Skip to main content

Recently Updated Pages

Resources

Demoscene

About A New HOPE (2022): Demoscene 2022: Electric Boogaloo (YoutTube) - Intro to demoscene fro...

Updated 2 years ago by hxd

Small Operating Systems

Interesting articles

gemini://ew.srht.site/en/2023/20231109-re-small-operating-systems.gmi

Updated 2 years ago by hxd

Kubernetes

Self Hosting Kubernetes

Resources http://carl.schelin.org/?p=1916 Networks Base range Subnet 1 / Usage Sub...

Updated 2 years ago by hxd

Services: Control

Self Hosting Kubernetes

Setup Installation with kubeadm init would set up certificates, configs and initial static kuble...

Updated 2 years ago by hxd

Etcd

Self Hosting Kubernetes

Setup Flags generated by kuebadm init etcd \ --advertise-client-urls=https://192.168.50.247...

Updated 2 years ago by hxd

Automation

Self Hosting Kubernetes

Agro CD

Updated 2 years ago by hxd

Usage

Self Hosting Kubernetes

kubectrl Fish shell completion kubectl completion fish > /usr/share/fish/vendor_completions.d/k...

Updated 2 years ago by hxd

Services: Node

Self Hosting Kubernetes

Kublet exec kubelet --kubeconfig /etc/kubernetes/kubelet.conf \ --container-runtime-endpoint ...

Updated 2 years ago by hxd

XBPS Packages

Linux

I have hosted packages under https://voidlinux.jpastuszek.net. Usage /etc/xbps.d/jpastuszek.c...

Updated 2 years ago by hxd

Ann

Home Network Hardware Specs

BIOS Hardware RAM 1x 8GB 1Rx16 PC4-3200AA SOSIMM SK hynix DDR4-3200 (1600MHz) PC4-256...

Updated 2 years ago by hxd

Self-sovereign identity

Hacking

Identity DID The Laws of Identity Understand the dynamics causing digital identity syste...

Updated 2 years ago by hxd

The Hexagonal Order of Free Knowledge

Hacking

AI generated. Core Beliefs: Openness: The Hexagonal Order believes in the free and open acces...

Updated 2 years ago by hxd

Comprehensive Python Cheatsheet

Interesting articles

https://gto76.github.io/python-cheatsheet/

Updated 2 years ago by hxd

Seizing the means of computation

Interesting articles

https://www.tni.org/en/article/seizing-the-means-of-computation Companies will treat you h...

Updated 2 years ago by hxd

The Rise of Worse is Better

Interesting articles

https://dreamsongs.com/RiseOfWorseIsBetter.html Simplicity -- the design must be simple,...

Updated 2 years ago by hxd

Auth & CPU servers

Plan9

Create user on the file system   Keyfs user database https://plan9.io/magic/man2html/4/keyfs...

Updated 2 years ago by hxd

Listen & services

Plan9

Services https://man.cat-v.org/plan_9/8/listen Start all services matching ls /bin/service/...

Updated 2 years ago by hxd

Tips & Tricks

Plan9

RC key bindings PgUp/PgDn - scroll Home/End - go to top/bottom DEL - terminate program C-f ...

Updated 2 years ago by hxd

Object Capabilities, ACLs & Sandboxing

Hacking

Capabilities Public keys are capability to send you a message that you can grand by giving the...

Updated 2 years ago by hxd

Offline first P2P identity and communication

Hacking

Like SSB but without need for relocation of all data, light on resources. Needs to work on solar ...

Updated 2 years ago by hxd