Blog
SSL/TLS Certificate, ACME, and Certbot
This article explains SSL/TLS certificates, the ACME protocol, and Certbot, focusing on how they interact and depend on each other.
SSH Authentication with Pubkey using Fido2
This guide explains how to secure SSH connections using FIDO2 (YubiKey) for authentication and provides a brief overview of SSH basics. Traditional SSH passwords and key files rely on secrets that can be copied or stolen. FIDO2 improves security by using a hardware-backed public/private key pair. The private key never leaves your device, while the public key is stored on the server.
Transfer Files Securely with SCP via PowerShell
To exchange files between Windows and Linux systems, SCP "Secure Copy" can be used, among other things.
Upgrade ESXi-Hosts Version 7.X to 8.0.3
This article describes how to upgrade ESXi hosts within vCenter using vSphere Lifecycle Manager.
PowerShell Modules
A PowerShell module is a package that contains PowerShell code such as functions, variables, workflows, and more — bundled in a reusable format. Modules enable users to import additional commands into their session, making them an efficient way to extend PowerShell’s capabilities.
PowerShell Environment customizing $Profile
$Profile is a PowerShell built-in variable. It actually points to a script file Microsoft.PowerShell_profile.ps1 which will be run every time you start PowerShell. It's more or less like .bashrc or .zshrc in the Linux/Unix world.
Harden Netapp vServer CIFS
CIFS (Common Internet File System) is usually used for file sharing in Windows environments. When running CIFS on a NetApp vServer, security hardening is crucial to prevent unauthorized access and data integrity.
PowerShell Environment Variable $env:
Environment variables in PowerShell store key-value pairs that define system settings. They are inherited from the local Windows operating system and can be accessed using the $env: prefix.
Apple Protect Mail Activity and Pi-Hole
Apple’s "Protect Mail Activity" is a powerful feature designed to enhance your email privacy by masking your IP address and preventing senders from tracking your email activity. However, when combined with Pi-hole, it can lead to unexpected delays in email delivery.