-wsl-images/">Backing Up WSL Images</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Home-Brew Ransomware Defense</title>
		<link>https://www.igoroseledko.com/home-brew-ransomware-defense/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Fri, 26 Dec 2025 08:18:31 +0000</pubDate>
				<category><![CDATA[Backups]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133439</guid>

					<description><![CDATA[<p>Originally published December 28, 2019 @ 12:42 amThe first well-known case of ransomware was documented in 1989. The so-called AIDS Trojan was delivered on a floppy disc; encrypted data; demanded $189.00 (nearly four hundred bucks in today&#8217;s money) as a &#8220;license fee.&#8221; The trojan was quickly defused due to its reliance on weak symmetric cryptography. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/home-brew-ransomware-defense/">Home-Brew Ransomware Defense</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Fuzzy Search with Linux</title>
		<link>https://www.igoroseledko.com/fuzzy-search-with-linux/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Tue, 25 Nov 2025 05:59:24 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Files]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=134826</guid>

					<description><![CDATA[<p>Originally published November 25, 2022 @ 11:01 pmThis is a quick look at several handy utilities that will allow you to find, navigate, and edit directories and files easily. This overview includes such tools as fzf, rg, fd-find, bat, and the fzf.vim plugin for VIM. The fzf is a general-purpose command-line fuzzy finder. . The [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/fuzzy-search-with-linux/">Fuzzy Search with Linux</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Appending Filenames</title>
		<link>https://www.igoroseledko.com/appending-filenames/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Sun, 16 Nov 2025 00:00:16 +0000</pubDate>
				<category><![CDATA[Commands & Shells]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Files]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=133412</guid>

					<description><![CDATA[<p>Originally published November 17, 2019 @ 11:39 amIf you google how to append, say, current timestamp to the filename in Bash, almost every suggestion boils down to something really basic along the lines of mv $somefile $somefile_$(date +'Y%-%m-%d'). Technically, this is correct and, yet, this is not what was needed. Most filenames have extensions that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/appending-filenames/">Appending Filenames</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Basic Data Recovery in Linux</title>
		<link>https://www.igoroseledko.com/basic-data-recovery-in-linux/</link>
		
		<dc:creator><![CDATA[Igor]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 16:02:05 +0000</pubDate>
				<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Filesystems]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.igoroseledko.com/?p=134767</guid>

					<description><![CDATA[<p>Originally published November 1, 2022 @ 8:22 amHave you noticed how the letters &#8220;e&#8221; and &#8220;r&#8221; are neighbors on your keyboard? And an unrelated question: do you know the difference between crontab -e and crontab -r commands? Look it up if you don&#8217;t. Honestly, I&#8217;ve never used the crontab -r command in my many years [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.igoroseledko.com/basic-data-recovery-in-linux/">Basic Data Recovery in Linux</a> appeared first on <a rel="nofollow" href="https://www.igoroseledko.com">Igor Oseledko</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
