siege Web-site benchmark tool


Run the benchmark siege test to simulate 50 clients accessing 10 random cached pages.

siege -b -c 50 -r 10 -i -f urls_list.txt

  • -b benchmark mode, no delay between intereation
  • -c <num> concurrent number of concurrent users
  • -r repititions - tells how many times each user should run
  • -i internet mode, read URLs from urls.txt file in random order
  • -d <seconds> delay between page request, can be 0.1
  • -m "<string>" log message to log file for this run
  • -f <file> path to file with URLs one per line unlike command line argument the URLs in the file or not quoted
    •  The file also supports UNIX-style commenting:

               # Comment looks like this



      POST homer=simpson&marge=doestoo

    • <scheme>://<username>:<password>@<hostname>:<port>/<path> POST <query>

Summary - Unreasonable Hospitality

Unreasonable Hospitality by Will Guidara

Unreasonable hospitality and its effects on your business

Unreasonable. This word has long screamed negativity, whether it’s your kid insisting on buying an expensive toy, a coworker who doesn’t compromise for the good of the project, or your mom refusing to listen to your sentiments. But what if you learn that being unreasonable could actually be a good thing?

In the service industry, hospitality is all about making people feel cared for, but when you add "unreasonable" to the mix, it takes things to a whole new level. Unreasonable hospitality is all about providing your customers with a unique, tailor-made service that makes them feel not just cared for but like real VIPs.

It’s not just about meeting expectations, it’s about exceeding them. And this act of going above and beyond creates an unforgettable encounter that’ll linger in people’s memories long after the experience is over.

How To Configure Varnish Cache with Apache Reverse Proxy and SSL Termination

Based on site: PlumRocket

In this guide, we will show you how to install and configure the Varnish cache for the Apache webserver with SSL termination. One limitation of Varnish Cache is that it is designed to accelerate HTTP, not the secure HTTPS protocol. Therefore, some workarounds must be performed to allow Varnish to work on SSL enabled website.

SSL/TLS Termination is the process of decrypting SSL-encrypted traffic. In our case, Apache acts like a proxy server and intermediary point between the client and Varnish and is used to convert HTTPS to HTTP.


Step 1. Install and Configure Apache (Backend) on CentOS/RHEL 8

We had CentOS 8 installed on our web server, which uses dnf package manager. However, if you are familiar with Linux systems, you can apply this manual almost entirely to other OS, such as Centos 7 (use yum) or Ubuntu and Debian (use apt instead).

How to install Wiki.js on Ubuntu 22.04

This guide is a fully detailed guide to install everything necessary to run Wiki.js on a brand new Ubuntu 18.04 / 20.04 / 22.04 LTS machine.

What's Included

At the end of the guide, you'll have a fully working Wiki.js instance with the following components:

  • Docker
  • PostgreSQL 11 (dockerized)
  • Wiki.js 2.x (dockerized, accessible via port 80)
  • Wiki.js Update Companion (dockerized)
  • OpenSSH with UFW Firewall preconfigured for SSH, HTTP and HTTPS

Update Ubuntu

sudo apt -qqy update

sudo DEBIAN_FRONTEND=noninteractive apt-get -qqy -o Dpkg::Options::='--force-confdef' -o Dpkg::Options::='--force-confold' dist-upgrade

Install Docker

Raspberry PI Pico W motion and light sensor relay

At first I thought I would need to use a PI Pico to control a automatic light in my garage.  I started off by buying the following, but then I learned that just the RCWL-0516 Switch Module could do it all without the need for the PI Pico.

Radar Sensor RCWL-0516 Switch Module

Songhe RCWL-0516 RCWL0516 Microwave Radar Sensor Module,Human Body Induction Switch Module,Motion Induction Switch Sensor Module 5-7m 4-28V 5pcs

At CDS you can add a LDR (light-dependent resistor) to do motion detection during night only. For example, if you need to use this module for motion sensing light for outdoor, then LDR is a must. Without LDR light will glow in daytime also which is the waste of electricity.

(details here)

Amazon 8 pcs for $9.59



Resistor 5516 GL5516 5mm 0.5 Mohm Photoresistor

Chanzon 20pcs LDR Resistor 5516 GL5516 5mm 0.5 Mohm Photoresistor Light-Dependent Photoconductor 20pcs Photo Light Sensitive

(details here)

Tinkercad meshes are limited to 300,000 triangles

File too large. Tinkercad limits imported files to 25MB.

This shape's mesh is too complex. Tinkercad meshes are limited to 300,000 triangles.  Try simplifying the mesh before re-importing it.

Sometimes a STL file has too much detail for Tinkercad.  If you just want to view what is in the file you can try gmsh.

$ sudo apt install gmsh
$ gmsh &

MeshLab, open source and free for Windows, Mac and Linux

Polygon reduction with MeshLab

Mesh reduction


$ sudo apt install meshlab

or Download MeshLab

or Download Meshmixer

From the menu, select Filters > Remeshing, simplification and construction > Quadratic Edge Collapse Detection. If your model is textured, there is also an option (with texture) that will do a good job at keeping your textures positioned properly. A panel with a few options will show up. 

Here are the optimal option settings: 

Data Breach Reports

Verizon Data Breach Investigations Report (DBIR).


  • Verizon Data Breach Investigations Report 2022

    The DBIR was created to provide a place for security practitioners to look for data-driven, real-world views on what commonly befalls companies with regard to cybercrime. 

    The past year has been extraordinary in a number of ways, but it was certainly memorable with regard to the murky world of cybercrime. From very well publicized critical infrastructure attacks to massive supply chain breaches, the financially motivated criminals and nefarious nation-state actors have rarely, if ever, come out swinging the way they did over the last 12 months. As always, we will examine what our data has to tell us about these and the other common action types used against enterprises. This year the DBIR team analyzed 23,896 security incidents, of which, 5,212 were confirmed data breaches.

  • Incident Response Under GDPR: What to Do Before, During and After a Data Breach