Deprecation warning screenshot

Ubuntu - Key is stored in legacy trusted.gpg keyring...

Learn how to resolve the “Key is stored in legacy trusted.gpg keyring” warning on Ubuntu 22.04 by properly managing GPG keys for repositories.

2022-10-21 · 3 min · timor
Devoxx 2022

Back on the big stage!

Announcing my return to the big stage with a talk on managing Docker base images at scale, presented at the Devoxx 2022 conference in Kraków.

2022-06-13 · 1 min · timor
[Photo by Markus Winkler from Pexels](https://www.pexels.com/photo/wood-dirty-rope-door-3828944/)

Creating fully encrypted ZFS pool

Learn how to create a fully encrypted ZFS pool on Linux, including steps for generating encryption keys and configuring ZFS for secure data storage.

2021-11-22 · 5 min · timor
My own photo of my drives

Shucking WD Elements 14TB

Learn how to shuck WD Elements 14TB drives for use in a RAID setup, including stress testing and performance considerations for ZFS.

2021-11-12 · 8 min · timor
[Photo by Christina Morillo from Pexels](https://www.pexels.com/photo/eyeglasses-in-front-of-laptop-computer-1181253/)

Automatically add ticket ID to every commit message in Git

Learn how to automatically add ticket IDs to every commit message in Git, ensuring consistent and informative commit history by using custom Git aliases.

2021-11-09 · 2 min · timor
Photo of my mainboad from asus.com website

Asus ROG STRIX Z590-E GAMING WIFI - my UEFI BIOS settings

Learn about the optimal UEFI BIOS settings for the Asus ROG STRIX Z590-E GAMING WIFI motherboard, including configurations for RAM, power management, virtualization, and more.

2021-10-30 · 2 min · timor
Just a nice shot of woman's eye as example picture with EXIF data removed

How to remove geo-localization/EXIF data from photos

Learn how to remove geo-localization and EXIF data from photos using ImageMagick on Linux, ensuring privacy before sharing images publicly.

2021-03-05 · 1 min · timor
[Photo by Paul IJsendoorn from Pexels](https://www.pexels.com/photo/antelope-canyon-33041/)

Moving from Linux to MacOS – first steps

Learn about the initial steps and adjustments needed when transitioning from a Linux desktop to MacOS for business purposes, including tips on keyboard shortcuts, application compatibility, and system settings.

2020-01-04 · 8 min · timor
[Photo by Tima Miroshnichenko](https://www.pexels.com/photo/close-up-view-of-system-hacking-in-a-monitor-5380664/)

Debuging commands running on memcached

I had strange statistics on one memcached servers. I had to look what it’s doing there. I found such commands1 that may be used to sniff, extract and make statistics from running memcached server. Debug GET commands Show only GET commands sent to memcached tcpflow -c dst port 11211 | cut -b46- | grep ^get cut command will remove 46 bytes at beginning of every string (src, dst, port). You may need to adjust numeric parameter for cut to leave commands only. Output should look like: ...

2016-07-13 · 2 min · timor
[Photo by Tima Miroshnichenko](https://www.pexels.com/photo/close-up-view-of-system-hacking-in-a-monitor-5380664/)

How to stole ssh session when you’re root

It happen to me all the time that one of developers notifies me about some kind of problem that I can’t confirm from my account. Sometimes it was because of bad ssh keys configuration, other times file permissions, mostly such stuff. It’s sometimes convenient to “enter into someone’s shoes” to see what’s going on there. If you’re root on machine you may do that like this: Switch to developer user su developer - Easy one but that’s not enough for all cases. When you use bastion host (or similar solutions) sometimes users have connection problems and it’s harder to check. When such user have ForwardAgent ssh option enabled you may stole this session to check login problems. ...

2016-04-27 · 2 min · timor