In this post we are going to see the basics of a macOS app through the creation of a simple, but at the same time useful for many developers app: A font viewer that will let us choose font families and it will be displaying the PostScript names of the available fonts.
tutorial mac programming swiftWe are going to use a productivity hack called Touch-It-Once. This means that once you open a conversation you decide right away what to do with it. Donât postpone and come back to it. You touch it once and move on to the next thing.
mail productivityWhen an instance grows to be very large, and its folder structure has many levels, the generation of this weather column can cost a lot of system resources slowing down other processes. If an instance is impacted by the performance of the Weather Column, a solution is to remove the folder health metrics of all existing folders. The only caveat of such a change is that the weather column will always report Folders as Healthy.
sysadmin jenkinsNope, not another Falsehoods post, but not entirely unlike one. Only here we have a few lessons in operations that we all (eventually) (have to) learn; often the hard way. Why things are the way they are, or what the lessons mean is left to the reader to interpret, agree, or disagree with. It's more fun that way. Enjoy!
devops funny itIn Bash, there are two closely related âspecial parametersâ for accessing how the current script was invoked: $*
and $@
. For both variables, the behavior is affected by whether or not the variable is enclosed in double quotes. The following table summarizes all cases:
Form Meaning
$* $1 $2 $3...
$@ $1 $2 $3...
"$*" "$1 $2 $3..."
"$@" "$1" "$2" "$3"...
bash
When a Composite Configuration is created as an ordinary module, it seems like it behaves like an ordinary Cmdlet. This means, to pass parameters to the composite configuration I had to do:
Node localhost
{
BaseConfig Common -MyParameter "My Parameter Value" {}
}
powershell
dsc
Bash-my-AWS is a simple but extremely powerful set of CLI commands for managing resources on Amazon Web Services.
bash awsAs the word signifies, âreduplicationâ in linguistics is when you repeat a word, sometimes with a modified vowel (e.g., ding dang dong) or sometimes with an altered consonant (e.g., nitty-gritty). As such, if there are two words, then the first word contains I, and the next word contains either A or O (e.g., âmish mashâ, âhip hopâ, âchit chatâ etc.).
However, if there are three words in question, then the first word contains I, the next contains A and the last word contains O (e.g., bish bash bosh). It doesnât have anything definite about it, but it somehow just sounds right.
reading interestingAdjectives, writes the author, professional stickler Mark Forsyth, âabsolutely have to be in this order: opinion-size-age-shape-colour-origin-material-purpose Noun. So you can have a lovely little old rectangular green French silver whittling knife. But if you mess with that order in the slightest youâll sound like a maniac.â
reading interestingLingon lets you run things automatically by modifying configuration files for the system function called launchd. This means that you can also edit or remove jobs created by other apps. And the system handles running the jobs in the background so you donât need to have Lingon open after you have saved your job.
apps macSupermicro IPMI / BMC tools.
supermicro download toolsWe are very familiar with running CLI processes in Docker containers with no Graphical UI at all. But did you know that you can just as well run applications with a graphical user interfaces, like Chrome, Firefox, Tor Browser, Gimp, etc⌠with Docker⌠on OS X!
tutorial dockerPKI is really powerful, and really interesting. The math is complicated, and the standards are stupidly baroque, but the core concepts are actually quite simple. Certificates are the best way to identify code and devices, and identity is super useful for security, monitoring, metrics, and a million other things. Using certificates is not that hard. No harder than learning a new language or database. Itâs just slightly annoying and poorly documented. This is the missing manual.
certificates encryption security read laterApple computers ship with a pre-installed suite of hardware diagnostic tools, known as Apple Hardware Test (AHT). In principle you can start them by holding the d
key while booting. Newer models support holding option d
to load AHT over the internet. If however, you reinstalled an older computer from scratch, the diagnostic tools might no longer be available. Unless you have the original disks that came with your computer, there seems to be no way to restore the AHT. Apple provides disk images with AHT for most computers, but does not make the links publicly available. Various blogs and forums have gathered a list of download links. The rest were obtained by scraping http://download.info.apple.com/Apple_Hardware_Test/
for all the links of the form 0(18|22)-\d{4}-A.dmg
.
The YubiKey Minidriver is designed to function in a Windows Server and Client environment configured for smart card authentication. Ensuring your deployment is set up properly is a crucial element of the initial planning for the YubiKey Minidriver deployment.
security windows active directory 2fa yubikeyOption 5: Download and install the cumulative update to a running Nano Server: If you have a running Nano Server VM or physical host, you can use the Windows Update WMI provider to download and install the update while the operating system is online. With this method, you don't need to download the .msu
file separately from the Microsoft Update Catalog. The WMI provider will detect, download, and install all available updates at once. After installing an update from Windows Update, you can find the log files at %ProgramData%\SoftwareDistribution\Logs\WindowsUpdate
.
Over the years my command line habits have improved and I often search for smarter tools for the jobs I commonly do. With that said, here's my current list of improved CLI tools.
commandline toolsRecently, I am learning how Elliptic Curve Cryptography works. I searched around the internet, found so many articles and videos explaining it. Most of them are covering only a portion of it, some of them skip many critical steps how you get from here to there. In the end, I didnât find an article that really explains it from end-to-end in an intuitive way. With that in mind, I would like to write a post explaining Elliptic Curve Cryptography, cover from the basics to key exchange, encryption, and decryption.
encryption security read later