Skip to content
- RDP - Intro Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server. RDP allows network administrators to remotely diagnose and resolve problems individual subscribers encounter. RDP is available for most versions of the Windows, MacOS or as an open source. Noteworthy properties of RDP include encryption, smart card authentication, bandwidth reduction, resource sharing, the ability to use multiple displays and the ability… … Continue reading "RDP"
- MS Word Regex - MS Office has a handy Word regex search and replace. Below are listed most common regex options Basic Regex used in Word ? and * The two most basic wildcards are ? and *. They are essentially similar in use.? is used to represent a single character and * represents any number of characters. On their own, these have limited use.s?t will find sat, set,sit ,sot and any other combination of three characters beginning with 's' and ending with 't'. It will also find that combination of letters with a word, thus it… … Continue reading "MS Word Regex"
- Notepad++ - INTRO - Why NPP Notepad++ is the most popular text/source code editor. It features syntax highlighting, code folding and limited autocompletion for programming, scripting, and markup languages, but not intelligent code completion or syntax checking. We love its speed and power, but it's even better once you dig a little deeper. Macros One of the killer features for Notepad++ is the ability to automate those trivial things we have to write on a daily basis. To do this with macros, simply click… … Continue reading "Notepad++"
- SSH logins and keypairs - Secure Shell (SSH) is a UNIX-based command interface and protocol for securely getting access to a remote computer. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and secure in several ways. Both ends of the client/server connection are authenticated using a digital certificate, and passwords are protected by being encrypted.SSH allows you to connect to your server… … Continue reading "SSH logins and keypairs"
- Mega - Mega.nz is a Secure Cloud Storage and Communication. Privacy by Design. Create a MEGA account to get 50 GB FREE storage (reduced to 15GB in 30 days) Reliable Storage and Fast Transfers End-to-End EncryptionSecure CommunicationThe Secure Solution for Your Business Personal Account From 4.99 € / monthBusiness Account From 10.00 € / user / month (min of 3 users)Open SourceFile VersioningFile backupExtensions (FF/Chrome)MEGAdropMEGAbirdMEGAcmd - Commandline, Scriptable, Autobackup, WebDav, FTP MEGAcmd - Command Line Interactive and Scriptable Application - https://github.com/meganz/MEGAcmd/MEGAcmd User… … Continue reading "Mega"
- AWS basics - Intro A great calculator for the services used can be found at https://calculator.s3.amazonaws.com/index.htmlAmazon is most famous with the virtual server it provides (EC2). However many more managed services are provided on top of it Servers Aws virtual servers are called instances - EC2. Computing unit EC2 needs storage utilized by EBS volumes. EBS volumes also come with snapshot capabilities. An EBS snapshot is a point-in-time copy of an EBS volume, meaning that it stores the exact image of an EBS… … Continue reading "AWS basics"
- Ten Commandmends - The Ten Commandments of IT Slackerism 1. Stupidity is not the same as the lack of intelligence... It's an independent dimension, quality of its own. It's unwitting self-destruction, the ability to act against one's best interests, social blindness... It's a a typical quality of gifted programmers/system administrators and you need to cultivate skepticism and your sense of humor in order to fight this disease before it destroys you... 2·There is a very fine line between software development as job, as… … Continue reading "Ten Commandmends"
- Passwords - Intro Passwords are critical to your safety. Take whatever it costs to manage them well! IDEAS Despite all their weaknesses, it looks as if passwords will stay for the foreseeable future. These are couple of steps people can take to strengthen their passwords so that it is less likely hackers can break into their accounts. Perhaps the most important step is to not re-use the same password across different websites.It is convenient only having one password, but this means that… … Continue reading "Passwords"
- O’Reilly fun - … Continue reading "O’Reilly fun"
- RegEx - Intro Regular expressions are a language of their own. When you learn a new programming language, they're this little sub-language that makes no sense at first glance. Many times you have to read another tutorial, article, or book just to understand the "simple" pattern described. Today, we'll review eight regular expressions that you should know for your next coding project. Regular Expressions aka Regex are expressions that define a search pattern. They are widely used for validation purposes, like email… … Continue reading "RegEx"