Monday, January 19, 2026

How Windows Notepad Sabotages Your Bash Scripts (Without Even Trying)

bash scripting

If you’ve ever written a perfectly reasonable Bash script on Windows, copied it to a Linux box, and been greeted by a mysterious ^M or a “bad interpreter” error, congratulations—you’ve met the joys of line endings. Windows Notepad loves to use CRLF (Carriage Return + Line Feed) to end lines, while Linux expects a simple LF. To Linux, those extra carriage returns are like unexpected speed bumps, and your script trips over them before it even gets started.

The problem is that Bash is very literal. When it reads #!/bin/bash^M, it doesn’t politely ignore the weird character—it assumes you’re asking for an interpreter that doesn’t exist. From your perspective, the script looks fine. From Linux’s perspective, it’s wearing Windows shoes on a hiking trail and wondering why everything hurts.

This is where plain old Windows Notepad really shows its age. It’s great for quick notes and passive-aggressive reminders, but it has zero awareness of Unix-style formatting. So you end up writing valid Bash logic that’s wrapped in invalid line endings, and the script fails in the most confusing way possible. Nothing like spending 20 minutes debugging code that’s technically correct but formatted “wrong.”

Using Notepad++ is how you avoid this whole mess. It understands that different operating systems have different expectations and lets you save files with Unix (LF) line endings. That one small setting turns your script from “Why won’t this run?” into “Oh wow, it just works.” Moral of the story: write your Bash scripts with tools that speak Linux, or at least have the decency to translate—your future self will thank you.

Here are the links 

Mobaxterm https://mobaxterm.mobatek.net/

Notepad++  https://notepad-plus-plus.org/







How Real-Time Observability Protects Manufacturers in a Disrupted World

Keep Manufacturing Operations Secure and Resilient




Friday, January 16, 2026

from the web: Cisco IP Source Guard (IPSG) and configuration

From the website:  "IP Source Guard is a security feature on Cisco switches designed to prevent IP address spoofing attacks. It restricts IP traffic on untrusted switch ports by filtering traffic based on the DHCP snooping binding database or manually configured IP-to-MAC bindings."

In January 2026, Internetworks published several networking tutorials focused on advanced IPv6 and routing topics. The January 15 post explains IPv6 route redistribution between different routing protocols like EIGRPv6, OSPFv3, and RIPng, highlighting how to configure redistribution so routes can be exchanged between these protocols in an IPv6 environment. It emphasizes planning to avoid routing loops and using filtering, metrics, and administrative distance adjustments to control the redistributed routes, and includes an example configuration with multiple routers running EIGRPv6, OSPFv3, and RIPng working together.

Earlier in the month, January 12 featured a tutorial on IPv6 EIGRP, detailing the next-generation implementation of Cisco’s Enhanced Interior Gateway Routing Protocol for IPv6. This explained its advantages—such as rapid convergence and separate protocol instances for IPv6—and showed how to enable IPv6 EIGRP on interfaces with addressing and configuration examples. January 4 covered Cisco IP Source Guard, a security feature that prevents IP spoofing on switches by filtering traffic based on DHCP snooping or static IP-to-MAC bindings, along with step-by-step setup instructions.

click on the image to read the article


Cisco IP Source Guard (IPSG) and configuration



We are now accepting technical articles or tool or topic recommendations.  
Just use the Contact form in the top right corner to contact us..



Wednesday, January 14, 2026

My Wifi 'extension cable'

TP-Link AC750 Wireless Portable Nano Travel Router (TL-WR902AC)

There’s something deeply unfair about having perfectly good Wi-Fi but a wired-only device staring back at you like it’s 2006. That’s where the $40 TP-Link AC750 Wireless Portable Nano Travel Router (TL-WR902AC) swoops in like a pocket-sized hero. This thing is absurdly small—about the size of a deck of cards—but somehow manages to solve problems that would otherwise involve sketchy USB adapters, driver hunting, or just giving up. It’s designed for travel, sure, but it’s also perfect for those random “why does this only have Ethernet?” moments.

The real magic for me was using it in client mode. In this configuration, the AC750 connects to an existing Wi-Fi network and then shares that connection out through its Ethernet port.

Translation: your wired-only device suddenly thinks it’s on a wired network. No OS tweaks, no weird hacks—just plug in an Ethernet cable and go. I used it to give a stubborn wired device internet access over my Wi-Fi, and it worked so smoothly it almost felt suspicious. its also a great companion for test tools that only have ethernet ports for admin or out of band access.

Setup is refreshingly painless. You power it up (USB-powered, because of course it is), connect to it, pick your Wi-Fi network, and boom—you’re done. The web interface is simple enough that you don’t need a networking certification or three cups of coffee to understand it. Once configured, it just sits there quietly doing its job, like the best kind of networking gear: the kind you forget about because nothing is broken.

The best part? This little router is cheap, portable, and endlessly useful. Toss it in a laptop bag and suddenly you’re ready for hotels, labs, job sites, or any situation where Wi-Fi and Ethernet refuse to cooperate with each other. The TP-Link AC750 is basically a Wi-Fi interpreter for wired devices, and it does it without drama. For something so small, it delivers a surprisingly big “why didn’t I buy this sooner?” moment.

amazon.com https://amzn.to/45iOR4K

amazon.ca https://amzn.to/4apCB5Y




Make sure you are on the email list for some cool stuff I have planned year by filing out the contact form with the work subscribe in the message  field.

email




Tuesday, January 13, 2026

free Stanford AI course - Language Models from Scratch (CS336)

 

free Stanford AI course - Language Models from Scratch (CS336)

Since the last one i posted got so much attention, i will post a few more.   Enjoy

If you’re eager to master the next frontier in artificial intelligence, Don’t miss the Stanford CS336: Language Modeling from Scratch playlist — a complete, free university-level lecture series now available on YouTube. This playlist guides you through building language models from the ground up, just like the ones behind cutting-edge AI systems. Whether you’re a developer, student, or AI enthusiast, these videos give you firsthand insight into the principles and practices that power today’s large language models. 

What makes this playlist truly valuable is its depth and clarity. Taught by Stanford faculty and researchers, the lectures cover both the theoretical foundations and hands-on implementation details you need to build real language models. You’ll explore tokenization, neural architectures, PyTorch coding techniques, and how language models are trained efficiently — all explained step by step. This level of instruction is rare, especially at no cost.  

Another advantage of this YouTube playlist is its flexibility. You can learn at your own pace, pause and replay complex sections, and revisit topics whenever you need a refresher. This is like having a world-class AI course on demand — no enrollment, no tuition, and no schedule to keep. If you’ve ever wished you could access Stanford-level AI education from anywhere in the world, this playlist makes that possible.  

In a world where language models are reshaping industries — from search and content creation to software development and research — understanding how they’re built is a powerful skill. The Stanford CS336 Language Modeling from Scratch playlist equips you with both the big-picture concepts and the practical know-how needed to advance your career or personal projects in AI. Dive in today and start learning the foundations of tomorrow’s technology.





Monday, January 12, 2026

Why Wireshark Display Filters Are Your Network Superpower

 

If you’ve ever opened a capture in Wireshark and immediately felt like you were staring into the Matrix, display filters are your way out. Learning to use them means you stop looking at all the packets ever and start looking at the ones that actually matter. Instead of scrolling endlessly and squinting at hex like it owes you money, you can narrow things down to exactly what you’re troubleshooting. Less noise, more signal, and way fewer “why is this taking so long?” moments.

One of the easiest and most satisfying wins is filtering by protocol name. In the video, using simple filters like dns, mdns, or nbns instantly cleans up the mess. Want to see only DNS traffic? Type dns and boom—suddenly your capture makes sense. It’s like telling Wireshark, “I don’t care about the other 10,000 packets, its just noise, packet junk or gossip.” This alone can turn a confusing capture into a clear story about what’s actually happening on the network.

Display filters also save a ton of time, which means less frustration and more confidence. When you know how to quickly isolate traffic, troubleshooting feels less like guessing and more like detective work. Is DNS slow? Filter on DNS. Is a connection failing? Filter on TCP. Instead of blaming “the network” (or the firewall, or the ISP, or Mercury in retrograde), you can actually prove what’s going on with a few well-placed filters.

Best of all, learning display filters is one of those skills that pays off immediately and forever. You don’t need to memorize everything—start simple, like protocol names, and build from there. Before long, you’ll look at massive captures and feel calm instead of afraid. And that’s a rare feeling in networking: confidence, clarity, and the smug satisfaction of saying, “Yeah, I filtered that.”









Popular post