Death by 1000 Cuts

Software Reliability – Deadly Cut 2

Reading Time: < 1 minute Software reliability is supremely important. I told my wife that I would download something. I told her it would take 10 minutes. More than an hour later, I’m still downloading the file due to software bugs. I only wanted to download a file, that’s it, but asking for software reliability was too much to ask.…

Bitwarden

Lastpass to Bitwarden – Part 2

Reading Time: 2 minutes Lastpass went to the past. In my last article, Lastpass to Bitwarden – Part 1, I wrote about my decision to switch password managers. I’ve been using Bitwarden the past several weeks, and here are my experiences with it. The desktop client is a bit clunky. Moving an entry to a new folder doesn’t let…

Terraform

Learning Terraform

Reading Time: 2 minutes I work with Amazon Web Services, so I tried out the AWS Cloud Development Kit (CDK). The CDK sounds like a great idea on paper, but the documentation is abysmal. While sifting through GitHub repositories is fun, it is not a fun full-time job. Most of my time spent using the CDK required digging for examples…

Hyper Terminal

Hyper Automator

Reading Time: < 1 minute I’ve recently started using Hyper terminal because iTerm was giving me grief. One of my goals was to be able to open it within Finder on macOS to avoid wasting time. I found this article and proceeded to hack away but proceed with caution. The Automator -> Services option does not exist in new versions…

Terminal

Setting SSH Key Permissions

Reading Time: < 1 minute If you haven’t generated a key, then you’ll want to use ssh-keygen to create a key for ssh sessions. Linux Usually, your key file will be located at ~/.ssh/id_rsa.pub on UNIX based systems chmod 600 path/to/key/keyfile Windows Usually, your key file will be located at %USERPROFILE%\.ssh\id_rsa.pub Run this command to enable inheritance Run this command…

Bitwarden

Lastpass to Bitwarden – Part 1

Reading Time: 2 minutes Bitwarden has given me new hope when it comes to password management. Password management is high on my list of things I simply don’t want to think about, ever. I want my passwords to be secure, but I also don’t want to have to remember a slew of passwords. If you’re currently using the same…

Synology, Docker, Pihole

Pi-hole, Synology, Docker, and you

Reading Time: 2 minutes The following steps detail how to enable pi-hole advertisement filtering for your local network. Install Docker on your Synology NAS Create a new container (It is recommended to pin to a version to avoid update issues but use 4.2.2 or later) Launch the container with these options then wait for it to load completely Open…