Timeline

Longwood Gardens, August 2019
Longwood Gardens is an American botanical garden. It consists of over 1,077 acres of gardens, woodlands, and meadows in Kennett Square, Pennsylvania, United States in the Brandywine Creek Valley. It is one of the premier horticultural display gardens in the United States and is open to visitors year-round.
Analyzing Network Performance
Much of network performance analysis will be comparative in nature. Thus, seeing the output of multiple commands side by side can be quite useful. Bash has a useful little utility called pr and we'll make use of it.
Maintaining DNS Records
I've recently dragged all of my DNS records from Site5. It only took me six years to finally get off that godawful hosting service. In retrospect, keeping a better track of all DNS records would not have wasted time. Then again, I would not be a sysadmin if I wasn't…Read More
Copying Data in a Restricted Environment
Consider this not-so-hypothetical scenario: you have some data on server_a that you would like to copy to server_b. Unfortunately, these two servers cannot communicate with each other. Nor do they have access to any common network-mounted storage. Bummer. I do have a jumpbox from which I can SSH to either…Read More
Raising Dead Services
I suppose you may say all of this can be just as easily be done via systemd service config files. Well, yes and no. Yes, it can be done. And, no, not as easily. Not even close. Because systemd sucks by design. But this is a subject for another post.…Read More
Working with ffmpeg on Multi-Core Systems
While ffmpeg has multithreading capability, getting the best performance on multi-core systems calls for something more than just playing with the -threads option.
IMDb Movie Title Parser in Bash
This is an update to the IMDb parser I wrote years back. From time to time IMDb makes small changes to their setup that break my script. This time they decided to start blocking curl, or so it would seem. Even using a fake user-agent string doesn't help. But wget…Read More
Sending Windows Logs to Remote Syslog
Nothing fancy here: just a quick note on directing Windows event logs and select application logs to a remote syslog server.
Plugging iPhone’s Privacy Holes
Many recent publications [efn_note]Gallagher, Sean, and Utc. “Dozens of IOS Apps Surreptitiously Share User Location Data with Tracking Firms.” Ars Technica, 10 Sept. 2018, arstechnica.com/information-technology/2018/09/dozens-of-ios-apps-surreptitiously-share-user-location-data-with-tracking-firms/. [/efn_note], [efn_note]Stern, Joanna. “iPhone Privacy Is Broken...and Apps Are to Blame.” The Wall Street Journal, Dow Jones & Company, 31 May 2019, www.wsj.com/articles/iphone-privacy-is-brokenand-apps-are-to-blame-11559316401. [/efn_note], [efn_note]Fowler,…Read More
Managing Mapped Network Drives in Windows
Windows, that epitome of operating system excellence, just loves hammering away at mapped network drives whenever it sniffs even a whiff of network connectivity. Any network, mind you—right or wrong. Predictably, this stubborn attachment leads to performance hiccups and random hangs, all because Windows can't resist reaching out to drives…Read More
LLM Collapse Explained
Overview [audio mp3="https://www.igoroseledko.com/wp-content/uploads/2025/05/v6y03s0z22gigydnwnbqf41qadf.mp3"][/audio] Model collapse in large language models (LLMs) occurs when models repeatedly train on their synthetic outputs, gradually reducing the diversity, accuracy, and alignment of generated content compared to original human-produced data. Detecting and measuring this issue is crucial to maintaining the quality of these models and avoiding…Read More
Squeezing Video Files
All that crap I've been saving from YouTube, Facebook and whatnot tends to add up. As quality is not a huge concern here (not that it was very high to begin with), optimizing those video files can recover a surprisingly significant amount of disk space. If you have CPU cycles…Read More
Finding Passwords in Logs and Shell History
Sooner or later it will happen: you type something after which you expect a password prompt then, as a reflex, you type the password. However, you fat-fingered the first command, and your password ended up in clear text in your shell history, likely in the system log, and who knows…Read More
Controlling Your Laptop’s Fan Noise
Does your laptop sound like a fully-loaded B-52 bomber going for a takeoff? I have a Dell XPS-15. These generally well-regarded machines are also known for making excessive cooling fan noise even when not under load.
Anatomy of Internet Bullshit
Here's an oldie from two years ago that reared its ugly head on Pocket: Starting Your Day on the Internet Is Damaging Your Brain, by Srinivas Rao. The author presents his personal opinion that reading stuff online in the morning is damaging your brain. Supporting evidence? Sure: a bunch of…Read More
Late Night Rant: College Admissions Scandal
This is America: you're either a duper or a dupee. I'm a duper. You guys are the dupees. — Frank Reynolds (Danny DeVito), It's Always Sunny in Philadelphia How will the 2019 college admissions scandal work out? Likely to the best interest of most everyone directly involved. Individuals already charged…Read More
Adding and Removing sshd instances on CentOS 7
As a follow-up to my previous post about adding sshd instances on CentOS 5 & 6, here's a script that does the same on RHEL/CentOS 7.
Adding and Removing sshd instances on CentOS 6
This is a process and a couple of script to allow you to setup an additional sshd service on an alternate port.
Late Night Rant: Facebook
According to media reports, since 2012, millions of Facebook and Instagram logins and plaintext passwords have been sitting on some internal Facebook system, accessible by thousands of the company's employees.
Notes on ownCloud configuration
The ownCloud file sharing application has been around for some time now, but somehow evaded my attention. My limited imagination makes me say "think of it us Dropbox hosted on the server in your basement".
GPG Encryption QSG
It always seems that just enough time has passed since the last time I worked with GnuPG for me to forget not just the exact syntax of these commands completely but the workflow in general. Here are some basics about using GnuPG and managing keys. If you need to know…Read More
Encrypting Log Data During Log Rotation
Most log files do not contain personally-identifiable information or other sensitive data. And even if they do, encryption of all personal data is not mandatory under GDPR. Still, on occasion, for testing and troubleshooting purposes you may want to log potentially sensitive information. It would be a very good idea…Read More
DevOps Obfuscation
Some years ago I've been reading "DevOps in Straight English" by Magnus Hedemark [efn_note]“DevOps in Straight English - Part 1 of 2 - Enter the Buzzword.” RHD Blog, 20 Apr. 2018, developers.redhat.com/blog/2014/01/15/devops-in-straight-english-part-1-of-2/. [/efn_note] and encountered the Release Frequency vs. Risk chart that supposedly illustrated the advantages of DevOps. It seemed convincing…Read More
The Unix Oriental
Placed quite appropriately in the "Security" category - my favorite Oriental cocktail recipe. Distinguishing it from the classic preparation, are absence of sweet vermouth and lime juice, as well as addition of just a couple of humble but crucial ingredients.