A repository of information technology questions and answers

Latest posts

Private and public key pairs for SSH

SSH has a key management capacity and related agents.When configured with public key authentication, your key proves your identity to remote SSH hosts

SSH configuration and security best practices

Here is a list of processes and configurations that you can use to tighten and enhance SSH security with regard to remote host access

Converting Nibbleblog .htaccess to IIS

This post gives an example how to convert the .htaccess file provided with Nibbleblog when SEO is enabled into the equivalent IIS web.conf file.

Renaming a ZFS zpool

Renaming a zpool is not as intuitive as I would expect, but it is still pretty simple. However, we can accomplish this through a three step process.

World Backup Day 2014

Until you need them, backups are a boring irritating waste of time. But when you need them, they can be an absolute life saver.