When using physical machines, virtual snapshots are not an option
Author: Nimpen Jimmy Nordström
System Developer and Network Security Enthusiast
Generate QR codes for Swish payments
Using the Swish API with php-curl running in Docker
This is how they do it ¯\_(ツ)_/¯
Whenever a hacker breaks in to a system, there are a few steps they take to keep the access without being caught red handed.
Web Monitor Script
Simple script for monitoring of a web service using curl
GlusterFS – a clustered filesystem
High availability requires shared storage of files
High availability with KeepAliveD
Redundant IP-Address assignment simply means that if one node goes down, another takes over the Virtual IP. This can be useful in many different scenarios like firewalling or reverse proxy.
OWASP Log Parser
Making your mod_security Apache log readable
Securing Apache with mod_security
Protecting your site with OWASP (Open Web Application Security Project)
Google FLoC is a major security concern
Google is rolling out Federated Learning of Cohorts (FLoC) for the Chrome browser.
Apparmor breaks slave DNS
This is why it’s important to check your log-files after upgrading your OS. It turns out that the latest Debian upgrade introduces new rules for apparmor which is not compatible with ISPConfig.