Tech

Synchronizing between devices

Synchronizing data, files between devices should not be a pain. IN the past I used to do it via rsync, sshfs and other shenanigans

1 Minutes Feb 6, 2025 LastMod: Feb 6, 2025 142 Words

Convert images using the commandline (WEBP)

The smaller an image is, the more disk space and bandwidth it can save. You can easily convert images to a more efficient form with the command line by using open source tools.

2 Minutes Jan 23, 2025 LastMod: Jan 23, 2025 258 Words

Best Blogging software

The majority of people use mainstream social media to share content. On the other spectrum we have technical people on the indieweb and the old web who self host their own servers/apps. Most of us became developers due to the fact that we didn;t have the easy drag and drop systems of today. But this also means that the current systems fail to produce adequate developers.

3 Minutes Jan 21, 2025 LastMod: Jan 21, 2025 487 Words

GoBlog and using MY website as the center of digital existence

I’ve relaunched my website with GoBlog . Saying 👋🏻hello to all GoBlog users out there!

2 Minutes Jan 15, 2025 LastMod: Jan 15, 2025 422 Words

The Botnet

A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation

3 Minutes Jan 6, 2025 LastMod: Jan 6, 2025 498 Words

The Botnet

A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation

3 Minutes Jan 6, 2025 LastMod: Jan 6, 2025 498 Words

Block Crawler Bots

NOTE: This is still work in progress {class=“notification is-info is-light”}

2 Minutes Jan 3, 2025 LastMod: Jan 3, 2025 311 Words
Subscribe to my Newsletter

Receive emails about Linux, Programming, Automation, Life tips & Tricks and information about projects I'm working on