Skip to main content

Reference

A curated feed of every post tagged Reference.

Blog posts that can be used as a reference for a specific topic (Documentation, how-tos, etc).

2025

Linux Iptables quick reference
1197 words·6 mins
Linux Terminal Shell Firewall Reference Network Networking
iptables in 5 Minutes: a quick cheat-sheet for quick rule edits, safe testing, and making changes stick, without tripping over firewalld, UFW, or nftables.
MacOS Setup for Efficiency | Part 1: Raycast
1260 words·6 mins
Setup MacOS Productivity Reference
Intro and Raycast showcase
Booting a private AWS EC2 instance with Tailscale
850 words·4 mins
Tailscale AWS Server Sysadmin Network Reference
Booting up an AWS EC2 Instance with Tailscale baked in for a quick homelab testing environment
SSH Tunneling and Port-Forwarding guide
592 words·3 mins
Ssh Reference Networking Security Port-Forwarding Tunneling Linux Sysadmin
A brief SSH tunneling & proxy methods guide - Dynamic, Remote & Local port-forwarding. Tunneling and Hardening resources.
Termbot Use Cases
595 words·3 mins
AI LLM Development Projects Reference
Useful ways to leverage Termbot as a Linux CLI LLM tool. From piping/redirecting stdout to reading text from local files, it allows for several combinations of “data chaining”

2024

PNG to Favicon.ico with ffmpeg
134 words·1 min
Web Website Development Linux Tools Reference
Quick how-to: Create favicon.ico from PNG by using FFMPEG

2021

Linux User switching with their own password
290 words·2 mins
Reference Linux Sysadmin
A procedure to allow users to switch (su) to another user, using their own password instead of the “target” user password
Running NetworkMiner on Linux
524 words·3 mins
Reference Linux Forensics Network
Using Mono utility to run NetworkMiner, a Windows utility for PCAP analysis
YAVG: Yet Another Vim Guide
1539 words·8 mins
Vim Linux Shell Bash Development Setup Programming Reference
Spending some time learning Vim to save time

2020

Firefox hardening quick guide
280 words·2 mins
Hardening Cybersecurity Browser Reference
The results of this guidelines render only a casual-use Firefox configuration. If you have special privacy/anonimity needs, or are concerned about sofisticated attack vectors, then please do not use Firefox (Or use it with other privacy-enhancing services/softwares). Do your own modifications and research as needed.