Josh SakovinSystem WeaknessSimple Protection Against Encryption AttacksEncryption cyber attacks obtain access to the victim’s computer and encrypt the files. The cybercriminal then demands a ransom to unencrypt…8 min read·Jan 17, 2022----
Josh SakovHow to fix expanding docker containersDo you have a docker container whose size keeps growing? Even when the container size increases slowly it means trouble when the container…4 min read·Aug 29, 2020----
Josh SakovLinux: Start an application automatically at bootThere are different methods for starting an application automatically every time a Linux system boots up. We will survey a few methods…4 min read·Jul 6, 2020----
Josh SakovKea Host Reservation with MySQL databasePorting Host Reservations from ISC DHCP to Kea MySQL8 min read·Aug 26, 2019--2--2