Welcome
A space to share my learnings.
My blog posts
Azure App Service Plan vs Function App Containers – Clearing the Confusion
While working with Azure Function Apps (Python in particular), a recurring point of confusion was understanding how App Service Plans relate to containers. Here’s a quick rundown based on actual experience.
Disable Bing Search in Windows 10 Start Menu
If you’re tired of web results cluttering your Start Menu search, here’s how to completely disable Bing integration on Windows 10.
10 Splunk Search Tips So Fast Your License Will Thank You
Speed up your searches, cut noise, and stay lean. Here’s how:
CI vs CD in GitHub Actions
TL;DR: CI runs first (build, test, lint). If it passes, CD runs to deploy the code.
Created First Ever Windows Executable Software in 2 Hours
For years, I used PDFsam on Windows to split or merge PDF files. It was a no-nonsense, solid tool. I discovered it long ago when looking for a free utility to extract or add pages from PDFs. Back then, PDFsam was simple freeware. I still have version 2.2.2, while the latest is 6.0.2. Unfortunately, when I tried running my old version on my current laptop, it required a Java Virtual Environment installation first. My current laptop didn’t have it installed, and I didn’t feel like jumping through hoops.
Prompting Isn't New, It's the Next Step: The Evolution of How We Talk to Machines
The buzz around AI and Large Language Models (LLMs) often paints a picture of revolution. But is it really a complete break from the past? When we look at the history of software development, a different picture emerges: the rise of LLMs and prompt engineering feels less like a revolution and more like the next logical step in a long journey.
Researching OAuth
OAuth (Open Authorization) is an authorization protocol, rather than an authentication protocol. It enables websites or applications (Consumers) to access Protected Resources from a web service (Service Provider) via an API, without requiring Users to disclose their Service Provider credentials to the Consumers.
Getting Ready for Jekyll Minima Theme on GitHub Pages
I had to recreate my development environment again, so I decided to document the initial setup steps this time for future reference. The starting point is the official Jekyll documentation: Jekyll Docs, but it assumes that Ruby and the
gem
package manager are already installed. Instead of installing packages directly on my machine, I opted to use a Docker container as the development environment.Firewall Management with firewalld
Firewall Management with firewalld
Git Resources
Over time, I’ve compiled a list of useful Git resources that have helped me understand and use Git effectively. This post serves as a reference for myself and others looking for guidance on Git commands, branching, merging, and more. If you’re interested in a practical collection of Git commands for everyday use, check out my Git Commands post, where I’ve listed essential commands and their use cases.
Git Commands
This blog post serves as a personal reference for useful Git commands and related resources. Git is an essential tool for version control and collaboration. Below you’ll find commands grouped by their functionality. If you’re looking for additional learning materials and references, check out my Git Resources post, where I’ve compiled a list of articles and guides that have helped me understand Git better.
Azure Private Link notes
Notes and thoughts whilst reading Azure Private Link and DNS.
Disable IPv6 on Debian
When running lab vm the IPv6 is not needed. It is good to keep things simple.
Check Point learning
Few terminologies from Check Point slides:
Stateful patent by Check Point
Article written on March 17, 1997.
Android on Linx tablet
Weblinx used to find the instructions to install Android on Linx 10 tablet:
High Throughput Ethernet ASICs by Justin Pietsch
My Raspberry’s chip size: 10x10 mm
SNMP v3 on F5 BIG-IP
A post to document and share the commands required to configure the SNMP agent on an F5 device.
F5 TMOS book study. Chapter 16 review
The answers for the Chapter 16 review:
Raspberry Pi Web Server Setup
Setting up an Apache Web Server on a Raspberry Pi
Journal: Exploring Firewalls and SSL Certificates
Looking at Let’s Encrypt SSL certificate options:
Firewall Options for Home Office
To meet Security Essentials certification requirements, a firewall is necessary. Below are useful resources I found while researching home office firewall solutions.
Bluecoat Training
Requirements
CBT CentOS Training
telinit <run-level>
0
- halt1
- single user (to reset the password)6
- reboot
- Root prompt is
#
, user prompt is$
- Common commands:
whoami
apropos
tar
(tape archive:-cvf
for create,-xvf
for extract)
- File manipulation:
- Working with text
- Soft links, hard links,
.
,..
- Monitoring system performance:
top
: Use>
to switch from highest CPU usage to highest RAM usage; watch forwa
(wait time)iotop
: Check for disk swap and I/O usage when wait time is high
- Process management:
pkill
: Finds and kills processes by pattern (e.g.,pkill fox
for Firefox)- Safer alternative: Use
pgrep
first to list processes before runningpkill
- Process priority:
- “Santa Claus has a really big nice level, but he runs slowly” (nice levels affect priority)
su
stands for substitute user, not superuser
F5 101 - Lessons while watching Keith on CTP Nuggets
- Have the habit of creating always a custom profile. Don’t use the default profiles. One benefit is that it will force you to look at the profile settings (a profile is a collection of settings). For example, opening the OneConnect profile will show what the limits are imposed in terms of connections and timeouts.
Crypto by Steven Levy
Notes from Crypto by Steven Levy
Red Hat training for Linux basics
I’ve just learned that the
usr
directory on Linux/UNIX systems stands for UNIX System Resources. I always assumed thatusr
was an abbreviation for ‘user’. Another lesson here: never assume.Post 2 - books
books read
subscribe via RSS