Doing any coding without some kind of versioning control system ( VCS ) is nearly impossible today. Thanks to his creator, Linus Torvalds, we have a great distributed system that…

Are you authoritative enough?  Let’s face it – Google dominates the digital advertising space real estate, and more and more businesses are turning away from other platforms in favor of…

As lots of system administrators have been in situation where they misplaced their root passwords or confused Girlfriend’s birthday with it… Well, to some of us at least 🙂 Anyhow, just…

SSH is a protocol for safe remote connection and safe communication over an unprotected network infrastructure. It can replace telnet, remote shell (rsh), remote copy (rcp). Other than that, it’s…

What is bash Bash is a command language interpreter for the gnu based linux operating systems. Name itself stands for ‘Bourne-Again -SHell’, which was given as an honorable mention to…

History of SPDY After failed attempts to start development of new protocol or change the existing HTTP/1.1 protocol, Google had decided to work harder on this topic and they have executed…

For SSL/TLS negotiation server needs to have private key and certificate. Handshake is done in 6 steps roughly generalizing: Client nack or Client Hello Indication that server needs to respond…

Looking for a good solution, at least for my use case, I’ve stumbled upon interesting approach to find and remove nginx cached files by regex pattern. This is proxy_pass or…