Skip to content

Blog

SSH Authentication with Pubkey using Fido2

This guide explains how to secure SSH connections using FIDO2 (YubiKey) for authentication and provides a brief overview of SSH basics. Traditional SSH passwords and key files rely on secrets that can be copied or stolen. FIDO2 improves security by using a hardware-backed public/private key pair. The private key never leaves your device, while the public key is stored on the server.

PowerShell Modules

A PowerShell module is a package that contains PowerShell code such as functions, variables, workflows, and more — bundled in a reusable format. Modules enable users to import additional commands into their session, making them an efficient way to extend PowerShell’s capabilities.

Harden Netapp vServer CIFS

CIFS (Common Internet File System) is usually used for file sharing in Windows environments. When running CIFS on a NetApp vServer, security hardening is crucial to prevent unauthorized access and data integrity.

Apple Protect Mail Activity and Pi-Hole

Apple’s "Protect Mail Activity" is a powerful feature designed to enhance your email privacy by masking your IP address and preventing senders from tracking your email activity. However, when combined with Pi-hole, it can lead to unexpected delays in email delivery.

Setting up persistent NFS mount via fstab

Providing storage to your Linux system is a common practice to separate storage from the computing unit. By utilizing a Synology 2-Bay NAS with RAID 1, you can ensure that your important data is secure and easily accessible. This setup not only offers redundancy but also allows for flexible sharing options across different Linux systems.

SAN (Storage) Basic's

A Storage Area Network (SAN) is a specialized network that provides block-level data storage. Unlike traditional file storage, SANs separate storage devices from servers, creating a dedicated, high-performance environment for accessing and managing storage.