There are many articles and tutorials out there on how to configure SSH to use public key authentication. I wanted to share my findings on the subject and identify some interesting connections I made when...
Continue reading...jim
Linux — SquidProxy Network Adblocking using Squid1.4
I originally discovered Adblock Plus when I first downloaded Firefox many years ago. Since then I’ve installed the Adblock plugin right after Firefox, etc. It’s become so standard that I almost think Firefox should just...
Continue reading...Linux — ASCII Art in Terminal Sessions
I was wondering today…I used to see this screenshot of a ASCII cow in a terminal that was giving some sort of advice or fortune. After a little googling I found the application fortune which...
Continue reading...F5 BIGIP — iRules….What are they?
What is an iRule? What are iRules? What can I do with iRules? What is an iRule example? One of the most advantageous features that an BIG IP F5 Local Traffic Manager brings is it’s...
Continue reading...What is BIGIP F5 (LTM and GTM)?
I’ve worked with BIGIP F5 hardware for over two years now, and have become quite familiar with the great features it provides. For those who are unfamiliar with BIGIP F5 hardware, it is network hardware...
Continue reading...Linux — Encrypt files with CCrypt, AxCrypt, and OpenSSL
Are you someone who keeps a text file on their Desktop with all there passwords in it? Do you write you account information and passwords on a sticky-note? I sure hope not! But if you...
Continue reading...