security

  • NetworkingPi hole on ubuntu 24.04 lts

    Install Pi-Hole in Ubuntu 24.04 LTS

    Pi-Hole is arguably one of the most popular ad-blocking solutions for home networks and home labs. Likewise, Ubuntu is one of the most popular Linux distros around. While Ubuntu 24.04 LTS is still in beta, let’s look at installing Pi-Hole…

  • SecurityWindows 11 security ebook

    Windows 11 Security Ebook Download

    Windows 11 has many security features built into its OS architecture, which helps to provide multiple layers of security. It relies on a structured approach that covers hardware security, operating system security, application security, identity, privacy, and cloud services. Take…

  • ContainersBest docker containers for security in 2024

    10 Best Docker Containers for Security in 2024

    Many are embracing running containers as opposed to running a virtual machines instance for workloads. There are so many great Docker containers users can look at for many different use cases and applications. However, there are also excellent container security…

  • home labFirewalla gold se thumb3

    Firewalla Gold SE Review for Home Lab

    I was recently sent one of the new Firewalla Gold SE devices to test out in the home lab. However, other than the unit being sent to me for my thoughts, this is not a paid review, and I only…

  • DevOpsScan your IaC Code Now

    Terrascan: Cloud Compliance and Security Scanner for IaC

    The world is moving towards cloud-native infrastructure, making infrastructure as code (IaC) a critical part of modern software development pipelines. As businesses increasingly use cloud-native infrastructure, compliance and security violations can emerge as challenges. This is where Terrascan, a comprehensive…

  • Self hostedvaultwardenfeatured

    Vaultwarden Setup with Traefik Self hosted deployment

    With high-profile breaches in cloud-based password managers, many are looking to self-host their password solutions. While Bitwarden is an extremely popular solution, Vaultwarden is an alternative implementation to the official resource-heavy service of Bitwarden. Let’s look at Vaultwarden setup with…

  • SecurityMetallic ThreatWise provides a unique threat deception technology protecting critical assets

    Commvault Metallic ThreatWise Early Threat Detection with Deception Technology

    There is no question that cybersecurity is at the top of the minds of businesses in 2022 and beyond. High-profile ransomware attacks and data breach events continue to plague businesses worldwide with no end in sight. Threat actors continue to…

  • SecurityVMwareESXiransomware

    I created ESXi ransomware its scary easy and why you need proper security

    As I am sure you have been reading about a lot lately, ESXi ransomware is gaining momentum and is becoming widespread. It means we, as VI admins, must stay sharp and fully understand the risks of ESXi ransomware and just…

  • SecuritySSH authentication with Putty

    RDP vs SSH – Which should you choose?

    Remote access is one of the most powerful tools in the toolbelt of an IT admin or helpdesk technician as it allows an IT worker to remotely access, configure, and administrate systems, regardless of whether they are physically near the…

  • VDISecure ThinOX4PC environment with VDI connection configured

    Securing Virtual Workspaces with Praim ThinOX

    No longer are the majority of workers driving into the office. The remote workforce has taken shape and is a trend that will undoubtedly continue. As a result, businesses have had to shift their infrastructure to support a largely remote…