5 ways AI Can Actually Help You Keep Your Job
A few weeks ago, I had the opportunity to attend a small trade show, which got me thinking (again) about how AI is shaping the future of work. I wanted to share a…
A few weeks ago, I had the opportunity to attend a small trade show, which got me thinking (again) about how AI is shaping the future of work. I wanted to share a…
Jul 18, 2025 13min Read Integrating an application programming interface (API) with n8n can be complicated because every API provider has specific requirements for connecting their service. Nevertheless, n8n’s code-minimal workflow can allow…
Jul 11, 2025 Ariffud M. Running n8n with Docker is an efficient way to self-host this workflow automation tool. Unlike installing n8n directly on your virtual private server (VPS), Docker offers a containerized…
This post explores over 30 of the best Linux terminal emulators, each with unique features and functionality, catering to different types of users. This list showcases the versatility and evolution of terminal emulators…
For enthusiasts, developers, and professionals who prefer the Linux operating system, choosing a Linux-compatible laptop is a pivotal decision. Here are five Linux-compatible laptops that I evaluated in my recent quest for a…
Last week I walked into an empty 5 × 4 ft storage room. By the end of the week, that blank space held a fully functional network core designed to keep a small…
Jul 04, 2025 Every modern app deals with data – this could be in the form of user account info and tracked order details, or it could be powering product searches or visitor…
Linux-powered smartphones are still the dominant force in the global smartphone market in 2025. While some may be surprised by this fact, Linux enthusiasts have every reason to be happy about the continued…
Update: Thankfully, as of release 2020.1, Kali Linux has swapped to a privileged non-root user by default. You will now log in with the user you create during the install process and no…
This article is a follow-up to the previous 90 Linux Commands frequently used by Linux Sysadmins post. Every week, as time allows, I will publish articles on the 90 commands geared toward Linux sysadmins and…
The first thing I did after installing Ubuntu 22.04 LTS was to remove Snap and its snap packages completely. I’m not proud of that approach, as I have nothing against snap packages per…
In my tech journey, I’ve always had an affinity for the cutting-edge, the not-fully-tested waters of the Linux world. Rolling release distributions like Arch, Fedora, or even a custom-installed Kali Linux have been…
This post includes SCP examples. SCP or secure copy allows the secure transferring of files between a local host and a remote host or between two remote hosts. It uses the same authentication…
Let’s pick up right where Part 1 left off: pfSense Firewall Appliance Unboxing. This isn’t a quick-start guide. It’s my logbook from weeks of fine-tuning pfSense. Weeks, not years, so follow along and…
For the past three years, I’ve been putting off an upgrade to my network’s firewall. During that time, I was balancing multiple priorities: maintaining uptime with multiple ISPs, managing VPN performance limitations, and…
May 30, 2025 Ariffud M. 11min Read The LGTM stack – consisting of Loki for logs, Grafana for visualization, Tempo for tracing, and Mimir for metrics – is an open-source observability suite developed…
The sudo command in Linux is one of the most important and widely used commands for managing system permissions. It allows you to run a command as the superuser, giving you elevated privileges…
This iotop command guide follows my previous 90 Linux Commands frequently used by Linux Sysadmins article. As time allows, I will continue to publish articles on the 90+ commands geared toward Linux sysadmins…