Conditional statements allow you to control the task execution based on specific conditions, ensuring that your playbooks respond appropriately to varying scenarios. Loops are control structures that allow you to repeat tasks across multiple items, such as iterating through a list of packages or files.
Continue reading “Ansible Basics 06: Conditional Statements and Loops”Author: Tom's IT Cafe
Ansible Basics 05: Playbooks
Ansible playbooks are the core components of Ansible. Playbooks are written in YAML format and describe a set of tasks that need to be executed on the managed systems. A playbook consists of one or more plays, and each play defines a set of tasks to be performed on a group of hosts. Tasks are the individual actions or commands that Ansible should execute, such as installing packages, copying files, or restarting services. Tasks call out to the programmed code units called modules.
Continue reading “Ansible Basics 05: Playbooks”Ansible Basics 04: The Inventories
An Ansible inventory is a structured list of hosts or nodes that Ansible can manage, providing a foundation for orchestrating automation tasks across a network. This inventory file typically contains information about the hosts’ IP addresses, connection details, and grouping, allowing users to organize and categorize systems based on their roles, functions, or other criteria.
Continue reading “Ansible Basics 04: The Inventories”Ansible Basics 03: Running Ad-Hoc Commands
Ansible consists of several key components that collectively build a robust automation and configuration management. Ad-hoc commands are the easiest and fastest way to run some commands remotely or on a host. You have to understand the basic terminology to do this, so here is a quick start, and later we are going to go into the details in the upcoming articles.
Continue reading “Ansible Basics 03: Running Ad-Hoc Commands”Ansible Basics 02: Installing Ansible
Ansible can be installed on a large variety of systems, but most people and companies run it on Linux hosts. Small companies and startups (with only a few administrators) do not dedicate a server for it, rather they use the admin workstations or notebooks. When a company grows and more people work on the environment they dedicate a server to these operations, and Ansible can scale well. In this article we go through the different alternative methods to install Ansible.
Continue reading “Ansible Basics 02: Installing Ansible”Ansible Basics 01: Automation, Configuration Management, Infrastructure as Code
The Ansible Basics course is a new, free series from Tom’s IT Cafe for those who want to learn the foundations of automation, configuration management and infrastructure as code. The structure of the course is simple, starting with the installation of Ansible, through its configuration, to some examples of the usage. You have to understand some computer basics to fully understand this topic. This article series will not go into the details of networking, identity and access management nor security hardening. It will help you start working with Ansible, and initiate your automation journey. New articles on Tuesdays and Thursdays at 5PM CET.
Continue reading “Ansible Basics 01: Automation, Configuration Management, Infrastructure as Code”Cryptocurrencies and Privacy Coins
In recent years, the world of cryptocurrencies has expanded exponentially, offering a plethora of options for investors, traders, and enthusiasts. Among these digital assets, both major cryptocurrencies and privacy coins have garnered significant attention. Each category comes with its own set of advantages and disadvantages, catering to different needs and preferences within the crypto community.
Continue reading “Cryptocurrencies and Privacy Coins”Ethereum: The Future of Decentralized Finance
In the blockchain technology, Ethereum stands out as a groundbreaking platform that has transformed the landscape of decentralized applications (DApps) and smart contracts. Launched in 2015 by Vitalik Buterin, Ethereum introduced a revolutionary concept: the ability to build decentralized applications on its blockchain, using smart contracts to execute code automatically when predetermined conditions are met. Over the years, Ethereum has evolved into a powerhouse, fueling the growth of decentralized finance (DeFi), non-fungible tokens (NFTs), and a myriad of other innovative projects.
Continue reading “Ethereum: The Future of Decentralized Finance”Proton Mail’s New Desktop Client: A Secure and User-Friendly Email Solution
Proton Mail, a renowned provider of secure email services, has recently released its new desktop client, setting a new standard for email security and usability. This innovative client offers a range of features that make it a top choice for individuals and businesses looking to enhance their email communication experience. I have just installed and tried it out for some days.
Continue reading “Proton Mail’s New Desktop Client: A Secure and User-Friendly Email Solution”PicoCTF: The Numbers [CTF Write Up]
This is a 50 points task in PicoCTF to solve this puzzle. I have to admit that I sat on it for a while because I suspected a complex solution like using stenography or any other hidden clues in the image file. Finally I just sat down and it became obvious immediately.
Continue reading “PicoCTF: The Numbers [CTF Write Up]”Bitcoin: A Decade of Disruption and the Promise of a Decentralized Future
Over the past decade, Bitcoin has emerged as a groundbreaking force, challenging traditional notions of currency and finance. Born out of the aftermath of the 2008 financial crisis, Bitcoin represents a decentralized and borderless form of digital currency that operates on a peer-to-peer network.
Continue reading “Bitcoin: A Decade of Disruption and the Promise of a Decentralized Future”The Transformative Power of Blockchain Technology
In recent years, blockchain technology has emerged as a revolutionary force with the potential to reshape industries, streamline processes, and enhance security. Originally developed as the underlying technology for cryptocurrencies like Bitcoin, blockchain has evolved far beyond its initial application. Today, it stands as a cornerstone for innovation across various sectors, offering transparency, security, and efficiency.
Continue reading “The Transformative Power of Blockchain Technology”PicoCTF: Cookies [CTF Write Up]
The PicoCTF web exploitation tasks are fun and you can learn a lot about the web and about the tools you can use as a white hat hacker or penetration tester. Knowing about the possible security issues can help you avoid them as well as a developer. Let’s see another web security challenge!
Continue reading “PicoCTF: Cookies [CTF Write Up]”The Vigenère Cipher
In the realm of cryptography, the Vigenère cipher stands as a testament to the ingenuity and complexity of early encryption methods. I have to admit that it is my personal favorite of the “old” ciphers. The Vigenère cipher, often attributed to Blaise de Vigenère, was actually first described by Giovan Battista Bellaso in 1553. Bellaso’s description of a polyalphabetic substitution cipher, which later became known as the Vigenère cipher, predated de Vigenère’s work by over a century. De Vigenère’s contribution was the development of a text autokey cipher, which was misattributed to him due to his association with the Vigenère cipher. The Vigenère cipher itself was not invented by de Vigenère but rather by Bellaso and later misattributed to him.
Continue reading “The Vigenère Cipher”PicoCTF: GET aHEAD [CTF Write Up]
In the following CTF game the player looks into the HTTP communication and its request methods. It is a great opportunity to learn about what happens behind the scenes during loading a web page. The game is on PicoCTF.
Continue reading “PicoCTF: GET aHEAD [CTF Write Up]”



