top of page
Search


Mastering awk: A Beginner-Friendly Guide with Examples
awk is a powerful text-processing tool available in Linux and UNIX. It is primarily used for pattern scanning, text manipulation, and...
Siddhesh Kadam
3 min read


Maximizing Security: A Step-by-Step Guide to Enabling Audit Logs on Linux
Introduction of Auditd Keeping track of what happens on your Linux system is crucial, especially for security and compliance. Linux...
Siddhesh Kadam
3 min read


Building an AI-Powered Browser Automation Agent: Step-by-Step Guide
In this guide, we'll walk through setting up a local AI-powered browser automation agent using browser-use, playwright, and gradio. By...
Siddhesh Kadam
2 min read


How to Generate Dummy Data in MySQL Using the Python Faker Module
In many development and testing scenarios, having a realistic dataset is crucial. Instead of manually entering fake data, Python’s...
Siddhesh Kadam
2 min read


Running DeepSeek Locally: A Step-by-Step Guide
In the world of machine learning and AI, running models locally can provide significant advantages, including data privacy, reduced...
Siddhesh Kadam
3 min read

Socket Statistics in Linux Using (ss)
If you’ve ever needed to troubleshoot network connections on a Linux system, you’ve likely encountered tools like netstat . But there’s a...
Siddhesh Kadam
2 min read


Monitoring Disk-Level Changes in Real-Time Using inotifywait
Monitoring file system activity in real-time is crucial for system administrators, developers, and DevOps engineers. Whether you’re...
Siddhesh Kadam
2 min read

Bringing AI Offline: Llama Local Models for Chrome Extensions
What is LLama ? In simple terms, LLaMA (Large Language Model Meta AI) is a powerful computer program developed by Meta (the company...
adarsh812003
2 min read


Creating Multiple Postfix Instances with Postmulti
Postfix is a popular mail transfer agent (MTA) used to route and deliver email on Linux servers. Sometimes, it’s necessary to run...
Siddhesh Kadam
2 min read


How to Create a Customized Log Format with Rsyslog
Logging is a critical aspect of system administration, helping you keep track of events, diagnose issues, and maintain security. While...
Siddhesh Kadam
3 min read

Restricting Access in Nginx: How to Block Unwanted Traffic
When managing a web server, it's essential to protect your site from unwanted traffic and malicious activity. Nginx, a popular web...
Siddhesh Kadam
2 min read

How to Hide the Server Name in Nginx Using the Headers More Module
When running a web server, security and privacy are key considerations. By default, Nginx reveals its server name in the HTTP headers,...
Siddhesh Kadam
2 min read

Installing Nginx from Source on a Linux System (RHEL9/Rocky9)
In this blog, I'll guide you through installing Nginx from source on a Linux system. We'll walk through each step, from installing the...
Siddhesh Kadam
2 min read

Exploring the Steps to Activate Debug Mode in Nginx
Debugging is an essential part of maintaining and optimizing your NGINX server. It provides detailed logs that can help you troubleshoot...
Siddhesh Kadam
2 min read

Understanding MySQL Triggers
Introduction to MySQL Triggers In the realm of database management, automation is key to maintaining data integrity and enforcing...
Siddhesh Kadam
3 min read
bottom of page