| CARVIEW |

Convert Code Snippets to PNG
On occasion I find myself struggling posting code on discussion forums that don't handle code formatting all that well. What would've helped is some quick and easy way to convert code to an image file with syntax highlighting. And so here it is.
Categories Commands & Shells, FeaturedBackup Options for Raspberry Pi
Just about every Raspberry Pi I used suffered the same fate: the micro SD card died. It is generally accepted that the expected lifespan of an SD card is around ten years of normal use.
Categories Featured, Raspberry PiAffordable Linux Server
A friend asked me what server I would recommend to run Linux. Yes, a very broad query. After a few followup questions we've determined the server will be used to run VMs, or Apache, or a database, or maybe a mail server, or FTP. Right...
Categories Computer Components, Featured, HardwareLinux Blog Directory
A curated list of Linux and Unix blogs from around the world.
Categories Commands & Shells, FeaturedHome-Brew Ransomware Defense
The first well-known case of ransomware was documented in 1989. The so-called AIDS Trojan was delivered on a floppy disc; encrypted data; demanded $189.00 (nearly four hundred bucks in today's money) as a "license fee." The trojan was quickly defused due to its reliance on weak symmetric cryptography. In contrast,…Read More
Categories Backups, Disaster Recovery, Featured, SecurityValidating HTTPS Cache Peers for Squid
I have a squid proxy server that uses a long list of authenticated cache peers in a round-robin configuration. The process looks something like this:
Categories Featured, Networking, SquidFuzzy Search with Linux
This is a quick look at several handy utilities that will allow you to find, navigate, and edit directories and files easily. This overview includes such tools as fzf, rg, fd-find, bat, and the fzf.vim plugin for VIM.
Categories Commands & Shells, Featured, FilesAnalyzing atop Logs with atopsar
I have discussed atop previously but concentrated primarily on how to run it and how to collect data. Now I'd like to spend some time talking about ways to analyze the data collected with atop.
Categories Featured, Performance, ProcessesAppending Filenames
If you google how to append, say, current timestamp to the filename in Bash, almost every suggestion boils down to something really basic along the lines of mv $somefile $somefile_$(date +'Y%-%m-%d'). Technically, this is correct and, yet, this is not what was needed.
Categories Commands & Shells, Featured, FilesRenaming Files with exiftool, Part II
In the first part of this article, I went over the details of a process for renaming photos to include the geographic location in the filename. Some people asked if the same can be done for videos, and the answer is "probably."
Categories Commands & Shells, Featured, FilesSelecting Time Ranges from Logs, Part 2
A couple of years ago I wrote an article about selecting specific time ranges from log files. I proposed two options: either convert all timestamps to epoch format (a CPU-intensive process) or rely on regex (limited to specific date/time periods). Here's a followup with a couple more methods. Perhaps a…Read More
Categories Commands & Shells, Featured, MonitoringAutomatically Block Frequent Visitors
I had a few similar scripts floating around this site, but this one is a bit more all-inclusive and better organized. The script will analyze your firewall/whatever access log and block particularly active visitors.
Categories Featured, NetworkingServer and Application Resiliency Testing
You are deploying a new application cluster and wonder how it will perform under less-than-ideal conditions: heavy system load, slow storage, network performance degradation. Application resiliency testing is integral to any application architecture but is often passed over because the process is considered overly complex and time-consuming. Here are some…Read More
Categories Featured, PerformanceDetecting Blurry Photos with ImageMagick
Here's a typical scenario: I go to a birthday party where everyone knows I'm a shutterbug, so I have to bring my camera. As time goes by and blood alcohol concentration rises and attention to detail declines, the photos become increasingly blurry. The trick is to take a lot of…Read More
Categories Commands & Shells, Featured, PhotographyWorking with iptables Logging
Most commonly iptables is used to allow, block, or redirect connections. However, it also has a logging feature that can be very useful for network traffic analysis and system security.
Categories Commands & Shells, Featured, Networking, Security
- January 24, 2026
- January 23, 2026
- January 16, 2026
- January 13, 2026
- December 26, 2025
- December 13, 2025
- November 25, 2025
- November 20, 2025
- November 15, 2025
- October 21, 2025
- October 2, 2025
- September 19, 2025
- September 8, 2025
- September 7, 2025
- September 1, 2025
Latest Articles
Verifying SNMP Connectivity on Multiple Hosts
Bulk-Adding IPTables Rules
Late Night Rant: Trump, Bolton, Iran, Saudis
Windows 10 Upgrades
CD/DVD-to-ISO Helper Script
Longwood Gardens, August 2019
Working with ffmpeg on Multi-Core Systems
Sending Windows Logs to Remote Syslog
Managing Mapped Network Drives in Windows




























