Simple two-step shortcut for DuckDuckGo bang searches direct from iOS home screen.
Simple two-step shortcut for @DuckDuckGo bang searches direct from iOS home screen ⬇️https://t.co/is4GpE8Pvq pic.twitter.com/ptmgOpuU9U
— Code with Kristian 🚀 (@codewthkristian) January 21, 2022
Installing the right Obsidian plugins.
A full year before I switched to Obsidian, I tried it out and didn't like it.
The UI was so plain. There weren't enough keyboard shortcuts. It was really difficult to get anything organized.
Turns out I just hadn't installed the right plugins!#ship30for30 21/30 pic.twitter.com/CB3R8BYGmg
— Nicole van der Hoeven (@n_vanderhoeven) January 29, 2022
How to Mind Map Any Meeting in 5 Steps – Notability Tutorial: Meetings can be chaotic, fluid and nonlinear. It’s no wonder that typing bullet points sometimes just can’t keep up.
Unpopular opinion – Obsidian is an excellent Task Manager ( + my setup ): They avoided Obsidian for a long while because they always heard it wasn’t a good task/project manager. Coming from Notion it was an AIO system or bust for them.
Unpopular opinion: Obsidian is an excellent Task Manager ( + my setup ) from ObsidianMD
nader shares web3 grants programs: “This is a great way to learn & get your foot in the door with web3 without making it your full time job.”
You earn between $1,000 to ~$500,000 by participating in web3 grants programs.
This is a great way to learn & get your foot in the door with web3 without making it your full time job.
Also, you don't have to be a developer! ✨
Here are 20 projects with great grant programs:
— nader dabit (🧱, 🚀) | sha.eth | nader.sol (@dabit3) February 1, 2022
Is TypeScript Faster than Go? A server comparison: This is a condensed version of what they did on stream to create a go vs typescript server and the learnings I had from it.
A DNS resolver in 80 lines of Go: In this post, Julia want to explain how DNS resolvers work in a different way – with a short Go program that does does the same thing described in the comic.
Scheduled Functions (Cron Jobs) With Netlify: Netlify just announced support for scheduled functions, which are basically serverless cron jobs. In this episode, Jason will explore the new functionality and see how it all works!
Developing the best free photo editor – Ivan KUCKIR – Web2day 2019.
Linux Upskill Challenge is an interactive, month-long course designed to teach the foundational Linux concepts. This free resource features daily lessons, support and discussion for anyone who would like to learn the skills needed to work with Linux. Details can be found here.
Powershell Masterclass is a series of fantastic educational videos offered by tech guru John Savill. This free masterclass includes tons of great material explained by a highly skilled instructor, who assures us you’ll find “zero adverts or breaks. Just lessons to help people learn.” Additional materials relative to the content can be found here.
Intune Training is a YouTube Channel loaded with videos explaining how to use Microsoft’s Intune service for mobile device and application management. The channel is hosted by Microsoft experts Steve Hosking, Adam Gross, Ben Reader and Jake Shackelford who generously offer their knowledge on how to get the most out of this service.
TheTips4You is an awesome resource for tutorials covering the basics of DevOps and how to deploy apps with automated CI CD pipeline, monitoring and more. Features videos on Docker, Kubernetes, Jenkins, Gitlab, Splunk, Grafana, Prometheus, Ansible, IoT & more—replicating how these tools can be used to deal with the challenges of a real-world production environment. This should help one “move from Admin to DevOps engineer.
The SysAdmin DOJO Podcast is a brand new, weekly exploration of tech topics. It aims to help you grow skills in everything from virtualization and automation to Microsoft365 and security… and lots more! Hosted by Altaro’s own system guru, Andy Syrewicze; it’s kicked off with an episode on PowerShell – why it’s important, how it helps and where to get started.
RunAsSpc is a portable tool that allows you to run an application as administrator from the user, passing along credentials (including password). Enables you to run the application as a different user or an admin from a standard account, with no need to install anything. Offers the following caveat, “website looks old but the software is solid.”
bootnext is a simple tray icon for Windows that enables you to quickly set the EFI BootNext variable.
BgInfo is a customizable tool for generating desktop backgrounds that keep useful, current system details at hand. Select whatever is most relevant to your situation, and avoid the hassle of ever having to look up that information again. The long list of display options includes things like OS version, IP address, network adapters and computer name.
Grist is an open-source alternative to Airtable and Google Sheets that combines the flexibility of a spreadsheet with the power of a database. Features customizable layouts, data linking and Python formulas. If you setup SSO logins, access control options can be granular, granting users access to individual rows, columns, and tables based on values in cells and user attributes, such as login email.
TcpLogView monitors all open TCP connections on a system, logging each new connection that is either opened or closed. It lists all of the TCP connections on a system (src/dest port/ip) and the process that initiated them, and then holds them in a buffer log.
Uptime Kuma is a fast, reactive, self-hosted monitoring tool along the lines of Uptime Robot. Monitors uptime for HTTP(s)/TCP/HTTP(s) Keyword/Ping/DNS Record/Push/Steam Game, with notifications available through over 70 different services. It can do pings, http requests, tcp requests, can do 2FA, and can have a public dashboard showing what is up. It also can do notifications when something goes down.
Using the Microsoft Threat Modeling Tool
We know how to approach threat modeling, so it’s time to look at a tool that we can use. For this example, I’m going to run through the free Microsoft Threat Modeling tool. By exploring the full capabilities of the free tool, you can build deeper threat models and understand how the adversary will approach any potential vulnerabilities in your software.
To get started on assessing the threats in your software, you only need a few basic things for this tutorial:
- A machine running Windows.
- The free Microsoft Threat Modeling Tool which you can download here.
- If you are running a test on an existing piece of software, a .tb7 file that contains a map of the application you want to review.
For the purposes of this tutorial, I am using Windows 10.
Using the Microsoft Threat Modeling Tool
This tool is designed to be easy to use but it still offers a wide range of customization options at the same time. Because of that, the simple user interface (UI) can be a little difficult to navigate on your first time.
A Beginner’s Guide to Visual Studio Code and Git provides an in-depth understanding of how to make the most of VS Code’s extensions, integrated terminal and other features. This hands-on tutorial helps you learn interactively via a Git repo.
10 basic Linux networking commands you should know about is a video tutorial from Linux Tech School that walks you through how to use some key commands for managing a network in Linux. You’ll learn how to use these commands to check networking interface configuration, test routes, see the routing and ARP tables, resolve domain names and monitor traffic.
19 Commands to Monitor the Network Activity in Linux is a nice article that explains precisely how to use key Linux commands to check network load, overall bandwidth usage, active connections, connection sockets and bandwidth usage by process.
Python for Network Engineers covers all the basics of Python, allowing beginners to master the fundamentals as well as providing an understanding of all the tools needed for practical application in managing a network. All concepts are explained in plain language and are readily applicable in the real world.
Making Servers Work is a book that teaches practical sysadmin skills, common architectures, and best practices that can be used to automate and run systems at any scale—whether a single computer or thousands. Provides a nice orientation and foundation for those who are early in their career as a sysadmin.
Awesome Cyber Security Newsletters is a nice list of relevant newsletters covering the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities and analysis of trending threats and attacks.
Boring AppSecurity focuses on the essential elements that make AppSec programs great. While not as exciting as the latest bug or tool, author Sandesh Mysore Anand finds this area undervalued while at the same time highly important. So here’s the place to learn about the boring—but critical—parts of AppSecurity you probably don’t hear too much about.
PCx3 is a blog on WordPress, SQL, VMware and Linux written from a hosting perspective. Author Stefan Pejčić draws on his expertise as virtualization architect, WordPress plugin developer and sysadmin to offer practical solutions that can save you time.
A Chrome workaround when faced with an error page
that the site is not accessible because chrome thinks it is unsafe… just type
thisisunsafe and it should let you in.
Secret sauce for HSTS errors: “chrome://net-internals/#hsts and type the URL you are trying to access in the field at the bottom, ‘Delete Domain Security Policies’ and press the Delete button, viola!”