Reference
A curated feed of every post tagged Reference.
Blog posts that can be used as a reference for a specific topic (Documentation, how-tos, etc).
2025
Linux Iptables quick reference
1197 words·6 mins
Linux
Terminal
Shell
Firewall
Reference
Network
Networking
iptables in 5 Minutes: a quick cheat-sheet for quick rule edits, safe testing, and making changes stick, without tripping over firewalld, UFW, or nftables.
MacOS Setup for Efficiency | Part 1: Raycast
1260 words·6 mins
Setup
MacOS
Productivity
Reference
Intro and Raycast showcase
Booting a private AWS EC2 instance with Tailscale
850 words·4 mins
Tailscale
AWS
Server
Sysadmin
Network
Reference
Booting up an AWS EC2 Instance with Tailscale baked in for a quick homelab testing environment
SSH Tunneling and Port-Forwarding guide
592 words·3 mins
Ssh
Reference
Networking
Security
Port-Forwarding
Tunneling
Linux
Sysadmin
A brief SSH tunneling & proxy methods guide - Dynamic, Remote & Local port-forwarding. Tunneling and Hardening resources.
Termbot Use Cases
595 words·3 mins
AI
LLM
Development
Projects
Reference
Useful ways to leverage Termbot as a Linux CLI LLM tool. From piping/redirecting stdout to reading text from local files, it allows for several combinations of “data chaining”
2024
PNG to Favicon.ico with ffmpeg
134 words·1 min
Web
Website
Development
Linux
Tools
Reference
Quick how-to: Create favicon.ico from PNG by using FFMPEG
2021
Linux User switching with their own password
290 words·2 mins
Reference
Linux
Sysadmin
A procedure to allow users to switch (su) to another user, using their own password instead of the “target” user password
Running NetworkMiner on Linux
524 words·3 mins
Reference
Linux
Forensics
Network
Using Mono utility to run NetworkMiner, a Windows utility for PCAP analysis
YAVG: Yet Another Vim Guide
1539 words·8 mins
Vim
Linux
Shell
Bash
Development
Setup
Programming
Reference
Spending some time learning Vim to save time
2020
Firefox hardening quick guide
280 words·2 mins
Hardening
Cybersecurity
Browser
Reference
The results of this guidelines render only a casual-use Firefox configuration. If you have special privacy/anonimity needs, or are concerned about sofisticated attack vectors, then please do not use Firefox (Or use it with other privacy-enhancing services/softwares). Do your own modifications and research as needed.