Linux as a service (The simplest Way to Understand It) A service is just a program that runs in the background systemctl is the tool to control it systemd is the system that manages services Simple analogy Think of a service like a car 🚗: You can start it You can stop it You can check if it’s running The systemd is like the engine that keeps the car running smoothly behind the scenes. By the e
There are roughly a thousand "top DevOps repos" listicles, and most of them are the same five awesome-lists in a different order. The problem with awesome-lists is that they are link directories. They tell you where to look, not what to do. If you want to actually get better at DevOps, you need a different shape of repo: ones with exercises, opinionated learning paths, hands-on demos, and source y
For me, Linux used to be much more intimidating at first. But once I understood the basics and started using it regularly, it became straightforward. Assigning an IP address—either automatically via DHCP or manually—is not as hard as it looks. However, troubleshooting can be challenging because Linux provides multiple ways to handle network configurations. This is the simplest way to get an IP add
If you are building a FiveM roleplay server, Discord Rich Presence is one of those small details that makes a big difference. It replaces the generic "Playing FiveM" status with your server name, logo, and player count. Every player on your server passively advertises your brand to their entire Discord friends list. The setup is straightforward but the implementation differs depending on your fram
The File Search tool in the Gemini API now supports multimodal retrieval by adding support for Gemini Embedding 2. This update allows images, such as charts, product photos, and diagrams, to be natively indexed and searched in the same store as your text-based documents. This post covers how to use the File Search tool end-to-end: creating a store, uploading documents and images, querying with gro
Process & Port Management Find what’s using a port: ss -tulnp | grep :8080 Kill process by port: kill -9 $(lsof -t -i:8080) Top processes (better than top): btop Show process tree: ps auxf File & Disk Tricks Human-readable disk usage: df -h Find large files: find / -type f -size +500M 2>/dev/null Quickly clean logs: truncate -s 0 /var/log/syslog Search Like a Pro G
Hi everyone, my name is P Swyom Sanjog. Welcome back to my blog—I hope you’re all doing well. Today, I’m bringing a new topic: Virtual DOM. Let’s understand what the Virtual DOM is in simple terms. We’ll cover key questions like what it is, why it’s used, and how it works. So, let’s get started! Virtual Dom So, let’s break down the topic into “Virtual” and “DOM.” Virtual means something that exi
Your phone will connect to the strongest tower it hears. It does not ask for ID first. It assumes trust, and that assumption is the entire problem. I first noticed this in 2019 outside a security conference in Las Vegas. My test Android dropped from LTE to 2G for 47 seconds, then returned to normal. No user notification. The baseband logs showed a cipher downgrade to A5/0, a location area code tha