Protecting The Wire – Semaphore Behind SSL Proxy

Mission Brief

Plain text communication is loud. It’s bleeding data.
Prying eyes can see every bit in the wire.

You have to isolate the backend – the Semaphore UI and MySQL containers stay locked down. Unreachable for the external work.
Open a tiny hole on the stronghold to the world – the frontend is an NginX SSL proxy.

You use:

  • Podman pod for network and container isolation
  • The Semaphore and MySQL containers without exposing them to the world
  • An NginX proxy container with SSL
Continue reading “Protecting The Wire – Semaphore Behind SSL Proxy”

Podman Basics 03: Installing Podman

Containerization has changed the way we deploy and manage applications. Podman is a powerful container management tool that provides a seamless experience for running containers in production, development, and testing environments. We will walk through the steps to install Podman on three popular Linux distributions: Debian, Ubuntu, and Rocky Linux. This lesson will equip you with the knowledge to enjoy the power of Podman on your preferred platform.

Continue reading “Podman Basics 03: Installing Podman”

Installing and Using Chkrootkit on Debian Linux

In an era where cyber security threats are evolving rapidly, safeguarding your Debian system against potential risks is very important. Rootkits, a type of malicious software designed to gain unauthorized access to a computer system, pose a significant threat to the integrity of your Debian Linux installation. To fortify your defenses, one effective tool to consider is Chkrootkit, a simple yet powerful rootkit detector.

Continue reading “Installing and Using Chkrootkit on Debian Linux”

How To Install Tenable Nessus Essentials The Free Vulnerability Scanner on Debian Bookworm

Nessus is a popular and widely used vulnerability assessment tool that works for both web and mobile applications and can be deployed on-premises or in a cloud environment. It scans and detects malware of embedded devices, configurations auditing, compliance checks among many other functions.

Small companies face a growing risk of cyber attacks in the digital age, as they often lack the resources and expertise to secure their networks and data. One way to improve their security is to perform regular security checks using a vulnerability scanner. Tenable Nessus Essentials is a powerful tool that can help small companies scan their systems for vulnerabilities and remediate them before they are exploited.

Continue reading “How To Install Tenable Nessus Essentials The Free Vulnerability Scanner on Debian Bookworm”

Hardening our Debian Desktop for More Secure Daily Work and Enhanced Privacy

In this blog post, we will explore some of the steps we can take to harden our Debian desktop for more secure daily work and enhanced privacy. Hardening is the process of reducing the attack surface and increasing the resilience of a system by applying security measures and best practices. By hardening our Debian desktop, we can protect our data, identity, and communication from malicious actors and unwanted surveillance.

Continue reading “Hardening our Debian Desktop for More Secure Daily Work and Enhanced Privacy”

How to Install ProtonVPN on Debian/Ubuntu Linux for Enhancing Security and Privacy

ProtonVPN is a popular and reliable VPN service that offers high-speed connections, strong encryption, and a no-logs policy. It also has features like Secure Core, Tor over VPN, and P2P support. ProtonVPN is compatible with various platforms, including Linux. I will show you how to install ProtonVPN on Debian/Ubuntu Linux and how to use it to enhance your online security and privacy.

Continue reading “How to Install ProtonVPN on Debian/Ubuntu Linux for Enhancing Security and Privacy”

Debian Linux: The Ultimate Operating System for More Experienced Users

If you are looking for a reliable, secure and customizable operating system that gives you full control over your computing environment, you might want to consider Debian Linux. Debian is one of the oldest and most respected Linux distributions, with a history of over 25 years and a community of thousands of developers and users. In this blog post, we will explore some of the reasons why Debian is the ultimate operating system for more experienced users.

Continue reading “Debian Linux: The Ultimate Operating System for More Experienced Users”

Upgrading Debian Bullseye (11) to Bookworm (12) on server and desktop

If you are a Debian user who wants to enjoy the latest features and improvements of the upcoming Debian 12 “Bookworm” release, you might be wondering how to upgrade your system from the current stable version, Debian 11 “Bullseye”.

In this post, I will guide you through the steps of upgrading your Debian desktop or server from Bullseye to Bookworm, using the official Debian repositories.

Continue reading “Upgrading Debian Bullseye (11) to Bookworm (12) on server and desktop”