Welcome

A space to share my learnings.

My blog posts

  • Azure App Service Plan vs Function App Containers – Clearing the Confusion

    While working with Azure Function Apps (Python in particular), a recurring point of confusion was understanding how App Service Plans relate to containers. Here’s a quick rundown based on actual experience.

  • Disable Bing Search in Windows 10 Start Menu

    If you’re tired of web results cluttering your Start Menu search, here’s how to completely disable Bing integration on Windows 10.

  • 10 Splunk Search Tips So Fast Your License Will Thank You

    Speed up your searches, cut noise, and stay lean. Here’s how:

  • CI vs CD in GitHub Actions

    TL;DR: CI runs first (build, test, lint). If it passes, CD runs to deploy the code.

  • Created First Ever Windows Executable Software in 2 Hours

    For years, I used PDFsam on Windows to split or merge PDF files. It was a no-nonsense, solid tool. I discovered it long ago when looking for a free utility to extract or add pages from PDFs. Back then, PDFsam was simple freeware. I still have version 2.2.2, while the latest is 6.0.2. Unfortunately, when I tried running my old version on my current laptop, it required a Java Virtual Environment installation first. My current laptop didn’t have it installed, and I didn’t feel like jumping through hoops.

  • Prompting Isn't New, It's the Next Step: The Evolution of How We Talk to Machines

    The buzz around AI and Large Language Models (LLMs) often paints a picture of revolution. But is it really a complete break from the past? When we look at the history of software development, a different picture emerges: the rise of LLMs and prompt engineering feels less like a revolution and more like the next logical step in a long journey.

  • Researching OAuth

    OAuth (Open Authorization) is an authorization protocol, rather than an authentication protocol. It enables websites or applications (Consumers) to access Protected Resources from a web service (Service Provider) via an API, without requiring Users to disclose their Service Provider credentials to the Consumers.

  • Getting Ready for Jekyll Minima Theme on GitHub Pages

    I had to recreate my development environment again, so I decided to document the initial setup steps this time for future reference. The starting point is the official Jekyll documentation: Jekyll Docs, but it assumes that Ruby and the gem package manager are already installed. Instead of installing packages directly on my machine, I opted to use a Docker container as the development environment.

  • Firewall Management with firewalld

    Firewall Management with firewalld

  • Git Resources

    Over time, I’ve compiled a list of useful Git resources that have helped me understand and use Git effectively. This post serves as a reference for myself and others looking for guidance on Git commands, branching, merging, and more. If you’re interested in a practical collection of Git commands for everyday use, check out my Git Commands post, where I’ve listed essential commands and their use cases.

  • Git Commands

    This blog post serves as a personal reference for useful Git commands and related resources. Git is an essential tool for version control and collaboration. Below you’ll find commands grouped by their functionality. If you’re looking for additional learning materials and references, check out my Git Resources post, where I’ve compiled a list of articles and guides that have helped me understand Git better.

  • Azure Private Link notes

    Notes and thoughts whilst reading Azure Private Link and DNS.

  • Disable IPv6 on Debian

    When running lab vm the IPv6 is not needed. It is good to keep things simple.

  • Check Point learning

    Few terminologies from Check Point slides:

  • Stateful patent by Check Point

    Article written on March 17, 1997.

  • Android on Linx tablet

    Weblinx used to find the instructions to install Android on Linx 10 tablet:

  • High Throughput Ethernet ASICs by Justin Pietsch

    My Raspberry's chip size: 10x10 mm My Raspberry’s chip size: 10x10 mm

  • SNMP v3 on F5 BIG-IP

    A post to document and share the commands required to configure the SNMP agent on an F5 device.

  • F5 TMOS book study. Chapter 16 review

    The answers for the Chapter 16 review:

  • Raspberry Pi Web Server Setup

    Setting up an Apache Web Server on a Raspberry Pi

  • Journal: Exploring Firewalls and SSL Certificates

    Looking at Let’s Encrypt SSL certificate options:

  • Firewall Options for Home Office

    To meet Security Essentials certification requirements, a firewall is necessary. Below are useful resources I found while researching home office firewall solutions.

  • Bluecoat Training

    Requirements

  • CBT CentOS Training

    • telinit <run-level>
      • 0 - halt
      • 1 - single user (to reset the password)
      • 6 - reboot
    • Root prompt is #, user prompt is $
    • Common commands:
      • whoami
      • apropos
      • tar (tape archive: -cvf for create, -xvf for extract)
    • File manipulation:
      • Working with text
      • Soft links, hard links, ., ..
    • Monitoring system performance:
      • top: Use > to switch from highest CPU usage to highest RAM usage; watch for wa (wait time)
      • iotop: Check for disk swap and I/O usage when wait time is high
    • Process management:
      • pkill: Finds and kills processes by pattern (e.g., pkill fox for Firefox)
      • Safer alternative: Use pgrep first to list processes before running pkill
    • Process priority:
      • “Santa Claus has a really big nice level, but he runs slowly” (nice levels affect priority)
    • su stands for substitute user, not superuser
  • F5 101 - Lessons while watching Keith on CTP Nuggets

    • Have the habit of creating always a custom profile. Don’t use the default profiles. One benefit is that it will force you to look at the profile settings (a profile is a collection of settings). For example, opening the OneConnect profile will show what the limits are imposed in terms of connections and timeouts.
  • Crypto by Steven Levy

    Notes from Crypto by Steven Levy

  • Red Hat training for Linux basics

    I’ve just learned that the usr directory on Linux/UNIX systems stands for UNIX System Resources. I always assumed that usr was an abbreviation for ‘user’. Another lesson here: never assume.

  • Post 2 - books

    books read

subscribe via RSS