This is a post that details how, after a great deal of research and frustration, I figured out how to perform whole-site WordPress acceleration and resiliency with a content delivery network (CDN), using SSL/TLS via Let’s Encrypt!. I run a fair number of WordPress sites, some of which have more need for resiliency to brief… Continue reading CDN, TLS, and WordPress – Oh My!
I’ve created a flowchart that details the flow traffic takes through the various tables and chains of the Linux iptables firewall.
The fail2ban suite is a very useful tool in the battle against brute force login attempts. Where it’s capabilities broke down for me, however, was in addressing repeat offenders. This post includes a configuration to permanently block repeat offenders using the iptables firewall.
This entry contains detailed steps on how to configure a QNAP NAS device to forward log messages via the network over an SSL-encrypted tunnel. All information here should be accurate, but I can’t guarantee there are no errors. I therefore wrap this entire entry in an “it works for me and I hope it also… Continue reading Forward QNAP NAS Syslog Messages Through an SSL tunnel
Acquiring forensic images can be one of the most dreaded steps in most analysts’ processes. It’s documentation-heavy, not terribly interesting to watch, and thanks to the ever-increasing size of commercial hard drives, it can take a LONG time. Thanks to the unrealistic portrayals of this process in movies and TV shows, it’s not uncommon for… Continue reading How Long Will That Image Take?
The procmail utility filters e-mail as it’s received (generally on a UNIX-like server), rather than when you retrieve it with your e-mail client (such as OSX Mail, Mozilla Thunderbird, Microsoft Outlook, etc). As with most UNIX-based utilities, procmail is a very powerful tool for those that take the time to learn how it can be… Continue reading Ultimate procmail Recipe