This is the 100th post here at Adminbyaccident. Little I knew when I starting posting that I would reach the ‘impossible’ mark of the 100 articles. Sure, some of them are not very interesting, nor instructive. Three years ago I wasn’t the same and I hope in three years time I’m still here and kicking. Very few people visiting this site know I had a different career in the past. … [Read more...]
Archives for May 2020
How to analyze suspicious email
Millions of emails are sent and received every day. Most of them are just junk. And many among those are potentially harmful. Phishing still is one of the most effective ways for malicious actors to penetrate into well secured networks. The weakest link, too often, is the human factor. Training can help mitigate this 24x7 all year-round risk and spam filtering has got cleverer … [Read more...]
How to work with Nessus scan results
Working with Nessus scan results is easy. How do I know that? Because I’ve worked with this tool for some time and although I do not know every corner of the things I’ve been doing some scans and solving quite a few deffects on systems that were labeled as ‘production ready’ when they clearly weren’t. Nessus is a powerful tool and has some niceties, even in the community … [Read more...]
How to install Ansible on FreeBSD
Ansible is a very useful tool geared to system’s configuration and applications deployment. In this how to install Ansible on FreeBSD I will briefly explain what the tool is, what it does, what it does not and how to install it on FreeBSD. I will also demonstrate very basic use and on a later article I will write about software deployment and maintenance through … [Read more...]
How to secure the ELK stack on CentOS 8
This is a follow up of the ‘how to install the ELK stack on CentOS 8’. That is a basic setup with no security at all. There is no encryption, no username and password setup, nothing. Not even firewall rules to filter ports. And as it’s known security can’t only rely on one factor but on a combination of few. In this guide you will read about: - Setting up firewall rules for … [Read more...]