Forgetting the password to your important PDF documents can be disastrous. pdfcrack is a Linux command line tool that can crack the password of any PDF file
Easily Self Host Vaultwarden Using Docker Compose - Tech Addressed
In this tutorial, we'll compare Vaultwarden to Bitwarden and why you would consider using it instead of Bitwarden as well as everything you need to know to get Vaultwarden deployed quickly and easily in your homelab environment using Docker Compose.
How To Setup & Configure A Nginx Reverse Proxy - Tech Addressed
If you run multiple services on your network - especially using Docker - hosting a Nginx reverse proxy is an invaluable tool for making accessing those services easier. With this guide, you'll have Nginx setup and configured in no time. While the bulk of the information regarding configuring Nginx will apply to any Nginx install, the scripts / instructions specific to installing the software will only work on Debian / Ubuntu.
OpenSearch is a community-driven, Apache 2.0-licensed open source search and analytics suite that makes it easy to ingest, search, visualize, and analyze data.
How to Install OpenSearch via Docker on Ubuntu 22.04
OpenSearch is a community-driven project by Amazon and a fork of Elasticsearch and Kibana. In this tutorial, you will install and set up OpenSearch - ...
What is a rogue DHCP server
A rogue DHCP server is an unauthorized DHCP server that distributes knowingly or unknowingly wrong or malicious information to clients that send DHCP discover packets withi
Screen is a terminal multiplexer and has a wide feature set. It allows you to split your terminal window into multiple windows (split screen feature), detach sessions to let commands run in the backgr
Power over Ethernet - or short 'PoE' - allows you to supply DC power for another device over the ethernet network cable. The most common Power Source Equipment (PSE) types are switches and routers (en
TLDR; The following command will create a new SSH key using ED25519 with an auto-generated comment.
ssh-keygen -t ed25519 -f $HOME/.ssh/id_ed25519 -C "$(whoami)@$(hostname)-$(date +'%y%m%d')" SSH Keys The best, and sometimes only, way to connect to a remote SSH server is via an SSH key. Allowing key only access to a SSH server massively reduces an attackers ability to brute force the server and raises the overall level of security.
I won't go into specific cases in this blog post. This is a general guide on how to gather the necessary information that will help you to get your problem fixed.
In this post, I'll use a Linux client
Docker has become the new standard for building your application. In a Docker image we place our source code, its dependencies, some configurations and our application is almost ready to be deployed…