The Operator’s KVM Bible

When the enterprise behind one of the widespread hypervisors was acquired:
many sysadmins decided to move on.

  • Most of them chose a Linux-based open-source alternative.
  • Many of them migrated to the Microsoft ecosystem.
  • They chased the same workflow, the same features they had before.

Only a very few operators dared to rework their processes and architecture.

KVM (Kernel-based Virtual Machines) is part of the Linux kernel.
It is a stable and fast hypervisor.

  • A carefully configured host OS for KVM can reduce the attack surface compared to feature-heavy hypervisors.
  • The libvirt API enables secure automation and configuration management.
  • KVM can host Linux, Windows and BSD virtual machines as well.
  • It ships an ecosystem of mature tools for the operators in charge.

KVM is not a downgrade. It’s a sideways step.

Continue reading “The Operator’s KVM Bible”

Gitea – Ansible Installer Role

Automation and configuration management are not just about comfort.
They provide security, auditability and operational freedom.

For this reason Tom’s IT Cafe provides an Ansible role that:

  1. Downloads and installs the Gitea Linux binary
  2. Sets up a system service (as a non-root user)
  3. Sets up PostgreSQL (or SQLite for lightweight setups)
  4. Optionally sets up a reverse proxy with Certbot or self-signed keys
  5. Highly configurable through variables

The role focuses on a small, auditable code base with strong security.

Continue reading “Gitea – Ansible Installer Role”

Gitea – Your Self-Hosted Git Platform

You feel the comfort of the cloud – low maintenance, fast setup.
Your source code, configuration and files are safe.

Or… are they?

You rely on a third party for infrastructure control, security operations and availability.
What would your business continuity plan look like if your SaaS provider became unavailable?

In this article we investigate a self-hosted solution for small businesses.

Continue reading “Gitea – Your Self-Hosted Git Platform”

GPG Basics: Simple, Safe Encryption for Everyday IT Work

When you hear the word encryption, it often sounds like something only security researchers and intelligence agencies deal with. But in reality, every IT professional – even small teams, freelancers, or home users – should understand the basics of protecting sensitive files.

GnuPG (or GPG) is one of the most trusted tools for this. It’s free, open-source, built into every Linux distribution, and works perfectly for encrypting files, verifying downloads, or signing work-related documents.

This guide walks you through a clean, beginner-friendly setup – no advanced OPSEC, no air-gapped machines, no master-key rituals. Just the essentials that anyone at home or at work can start using today.

Continue reading “GPG Basics: Simple, Safe Encryption for Everyday IT Work”

Solo Development Doesn’t Need Corporate Git Workflows

Git is a powerful tool, but solo developers often inherit processes designed for large teams.
Corporate branching strategies solve coordination problems that an individual simply doesn’t have.
When you’re the only developer in the room, heavy processes become friction.
You don’t need gates, ceremonies, or complex merging rules to work effectively.

Continue reading “Solo Development Doesn’t Need Corporate Git Workflows”

Local LLMs for Privacy‑First Workflows A Practical Guide with LMStudio

Why run a language model on your own machine?

  1. Data stays local – No text leaves your computer, so sensitive information can’t be sent to the cloud.
  2. No API limits or costs – Once you have the model file, you’re not paying per request.
  3. Instant response time – The round‑trip latency of an internet call disappears; the model replies in milliseconds.

If you’re a developer, system admin, or just someone who values privacy, these benefits make local LLMs worth a look.

Continue reading “Local LLMs for Privacy‑First Workflows A Practical Guide with LMStudio”

Understanding Linux Permissions: The “chmod” Cheat Sheet You’ll Never Forget

When you first see a file in Linux, the three-letter string that starts with -rw-r--r-- can look like an alien language.
It tells the system who can read, write, or execute that file. Don’t worry – it’s just a set of rules.
In this post we’ll break those rules down into bite-sized pieces and give you a handy cheat sheet for the most common chmod commands.

Continue reading “Understanding Linux Permissions: The “chmod” Cheat Sheet You’ll Never Forget”

Firewall Basics with UFW: Protecting Your Server in Minutes

What is a firewall?

A firewall sits between your server and the outside world. It decides which network traffic is allowed to reach your machine and which should be dropped. Think of it as a bouncer at a club: only people on the guest list get in.

UFW, short for Uncomplicated Firewall, is Ubuntu’s front‑end to iptables. It lets you write rules with simple commands instead of juggling raw tables.

Continue reading “Firewall Basics with UFW: Protecting Your Server in Minutes”