This recipe is for tunneling NFS traffic over SSH. This adds encryption
and Public Key authentication to otherwise insecure NFS traffic.
For this recipe to work, requires NFSv4. Earlier versions were
not tested, but I expect not all the functionality to work.
server configuration
...
This is similar to my previous article
Encrypting Filesystem in Void Linux
but for Alpine Linux
The point of this recipe is to create a encrypted file sytem
so that when the disc is disposed, it does not need to be
securely erased. This is particularly important for SSD devices
...
Keep your data and accounts safe by using a secure open source
password manager to store unique, complex passwords.
Maintaining complex, unique passwords for each site and service you
use is among the most common pieces of advice that security
professionals provide to the public every year.
Yet no matter how many times it is said, it seems like a week doesn't
...
There are plenty of reasons why people would need to encrypt a
partition. Whether they're rooted it in privacy, security, or
confidentiality, setting up a basic encrypted partition on a Linux
system is fairly easy. This is especially true when using LUKS, since
its functionality is built directly into the kernel.
Installing Cryptsetup
...
THIS IS FOR ARCHIVAL PURPOSES. THIS IS OUT-OF-DATE
backup OpenShift
openshift getenv(USER) from OpenShift php
ssh to {user}@{app-domain} gear snapshot > file
Run gear app
OpenShift migration further notes
...
This is a service that let's you get SSL certificates for HTTPS. These certificates are trusted by major browsers. See Let's Encrypt This is a barebones howto to get SSL certificates:
git clone https://github.com/letsencrypt/letsencrypt
cd letsencrypt
This contains the client software for let's encrypt.
./letsencrypt-auto certonly --manual
This will start by updating and getting any needed dependencies and then jump to a wizard like configuration to get this done. Follow the prompts and pay special attention on the prompt used to validate your domain. (You need to create a couple of folders and a file with the right content). Afterwards your certificates will be in:
...
Sometimes we need to connect two or more geographically distributed ethernet networks to one broadcast domain. There can be two different office networks of some company which uses smb protocol partially based on broadcast network messages. Another example of such situation is computer cafes: a couple of computer cafes can provide to users more convinient environment forr playing multiplayer computer games without dedicated servers. Both sample networks in this article need to have one *nix server for bridging. Our networks can be connected by any possible hardware that provides IP connection between them.
Connecting Two Remote Local Networks With Transparent Bridging Technique
Short description
In described configuration we are connecting two remote LANs to make them appearing as one network with 192.168.1.0/24 address space (however physically, presense of bridges in network configuration is not affecting IP protocol and is fully transparent for it, so you can freely select any address space). Both of the bridging servers has two network interfaces: one (as eth0 in our example) connested to the LAN, and second (eth1) is being used as transport to connect networks. When ethernet tunnel between gateways in both networks will be bringed up we will connect tunnel interfaces with appropriate LAN interfaces with bridge interfaces. Schematically this configuration can be following:
...