Cosmic Bytes π
Welcome to Cosmic Bytes! This is where I write about my learnings and interests and share them with the world.
Most content is centered around software development and linux system administration (self-hosting), but my interests are diverse, and you may find posts relating to many other topics, such as physics, urban development, sociology, and many others! Hope you enjoy!
Recent Posts
- Reactivity and Reactive Programming- Nearly all modern browser UI frameworks boast Reactivity as a core feature. What is Reactivity all about? Is it useful or applicable outside of frontend development? what is the hype all about anyways? read article
- The Finite State Machine- The Finite State Machine is a model of computation that is important in the study of the theory of computation, and has various practical applications. read article
- Messaging in Distributed Systems (Pub-Sub, Message Queues, etc)- Exploring the messaging design pattern in distributed systems at a high level. What benefits could it provide to a distributed system, and what are the disadvantages and limitations? read article
- Securing SSH With Passwordless Public Key Authentication- SSH public key authentication adds a ton of security, convenience, and scalability compared to traditional password authentication. Let's see how easy it is to setup, and whether you should use it or not. read article
- What is the Fediverse, and Frequently Asked Questions- The Fediverse is an interesting take on the world of social networks, but is surrounded by a degree of jargon and mystery. Let's answer some of the commonly asked questions about it! read article
- Demistifying Containers and Docker- What exactly is a container? what exactly is happening when I run my application in a (Docker) container? What is the benefit, and do I truly need this complexity in my project? read article
- Unix Permissions - Part 3: Devising a Security Model- Securing files or systems using learnings from the previous parts of this series about Unix Permissions and their CLI apps. read article
- Unix Permissions - Part 2: chmod and Other Permission Command-line Apps- Exploring various command-line tools for working with Unix Permissions, and taking a deep dive into two of the most important ones: chmod and chown read article
- Unix Permissions - Part 1: Anatomy of Permissions- Diving into the traditional Unix permission system, which is essential for working in the command line on Linux and Unix-like systems. We will explore how the permission system works and how its individual components tie together. read article
- Customizing Find and Replace in the Command Line- Exploring how to perform find and replace in the command line and looking into many options to customize and improve it, including making it recursive and applying it to many files and directories, previewing changes, and adding a confirmation prompt, learning general command line concepts on the way. read article