Tags: analyze traffic, mobile traffic investigation, mitm proxy attackLast update: Feb 2021 ForewordIn this tutorial we will use a regular computer with two USB wifi adapters: one for the connection to our internet/wan and the other one for creating our local wifi hotspot. You can substitute one of the wifi adapters with an ethernet adapter […]
This author has yet to write their bio.
Meanwhile lets just say that we are proud Roland contributed a whooping 21 entries.
Tags: jitsi installation, secure, ubuntu, linuxLast update: Jan 2021 Prerequisites a fresh installation of Ubuntu 21.04 LTS or Ubuntu 18.04 LTS verify all updates are installed by issuing If you intend to run Jitsi on your new publicly accessible server, reachable under meet.yourdomain.com, you should change the name of your host accordingly in both files […]
Tags: linux, raid1, software raid, mdstat, md0Last update: Jan 2021 Assumptions We have a running software RAID1 at moint point /dev/md0 consisting of the following partitions: /dev/sda1 /dev/sdb1 Showing details You can get some detailed information about the fitness of /dev/md0 by issuing: An exemplary entry looks like this: and tells us that it’s a […]
Tags: LinuxLast update: Mar 2018 Compare binary files within the console and highlight those areas which differ. Vim and Colordiff have to be installed before. 2. Using a harddisk device for storing encrypted data: 3. Mirroring with rsync from /source to /destination. Compression is great when backing up over the Internet. 4. Wipe a file […]
Tags: Windows | Linux | 7-Zip Command Line InterfaceLast update: Dec 2017 1. Foreword / Setting / Requirements We want a quick and tiny script to initially backup our files secondarly to update our archive for example on a daily basis. We want to modify our archive only in case a file/folder has been changed. […]
Tags: Secure wipe, LinuxLast update: Dec 2017 First we want to fill up our pendrive with zeroes: After completion we can check if our flash drive is really wiped with zeros by installing and using a text-based Hex-editor: Remember: We trust nobody so we check manually if zeros have been written to the drive. If […]
Tags: Windows 2012 R2 Standard | Hyper-V | Ubuntu 16.04.1 LTS | Bridged OpenVPNLast update: May 2017 1. Foreword / Setting / Requirements Sometimes we are travelling through the globe and imagine that on a particular day we are working onsite with our mobile device. Suddenly we recognize there are files missing which are quite […]
Tags: Coreboot, F2A85-M, F2A85-M PRO, A10-5800KLast Update: Jan 2021 This guide is based on the BIOS UEFI replacement called Coreboot which runs on an ASUS F2A85-M or F2A85-M PRO mainboard with an AMD A10-5800K CPU with integrated graphics. 1. Introduction and aim This initial idea came up with the uprising problems and vulnerabilities of Intel ME and AMD […]
Tags: Postfix, Mailhoster, Linux, SMTPLast update: Feb 2021 First we need to install packages: If it’s not opening up automatically you can configure Postfix with “sudo dpkg-reconfigure postfix”.Confige Postfix by choosing: satellite system system mail name = your-computername smtp relay host = [your-mailhost]:port root mail recipient = empty other destinations = leave default yes local […]
Tags: Full Disk Encryption, Ubuntu Linux, Dropbear, SSHLast update: Dec 2019 Some of you are security-aware and would like to install a full disk encryption on a new system. But you’ll face a problem: Once the machine reboots and you’re not around to type in the password, the machine will simply not boot up. For […]
+49 (0) 175 80 755 05
Freunde sind da, wenn man sie braucht. Wir glauben an ehrliche, persönliche und nachhaltige Geschäftsbeziehungen. IT & Media Beratung ohne Kompromisse.
Freundschafter nimmt den Schutz Ihrer Daten sehr ernst. Daher speichern wir alle Inhalte ausschließlich verschlüsselt ab. Zum Zwecke der Buchhaltung werden nach dem Minimalprinzip personenbezogene Daten gespeichert. Sie können deren Löschung jederzeit verlangen.