Location via proxy:   
[Report a bug]   [Manage cookies]                

Prevent newsletter signup spam

Got spammed with fake newsletter signups? Learn how to protect your forms using double opt-in, CAPTCHA, and Cloudflare.

April 17, 2025 728 words 4 min

Introducing CypherGoat - The first open source crypto exchange aggregator

Swap your crypto at the best rate on the market. Fast, Private, Open source!

Deploying Go + Templ + HTMX + TailwindCSS to production

In this article I will be showing you how to deploy the GoTTH stack (Go Templ htmx tailwind) to production.

Simple Rate Limiting in Go (Gin)

In this article will be showing you how to setup rate limiting in the gin library in go.

March 4, 2025 319 words 2 min

If Linux is so great why isn't everyone using it?

Curious why more people aren’t using Linux if it’s so awesome? This article breaks down what Linux is, why it's great and how it secretly powers most of your favorite devices, from smartphones to servers.

October 13, 2024 555 words 3 min

How to build a URL shortener in Go

In this article will be showing you how to build a url shortener in go.

September 22, 2024 1321 words 7 min

How to deploy django to production

In this article I will show you how to deploy django to production. We will be using nginx, gunicorn and cloudflare tunnels

How to setup a selfhosted newsletter using listmonk

Listmonk is an amazing feature packed selfhosted email newsletter manager. It offers loads of features like analytics (clicks, opens, bounces), templates, public subscription pages, importing subscribers and much more!

Selfhost your own gitea instance - selfhosted, lightweight github alternative

In this article I’ll walk you through how you can run your own gitea instance. But first What is gitea? Gitea is a painless selfhosted Git service. It is written in Go and is extremely lightweight. I run a gitea instance on my Le Potato and it barely uses any resources. Why use gitea (vs GitHub, GitLab etc) I started running my own Gitea instance because I wanted a private place to host my Obsidian notes....

How to Improve Go API request performance

In this post I'll show you how I improved the performance of my go based cryptocurrency exchange aggregator. By making small changes, like using goroutines, switching JSON libraries and reusing HTTP handlers.

My Obsidian + Hugo blogging setup

In this post I go through how I have setup my Obsidian and Hugo blogging workflow. I use a single vault and auto publish my articles with hotkeys.

New look, new start

I recently switched from the hugo LoveIt theme to PaperModX . Why the switch? The LoveIt theme hasn’t been updated in 2+ years. PaperModX has a more modern look LoveIt doesn’t work that well with obsidian. The overall switch went pretty smoothly. You can see the changes I made in this commit. For anyone wondering this what the website used to look like More articles to come! The theme wasn’t the only change that I made....

August 11, 2024 128 words 1 min

Ultimate Monero ColdStorage Guide (Feather X Anonero)

In this comprehensive guide, I will walk you through the process of easily setting up Monero cold storage using an old computer and your smartphone, using animated QR codes. No USB needed!

December 14, 2023 1057 words 5 min

Easy monero cold storage

In this article I will show you how to “easily” generate a live archlinux usb with the monero gui pre-installed. Requirements An archlinux install A usb Setup In this guide I will show you how to build a custom archlinux iso with monerogui installed. I will not be providing any pre-built images. The first thing you will have to do is install archuseriso. You can install it from the aur using this command:...

November 7, 2023 723 words 4 min

SSH Remote Access NO Port-Forwarding NO Cloudflare

In this article I will show you how I securely connect to my remote machines without having to configure port forwarding. Requirements: A computer “server” (running linux) A internet connection Another computer to connect to your server (running linux) Why? If you want to access your server without portforwarding in a extremely secure fashion you will want to follow this tutorial. You will be connecting to the server via tor which will make it harder for anyone to find the url of the server and ill show you how to setup keybased auth for even more security!...

October 4, 2023 467 words 3 min

How I setup this blog for free (domain, hosting, ssl) Complete Guide

In this article I’ll show you how I setup this blog completely for free. I’ll show you how to use hugo to write your blog, Cloudflare and eu.org for your domain and ssl, Render and github for the hosting and even how to get your blog on google. What is hugo? Hugo is a fast and popular open-source static site generator used for creating static websites without requiring a database or dynamic components....

March 23, 2023 1292 words 7 min

Python for Complete Beginners

Why you should use Python. Going over the basics of Python. In this course/article I will be talking about why someone should use Python. Later on, I will be tackling the basics of Python. But let’s start by explaining what coding is. What is coding? Coding means writing instructions for computers and a finished set of instructions is known as a program. Computer programs control everything from smartphones to space rockets....

PocketBase self-hosted Firebase alternative

What is PocketBase PocketBase is an open source backend made in go consisting of embedded database (SQLite) with realtime subscriptions, built-in auth management, convenient dashboard UI and simple REST-ish API. Install PocketBase The first thing that you will have to do is head to https://pocketbase.io and select the file for your operating system. Since I am using linux I will show how to set this up on linux but it should be pretty similar for any other os....

Why Monero is the ultimate form of a cryptocurrency

In this article, I will tell you why Monero fits my views of what a cryptocurrency should look like. What is Monero? Monero is a decentralized cryptocurrency. It uses a public distributed ledger with privacy-enhancing technologies that obfuscate transactions to achieve anonymity and fungibility. Observers cannot decipher addresses trading Monero, transaction amounts, address balances, or transaction histories. Monero works like any other currency but with some privacy and decentralization innovations....

Create a MultiBoot USB using ventoy

Whats ventoy? Ventoy is a free and open-source utility used for writing image files such as .iso, .wim, .img, .vhd(x), and .efi files onto storage media to create bootable USB flash drives. Once Ventoy is installed onto a USB drive, there is no need to reformat the disk to update it with new installation files; it is enough to copy the .iso to the USB drive and boot from them directly....

March 6, 2023 356 words 2 min

Nmap(Network Mapper) For Beginners

Whether you want to scan your network for vulnerabilities or just want to see which ports you have open, nmap can be extremely useful. What is nmap Nmap (Network Mapper) is a network scanner created by Gordon Lyon . Nmap sends packets and examines the answers to find hosts and services on a computer network. For probing computer networks, Nmap offers a variety of functionalities, including host discovery, service detection, and operating system detection....

How Microsoft is monetizing the GitHub code base

Microsoft purchased GitHub in 2018, something many users are not aware of. After Microsoft’s acquisition of GitHub there have been many controversies like blocking private repositories and access to GitHub pages in certain countries and of course, GitHub Copilot. What is Github Copilot GitHub Copilot is an artificial intelligence tool developed by GitHub and OpenAI to assist users of Visual Studio Code, Visual Studio, Neovim, and JetBrains integrated development environments (IDEs) by autocompleting code....

How to Set Up Your Own Git Server: A Simple Guide

Thinking about setting up your own Git server? There are plenty of perks to doing so instead of relying on platforms like GitHub. For starters, you’ll have complete control over your code, ensuring it can’t be used for profit or deleted by anyone but you. What You’ll Need A Computer for Your Server: Ideally running Linux (Debian is a solid choice). Internet Connection: Pretty essential for accessing your server remotely. Another Computer with Git Installed: This is what you’ll use to interact with your server....

Host your own private search engine — searX

We rely on google more and more, but it’s interesting to know how much data Google is now handling. Alphabet aka Google describes its extensive data collection practices in its privacy policy. The company stores an astounding quantity of data. An estimated 15 exabytes of YOUR data are stored by Google. Google is tracking your every move. What is searX? Searx is a free and open-source metasearch engine, available under the GNU Affero General Public License version 3, with the aim of protecting the privacy of its users....

Become anonymous and somewhat untraceable with tails os

In this article we will talk about what tails is and how to install and more. What is tails? Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity.It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB, and leaves no digital footprint on the machine unless explicitly told to do so....

Get ad free web with Pi-hole

In this article, I will show you how to set up Pi-hole. Pi-hole will allow you to block in-app ads, improve your network’s performance, and monitor statistics. Pi-hole also allows you to create a VPN. What is Pi-hole? Pi-hole is a Linux network-level advertisement and Internet tracker blocking application that acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network capability, such as the Raspberry Pi, but can be installed on any Linux machine....

Securing ssh with Key-Based authentication

SSH keys provide an extremely secure way of logging into your server. SSH Password Based VS Key Based Authentication Clients can be authenticated by an SSH server in a variety of ways. The most basic is password authentication, which is simple to use but not particularly secure. The more advanced and secure way is via ssh keys.Brute-forcing a password-protected account is quite possible thanks to modern computing power and automated scripts....

Setup a tor website (hidden service)

In this article i will be showing you how to host your “dark web” aka Tor website for free. What is Tor? Tor — short for the Onion Routing project — is an open-source privacy network that enables anonymous web browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that users’ online privacy is protected. Tor users’ digital data and communications are shielded using a layered approach that resembles the nested layers of an onion....

The importance of open source software

As the linuxfoundation states about 95% of cloud providers run kubernetes which is an open sourced solution, the Apache Web server powers millions of websites including netflix.com, spotify.com and more. Most of the Internets core functions are based on open source technology. But what is it and why is it so important? What is open sourced software? Open-source software is computer software that is distributed under a license that allows users to use, study, modify and distribute the program and its source code to anyone and for any purpose....

Self host your own website

In this article i will show you how to self host your own website securely. Requirements A computer or microcomputer to host the website The computer needs to run linux An internet connection (Its pretty hard without one, trust me) Lets get started! Installation The first thing that we will have to do is setup our nginx site. We first have to be root sudo su If you dont have sudo installed try:...

Raspberry pi security camera

In this article i will show you how to setup a raspberry pi security camera using motion. In the end of this article you will have a fully functioning security camera with a live feed and motion detection. Requirements Raspberry pi or any other computer Web cam Any kind of debian based distro installed on the pi/computer Setup In this article we will be using the motion package (https://motion-project.github.io/) To get started power on your raspberry pi and ssh into the machine or just connect it to a monitor and a keyboard....

How SSH works

If you work in the IT industry, you’ve undoubtedly heard of ssh. But how does it work? SSH (secure shell) is a network protocol that allows two computers to connect securely over the internet. SSH uses encryption to prevent hackers from reading data sent between two connected devices. SSH is divided into three layers: The transport layer The connection layer The authentication layer During and after authentication, the transport layer establishes safe and secure communication between a client and a server....

February 25, 2023 889 words 5 min

Automating your web browser with selenium

Selenium is a very good skill to have as you can automate almost everything that you can do with a web browser. In this tutorial, we’ll learn how to use Python and Selenium to automate a web browser. This is an updated version of my previous article which unfortunately doesn’t work anymore. If you’re a complete beginner, read my python article to understand the basics. (https://4rkal.com/posts/python/) What is selenium? Selenium is an open source umbrella project for a range of tools and libraries aimed at supporting browser automation....

Why computers can’t represent 0.3 accurately

Most people know that adding up 0.1 + 0.2 equals 0.3. However computers represent it as 0.30000000000000004 . Here is a screenshot of it in python3 Your first thought might be that this is just some kind of error. Well its not Why does this happen? Fractions can be represented precisely in the base 10 system (used by humans) if a prime factor of the base is used (10). 2 and 5 are the prime factors of 10....

February 21, 2023 224 words 2 min