Skip to content

2025

SSH Authentication with Pubkey using Fido2

This guide explains how to secure SSH connections using FIDO2 (YubiKey) for authentication and provides a brief overview of SSH basics. Traditional SSH passwords and key files rely on secrets that can be copied or stolen. FIDO2 improves security by using a hardware-backed public/private key pair. The private key never leaves your device, while the public key is stored on the server.

PowerShell Modules

A PowerShell module is a package that contains PowerShell code such as functions, variables, workflows, and more — bundled in a reusable format. Modules enable users to import additional commands into their session, making them an efficient way to extend PowerShell’s capabilities.

Harden Netapp vServer CIFS

CIFS (Common Internet File System) is usually used for file sharing in Windows environments. When running CIFS on a NetApp vServer, security hardening is crucial to prevent unauthorized access and data integrity.

Apple Protect Mail Activity and Pi-Hole

Apple’s "Protect Mail Activity" is a powerful feature designed to enhance your email privacy by masking your IP address and preventing senders from tracking your email activity. However, when combined with Pi-hole, it can lead to unexpected delays in email delivery.