Recently Updated
Tutorial 28
- k8s part 7 ceph backups Oct 24, 2025
- k8s part 6 adding a blog to the cluster Oct 18, 2025
- k8s part 5 persistent storage Oct 9, 2025
- k8s part 4 TLS and RBAC Oct 4, 2025
- Bypassing netflix's paywall BS Sep 29, 2025
- 3 node k8s on hetzner's bare metal machines Sep 22, 2025
- haproxy part 3 the Virtual Router Redundancy Protocol Sep 11, 2025
- haproxy part 2 the dataplaneapi Sep 8, 2025
- k8s part 2 deploying a web app Aug 16, 2025
- k8s part 1 a primer on kubernetes Aug 9, 2025
- haproxy part 1 load balancing a webserver Aug 8, 2025
- Protect against a DDOS Aug 3, 2025
- Network boot with pxe and ipxe Jul 27, 2025
- SSO part 3 Wireless network Access Control and VLANs Jul 26, 2025
- Automating our backups Jul 20, 2025
- Windows print server Apr 14, 2025
- Home automation Apr 13, 2025
- Building a CMDB with grafana and low code Apr 12, 2025
- SSO part 2 OpenId Connect Apr 11, 2025
- SSO part 1 Wireless network Access Control with 802.1x Apr 8, 2025
- Live backups with btrfs Nov 2, 2024
- Evil twin attack Sep 13, 2023
- Man in the middle attack May 5, 2023
- Trying out an android Remote Access Trojan (RAT) Apr 5, 2023
- Exfiltrating data from a bank Apr 4, 2023
- A simple trojan for Linux Apr 3, 2023
- A simple click-jacking exercise Apr 1, 2023
- A simple phishing exercise Mar 27, 2023