A few weeks ago I published a how to guide to configure Apache HTTP as a reverse proxy. On that ocasion I was following what the average guide on the internet does on Linux. A front end server with Apache HTTP on calls a backend server where the real site is sitting. Many backend calls […]

How to configure Apache HTTP with a TLS reverse proxy backend on FreeBSD

Nessus vulnerability scanner
Nessus is a very well known vulnerability scanner used by many large and small companies to assess their systems and correct the issues found in them. Cybersecurity teams and specially auditors, make heavy use of tools like this in order to follow up the state of infrastructure and environments. Having a tool like this saves […]

How to find vulnerabilities in your WordPress with WPScan
Vulnerability scanners are useful tools for administrators and security analysts alike. For the casual WordPress user tools like WPScan may look excessive and complicated for their knowledge, they just need their blog, web page, whatever they’re doing up and running. Any complex administration bothers them to the max, and there are good and valid reasons […]

How to detect a WAF – Web Application Firewall
From a penetration testing perspective to identify if a Web Application Firewall (WAF) is in place is essential. The next question is, does an administrator need to know this? My view is, anyone who is in charge of any system that has implemented some sort of WAF needs to verify this tool is working, at […]

Donation Time 2020
This 2020 has been a difficult year for everyone. Because of this difficulty and the opportunities I had the chance to take, I’ve been able to contribute back to the open source community, not just with content here in Adminbyaccident.com, advocacy for a few tools such as my favorite OS (FreeBSD) and the usual mouthful […]

How to install Matomo 4 on FreeBSD
Why would anyone need to install Matomo 4 on FreeBSD? Because you’re the admin of a website, or a few of them, and you want/need to count the visitors, how long do the stay looking at the content and some other fancy stuff. This is what Matomo does. But it also does this without you […]
Contact
I am a busy guy. Answering comments takes precious time from my daily life so don’t get mad if I don’t reply you back quickly or if I just don’t do. Plus, think twice before posting. If you really have something interesting to say, just go ahead. If that is something you really think I’d […]

SSH keys
SSH or how to remotely control a UNIX system in a secure manner. The SSH keys is a secure method to interact with a UNIX system remotely. They are also used to transfer data between different systems. Using clever cryptography anyone can use them. As their name state it is a pair of keys, one […]

How to mitigate Spectre and Meltdown on a Lenovo T430s with FreeBSD
As recently announced in a previous article I wanted to write a couple of guides on how to mitigate Spectre and Meltdown vulnerabilities in GNU/Linux and UNIX environments. It is always a good and I hope a standard practice to have your systems patched and if they aren’t for whatever the reason (that legacy thing […]

A brief introduction to SSL/TLS certificates
SSL stands for Secure Sockets Layer and it an old implementation of a crytographic protocol. TLS, or Transport Layer Security, is a new one. They are both used to have privacy in the communications between different parties. They are used to secure email, web browsing, instant messaging, etc These protocols work in a complex way […]
