today's howtos

-
What happened to simple, basic web hosting?
For a friend’s memorial I signed up to make a batch of images into a slideshow. All I wanted was the Simplest Possible Thing: a web page that would cycle through a batch of images. It’s been a while since I did something like this, so I looked around and didn’t find anything that seemed simple enough. The recipes I found felt like overkill. Here’s all I wanted to do:
1. Put the images we’re gathering into a local folder
2. Run one command to build slideshow.html
3. Push the images plus slideshow.html to a web folder
-
Just Copy What Works
No magic. No plan. No philosophy. Just copying what demonstrably works for someone I know directly.
-
Web URL paths don't quite map cleanly onto the abstract 'filesystem API'
Generally, the path portion of web URLs maps more or less on to the idea of a hierarchical filesystem, partly because the early web was designed with that in mind. However, in thinking about this I've realized that there is one place where paths are actually a superset of the broad filesystem API; in fact this place actually causes some amount of heartburn and different design decisions in web servers when they serve static files.
The area of divergence is that in the general filesystem API, directories don't have contents, just children. Only files have contents. In web paths, of course, directories very frequently have contents as well as children (if anything, a web path directory that refuses to have contents is rarer than one that does). This is quite convenient for people using the web, but requires web servers to invent a convention for how path directories get their contents (for example, the 'index.html' convention).
-
Wireshark’s little known Snort post-dissector
Snort rules are considered the gold standard of network intrusion detection signatures, and because of that, new analysts need to learn how to read and understand their logic. There are many great blog posts already on understanding Snort rules, such as this one by Rapid7, so I won’t try to rehash them here.
Instead, I wanted to show how you can use Wireshark to find which specific packet triggered a Snort rule in seconds from within the Wireshark GUI, giving you all the surrounding context that a PCAP can give you.
-
How to use Keycloak to configure SSO and MFA for command-line applications | Enable Sysadmin
Set up identity and access management for command-line interface (CLI) applications with the Keycloak open source tool.
-
How To Install Visual Studio Code on AlmaLinux 9 [Ed: Very bad idea as it is proprietary, it is controlled by Microsoft, it spies on the users, and these instructions give Microsoft complete (root) control over your GNU/Linux PC]
-
- Login or register to post comments
Printer-friendly version
- 950 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
today's howtos
| Programming Leftovers
|
Games: Porting Doom, ScummVM, and The Legend of Zelda: Breath of the Wild
| Debian Hiding Issues and Suppressing Volunteers' Dissent
|
Recent comments
4 hours 40 min ago
7 hours 2 min ago
7 hours 30 min ago
10 hours 47 min ago
12 hours 4 min ago
22 hours 9 min ago
1 day 6 hours ago
1 day 7 hours ago
2 days 4 hours ago
2 days 12 hours ago