Teleport is an open-source that can be used as an access plane for your global infrastructure. It provides zero-trust access to various services such ...
There a multiple use cases to run a script on login. Configuration, starting services, logging, sending a notification, and so on. I want to show you different ways to do so.
Example script
The examp
How to Backup and Restore Firefox Profile On Linux
A backup of your Firefox profile enables you to save all your browser data (extensions, history, settings, etc.) on your local machine or any other storage.
Like most folks working in infrastructure engineering in 2014, I really enjoyed Google’s BeyondCorp whitepaper. My foremost personal interest was grounded in the fact that Uber’s contemporaneous security implementation didn’t include a VPN, so it was interesting to see a well-thought description of fostering security without over-reliance on a hardened network for employee devices. I had a second, longer-term, personal interest as well, which was never again having to argue with a coworker about why they needed to log into the VPN before accessing a secure resource.
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you.
Topics: use ca
50+ Useful Git Commands with Examples for Beginners
This guide highlights the usage of useful Git commands for handling distributed version control on Git-repository management systems like GitHub and GitLab.
The comments section on the blog will be closed starting December 21 as the website receives an overhaul. In the meanwhile, there is a dedicated thread on the PINE64 Forum to discuss this month'
EICAR test file - riskless method to test your antivirus and firewall
Disclaimer: There are more meaningful, and more advanced solutions to test your security solutions, but for a quick, simple, and riskless test, the upcoming test files are more than enough.
EICAR test
It can frustrate to work on complex commands in the terminal. I'll present you some tips on how to manage them. If you have another tip, I'd appreciate a quick message.
Use backslash\ to add a line b
Important disclaimer: This solution is not secure! - It is fine for a quick and temporary solution for your local network, but it is not a secure solution for important ressources that are available o
ssh - How to use public key authentication on Linux
Disclaimer:
Read the whole post before you start. This will help you avoid a lock-out
Generating a secure key pair
SSH keys use asymmetric cryptographic algorithms that generate a pair of separate
We all know that it is important to secure your machines. I am going to show you some ways to do so. Some are trivial and should be set immediately, and some require some more work. Part 2 will follow