System & Network Admin

System & Network Admin

1911 bookmarks
Custom sorting
How to Install a Teleport Cluster on Debian 11
How to Install a Teleport Cluster on Debian 11
Teleport is an open-source that can be used as an access plane for your global infrastructure. It provides zero-trust access to various services such ...
·howtoforge.com·
How to Install a Teleport Cluster on Debian 11
SSH - run script or command at login
SSH - run script or command at login
There a multiple use cases to run a script on login. Configuration, starting services, logging, sending a notification, and so on. I want to show you different ways to do so. Example script The examp
·ittavern.com·
SSH - run script or command at login
Exporting History from Firefox
Exporting History from Firefox
I have found recently that Firefox in Linux (Mint 17.3) is very sluggish, I do have Chrome on my system as well but I prefer Firefox for various
·linuxquestions.org·
Exporting History from Firefox
How to Backup and Restore Firefox Profile On Linux
How to Backup and Restore Firefox Profile On Linux
A backup of your Firefox profile enables you to save all your browser data (extensions, history, settings, etc.) on your local machine or any other storage.
·fossmint.com·
How to Backup and Restore Firefox Profile On Linux
Trying Tailscale.
Trying Tailscale.
Like most folks working in infrastructure engineering in 2014, I really enjoyed Google’s BeyondCorp whitepaper. My foremost personal interest was grounded in the fact that Uber’s contemporaneous security implementation didn’t include a VPN, so it was interesting to see a well-thought description of fostering security without over-reliance on a hardened network for employee devices. I had a second, longer-term, personal interest as well, which was never again having to argue with a coworker about why they needed to log into the VPN before accessing a secure resource.
·lethain.com·
Trying Tailscale.
Linux iptables Firewall Simplified Examples - Like Geeks
Linux iptables Firewall Simplified Examples - Like Geeks
Learn about iptables firewall, Chains, Policies, Adding, Deleting, Replacing, Saving and Listing Rules, Block ICMP Packets, Blocking Bad Flags, SYN Flooding
·likegeeks.com·
Linux iptables Firewall Simplified Examples - Like Geeks
auto-encrypt
auto-encrypt
Automatically-provisioned TLS certificates for Node.js servers using Let’s Encrypt.
·codeberg.org·
auto-encrypt
Visual guide to SSH tunneling and port forwarding
Visual guide to SSH tunneling and port forwarding
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you. Topics: use ca
·ittavern.com·
Visual guide to SSH tunneling and port forwarding
50+ Useful Git Commands with Examples for Beginners
50+ Useful Git Commands with Examples for Beginners
This guide highlights the usage of useful Git commands for handling distributed version control on Git-repository management systems like GitHub and GitLab.
·linuxshelltips.com·
50+ Useful Git Commands with Examples for Beginners
Cutover
Cutover
·abuseat.org·
Cutover
Open. Friendly. Community Driven. | PINE64
Open. Friendly. Community Driven. | PINE64
The comments section on the blog will be closed starting December 21 as the website receives an overhaul. In the meanwhile, there is a dedicated thread on the PINE64 Forum to discuss this month'
·pine64.org·
Open. Friendly. Community Driven. | PINE64
Share secrets with public cryptography
Share secrets with public cryptography
Share secrets with public cryptography Software Development, API development, Indutrial IOT
·kevwe.com·
Share secrets with public cryptography
EICAR test file - riskless method to test your antivirus and firewall
EICAR test file - riskless method to test your antivirus and firewall
Disclaimer: There are more meaningful, and more advanced solutions to test your security solutions, but for a quick, simple, and riskless test, the upcoming test files are more than enough. EICAR test
·ittavern.com·
EICAR test file - riskless method to test your antivirus and firewall
Linux - How to work with complex commands
Linux - How to work with complex commands
It can frustrate to work on complex commands in the terminal. I'll present you some tips on how to manage them. If you have another tip, I'd appreciate a quick message. Use backslash\ to add a line b
·ittavern.com·
Linux - How to work with complex commands
nginx - simple and native authentication function
nginx - simple and native authentication function
Important disclaimer: This solution is not secure! - It is fine for a quick and temporary solution for your local network, but it is not a secure solution for important ressources that are available o
·ittavern.com·
nginx - simple and native authentication function
ssh - How to use public key authentication on Linux
ssh - How to use public key authentication on Linux
Disclaimer: Read the whole post before you start. This will help you avoid a lock-out Generating a secure key pair SSH keys use asymmetric cryptographic algorithms that generate a pair of separate
·ittavern.com·
ssh - How to use public key authentication on Linux
SSH server hardening
SSH server hardening
We all know that it is important to secure your machines. I am going to show you some ways to do so. Some are trivial and should be set immediately, and some require some more work. Part 2 will follow
·ittavern.com·
SSH server hardening