Search results

0

Part one of my blog series on hacking my Delonghi Bluetooth coffee maker to brew coffee from Github Actions is up. I spent far too long on this project, but the coffeemaker's app was too rough to us, and filing an issue to get a caffeinated beverage just makes far too much sense!

grack.com/blog/2022/12/01/hack

0
0

New blog post: Production-grade containers without the K8s complexity

Podman Quadlets + systemd + Traefik = secure, maintainable container deployments on RHEL

- Network isolation
- SELinux integration
- Automatic updates
- Zero orchestration overhead

Complete Forgejo deployment walkthrough with all the config files.

blog.hofstede.it/production-gr

@forgejo

0
0
0
0
0

Hey there! I'm Lily, a proud trans lesbian from Conifer , a mom of a teenage son, and a perpetual instance admin / migrator.

This is my primary account.

I'm a neurodivergent woman in tech working as a Senior SRE.

I love to be , tend to the , play in my wood shop, hang out with my kiddo, play , play , , and see whatever kind of trouble my wife and I can get into on the weekends.

0
0
0
0

๐ŸฐFairly proud of this one! It took a bit of effort to turn the Cake .NET tool scripting engine into "just" a single SDK directive for use in regular .NET projects, but with the simplicity&feel of the DSL, making migrating existing scripts fairly straightforward.
Also same day .NET 10 & C#14 support๐ŸŽ‰

Being a project that's been around for eleven years, it's mostly been a marathon, but yesterday was a sprint๐Ÿ˜Ž

dotnet.social/@cakebuild/11553

0

Guess I never posted or pinned an if I had one. I've been on Mastodon for a bit now, since 2019 if my profile is to be believed. I'm _really_ bad at social media in general but am a fan of the vibes and federation of Mastodon and other AP offerings.

Former frontend > full stack dev now living the life. Currently located in America pushing for change. I believe in and .

More in bio.


0

Thinking about migrating from Linux to the rock-solid security of FreeBSD? Our expert training is designed for you. Learn BSD fundamentals, command differences, and how to harness ZFS.

Start your journey with confidence!

bastillebsd.org/training/

0
0
0
0
0
0

Reprising for the *BSD curious - "What every IT person needs to know about OpenBSD" nxdomain.no/~peter/what_every_

and my "short reading list" that has more (hopefully useful) links for aspiring and seasoned techies nxdomain.no/~peter/the_short_r

0
0

้–‹็™บ็”Ÿ็”ฃๆ€งใ‚’ๅฏ่ฆ–ๅŒ–ใ™ใ‚‹ใŸใ‚ใซใ€ใ‚ใˆใฆใ€Œ็คพๅ†…ใ‚ขใƒณใ‚ฑใƒผใƒˆใ€ใ‚’ใ™ใ‚‹็†็”ฑ | Wantedly Engineer Blog by @qnighyMasaki Hara wantedly.com/companies/wantedl

ๆ›ธใใพใ—ใŸใ€‚ๆฐ—ใซๅ…ฅใฃใŸใ‚‰ใƒชใ‚ขใ‚ฏใ‚ทใƒงใƒณใŠ้ก˜ใ„ใ—ใพใ™ใ€‚

0

The NixOS appliance series continues: After we successfully minimized our image in part 2, it's time for the next step: Enable automatic Over-The-Air (OTA) updates!

Part 3 is now live! This article shows you how to build a truly robust, self-updating system using NixOS. We dive deep into:

๐Ÿ”น Creating immutable A/B system partitions with systemd-repart.
๐Ÿ”น Preparing the update packages.
๐Ÿ”น Implementing seamless Over-the-Air (OTA) updates with systemd-sysupdate.

This is a must-read if you're building dependable, minimal, and auto-updating appliances.

LINK: nixcademy.com/posts/immutable-

NixOS and systemd-sysupdate are a dream team making OTA updates easy!
0

Proper FreeBSD system hardning :)
(all for sysctl)

security.bsd.see_other_uids
security.bsd.see_other_gids
--> Don't show other users processes

security.bsd.unprivileged_read_msgbuf
--> Don't allow unprivileges to read kernel buffer (dmesg)

security.bsd.unprivileged_proc_debug
--> Don't allow unprivileged to use debugging

security.bsd.hardlink_check_uid
security.bsd.hardlink_check_gid
--> restrict hardlinks to same user/group

kern.elf64.aslr.enable
kern.elf32.aslr.enable
--> Enable kernel address randomization (ASLR)

security.bsd.unprivileged_mlock
--> Restrict unprivileged users from loading kernel modules

sysctl kern.securelevel=1
--> Cannot lower securelevel
--> Cannot write directly to mounted disks
--> Cannot write to /dev/mem or /dev/kmem
--> Cannot load/unload kernel modules
--> Cannot change firewall rules (if compiled with IPFIREWALL_STATIC)
--> System immutable and append-only file flags cannot be removed

This can make a FreeBSD system more secure, especially on multi-user systems. Securelevel ca even go higher, but those restrictions generally need care.

0