In this little post I am going to show you why you sometimes need to rewrite the author or committer history, how you do it and where it will not work as expected.
Author Archives: cytopia
How to configure ranger image preview on OSX with iTerm2? Ranger’s image preview in iTerm2 does not work out of the box and you will need some additional scripts and config settings to get it working. Here you can see step by step how it gets done. TL;DR Install iTerm >= 2.9 and… # Install
When you issue git tag it will show you all tags of a repository sorted in alphabetical order. But actually it makes much more sense to see tags sorted by tagging date. Unfortunately there is currently no such git sub command that accomplishes this easily. So we are going to write our own: Article series
If you want to search files by a pattern and then apply something to the results you have at least two choices. You can use find. -exec or you can pipe the results to xargs. There are also two different choices for find -exec and find | xargs that will have a dramatic impact on
How can you make sure all your system binaries and configuration files have not been compromised by an intruder? You can of course run rkhunter or AIDE on a regular base or via cron, but this is only going to show you, that a MD5 checksum has been changed. Using git as an intrusion detection
Git like a pro will present some more advanced git tricks, you might not have heard about. This is going to be a collection of deluxe git stuff I have picked up somewhere or written myself. It is also going to be a repeating section, so stay tuned and look for other posts on git
Ranger is a really nice file explorer for the command line. If you have tried it once, you will never wanna miss it again. The coolest thing about ranger is its integrated file preview, which works similar to the OSX Finder. But for working CLI only, its most outstanding feature is the terminal picture preview.
You plan to make secure and automated mysql database backups on your server? There is a lot more to it than just using mysqldump from inside cron. Don’t step into the pitfalls many people do and risk to compromise all of your databases. What makes a well designed and secure database backup script? For that