Jenkins is a platform for creating a Continuous Integration/Continuous Delivery (CI/CD) environment. It is written in Java and provides support for various version control tools such as Git, running Bash scripts and Windows batch files, building Ant and Apache Maven-based projects, and more. Jenkins helps build, test, and continually deploy software. It is an open-source system and one of the leading automation servers. Jenkins requires scripting some automation steps, but it provides a fast and robust way to systematize the software development lifecycle. The program runs web containers and plugins, such as Apache Tomcat, and helps manage lifecycle and access rights requests. Over 1700 plugins for Jenkins enrich the software integration, automation, and delivery processes and provide a customizable environment. Jenkins is used for the whole software delivery pipeline, including deployment.
Continue reading “How To Create A Scalable Jenkins CI/CD Environment Using Containers?”Category: Old Posts – History
Posts archive till up to December 2025.
Container Orchestration In Podman Pods With Kubernetes Compatibility
Containerization has revolutionized the way we deploy and manage applications, offering lightweight and scalable solutions for a variety of workloads. The Podman, a container management tool, provides a flexible and user-friendly alternative to traditional container orchestration systems.

TryHackMe’s Advent of Cyber – A Gift for Cyber Security Enthusiasts
In the ever-evolving landscape of cyber security, staying ahead of the curve is not just a preference but a necessity. Continuous learning and hands-on practice are crucial components of honing the skills required to defend againsTryHackMet the relentless onslaught of cyber threats. TryHackMe, a leading platform for cyber security education, has introduced an innovative and festive approach to learning with its Advent of Cyber series. This blog post explores the unique features that make TryHackMe’s Advent of Cyber a valuable resource for individuals seeking to enhance their cyber security prowess.

The Magic of Burp Suite: Interception Techniques for Enhanced Web Security
In the realm of web security, Burp Suite stands tall as a powerful ally for ethical hackers, penetration testers, and cyber security professionals alike. Among its arsenal of robust features, one of the most essential functionalities is the ability to intercept and inspect connections between a browser and a website. In this blog post, we will explore the art of connection interception using Burp Suite and understand how this technique can bolster web security and protect against potential vulnerabilities.

Writing Your Own Ansible Role: A Comprehensive Guide Using Industry-Standard Tools and Software
Automation has become a cornerstone of modern IT operations, and Ansible stands as one of the most popular tools for configuration management, application deployment, and task automation. Ansible simplifies these processes through its role-based approach, making it easier to manage complex infrastructure and streamline workflows. In this blog post, we will explore how to create your own Ansible role using industry-standard tools and software. By the end, you’ll be well-equipped to design and share your own reusable Ansible roles.

Enhancing Security with Tripwire on Debian Bookworm
In an era where digital threats continue to evolve, the need to safeguard your Linux system has never been more critical. Ensuring the integrity of critical system files, directories, and configurations is a fundamental aspect of system security. Enter Tripwire, a robust host-based intrusion detection system (HIDS) designed to monitor and protect your Debian Bookworm system against unauthorized changes and security breaches.

What is DevSecOps and Why is it Good for Enterprises and Small Businesses?
DevSecOps is a term that combines development, security, and operations. It is a framework that integrates security into all phases of the software development lifecycle, from planning to deployment and beyond. DevSecOps aims to make security a shared responsibility of everyone involved in the software delivery process, rather than a separate function that is performed at the end or by a different team.

Streamlining IT Operations: Getting Started with Ansible Automation in 2024!
In the fast-paced world of technology, efficiency and automation are key to staying competitive and managing resources effectively. Small and medium-sized businesses (SMBs) are no exception, and one powerful tool for automating IT operations is Ansible. We -at Tom’s IT Cafe- start a new series of blog posts where, we will guide you through the process of installing and getting started with Ansible in a small company to kickstart your automation journey.

AIDE: Protecting the Integrity of Your Linux System
In today’s digital landscape, safeguarding your Linux system against potential security threats is paramount. Detecting unauthorized changes to critical system files and directories is a fundamental aspect of this protection. Enter AIDE, or the Advanced Intrusion Detection Environment, a potent open-source tool designed to fortify the integrity of your Linux system by detecting alterations that might signal security breaches or system tampering.
Continue reading “AIDE: Protecting the Integrity of Your Linux System”Getting Started with Ansible Execution Environments: A Quick Guide
Ansible is a powerful automation and configuration management tool widely used in the DevOps world. One of the recent additions to Ansible is Execution Environments, which simplifies the management of Ansible collections and dependencies. In this blog post, we will explore what Ansible Execution Environments are and provide a quick start guide to help you get started.

Detecting Rootkits with RKHunter
In the ever-evolving landscape of cyber security, the importance of safeguarding your Unix-based systems cannot be overstated. Malicious actors continuously seek new ways to infiltrate and compromise your systems. One particular threat that often goes undetected is the rootkit—a sophisticated malware that conceals its presence by subverting system functions. To counter this menace, one valuable tool in your cyber security arsenal is RKHunter, short for Rootkit Hunter. This open-source, command-line utility is specifically designed to identify and help mitigate rootkit infections on Linux and other Unix-based systems.
Continue reading “Detecting Rootkits with RKHunter”Installing ZoneMinder Camera System on Debian Bookworm
ZoneMinder is a popular open-source video surveillance and security application that allows users to monitor and record video streams from various types of cameras. If you’re running Debian Bookworm and looking to set up a robust surveillance system, ZoneMinder is an excellent choice. In this guide, we will walk you through the steps to install ZoneMinder on Debian Bookworm.
Continue reading “Installing ZoneMinder Camera System on Debian Bookworm”Unveiling the Role of Blue Teams and the Essential Skills for Cyber Defense in Our Online World
In an era defined by the constant threat of cyberattacks, organizations are increasingly investing in robust cyber security measures. As part of this proactive approach, the Blue Team plays a pivotal role in safeguarding digital assets and sensitive information. We had an article about Red Teams, let’s investigate the role of the Blue Team now!

Defending Against Cyber Security’s Giants: Understanding Whaling Attacks
In the vast and treacherous seas of cyber security, threats come in all shapes and sizes. While phishing and malware attacks are commonly discussed, there’s a bigger fish in the ocean: “whaling” attacks. These are highly targeted and sophisticated cyber threats that aim to harpoon the biggest catch of all—senior executives and high-ranking individuals within organizations.

A Comprehensive Guide to Installing and Utilizing Docker Swarm and Load Balancing Docker Swarm Services with Nginx Proxy
Containerization has revolutionized software deployment, and Docker Swarm provides a powerful solution for orchestrating and managing containerized applications. In this guide, we will take you through the step-by-step process of setting up and effectively using Docker Swarm on three virtual machines, and then extend it to include a load balancing proxy using Nginx. By the end of this tutorial, you’ll be equipped with the knowledge to harness the benefits of container orchestration and load balancing for your projects.

