127 private links
There is often the desire to start "standard" or pre-configured workspaces in tmux
.
For example, run tail
on two log files in a pane, or to start both vim
and mysql
in a pane, etc.
If you try to find information about starting tmux
workspaces, you typically get advised to use wrapper programs such as tmuxinator
, tmux-resurrect
, or tmux-continuum
. These programs may be great, but the article proposes a simpler approach.
I personally like this approach.
In a world of evolving and targeted cyber threats understanding your attacker’s intentions and tools has never been more crucial. By deliberately maintaining vulnerable systems, or Honey Pots, and letting the attackers in you can analyse their activity and gather intelligence so you can be ahead of the game if you ever have a compromise. When running an SSH Honey Pot you can gain a full log of the commands an attacker attempts to run on your system and any files which they attempt to download and can be a great way to obtain samples of malicious software for analysis or understand the techniques used by an attacker to scour your data.
This article, explains different ways of preventing Git from repeatedly prompting for username and password when interacting with a remote repository over HTTP(S).
How to combine data spread over two CSV files, like separate tables in a normalized relational database.
exa is a replacement for the venerable ls command. exa sports more features and arguably better defaults. Free and open source software.
Learn how to use TF-IDF and scikit-learn to extract important keywords from documents. This is a full working example using the Stack Overflow dataset.
Learn how to use the k-means clustering algorithm to segment data.
Git Essentials Crash Course - Introduction This is not Java but several newbie developers ask the same question, how to use GIT and how does GIT works so here it goes...
Bayes Theorem provides a principled way for calculating a conditional probability. It is a deceptively simple calculation, although it can be used to easily calculate the conditional probability of events where intuition often fails. Bayes Theorem also provides a way for thinking about the evaluation and selection of different models for a given dataset in …
Finally, after many people have asked for it: here is part two of the mutt-series: this time we talk about actually using and configuring mutt, and some other smaller tools needed for a nice email-workflow.
The link to part one is reported in the beginning of the article.
In order to use a GnuPG key on a smartcard or Yubikey, a GnuPG key needs to be created. This post will show you how to create a GnuPG key with sub-keys for signing, encryption and authentication. The authentication key can be used later on to authenticate via ssh as well.
peco is a CLI utility that filters text interactively. The tool is written in the Go programming language. It's free and open source software.
A simple walkthrough of what RNNs are, how they work, and how to build one from scratch in Python.
Say you have an external hard drive with layers upon layers of cryptically named folders and intricate mazes of directories (like here, or here). How can you make sense of this mess? Python offers various tools in the Python standard library to deal with your file system and the folderstats module can be of additional help to gain insights into your file system.
In this article, you will learn the various ways to traverse and explore the file system with Python. In the next section, you will see how to extract statistics from files and directories. In the last section, you will see a practical way to analyze folder structures with folderstats and Pandas with some use cases and visualizations along the way.
Learn what Amazon Web Services (AWS) Lambda is, and why it might be a good idea to use for your next project.
In order to show how useful Lambda can be, it’ll walk through creating a simple Lambda function using the Python programming language. It’ll test it out, as well as take a look at what Lambda provides for metrics and logging.
Awk is a very nice language with a very strange name. In this first article of a three-part series, Daniel Robbins will quickly get your awk programming skills up to speed. As the series progresses, more advanced topics will be covered, culminating with an advanced real-world awk application demo.
This article will give a brief introduction to SSMTP and steps to install it and use the same to send emails from Linux terminal.
Moving your filesystem to USB is a great way to improve reliability, speed and storage space on your Raspberry Pi. If you’re running something that is writing a lot of data constantly then having your filesystem on USB is safer because it’s less likely to get corrupted or stop working with a high amount of write cycles.
This tutorial is using a USB stick which doesn’t require any additional external power, if you want to use a larger USB hdd you will have to also get a powered USB hub because you’re Raspberry Pi doesn’t have enough juice to power it.
I’m using Raspbian for my operating system and I’ll assume you know how to install and configure that yourself.
Read the full article ...