Blog
Tutorials and Cheatsheets
2024
- Cheatsheet of useful Linux commands (EN)
- How to: Install PiHole (DNS-Adblocker) and PiVPN (Wireguard) on Ubuntu (EN)
- How to: Install Nextcloud AiO using Docker and NGINX Proxy Manager (EN)
- How to: Install VirtualBox 7.1 on Ubuntu 24.04 (EN)
- How to: Dualboot Windows +Bitlocker and Ubuntu +LUKS (EN)
- How to: Dualboot Windows +Bitlocker and Kubuntu +LUKS (EN)
2022
- How to: Install Elastic Stack on Debian 11 Bullseye (EN)
- How to: Set up Postfix on Debian 11 to use a mailhoster with SMTP (EN)
- How to: Set up MSMTP on Debian to use a mailhoster with SMTP (EN)
- How to: Migrate some specific app profiles on macOS (EN)
2021
- How to: Monitor network traffic from a device (mobile phone, tablet, notebook) (EN)
- How to: Install a privacy friendly Jitsi Meet on Ubuntu and run it securely (EN)
2020
2019
CyberSecurity
2021
- How to: Build a more secure personal computer (EN)
- System alternatives without Intel ME / iAMT and AMD PSP / Secure Technology (EN)
2020
2018
Academic
2020
- Zugriffskontrollstrategien / Access Control Models (DE)
- Wie Meltdown funktioniert (DE)
- Folien zur Einführung in Quantenkryptografie (DE)
- Quantenkryptografie – Eine Einführung (DE)
- Abschlussarbeit “Migration auf den modernisierten IT-Grundschutz und Entwicklung einer Transformations-Roadmap” von Norbert Kiss (DE)
2018