In this tutorial, I'll be setting up a pair of authoritative DNS servers using the NSD DNS server daemon.Master : ns1.example.etherarp.net Slave : ns2.example.etherarp.net Both will receive public
This script will detect if SSH has inadvertently been exposed to the outside world.
It would be neat if my wireless access point could bridge directly to my cable modem so that clients would have proper public IP addresses. Being directly connected to the internet significantly increases vulnerability so the aim is to address this with a bridge firewall.
This tutorial will demonstrate how to create reactive firewall rules. If a device attempts to communicate with known malware command-and-control servers, the potentially compromised device will be added to a blacklist, and its internet access will be immediately disabled.
In this tutorial, we will use a cheap usb modem to send SMS messages over the internet. It can be accessed via a Web GUI or command line
This tutorial will show how to route all the traffic belonging to particular user account through an OpenVPN tunnel
This tutorial will show you how to set up a blog using Cloudflare and Ghost. Cloudflare will improve performance and security by acting as a caching reverse-proxy.
This is a comprehensive list of examples for the sed (stream editor command). This command is used to find, replace, refactor, and modify text.
This tutorial is a beginner friendly introduction to the iptables firewall and includes a number of practical examples.
Released in April 2018 by Cloudflare, 126.96.36.199 is a very attractive choice for resolving your DNS queries. It claims to be the fastest although it depends on your location. It
Today we will learn about loopback addresses that can be reached from the outside via routing. This is useful for running services on a router In a previous post, I talked about the
This tutorial creates rules to limit traffic (both ingress/egress) only to gateway. This prevents traffic from other patrons reaching you when using public wifi
Ferm is a 'frontend' for iptables written in Perl. The best way to describe it is a firewall compiler (although it can do more than that, as we'll see later). Ferm provides a syntax that is simple, rich, and flexible for writing rules, ferm then generates a list of iptables rules.
Today we will learn how Docker volumes work and use it to synchronize the contents of this website between the remote server hosting the production and the local workstation (for modifying) In a
A primitive port scanner can be constructed using solely the bash shell via its /dev/tcp virtual file. The script will scan common ports, and if an open port is found, it will display a base64 encoded output of the servers response.
The Ubiquti Edgerouter Lite has an iptables based firewall. For each firewall rule (and named set of ules) there is a is an option to enable LOG. Unsolicited traffic to tcp ports, especially
Stunnel is a tool that allows you to seamlessly add TLS to most existing services. Stunnel listens on a port, and can either receive encrypted traffic and pass it to an unencrypted destination,
The loopback interface is most familiarly encountered as 127.0.0.1 and is referred to as the local loopback address. This address is present on every IPv4 host and is given the
So this is one application of the SMS gateway. My home internet gets its address via DHCP, however, unless something goes wrong, the addresses are usually reasonably persistent (generally at least 10 days)
The command known as ss which stands for socket statistics. It is used for listing listening and established connections and to find out which processes and users are associated with them. Finding all