Z-Wave Associations with Home Assistant
Introduction Configuring associations Setting associations Removing associations Last words ...
Introduction Configuring associations Setting associations Removing associations Last words ...
Bootstraping Execution order Create a file without external template Creating inventory script Writing ansible modules in sh ...
Prepare EDID blob Modify Kernel command line Update initramfs Reboot Post boot EDID ...
Introduction Origins Why use OpenTofu Using OpenTofu ...
This recipe is for tunneling NFS traffic over SSH. This adds encryption and Public Key authentication to otherwise insecure NFS traffic. For this recipe to work, requires NFSv4. Earlier versions were not tested, but I expect not all the functionality to work. server configuration ...
This is a sequel to my article IPv6 blues. Layout Enabling forwarding Configure networking ...
Rules Simple include/exclude rules Simple include/exclude example Filter rules when deleting Filter rules in depth ...
Some hints and tips foor doing SSL related things: Netcat for SSL This command lets you connect to a SSL server (a-la netcat): cat request.txt | openssl s_client -connect server:443 Creating self-signed certificates This is a single command to generate a self-signed certificate: ...
This article tries to supplement the nginx documentations regarding the auth_request module and how to configure it. In my opinion, that documentation is a bit incomplete. What is the nginx's auth_request module The documentation for this module says, it implements client ...
This is the least you need to know to get to use a Python virtual environment. What is a Virtual Environment At its core, the main purpose of Python virtual environments is to create an isolated environment for Python projects. This means that each project can have its own dependencies, regardless of what ...
Want to share your family photos after your death, but take your search history to the grave? All that and more is possible with Google's Inactive Account Manager. How You Can Control Your Information After Death It's not nice to think about, but one day, you will die, along with the keys to your online kingdom. And these days, those online accounts ...
If you often mount and access a remote NFS share on your system, you will probably want to know how to improve NFS file access performance. One possibility is using file caching. In Linux, there is a caching filesystem called FS-Cache which enables file caching for network file systems such as NFS. FS-Cache is built into the Linux kernel 2.6.30 and higher. ...
From 2daygeek.com Server patching is one of the important task of Linux system administrator to make the system more stable and better performance. All the vendors used to release security/vulnerabilities patches very often, the affected package must be updated in order to limit any potential security risks. Yum (Yellowdog Update Modified) is RPM Package Management utility for CentOS and Red Hat systems, Yum history command allows administrator to rollback the system to a previous state but due to some limitations, rollbacks do not work in all situations, or The yum command may simply do nothing, or it may remove packages you do not expect. I advise you to take a full system backup prior to performing any update/upgrade is always recommended, and yum history is NOT meant to replace systems backups. This will help you to restore the system to previous state at any point of time. n some cases, the hosted applications might not work properly or through some error due to recent patch updates (It could be some library incompatibility or package upgrade), what will be the solution in this case? Get in touch with App Dev team and figure it out an issue creating library' and packages then do the rollback with help of yum history command. ...
Losing your job to robots is no longer a sci-fi fantasy. Some estimates say, robots may take over more than five million jobs across 15 developed countries. Machines could account for more than half the workforce in places like Cambodia and Indonesia, particularly in the garment industry. While such information has led many people to seek out higher-tech ...
We use it for receiving junk e-mails (i.e. for those times where we need an e-mail address for sign-up to a service). E-mails are of the form: [email protected] TODO: Extend postie: ...
Since now I have a Android TV I put away my HTPC and with that the capability to view DVDs or listen CDs directly. So I converted my entire CD and DVD library to media files and stored in my home NAS. Since we are talking hundreds of DVDs and CDs, I was using some tools. CD ripping For CD ripping, pretty much everything can be done with abcde. ...
During my last vacation I wanted to move how we manage our personal finances away from the ad-hoc spreadsheet that we had been using for the past few years. I envisioned something server side, so I wouldn't need to add software on my wife's computer. And initial quick run through of server side software did not yield anything that interested me. In general I could only find full accounting applications, which ...
My Documents DOCUMENTS Project Folder old ...
In Microsoft Outlook has the option to tag e-mails with a sensitivity tag. Technically this is fairly meaningless. However sometimes I like to use them. The confidential tag is quite self explanatory. I always confuse what is the difference between private and personal. So here is one possibility... Personal information are things like preferences, political association, likes and dislikes. Private information are things like bank account numbers. Stuff that you probably would like to keep secret. ...
In Linux, there is a caching filesystem called FS-Cache which enables file caching for network file systems such as NFS. FS-Cache is built into the Linux kernel 2.6.30 and higher. In order for FS-Cache to operate, it needs cache back-end which provides actual storage for caching. One such cache back-end is cachefiles. Therefore, once you set up cachefiles, it will automatically enable file caching for NFS shares. ...