System & Network Admin

System & Network Admin

2075 bookmarks
Custom sorting
How to Install and Use Nginx Proxy Manager with Docker
How to Install and Use Nginx Proxy Manager with Docker
A reverse proxy is a web server that can sit in front of another web server or a web service. It can encrypt outgoing traffic, act as a load balancer,...
·howtoforge.com·
How to Install and Use Nginx Proxy Manager with Docker
TCP MSS Clamping – What Is It and Why Do We Need It? « ipSpace.net blog
TCP MSS Clamping – What Is It and Why Do We Need It? « ipSpace.net blog
This (not so very) short video explains what TCP MSS clamping is and why we’re almost forced to use it on xDSL (PPPoE) and tunnel interfaces. TL&DW summary: because Internet-wide Path MTU Discovery rarely works.
·blog.ipspace.net·
TCP MSS Clamping – What Is It and Why Do We Need It? « ipSpace.net blog
How to Create Custom 404 Error Page in NGINX
How to Create Custom 404 Error Page in NGINX
Every time NGINX encounters an error as it attempts to process a client’s request, it returns an error. Each error includes an HTTP response and description.
·tecmint.com·
How to Create Custom 404 Error Page in NGINX
Introduction To SSH Tunneling
Introduction To SSH Tunneling
Did you know that you can actually bypass firewalls with SSH Tunneling? Today, I am going to give you a smooth introduction to SSH Tunnelling and we shall later see its other use cases and client applications out there. SSH is basically a client-ser...
·blog.octachart.com·
Introduction To SSH Tunneling
Please stop writing shell scripts
Please stop writing shell scripts
It is quite difficult to write correct shell scripts; you’re much better off just using Python.
·pythonspeed.com·
Please stop writing shell scripts
Bitwarden Self-Hosting - 12 Months Later
Bitwarden Self-Hosting - 12 Months Later
For the longest time, I used LastPass as my password manager of choice. It was easy to use, I didn’t have to host anything, and hence I…
·itnext.io·
Bitwarden Self-Hosting - 12 Months Later
Create your own Pi-hole in 10 commands
Create your own Pi-hole in 10 commands
It’s really easy to create a DNS server that filters out malicious ads and links. The most popular option is to turn to Pi-Hole, but you will see for yourself that it is far from necessary. This tool requires some maintenance effort and increases the chances of being compromised by having a web environment open to the outside world. With just a server, VPS or Raspberry Pi, and 10 commands we will have our own DNS filter running with fantastic performance. Shall we start? 1 Download Maza Ad Blocking. curl -o maza https://raw.githubusercontent.com/tanrax/maza-ad-blocking/master/maza 2 Grants Maza enforcement permissions. chmod +x...
·programadorwebvalencia.com·
Create your own Pi-hole in 10 commands
New Linux botnet exploits Log4J, uses DNS tunneling for comms
New Linux botnet exploits Log4J, uses DNS tunneling for comms
A recently discovered botnet under active development targets Linux systems, attempting to ensnare them into an army of bots ready to steal sensitive info, installing rootkits, creating reverse shells, and acting as web traffic proxies.
·bleepingcomputer.com·
New Linux botnet exploits Log4J, uses DNS tunneling for comms
Exploring the Lynis Audit Report
Exploring the Lynis Audit Report
Lynis is a free and open-source security auditing tool and released as a GPL licensed project and is available for Linux and Unix-based Operating syst...
·howtoforge.com·
Exploring the Lynis Audit Report
Getting Started with Pre-built Docker Images
Getting Started with Pre-built Docker Images
Images are the fundamental component of docker. In this guide, we will discuss what docker images are, how to build them, how to manage them, and how ...
·howtoforge.com·
Getting Started with Pre-built Docker Images
BTRFS Install | Kali Linux Documentation
BTRFS Install | Kali Linux Documentation
Have you ever wished you could travel back in time after deleting that all important customer report or installing a broken driver just before heading into the board meeting? Well, you better read on, because now you can! All it takes is to install Kali Linux version 2022.1 or newer with btrfs as file system and to enable snapshotting after installation.
·kali.org·
BTRFS Install | Kali Linux Documentation
NordVPN Installation and Review On Linux Systems
NordVPN Installation and Review On Linux Systems
NordVPN has been mentioned across the web by reputable bodies as a deserving representative of the top virtual private networks.
·tecmint.com·
NordVPN Installation and Review On Linux Systems