This recipe is for tunneling NFS traffic over SSH. This adds encryption
and Public Key authentication to otherwise insecure NFS traffic.
For this recipe to work, requires NFSv4. Earlier versions were
not tested, but I expect not all the functionality to work.
server configuration
...
This is similar to my previous article
Encrypting Filesystem in Void Linux
but for Alpine Linux
The point of this recipe is to create a encrypted file sytem
so that when the disc is disposed, it does not need to be
securely erased. This is particularly important for SSD devices
...
I am busy moving away from my VeraEdge
installation to a Home Assistant running on a Raspberry Pi 4. This is
because it looks like the maker of the VeraEdge was bought and it is slowly being
phased out.
For this I am using the following parts:
...
This recipe is for setting virtualization on a voidlinux desktop.
Use this setup script to set things up on void linux.
Connecting to libvirtd
Note that virsh and virt-manager commands connect to different libvirtd
sessions by defauult.
virsh defaults to qemu:///session while virt-manager to qemu:///system.
...
Flatpak is a utility for software deployment and package management for
Linux. It is advertised as offering a sandbox environment in which users
can run application software in isolation from the rest of the system.
Flatpak was developed as part of the freedesktop.org project and was
originally called xdg-app.
Snap vs Flatpak
...
This article is about erasing disc drives securely. Specially for SSD
drives, writing zeros or random data to discs is not good enough and
counterproductive.
One way to do secure erase (for disposal) is to begin with an encrypted
disc. However, after the fact the following options are possible:
ATA Secure Erase
...
There are plenty of reasons why people would need to encrypt a
partition. Whether they're rooted it in privacy, security, or
confidentiality, setting up a basic encrypted partition on a Linux
system is fairly easy. This is especially true when using LUKS, since
its functionality is built directly into the kernel.
Installing Cryptsetup
...
Windows system administration is very mouse driven and to reach
all tools you need to browse through Windows explorer.
If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names.
Here is a list of admin tools with their .msc file names.
domain.msc: AD Domains and Trusts
...