How-To Guides¶
Personal Technical Knowledge Base
These technical how-to guides started as my personal reference documentation, notes and procedures I created for myself while working with various technologies. I'm sharing them here in case they might be useful to others.
Available Guides¶
-
Fish Shell
Fish shell setup with Fisher plugin manager and Tide prompt, autosuggestions, syntax highlighting, and a beautiful prompt out of the box.
Topics covered:
- Fish installation and default shell setup
- Fisher plugin manager
- Tide prompt via interactive setup wizard
-
GPG Guide
GNU Privacy Guard implementation for encryption, signing, and SSH authentication with hardware security keys.
Topics covered:
- Smart card management (Nitrokey, YubiKey)
- SSH agent configuration
- Web Key Directory (WKD) setup
- Key server operations
- Security best practices
-
iwd (iwctl)
Wireless network management with iwd, a lightweight wireless daemon for Linux.
Topics covered:
- Device listing and scanning
- Network discovery and connection
- Station and device status
-
Incus Containers
Modern container management with Incus - the community-driven successor to LXD.
Topics covered:
- Container lifecycle management
- Resource limits and performance tuning
- Network configuration and security
- Storage management and volumes
- Migration from LXD to Incus
-
macOS Tips
Power user tips and command-line tricks for macOS developers and system administrators.
Topics covered:
- Clipboard operations and JSON formatting
- System monitoring and thermal management
- Network utilities and Wi-Fi management
- Development tools and Homebrew
- Security and performance optimization
-
Sysadmin Tips
System administration techniques and utilities for Linux environments.
Topics covered:
- Process management and monitoring
- Network troubleshooting
- File system operations
- Service management
- Performance optimization
-
WPA Cracking
Educational wireless security testing with modern tools and techniques.
Topics covered:
- Monitor mode setup and network discovery
- Handshake capture techniques
- Password cracking methods
- PMKID attacks and WPS vulnerabilities
- Educational purposes only
-
Void Linux
Post-installation setup for Void Linux with full-disk encryption and runit services.
Topics covered:
- LUKS encryption with key file
- Runit service management
- Wireless networking (iwd, dhcpcd)
- DNS configuration
- Essential packages
-
ZFS Storage
Advanced filesystem management with ZFS for next-generation storage solutions.
Topics covered:
- Pool and dataset management
- Compression and deduplication
- Snapshots and backup strategies
- NFS sharing configuration
- Performance optimization