System & Network Admin

System & Network Admin

2123 bookmarks
Custom sorting
Create your own Pi-hole in 10 commands
Create your own Pi-hole in 10 commands
It’s really easy to create a DNS server that filters out malicious ads and links. The most popular option is to turn to Pi-Hole, but you will see for yourself that it is far from necessary. This tool requires some maintenance effort and increases the chances of being compromised by having a web environment open to the outside world. With just a server, VPS or Raspberry Pi, and 10 commands we will have our own DNS filter running with fantastic performance. Shall we start? 1 Download Maza Ad Blocking. curl -o maza https://raw.githubusercontent.com/tanrax/maza-ad-blocking/master/maza 2 Grants Maza enforcement permissions. chmod +x...
·programadorwebvalencia.com·
Create your own Pi-hole in 10 commands
New Linux botnet exploits Log4J, uses DNS tunneling for comms
New Linux botnet exploits Log4J, uses DNS tunneling for comms
A recently discovered botnet under active development targets Linux systems, attempting to ensnare them into an army of bots ready to steal sensitive info, installing rootkits, creating reverse shells, and acting as web traffic proxies.
·bleepingcomputer.com·
New Linux botnet exploits Log4J, uses DNS tunneling for comms
Exploring the Lynis Audit Report
Exploring the Lynis Audit Report
Lynis is a free and open-source security auditing tool and released as a GPL licensed project and is available for Linux and Unix-based Operating syst...
·howtoforge.com·
Exploring the Lynis Audit Report
Getting Started with Pre-built Docker Images
Getting Started with Pre-built Docker Images
Images are the fundamental component of docker. In this guide, we will discuss what docker images are, how to build them, how to manage them, and how ...
·howtoforge.com·
Getting Started with Pre-built Docker Images
BTRFS Install | Kali Linux Documentation
BTRFS Install | Kali Linux Documentation
Have you ever wished you could travel back in time after deleting that all important customer report or installing a broken driver just before heading into the board meeting? Well, you better read on, because now you can! All it takes is to install Kali Linux version 2022.1 or newer with btrfs as file system and to enable snapshotting after installation.
·kali.org·
BTRFS Install | Kali Linux Documentation
NordVPN Installation and Review On Linux Systems
NordVPN Installation and Review On Linux Systems
NordVPN has been mentioned across the web by reputable bodies as a deserving representative of the top virtual private networks.
·tecmint.com·
NordVPN Installation and Review On Linux Systems
Setting up Pi-Hole in LXC
Setting up Pi-Hole in LXC
I already have AdGuard installed on the Windows PC (at the network layer), but I'm starting to reconsider running browser extensions and their ilk - they're executing with potentially full rights in the DOM (AdGuard injects JS to manage things
·cricalix.net·
Setting up Pi-Hole in LXC
Downloading Proxmox Container images
Downloading Proxmox Container images
Before you can create a LXC container on a Proxmox virtualized environment, you need to download the template images first from an available list. You need to pre-download the images first befoe yo…
·kevinhooke.com·
Downloading Proxmox Container images
Using LXC
Using LXC
AJ's personal blog
·blog.ayjc.net·
Using LXC