PinnedBedeHow to Hide API keys and Access tokens in your code.When handling , access tokens or API keys, it is important not to hardcode them into your application. The reason is in order to keep them…Jan 13, 2023Jan 13, 2023
BedeDisplay Images From Google Drive On A Webpage.The inspiration for this post came as I intended to serve images stored in a google drive to a personal static blog site I was building…Jun 13, 2023Jun 13, 2023
BedeCreate You Own Custom Commands In Linux.Ever wondered whether you can have custom commands for specific operations to make your life on the command line easier? — Well it is very…May 19, 2023May 19, 2023
BedeHow To Run Cron Jobs with GitHub Actions.Cron jobs are an important tool for automating tasks on a regular basis. Traditionally, cron jobs have been scheduled using the Linux…May 12, 2023May 12, 2023
BedeAutomate With Cronjob: A Beginner’s GuideCron is a utility that allows users to schedule commands or scripts to run automatically at specific intervals. In simple terms, a cronjob…May 9, 2023May 9, 2023
BedeFive(5) Useful Bash Scripts For System Admins.As a Linux system administrator, you are always looking for ways to automate tasks and streamline processes. One of the most powerful tools…May 8, 2023May 8, 2023
BedeSSH Demystified: A Beginner’s GuideSSH or Secure Shell, is a widely used network protocol that allows users to securely communicate with remote computers over an unsecured…Apr 5, 2023Apr 5, 2023
BedeBasic Networking Commands for Linux System Admins.As a Linux System Admin, having a solid understanding of networking commands is essential for maintaining and troubleshooting network…Apr 5, 2023Apr 5, 2023
BedeWindows Terraform Integration: A Guide to Installing Terraform on Windows (Manual and Package…Imagine having the power to shape and mold your infrastructure with just a few strokes of code. With Terraform, the IaC tool by HashiCorp…Jan 30, 2023Jan 30, 2023
BedeManaging File Permissions In Linux Using Chmod Command.As a multi-user OS, Linux uses the concept of ownership and permissions to protect the system and prevent users from accessing each other’s…Jan 18, 2023Jan 18, 2023