I am a busy guy. Answering comments takes precious time from my daily life so don’t get mad if I don’t reply you back quickly or if I just don’t do. Plus, think twice before posting. If you really have something interesting to say, just go ahead. If that is something you really think I’d […]
Contact

VMWare ESXi (One)
The VMWare ESXi is a hypervisor developed by the VMWare company and it is widely known and used in many environments and enterprises of all sorts. Nowadays it is the main component of a sort of a software suite. It is a type one hypervisor which means it runs directly on to the hardware controlling […]

A brief introduction to Regular Expressions
A regular expression is a set of characters, a string of characters if you will, that specify a pattern. Ever used the grep command? It makes use of them. The ‘grep’ command is very handful when one needs to look for certain things inside a text file, or looking for some specific pattern from another […]

How to mirror disks on FreeBSD’s ZFS
This article is not going to be a long, detailed, specialized how to. I just wanted to share the ease and the fantastic quality of ZFS for a dead simple need I had. A spare box with a spare disk doing nothing could be repurposed as a file share box at home. Mirroring the two […]

How to find vulnerabilities in your WordPress with WPScan
Vulnerability scanners are useful tools for administrators and security analysts alike. For the casual WordPress user tools like WPScan may look excessive and complicated for their knowledge, they just need their blog, web page, whatever they’re doing up and running. Any complex administration bothers them to the max, and there are good and valid reasons […]

How to install the Clamav antivirus in FreeBSD
Clamav is an antivirus. But don’t think of Clamav as the antivirus you have sitting in your personal computer at home or in your office. It’s an antivirus that works under user demand. It is not constantly monitoring the system. So you will have to setup some cronjobs in order to check and monitor the […]

Symbolic and Hard Links in UNIX and Linux
Symbolic and Hard Links are useful ways to reference to information on a disk, both found in UNIX and Linux systems. While they seem similar in the surface they are quite different in how they work and it what can be achieved when using them. If you find the articles in Adminbyaccident.com useful to you, […]

Networking Dictionary
This is an attempt to collect all the necessary basic vocabulary to have a very basic basic understanding of networking. Because context is also needed, some concepts or historical references will be also shown. This dictionary is an informal one, for a better, accurate, more correct and in depth understanding look somewhere else, like the […]

How to configure Modsecurity 3 for WordPress on FreeBSD
A few weeks ago I wrote a guide on how to install Modsecurity 3 on Apache HTTP for the FreeBSD operating system. However there’s a catch with that setting and with Modsecurity in general. As good as it is as a WAF you need to at least adjust its configuration to the tool one pretends […]

How to analyze suspicious email
Millions of emails are sent and received every day. Most of them are just junk. And many among those are potentially harmful. Phishing still is one of the most effective ways for malicious actors to penetrate into well secured networks. The weakest link, too often, is the human factor. Training can help mitigate this 24×7 […]
