Posts
All the articles I've posted.
-
Disabling Discord’s Activity Tracking
Discord tracks what you're running. Here's how to turn off activity status, game detection, and telemetry so your app habits stay private.
6 min read -
Optimize Ubuntu Logs: btmp Log Rotation
btmp logs failed logins and grows forever on internet-facing servers. Set up logrotate to keep it under control before your disk fills up.
11 min read -
Navigating the Storm: Analysis of Intel’s 13th and 14th Gen CPU Instability Issues
Intel 13th and 14th gen CPUs have a documented instability problem. Here's what's happening, who's affected, and what Intel is doing about it.
13 min read -
Ansible: Task and Role Inclusions for Efficient Automation
Stop copy-pasting Ansible tasks across playbooks — use include_tasks, import_tasks, and roles to keep your automation DRY and maintainable.
6 min read -
Preserving Bash History in Multiple Terminal Windows
By default bash history is lost across multiple terminal sessions. Fix it with HISTAPPEND and PROMPT_COMMAND so nothing gets overwritten.
3 min read -
Finding the PID of a Process Using a Specific Port in Linux
Something's squatting on port 8080 and you need to know what. ss, lsof, and fuser one-liners to find and kill the culprit fast.
3 min read -
Differences Between nohup, disown, and & in Linux
nohup, disown, and & all keep processes running after logout — but they work differently. Here's which one to reach for and why.
3 min read -
the lost+found Directory in Linux
What is lost+found and why does it exist? fsck puts recovered file fragments there after a crash — and no, you can't delete it.
3 min read -
Understanding printf vs echo in Bash
echo is convenient but inconsistent across systems; printf is portable and precise — know when to use each and avoid the gotchas.
3 min read -
Understanding Grep: A Comprehensive Guide
grep is more powerful than you think — regex patterns, context flags, recursive search, and piping tricks that save hours of log digging.
10 min read -
The Role of Antivirus and Endpoint Detection and Response Systems
AV vs EDR — traditional antivirus signatures vs behavioral endpoint detection. What each catches, what it misses, and what you actually need.
4 min read -
Key Parameters of Large Language Models
Temperature, top-p, top-k, context length — LLM inference parameters explained so you stop guessing why the model gives weird output.
4 min read