Author/Consultant Jeremiah L. Byerley
Jeremiah Byerley is a technical consultant & author who helps individuals and businesses develop the confidence and habits they need to be competitive in the information age. Jeremiah has unique insight in California’s South Coast working for companies such as Santa Barbara’s Higher Octave Music and Ojai’s Lynda.com with a wealth of international experience consulting for EMI, Activision, IDIMedia (Blaylock & Company), Anysoft and a contributor for online syndication company, Storyful. The news & tutorials on this site feature articles written by Mr. Byerley and curated selections from other authors to keep you on the edge of technology and security. For consultations requests, please contact Jeremiah.

Linux distros RAM consumption comparison (updated, 20 distros – flavours compared) .t3_5l39tz ._2FCtq-QzlfuN-SwVMUZMM3 { –postTitle-VisitedLinkColor: #9b9b9b; –postTitleLink-VisitedLinkColor: #9b9b9b; }

Top 5 lightweight distros / flavours: (system, Firefox, file manager and terminal emulator launched) Debian 9 XFCE (345 MB) Lubuntu (406 MB) Solus (413 MB) Debian 9 KDE (441 MB) and Debian 8 GNOME (443 MB) Xubuntu (481 MB) After doing Ubuntu flavours RAM consumption comparison, I decided to test other popular distros too. Tests […]

How do I run a script at start up? [duplicate]

You will need root privileges for any the following. To get root, open a terminal and run the command sudo -i and the command prompt will change to ‘#’ indicating that the terminal session has root privileges. Alternative #1: Add commands to /etc/rc.local vi /etc/rc.local with content like the following: # This script is executed […]

Mount Remote FTP Server Folder as Local Directory on Linux / Ubuntu / Debian / Raspberry / Raspbian

Mount Remote FTP Server Folder as Local Directory on Linux / Ubuntu / Debian / Raspberry / Raspbian 2019-11-16 by Gábor Hargitai 1 min read Have a remote FTP server directory mounted locally is pretty convenient for cross-server copying. It could also come in handy if you would like to copy content from your NAS […]

gotop: Graphical System Monitor For The Command Line

gotop is a terminal-based (TUI) system monitor for Linux and macOS. The software is inspired by gtop and vtop, but while these 2 utilities use Node.js, gotop is written in Go. The command line tool supports mouse clicking and scrolling, comes with vi-keys, and it displays the CPU, memory and network usage history using colored […]

Resetting the Logitech bluetooth keyboard

Resetting the Logitech bluetooth keyboard The Logitech K810 has been my favorite keyboard for many years. I have one at home and one in the office. It allows to easily switch between 3 different devices. It has the same size and layout as most notebooks, is stylish, and a blast to type. But one day […]

DuckDuckGo Tracker Radar Exposes Hidden Tracking

DuckDuckGo Tracker Radar is a best-in-class data set about trackers that is automatically generated and maintained through continuous crawling and analysis. This data set is now publicly available to use for research and for generating tracker block lists. And, the code behind it is now open source. We use it ourselves to power the tracker […]

Meaning Behind the Phrase to Cross the Rubicon

To cross the Rubicon is a metaphor which means to take an irrevocable step that commits one to a specific course. When Julius Caesar was about to cross the tiny Rubicon River in 49 B.C.E., he quoted from a play by Menander to say “anerriphtho kybos!” or “let the die be cast” in Greek. But […]

Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication

The recently disclosed Jeff Bezos phone hack and other incidents show that mobile devices are being increasingly targeted by sophisticated nation-state attackers. NEW ORLEANS – Sophisticated nation-state groups are increasingly using mobile devices as an infection vector. Oded Vanunu, head of products vulnerability research at Check Point research, told Threatpost during CPX 360 this week […]

Sodinokibi Ransomware Group Sponsors Hacking Contest

Larger winnings for underground skills competitions are attracting sophisticated crime groups. White hats aren’t alone in holding hacking contests. Russian-language cybercriminals are known for running similar competitions on underground forums. However, an analysis of Dark Web activity has uncovered a trend towards offering increasingly high-stakes prizes during such battles. At the same time, increasingly sophisticated […]