GREENARMOR
Long-form notes that mirror what you can read inside the terminal overlay. Posts stay in Markdown so the floating windows and this page share the same content.
A controversial remark by a Philippine lawmaker referencing actress Anne Curtis has ignited accusations of misogyny. But the incident also raises a deeper question: when celebrities promote sensual…
This article was written after examining BayaniChain’s branding as a “blockchain” solution for government systems. When Polygon, the actual blockchain providing consensus and finality is removed from…
The event branded as “The Great Debate” promised a rigorous exchange on blockchain and public governance. What unfolded instead was a missed opportunity, one where critical infrastructure questions,…
Blockchain grants are not the problem. Architecture is. When public funds are moved onto permissionless chains without safeguards, adoption incentives can quietly turn into long-term risk.
Discussions about blockchain adoption are usually framed as technical debates. In practice, the friction is cultural and procedural. This piece looks at why Web2 and Web3 approaches often clash…
Two days ago, Google officially released the Universal Commerce Protocol (UCP) along with its own [GitHub repository](https://github.com/Universal-Commerce-Protocol/ucp) and published their official…
A detailed guide to extending Terraform Cloud with run-task integrations, private module registries, and automated cost governance so every plan is validated, every module is trusted, and every…
A comprehensive guide to promoting Terraform changes across environments, scheduling drift detection, and enforcing policy-as-code in Terraform Cloud using workspace design, CI pipelines, and…
A detailed continuation that assembles a complete CI pipeline using GitHub Actions and Terraform Cloud, including bootstrap, workspace wiring, backend safety checks, automated import workflows, and…
This post invites you to unlock a complete Terraform toolkit that makes infrastructure automation feel effortless. Designed for newcomers and seasoned engineers alike, it explains how the…
Ni8mare is a critical full-chain exploit affecting the n8n automation platform, combining CVE-2026-21858 and CVE-2025-68613 into a devastating attack path. What begins as an unauthenticated arbitrary…
Wikipedia is often treated as a source of truth, but structurally it was never designed to be one. Built on consensus rather than verification, it excels at accessibility and summaries-but struggles…
In content-driven systems like greenarmor.pw, every shared link should carry context, identity, and intent. This article breaks down how dynamically programmable og:image metadata works, why it…
Greenarmor is not a terminal-themed website. It is a terminal-native system. Every command maps to real logic, every response is intentional, and every interaction favors clarity over distraction.…
Open-Weight AI Models: These models release their trained weights publicly but often under custom “source-available” licenses rather than standard open-source licenses. Open-Source AI Models: These…
Automate VM access by resolving zones correctly to avoid misrouting and interactive prompts.
Inventory core DevOps services and understand how they shape GCP delivery pipelines.
Explore how to enumerate container images and tags to support release auditing and rollbacks.
Combine batch, streaming, and warehouse views to build a coherent map of GCP data services.
Catalog networks, subnets, routes, VPNs, firewall rules, and DNS zones to understand connectivity and exposure.
Walk through export workflows, prerequisites, and operational caveats for reliable Cloud SQL backups to GCS.
Inventory databases and storage services across SQL, object storage, and managed caching for a full persistence map.
Avoid context bleed and concurrent command hazards with isolated kubeconfig workflows tailored for GKE.
Survey GCE, App Engine, Functions, Cloud Run, and GKE to understand your runtime footprint and operational hotspots.
Map IAM roles in use and retrieve secrets safely to build a security-focused operational picture.
Learn how to enumerate enabled APIs and interpret the service footprint that powers each GCP environment.
Set up the GCloud SDK, authenticate safely, and confirm project context so every subsequent inventory step is accurate and repeatable
This guide outlines essential steps to harden a Linux server against unauthorized access and attacks. Follow these best practices to enhance your system's security posture.
Fine-tuning adapts pre-trained LLMs to specific tasks by updating weights on targeted datasets. Key methods include full fine-tuning (updating all parameters), parameter-efficient fine-tuning (PEFT)…
blog list or blog read <id|slug> to open the same posts in a floating window.