OSSEC creating ‘ignore’ rules
For automated log monitoring and alerting, several years ago I decided to start using OSSEC. The nice thing about OSSEC
Read moreFor automated log monitoring and alerting, several years ago I decided to start using OSSEC. The nice thing about OSSEC
Read moreSeems like nowadays everyone has his or her own shell prompt, one even fancier than the other. After being to
Read moreSome while ago, I stumbled across a nice 7″ display ordered at aliexpress at one of my friends. Since I
Read moreRecently I decided to stop breaking stuff on my web server, dns server and other internal infrastructure. It simply takes
Read moreSince we still have one windows computer at home (my wife’s laptop), my file server runs samba. Some days, I
Read moreAs long as I know, on a linux system the wired devices were called eth0, eth1, eth2 etc. Wireless devices
Read moreHalfway past November, a vulnerability in the LUKS Full-disk encryption for linux systems was discovered (CVE-2016-4484). Since I use this
Read moreLast month I started working on something that feels extremely counter-intuitive. Building targets for a hacking ‘Capture The Flag‘ event.
Read moreFinding the right base-tools Since this is my very first home-automation project, I needed to have some tooling to verify
Read moreAfter getting all elements delivered at home, the next step in realizing the home automation part is putting it all
Read more