Instead of simply discarding incoming phishing emails from APT actors, I decided to make sure it was loud and clear in mail logs that I discarded them - with attribution.
All tagged security
Instead of simply discarding incoming phishing emails from APT actors, I decided to make sure it was loud and clear in mail logs that I discarded them - with attribution.
Everything on the network is finally done. Oh who am I kidding? Things change constantly between software and hardware updates and upgrades. This just documents a small part of it.
I wanted to use AI but in a way that was responsible, didn’t dig into my privacy, and helped me to get what I want. One might say I am “hacking” AI. Maybe I am. I’m trying to get it to do what I want it to do on my own terms - the essence of hacking. But first, I had to devise a test. Granted, this test is for my needs, but maybe you might find it interesting as well.
I was asked by a friend why I was a supporter of the gay community. I didn’t realize I was, I thought I was just being accepting to everyone.
I did a bit of an experiment with several LLMs and code generation, and one of them actually seemed to perform slightly better from a security perspective.
Unsurprisingly to other techies my server rack has changed over the past year and few months. Warning, nerd territory ahead.
I closed a security hole on my mail server. Granted, one could barely see the hole, and the chances of compromise are quite low, but everything counts. Right? Right?
There are a lot of decent tutorials online about Wireguard setup. I’m not claiming this is one of them, but this is about a real world implementation.
Running Pi-hole in recursive mode has a lot of benefits - especially if you run your own mail server.
To save on server room space as well as power consumption, I migrated three tower systems to Intel NUCs and rack mounted them. Here’s why.
Instead of making predictions, I look back at past predictions, particularly the outlandish ones, just to see how well I did.
Hosting your own Mastodon instance isn’t for everyone, but if you decide to do it, it’s probably easier than you think.
To properly run a mail server, you need your DNS in order. This is my over-the-top method to do just that.
It’s all fun and games until a PRC-sponsored attack group gets personal.
There are reasons I run my own mail server, they may seem paranoid but they are not. Well. not too paranoid...
I moved everything to UniFi, then they had a major breach. I’d do it again the same way regardless.