Author Archives: john

NJ homeowners: how to sell your SRECs from your solar panels

Intro I was an enthusiast and got solar panels on my roof while there was still a tax credit for doing so. But then i became lazy and didn’t want to bother selling the SRECs I was awarded. Here is … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Linux tip: how to enable remote syslog on SLES

Intro I write this knowing I still don’t know anything to speak of about syslog, but, sometimes you gotta act without knowing. I needed to send syslog to somewhere in a big hurry so I figured out the absolute minimum … Continue reading

Posted in Admin, Linux, Network Technologies, SLES | Tagged , , | Leave a comment

Suppress /apple-touch-icon URLs on an F5 ASM

Intro Displaying the ASM event log is slow – it can take minutes on our older equipment. So anything that helps cut out the clutter in the returned log entries may save precious minutes of, e.g., paging to the next … Continue reading

Posted in Security | Tagged , | Leave a comment

Pi-hole: it’s as easy as pi to get rid of your advertisements

Intro I learned about pi-hole from Bloomberg Businessweek of all places. Seems right up my alley – uses Raspberry Pi in your home to get rid of advertisements. Turns out it was too easy and I don’t have much to … Continue reading

Posted in Raspberry Pi, SLES, Web Site Technologies | Tagged , | Leave a comment

Docker on CentOS 6: FAIL

Intro I think I’ve been running CentOS 6 for six years now. With upgrades I’m at v 6.9. It was nice and new six years ago, but not so much anymore. I think it showed its age when I tried … Continue reading

Posted in CentOS | Tagged | Leave a comment

Future project idea: Interplanetary file system, IPFS

Intro If I had more time and more energy, what I’d like is to explore the Interplanetary Filesystem, perhaps put up a server and create some objects. It seems right up my alley as I was an early adapter and … Continue reading

Posted in Linux | Tagged | Leave a comment

LDAP authentication on the F5 BigIP without Access Policy Manager

Intro I recently received revised guidelines for dmz best practices which mentioned a requirement to implement application-independent authentication using the F5 web application firewall. I had never heard of it and didn’t think it was possible without buying the very … Continue reading

Posted in Network Technologies, Security | Tagged , , | Leave a comment

The IT Detective Agency: the vanishing certificate error

Intro I was confronted with a web site certificate error. A user was reluctant – correctly – to proceed to an internal web site because he saw a message to the effect: I tried it myself with IE and got … Continue reading

Posted in Admin, Linux, Security, Web Site Technologies | Tagged | Leave a comment

The IT Detective agency: Some insights into 4096-bit SSL keys

Intro I was recently asked if a new certificate a web site is about to deploy would require any changes to our clients such as needing to import this certificate into their Java keystore. The details Well, I saved the … Continue reading

Posted in Admin, Network Technologies, Security | Leave a comment

Whois information without the pushy hard sell tactics

Intro Did you ever want to learn about a domain registration but were put off by the hard sell tactics that basically all web-based whois searches subject you to? Me, too. Here’s what you can do. The details Linux – … Continue reading

Posted in DNS, Linux, Network Technologies, Raspberry Pi, Security | Tagged , , , | Leave a comment