Timeline
Scripting
Applications
ffmpeg
Hadoop
Kodi
MySQL
Oracle
Samba
Squid
Virtualization
WordPress
Data
Backups
Disaster Recovery
Disks and Volumes
Files
Filesystems
Security
Monitoring
Performance
Processes
Social Networks
Facebook
Instagram
Twitter
Networking
Email
Photography
Events
Garden
Travel
Search
61.3
F
Wilmington
Home
Timeline
Blog
Music
Photo
Work
Email
Legal
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Igor Oseledko
Timeline
Scripting
Commands & Shells
Nohup Without Nohup.out
Commands & Shells
Approximate String Matching
Commands & Shells
Improving Your Scripts with ShellCheck
Commands & Shells
Better ‘date’ Functionality in Solaris
Commands & Shells
Create NFS share from QNAP CLI
Applications
All
ffmpeg
Hadoop
Kodi
MySQL
Oracle
Samba
Squid
Virtualization
WordPress
Networking
Fixing NIC Name in Cloned VMWare Linux Machines
Virtualization
VMWare VMDK Locked Error
Kodi
Kodi Volume Control Stops Working
WordPress
Useful WordPress Plugins
Data
All
Backups
Disaster Recovery
Disks and Volumes
Files
Filesystems
Security
Filesystems
Osync and DiffTree
Backups
Filesystem Synchronization with Freehold
Disks and Volumes
Decrypting Mac Disk
Commands & Shells
Create NFS share from QNAP CLI
Monitoring
All
Performance
Processes
Social Networks
Facebook
Instagram
Twitter
Networking
Linux CLI Network Speed Test
Monitoring
Understanding Memory Utilization in Linux
Twitter
Searching Twitter
Commands & Shells
Finding Gaps in Timestamps
Networking
All
Email
Networking
Socket Statistics ss Command
Networking
Linux CLI Network Speed Test
Commands & Shells
Create NFS share from QNAP CLI
Networking
Fixing NIC Name in Cloned VMWare Linux Machines
Photography
All
Events
Garden
Travel
Photography
Sunrise at Cape Henlopen
Photography
Canyonlands National Park, Utah
Photography
Yellowstone National Park, Wyoming
Photography
Sun Juan Mountains, Colorado
Home
Data
Security
Security
Random
Latest
Featured posts
Most popular
7 days popular
By review score
Random
Security
Copying Data in a Restricted Environment
Igor
-
August 8, 2022
Security
Encrypting Log Data During Log Rotation
Igor
-
March 1, 2022
Security
Finding Passwords in Logs and Shell History
Igor
-
April 25, 2022
Security
Finding Strings in Outlook PST Files
Igor
-
December 27, 2020
Security
Copying File Attributes Across Servers
Igor
-
August 27, 2022
Security
Laziness vs Phishing
Igor
-
October 14, 2021
Security
Hiding Passwords
Igor
-
February 20, 2023
Security
Plugging iPhone’s Privacy Holes
Igor
-
May 31, 2022
Security
Updating Lynis
Igor
-
February 28, 2023
Security
Home-Brew Ransomware Defense
Igor
-
December 27, 2022
1
2
3
...
5
Page 1 of 5