Running a Redundant Pi-Hole Setup Using Two NICs
Guide to setting up dual Pi-hole with Docker for redundant DNS ad-blocking using two NICs. Covers prerequisites, deployment via Docker Compose, customization, and optimization for resilient networks.
All posts tagged with security
Guide to setting up dual Pi-hole with Docker for redundant DNS ad-blocking using two NICs. Covers prerequisites, deployment via Docker Compose, customization, and optimization for resilient networks.
Managing secrets effectively is crucial for secure infrastructure. Infisical is a containerized solution for storing API keys, passwords, etc., securely via Docker. It offers self-hosting, simplicity, and flexibility for all project sizes.
Introduction When it comes to managing and updating Docker containers, it can often feel like a time-consuming process to keep
Effective logging is crucial for security and system reliability. Graylog, an open-source log management tool, simplifies monitoring and analysis, catering to self-hosting enthusiasts and enterprises alike.
Self-hosting ChatGPT with Ollama offers greater data control, privacy, and security. This open-source application runs locally on MacOS, Windows, and Linux. Interact via Open WebUI and share files securely.
SSH is the backbone of remote server administration, allowing seamless access and secure file transfers in Linux environments. However, without proper security measures, it can become a potential gateway for unauthorized access and malicious activities.
It's almost 2023, now is the time to review your security measures.
Email can be spoofed, even when the domain isn't being used for email services.
Websites can be compromised.
Security through obscurity refers to the idea of obscuring or the state of being unknown as a way to protect against cyber threats.