Hidey Ho neighborinos!

Even bad things come to an end. This is it. Please unsubscribe to any feeds at this site you might be subscribed to. If you just can't get enough, I'm moving everything (well almost everything... the stuff people seem to read) here. Loveyameanit.

Bugzilla removed. Spammers got into it and all of this software is deprecated anyway. If you find a bug (ha!) and you really care about it, email me.

pngimg.com - linux_PNG1

I no longer plan to develop DMR or Parasite. There is much better blogware out there and the world is a different place than it was when I started writing DMR. I barely use it myself these days. I see that someone else is trying to make a business of a crippled version of it. Good luck! Join this group! 🙂

If anyone wants the working-but-very-difficult-to-install source for the latest version, email me and I’ll give it to you. The only real improvement is the RSS/Atom reader is much much much better.

So, this means that this site will probably get an overhaul as soon as real life and procrastination allow. I need to find a CMS that allows for blogs as well as static content.

This post is mostly a reminder to myself. If you ever dd a whole disk to a file and you need to loopback mount an individual partition from that file, here’s how:

  • sfdisk -l -uS myimg.img
    • Disk myimg.img: cannot get geometry
      Disk myimg.img: 0 cylinders, 0 heads, 0 sectors/track
      Warning: The partition table looks like it was made
        for C/H/S=*/64/63 (instead of 0/0/0).
      For this listing I'll assume that geometry.
      Units = sectors of 512 bytes, counting from 0
         Device Boot    Start       End   #sectors  Id  System
      myimg.img1   *        63   3515903    3515841  83  Linux
      myimg.img2       3515904   4124735     608832  82  Linux swap / Solaris
      myimg.img3             0         -          0   0  Empty
      myimg.img4             0         -          0   0  Empty
  • Since “End” is the end point, not a count point, subtract the Start from the end:
    echo 3515903 - 63 | bc
    • 3515840
  • create a file with just the partition you want:
    dd if=myimg.img of=part1.img bs=512 skip=63 count=3515840
  • mount -o loop /path/to/part1.img /mnt


Efficiency Unleashed: Advanced Strategies in Bash Scripting

In the realm of system administration, software development, and data processing, efficiency reigns supreme. As the demands of modern computing continue to escalate, mastering advanced strategies in Bash scripting becomes essential for unleashing unparalleled efficiency and productivity. In this article, we’ll explore a spectrum of advanced techniques and strategies that elevate Bash scripting from a…

Read more

SSH Essentials: Securing Connections and Streamlining Remote Administration

Introduction: In an interconnected digital landscape, remote administration of servers and devices has become a critical aspect of modern IT operations. However, with the proliferation of cyber threats, ensuring the security of remote connections is paramount. Secure Shell (SSH) emerges as an essential tool for securing connections and streamlining remote administration tasks. This article explores…

Read more

From Beginner to Pro: A Comprehensive Guide to Bash Scripting

Bash scripting stands as a cornerstone skill for anyone navigating the Unix-based operating systems landscape. Whether you’re a system administrator, developer, or power user, mastering Bash scripting can significantly enhance your productivity, efficiency, and problem-solving capabilities. In this comprehensive guide, we’ll embark on a journey from beginner to pro, covering everything you need to know…

Read more

Mastering SSH: Enhancing Security and Efficiency in Remote Access

Introduction: In the digital age, remote access to servers and devices is a necessity for businesses and individuals alike. However, ensuring the security and efficiency of remote access operations poses a significant challenge. Secure Shell (SSH) emerges as a powerful solution, offering robust security features and streamlined access management. This article delves into the realm…

Read more

Demystifying SSH: A Comprehensive Guide to Secure Shell Protocol

Introduction: In the realm of cybersecurity and network administration, Secure Shell (SSH) stands as a cornerstone for secure communication between computers. Despite its prevalence, SSH often remains shrouded in mystery for many users. This article aims to demystify SSH by providing a comprehensive guide to its workings, benefits, and best practices. Understanding SSH: Secure Shell,…

Read more