Tom's Blog
Tom's Blog
Tom
DevOps blog about Linux configuration, Containerization, Automation, Security and from time to time Leadership.
Latest Posts
I wanted/needed some statistics on few my machines. I saw earlier grafana and was impressed so this was starting point. Then I started reading about graphite, carbon and whisper, and then… I found InfluxDB. Project is young but looks...
I wanted/needed some statistics on few my machines. I saw earlier grafana and was impressed so this was starting point. Then I started reading about graphite, carbon and whisper, and then… I found InfluxDB. Project is young but looks...
From the first moment I heard about Let’s Encrypt I liked it and wanted to use it as fast as possible. But the more I read how they want to implement it, the more I dislike it. Current project with automatic configuration is not what I...
Lately I had a lot of brute force attacks on my WordPress blog. I used basic auth to /wp-admin part in nginx configuration to block this and as a better solution I wan’t to block source IPs at all on firewall. To do this, place this...
I have some Ansible roles to configure my vps, Raspberry Pi, etc. I like to test them before I broke something on my real, not clustered machines - I use Vagrant for that. But with it I had one problem - in playbooks I define hosts as...
Normally you want dynamic content to be fresh and not cacheable. But sometimes it may be useful to cache it, like when you have website behind reverse proxy1. To do this try something like this: Add new Apache conf file <filesmatch...
It will happen from time to time, that you’re on alien machine and have to brutally update things in db without knowing credentials. Example is for root (quite secure candidate to change because it shouldn’t be used in app 😃 ) but will...
I hate movies recorded on phone in vertical position. This just short tip how I dealt with with it last time: for m in *.mp4 do avconv -i $m -vf "transpose=1" -codec:a copy -codec:v libx264 -preset slow -crf 23 rotated-$m done Other...
After long break I’m thinking about writing more on my blog. I was reviewing my favorites/bookmarks and half of them was broken, so I can’t rely on them in case of knowledge management. I think I will write shorter, less descriptive...
I had some passwords saved in remmina but like it always happen, I wasn’t been able to remember them when needed. Trying to restore them I found that they’re encrypted in .remmina directory. Then I used this script to decrypt them 1:...
Allow from IP without password prompt, and also allow from any address with password prompt Order deny,allow Deny from all AuthName "htaccess password prompt" AuthUserFile /web/askapache.com/.htpasswd AuthType Basic Require valid-user...
The Girl Who Kicked the Hornets' NestMilleniumAuthor: Stieg Larsson By the time I got to The Girl Who Kicked the Hornet’s Nest, I remember feeling like I’d been through a full storm of conspiracies and violence. It’s more political and...
Splątana siećPrzewodnik po bezpieczeństwie nowoczesnych aplikacji WWWAuthor: Michał Zalewski
The Girl Who Played with FireMilleniumAuthor: Stieg Larsson I remember The Girl Who Played with Fire as the most “thriller-like” of the trilogy. It dives deep into Lisbeth’s past and gives her even more of the spotlight, which I liked....
The Girl with the Dragon TattooMillenniumAuthor: Stieg Larsson I read The Girl with the Dragon Tattoo quite a while ago, back when everyone seemed to be talking about it. The hype was real - and I could see why. It’s a solid crime story...