Skip to Content

David Cao

David is a Cloud & DevOps Enthusiast. He has years of experience as a Linux engineer. He had working experience in AMD, EMC. He likes Linux, Python, bash, and more. He is a technical blogger and a Software Engineer. He enjoys sharing his learning and contributing to open-source.

The error message bash: TMOUT: readonly variable indicates that the TMOUT variable has been set as readonly, which prevents you from changing its value in your current session. This is usually done for security reasons, often in a global configuration file, to enforce automatic logouts for idle sessions. To fix this and change the TMOUT …

Read More about Fix bash: TMOUT: readonly variable Error in Linux

Addressing SSH auto-logout issues often involves configuring two key settings: the TMOUT shell variable and the StopIdleSessionSec setting in /etc/systemd/logind.conf.  Each plays a distinct role in session management and inactivity handling. TMOUT Variable: A Bash shell setting that defines the maximum idle time before automatic logout. It is crucial for users experiencing undesired SSH disconnections …

Read More about Fix SSH timed out waiting for input: auto-logout in Linux

The XLOOKUP function in Excel includes an argument for “match mode,” which is crucial for determining how the function matches the lookup value with values in the lookup array. XLOOKUP(lookup_value, lookup_array, return_array, [if_not_found], [match_mode],[search_mode]) This affects how the function searches for and identifies the value being sought. Below is a breakdown of the different match …

Read More about Understanding Match Mode in Excel’s XLOOKUP Function

Excel is one of the most popular spreadsheet software used by millions of people worldwide. It offers a wide range of functions and features that help people in data analysis, manipulation, and management. One of the powerful features of Excel is the XLOOKUP function which allows users to look up a specific value in a …

Read More about #N/A error in XLOOKUP: Understanding the concept and exploring 5 ways to fix it

In today’s digital age, it is becoming increasingly important to sign electronic documents using electronic signatures instead of traditional handwritten signatures on paper. One challenge that arises is how to convert a paper-based signature into a transparent electronic signature within a Word document. In this article, we will explore how to achieve this and provide …

Read More about Converting Handwritten Signatures to Transparent Electronic Signatures in office Word

As an Excel user, you have likely encountered the problem of having unwanted spaces within your cell contents. Whether it’s due to importing data from another source, copy-pasting, or simply typing too quickly, it’s important to know how to swiftly remove those blank spaces to avoid errors in your work. In this article, we will …

Read More about 7 Ways to Remove Blank Spaces in Excel

The SUMIFS function in Excel is a powerful tool used for adding up values in a range based on multiple criteria. It extends the SUMIF function to allow for multiple criteria. SUMIFS Syntax SUMIFS(sum_range, criteria_range1, criteria1, [criteria_range2, criteria2], …) sum_range: The range of cells to be summed up if they meet the specified criteria. criteria_range1: …

Read More about 10 Advanced Excel SUMIFS Function Examples to Boost Your Data Management Skills

Introduction Linux stands as a bastion of network management, offering a suite of powerful tools and commands for effective network administration. Among these, understanding and managing network interfaces is a crucial skill for any Linux system administrator. Network interfaces in Linux are the points through which devices communicate with external networks. This article delves into …

Read More about 3 Linux commands to list network interfaces

An SSL certificate chain comprises a sequential arrangement of certificates, including the SSL/TLS Certificate and Certificates from Certificate Authorities (CAs). This chain allows the recipient to authenticate the credibility of the sender and the involved CAs. Within each certificate, there’s data about its issuing authority, serving as a successive connection in the chain. The typical …

Read More about How to verify the Order of SSL Certificate Chains Using OpenSSL