Category: Linux
-
SOPS + age + YubiKey
Secure system/data separation with SOPS, age, and YubiKey A reproducible, hardware-backed method to separate executable system logic from sensitive configuration data, while keeping all secrets encrypted at rest in Git. Goal The objective of this architecture is to split a deployed platform into two repositories: Repository Purpose system Scripts, installers, services, deployment logic, executable code…
-
aide-monitor: Context-Aware Integrity Monitoring for Debian Systems
Lightweight, context-aware integrity monitoring for Debian systems, built on top of AIDE.
-
Building a Secure Travel Router with Raspberry Pi, CSF, and Pi-hole
Introduction When connecting to public networks — hotels, airports, cafés — you are effectively placing your devices in an untrusted environment. While VPNs help, they do not give you full control over how your devices communicate with the outside world. In this project, I built a portable travel router using a Raspberry Pi that: This…
-
SyncBlock: Centrally Managing Pi-hole Blocklists Across Multiple Instances
Overview If you run more than one Pi-hole on your network, you’ve probably faced the same frustration: keeping blocklists in sync across all of them is tedious, error-prone, and easy to forget. Each Pi-hole ends up with a slightly different set of lists, maintained separately, with no version history and no easy way to roll…
-
Protected: Resize VirtualBox vdi for ubuntu lvm
There is no excerpt because this is a protected post.
-
Protected: Linux Commands and Scripting
There is no excerpt because this is a protected post.
-
Protected: Howto: Linux and Memory
There is no excerpt because this is a protected post.
