Shadow

Tech Tips

Tech tips and tricks to help you.

Top 3 Keyboards to Travel With

Top 3 Keyboards to Travel With

Blog, Hardware, Recent Posts, Tech Tips
Traveling with a full-sized keyboard can be a little tedious. They aren’t easy to travel with, they might not even fit inside your bag if you are trying to travel light. But, we still need them. So, what do we do? We try to find the most convenient keyboard possible by considering what makes a keyboard good for traveling with. This short article will cover what makes a keyboard good for traveling with and gives 3 great, safe, examples that you know you can rely on. What makes a keyboard good for traveling? When finding a keyboard for traveling size matters. The bigger and bulkier a keyboard is, the more inconvenient it is to lug around This is why you might want to consider a foldable keyboard, they pack away much easier allowing you to store them easily in a laptop bag or a small s...

Egrep & Fgrep

Recent Posts, Blog, Linux, Tech Tips
EGREP:             The Command egrep is the same as running grep –E. egrep is used to search for a pattern using extended regular expressions. Terry@f:~/FinderDing>cat testsort A line 1 a line 2 8 line 3 line 4 5 line 5 Terry@f:~/FinderDing>egrep '^[a-zA-Z]' testsort A line 1 a line 2 line 4 *Show lines that start with a letter from alphabet Terry@f:~/FinderDing>cat html <!DOCTYPE html> <html> <body> <h1>My First Heading</h1> <p>My first paragraph.</p> </body> </html> Terry@f:~/FinderDing>egrep "My|first" html <h1>My First Heading</h1> <p>My first paragraph.</p> `*Find lines with pattern My first from html file FGREP: The command fgrep is the same as running grep –F. The Command searches for fixed character strings in a...

Chocolatey Goodness

Windows, Blog, Software, Tech Tips
One of the reasons I prefer Linux over Windows is the ease of package management.Apt, Yum, and Pacman depending on your distribution (Debian:Ubuntu, RedHat/Fedora or Arch) just seem much more logical than the Microsoft App Store or even Apple’s software store. I don’t use the GUI interfaces available on any system if I can carry out the same goal from a terminal. I realize all these systems have a “terminal/Command line” available, but a lot of users have grown accustomed to a graphical point and click method. I haven’t, nor do I enjoy navigating around the screens pointing and clicking - it seems like a waste of time. This is the section that was cutoff PowerShell on the Windows System is an exception. I’ve gotten used to using the Windows command prompt and netshell when po...
Weather Data

Weather Data

Recent Posts, Tech Tips
Weather alerts, weather Alerts, notifications everywhere. The iPhone notifications from multiple weather apps are handy, and when you hear the notification alerts from other people’s phones going off around you, you’re going to look at your screen. Something is going on, or soon will be. In the old days, we listened to our radios for weather forecasts, often the local television station weather broadcast. Later on, the soothing sounds of the Weather Channel’s greatest hits played while our local forecast rolled across the screen in-between weather people pointing to a green screen and looking off-camera to create a less confusing presentation illusion. It all worked very nicely. Now we can view the weather in our computer browsers or on a phone app.You can easily view the weather in...
Meltdown – How much will your CPU be affected?

Meltdown – How much will your CPU be affected?

Software, Tech Tips
Meltdown and Spectre were a hot topic this week for anyone who uses a computer. That would be a huge number of affected systems mainly because Intel chips were highlighted as having a design flaw (apparently for many years) that presents a “potential” Security weakness that could be capitalized on for some malicious activity. ARM and AMD chips also are identified as having the same or similar problems. The issue is how the CPU passes control to the kernel operations, then takes control back. Speculative execution is used to increase performance, but due to the CPU vulnerabilities, sensitive data may be exposed. Meltdown affects the isolation between applications and the operating system. This requires hardening the system against any exploits that could leverage these vulnerabilities. Anyw...