I find it much easier to create a venv with the same packages than renaming one. I found magic sed commands and directory traversal scripts, but they did a half work or nothing. I found out that recreating an env is easier and faster.
Continue reading “How to rename (or backup) a Python virtual environment?”Category: General
General posts about quick thoughts.
How to install a secure Apache2 web server on Debian 11?
The expected outcome is:
- To open a browser
- Type the IP address of the machine (DNS configuration is a topic for later)
- It must serve a new, custom html file called index.html with our string “Hello, How are you?”
- Preparation work
- Debian 11 netinstall in a VM is ready (it will be the server)
- The network configuration is ready (IP and port 80 are reachable)
- Root access on the VM

Installing Kali Linux with GUI on WSL
Pre-Installation steps
- WSL must be installed on the host machine prior this task. Microsoft has an extensive documentation on the topic.
- Basic WSL management skills are nice to have, like importing/exporting/removing WSL instances. Use wsl –help for reference.
- Read the Kali documentation about the topic as well.
Ubuntu upgrade FAIL!
I try out the systems I advise to the people. I am a Linux user with a significant background in debugging and solving errors in the system. Being a Debian user since the Woody/Sarge times I welcomed Ubuntu Linux early when it was released the first time. It was a solid, user friendly system for more than a decade. Unfortunately I experience serious quality degradation in the past years.
Continue reading “Ubuntu upgrade FAIL!”Jr. Penetration Tester learning path on THM
TryHackMe is a great site to learn Cyber Security with practical lab exercises. I just finished their penetration tester path to refresh my knowledge.

They provide a nice certificate after finishing the path and a short “test”.
How to stay safe on the internet in 2023?
2022 was a busy year for the IT professionals with the defense against the increased number of security threats. As the world has been hit by COVID-19, and many companies introduced a remote work scheme, the attack surface grew exponentially. Most companies stayed with the hybrid work model after the lockdowns, so the issue will remain with us, IT professionals to adapt to the new world.
Remote work and the “Bring Your Own Device” culture added a new level of complexity to the Cyber Defenses. More complex endpoint security and extended policies are necessary to keep up with the increased threats. Remote access and the outdated identity and access management bring huge problems into the mix.
Cyber Security starts on a personal level. It means that our professional lives are mixing our private ones, the border is blurry, not to mention that most people use their system with privileged access (as an Administrator).
Malicious actors try to get valuable information from employees of the companies even in their private life, and they try to use it later in their acts.
Here are some of my advice to stay safe(r) in 2023.
Continue reading “How to stay safe on the internet in 2023?”The future of DevOps
A lot of people are talking about the future of the IT, the traditional operations work, and they are trying to guess whether they will have a job in IT in the future.
As I see most IT colleagues feel some uncertainty about their jobs. Different positions (and position names) come and go at the huge tech, telco and financial companies. The fluctuation of the people is also constant.
Do you think your job is in danger? Read further!
Continue reading “The future of DevOps”How to backup and restore a distro in WSL?
Backing up and restoring WSL distros is easier than we think! It is simply an export of the (stopped) distro that can be moved on an external disk as an archive. Restoring a backup is importing the generated tar file.
Moreover we can add multiple instances of the same distro with exporting and then importing it.
Continue reading “How to backup and restore a distro in WSL?”