Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

60 total results found

Copy a GPT Partition Table to Another Disk

Linux

Command Syntax To clone GPT partition table command syntax are as following. sgdisk -R <New_Disk> <Existing_Disk> Be sure to take note of the order of the disks. It looks like many commands with a <from> <to> ordering but actually New_Disk is an argumen...

VLAN Segmentation

Network

VLAN 1 (LAN) The primary home network for devices and services that don't need to be publically facing to the Internet. Name LAN CIDR 10.0.1.1/21 Range 10.0.0.1 - 10.0.7.254 VLAN 8 (DMZ) A DMZ for devices and servic...

SPF (Sender Policy Framework)

Email

Introduction Sender Policy Framework (SPF) is an email authentication method designed to detect forging sender addresses during the delivery of the email. SPF alone, though, is limited only to detect a forged sender claimed in the envelope of the email whic...

DKIM (DomainKeys Identified Mail)

Email

Introduction DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in emails (email spoofing), a technique often used in phishing and email spam. source Description DKIM is a more advanced method...

DMARC (Domain based Message Authentication, Reporting and Conformance)

Email

Introduction DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol. It is designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing. ...

Add Custom User Path

Shell Fish

You can use the set command to prepend a new path to your $PATH. set -U fish_user_paths $HOME/.cargo/bin $fish_user_paths `-U or --universal causes the specified shell variable to be given a universal scope. If this option is supplied, the variable will b...

WireGuard

Networking

WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than Op...

Base Install

mini Host Configuration

Operating System Proxmox Virtual Environment 6.x Configuration Proxmox configuration has been transitioned to being automated by an Ansible Role

LXC / backup

blackbox

Description A LXC container running Proxmox Backup Server (PBS) to back up Proxmox Virtual Environment (PVE) instances. Because I prefer running LXC intances instead of virtual machines I used the LXC template for Debian Linux (version 10 - Buster) and the...

LXC / pihole

edge

Description A LXC container running Pi-Hole to provide DNS caching and advertisement blocking. Configuration Resources Hostname CPU Memory backup 2 vCPU 512MB Storage Mount Point Source Mount Path Size Options ...

Subnet IP Ranges

Network

LAN (VLAN1) LAN - The primary home network for devices and services that don't need to be publically facing to the Internet. Subnet VLAN Purpose 10.0.1.0/24 1 Network related infrastructure (dns server, router, switches, etc.) 10.0.2....

VM / firewall (needs verification)

vault

Description This VM is for running VyOS to act as a firewall/router for the network. Originally this machine was running pfSense (which is excellent) but that is based on FreeBSD and I wanted a firewall/router based on Linux. Configuration Resources ...

Serial Console

Linux

Output to Serial Console Make sure the kernel is started with the following parameter… console=ttyS0,115200 Dual Output It is possible to have the kernel write to both the standard pseudo-terminal (tty0) and the serial console (ttyS0) by adding the follo...

Passwords

Linux

Generate Random Password With pwgen (generate 1 password, length 16, with a least a number and uppercase character) pwgen -cns 16 1 Encrypt Password With openssl (encrypt password from password.txt using SHA-512 and random salt) openssl passwd -in passw...

Physical Layout

Network

Physical Hardware

outpost

Basic Components Proectli Vault Compute Processor Intel Celeron Bay Trail-D J1800 64-bit2-cores / 2-threads2.41GHz base, 2.58GHz burst2MB L2 Cache GPU HD Graphics for Intel Atom Processor Z3700 Series Intel Quick Sync Video688...

Base Install

outpost

Operation System Proxmox Virtual Environment 6.x

Systemd

Linux

Introduction systemd is a software suite that provides an array of system components for Linux operating systems. Its main aim is to unify service configuration and behavior across Linux distributions; systemd's primary component is a "system and service mana...

LXC NIC Passthrough

Linux LXC

On the rare occation you have a good reason to forgo the small overhead of an veth (Virtual Ethernet) device connected to an ethernet bridge it is possible to pass a physical network interface directly to a LXC host. To pass a physical device you just need to...

netfilter/iptable logging

Linux LXC

Logging from network namespaces other than init has been disabled since kernel 3.10 in order to prevent host kernel log flooding from inside a container. Source: lxc-users.linuxcontainers.narkive.com There are two ways to get logging working on guests ...