Categories
SecOps

How to log every executed command

Log every executed command to syslog.

Categories
Uncategorized

How to generate password digest for basic authentication of HTTP users

Generate password digest for basic authentication of HTTP users.

Categories
Uncategorized

How to revoke specific key used to login with OpenSSH

Revoke specific key used to perform key-based login with OpenSSH utilizing simple public key revocation list or OpenSSH Key Revocation List (KRL).

Categories
SysOps

How to protect Netdata instance using basic access authentication

Protect Netdata using basic access authentication.

Categories
Uncategorized

How to determine which key was used to login with OpenSSH

Determine which SSH key was used to perform key-based login using public key fingerprint.

Categories
Uncategorized

How to stop requests with empty or incorrect host header

Handle domains that are not defined in the configuration using dedicated backend.

Categories
Uncategorized

How to create VLAN interface using the ip utility

I have already described how to create VLAN interface, but things have changed over time, so I decided to update the know-how.

Categories
SysOps

How to display and verify certificate chain for specific domain

Use openssl utility to display and verify the certificate chain for a specific domain.

Categories
SysOps

How to perform dictionary attack on LUKS passphrase

Perform a dictionary attack on the forgotten LUKS passphrase to access the encrypted device.

Categories
Uncategorized

How to erase LUKS header

Learn how to erase the LUKS header on a specific device.