VPN: Virtual Private Network Strongswan: IPsec-based VPN IKEv2: VPN encryption protocol MS-CHAPv2 (MSCHAPv2): authentication protoco...
A php strong password generator, with a pinch of salt
When it comes to protecting web user accounts, the first step is to ask users for a strong password, one composed of 10-12 lowercased,...
1 F1-micro google VM, your Linux server, production-ready playground
Using Google Cloud free/always free products it has to offer we can create a small yet powerful free virtual machine (a Google Cloud Com...
PostgreSQL row-level table audit (back in time) hstore restore
Keeping track of database table data changes can be a software development requirement. This approach (auditing a database table) can be...
Restic & incron/inotify, continuous backup on folder content change
Restic is a cross platform “Fast, secure, efficient backup program, Free Software (not just Open Source)”, as the developers says and I&...
Asus Lyra AC2200 review - mesh Wi-Fi done right
In our age, the electronics are very used, at home at work, but some can not connect to the internet to be controlled because we have n...
How to anonymize strings and emails in PostgreS database
If we need to anonymize some sensible or personal data strings from our PostgreSQL database, then the bellow function will do the work ...
How secure is today's internet browsing and browsers
During last years, starting with HTTPS Everywhere initiative by Google, big internet players have invested in securing the internet brow...
How to copy a bootable large disk to a smaller disk
In Linux, cloning a disk (USB/SSD/HDD) is really simple, using dd utility we can make identical copies of one disk to another disk. Basi...
Blogger custom domain Full SSL/HTTPS support
Serving a secure version (HTTPS) of your blogger.com custom domain was possible only by using Cloudflare services where is possible to en...