All 'security' Posts
-
How to use TPM-backed SSH keys on macOS
I recently had to reinstall macOS (because the installation had ~250GB of “System Data” I am unable to purge, even as root) and used this opportunity to switch my SSH key setup on that device to be completely TPM-backed…
-
Secure initial setup of the ODROID GO Advance
In this post I’ll describe how to secure the default installation of the ODROID GO Advance. This guide may also work on other Linux Handhelds with some modifications.
-
How to remotely set up an encrypted Debian 12 server (IMHO)
Welcome to another IMHO post.
This time I am going to write about setting up servers. From zero to serving stuff. Additionally, I’ll try to describe basic security measures that I think are a good base for a secure deployment.
-
How to monitor dedicated servers (IMHO)
I have been playing with monitoring applications and servers for a while now and especially like Prometheus and Grafana.
In this post I’ll explain how I monitor my servers.