About:

SysAdmin with a focus on software testing, performance, and privacy, sharing insights on ITTAVERN.COM.

Website:

Specializations:

Interests:

Testing new software and tools Performance Clean design Privacy

Incoming Links:

Outgoing Links:

Sam Bleckley
Subscribe to RSS:
This article explains how to use SSH keypairs to encrypt messages using the 'age' tool in Ubuntu 24.04. It discusses the limitations of certain SSH key types for encryption, provides installation guidance, and details the usage of...
The author discusses the development of their own static site generator, picopaper, which they created to simplify their blogging experience compared to using Hugo. They express a preference for a more straightforward tool that al...
This article explains how to use SSH keypairs to encrypt messages using the 'age' tool in Ubuntu 24.04. It discusses limitations of certain SSH key types for encryption, specifically mentioning that sk-* and ECDSA keys are not sui...
This article provides a step-by-step guide on configuring nginx to log in a structured JSON format and setting up Grafana Alloy to aggregate and display these logs in Loki. It assumes the reader has two Linux servers, one for ngin...
The article explains the concept of ETags (Entity Tags) in HTTP response headers, which help in efficient caching by allowing clients to check for new resource versions before downloading. It discusses weak and strong ETags, their...
The blog post discusses various updates and changes made to ITTavern.com, including design changes, the addition of Zabbix as a monitoring solution, changes to the RSS feed, security headers, and the addition of a small blog platf...
The article discusses the use of dummy IP and MAC addresses for documentation and sanitization purposes. It highlights the importance of using reserved IP and MAC address ranges to avoid security and privacy issues. The article li...
The blog post provides a detailed guide on deploying the ISSO commenting system for static content using Docker. The author explains the setup process, including configuring the backend server with Docker and nginx, setting up a r...
The blog post discusses the generation of Vanity v3 Hidden Service Onion Addresses using the tool mkp224o. It begins with a brief history of onion addresses, explaining the transition from V2 to V3 for enhanced security and privac...
The blog post provides a comprehensive guide on using ssh-audit, a lightweight, open-source tool for auditing SSH clients and servers. It supports both SSH versions and is available for Linux and Windows. The article explains the ...
The blog post discusses the use of mtr, a network troubleshooting tool that enhances the capabilities of traceroute by providing detailed information about network nodes. It focuses on using mtr on Linux with ICMP, explaining how ...
The blog post outlines the author's personal backup strategy, focusing on the organization and reasoning behind it rather than technical details. The strategy prioritizes the protection of important data such as family photos, cry...
The blog post discusses recent updates to the ITTAVERN.COM website, including the addition of a comment section using the self-hosted isso-comments platform, which allows for anonymous comments and requires approval for new commen...
The blog post discusses the user authentication process in iperf3, focusing on the use of passwords and RSA public key pairs. It highlights the security update in version 3.17, which addresses a side-channel attack, and provides b...
The blog post discusses the use of trash-cli, a tool that provides a trash can functionality for the Linux command line interface (CLI). Unlike the rm command, which permanently deletes files, trash-cli allows users to 'trash' fil...
The blog post provides a guide on measuring bandwidth using netcat on Linux, specifically on rockOS 8. It explains the use of nmap-ncat for testing, highlighting that it uses TCP by default and avoids disk I/O limitations. The pos...
The blog post is a comprehensive guide on using the rsync command-line tool for data transfer, backup, and mirroring. It focuses on using rsync over SSH and provides detailed instructions on syntax, options, and use cases. Key fea...
The blog post provides a comprehensive guide on setting up and managing cron jobs on Linux systems, specifically using Ubuntu 22.04 and rockyOS 9.2 as examples. It covers the basics of cron jobs, which are scheduled tasks that aut...
The blog post is an updated guide on SSH server hardening, focusing on configuration changes to enhance security. It emphasizes testing changes in a controlled environment and warns against blindly copying configurations. Key reco...
The blog post discusses port knocking as a security measure to protect services like SSH by only allowing connections after a specific sequence of port hits. The author uses knockd on Linux Ubuntu 22.04 LTS to demonstrate the setu...
The blog post provides a comprehensive guide on getting started with rclone, an open-source data synchronization tool for cloud services. It covers the initial setup and data transfer using Linux as a reference system. The post ex...
The blog post provides a detailed guide on setting up a Cisco ISE backup to an SFTP repository using public key authentication. It outlines the necessary prerequisites, including access to Cisco ISE via GUI and CLI, an SFTP server...
The blog post provides a basic introduction to using the 'dig' command for DNS troubleshooting. It explains that 'dig' stands for 'Domain Information Groper' and is a tool used to obtain information about domain names, serving as ...
This blog post provides a comprehensive guide on getting started with Fail2Ban on Linux, specifically using Ubuntu 22.04 LTS. It explains how Fail2Ban enhances server security by monitoring logs for suspicious activity and banning...