Multi-process container images

While sticking to the mantra of “One Container, One Process” where possible, it is not always possible to have only one process running per container. Sometimes helper processes or side processes are needed. Side processes can be necessary to achieve … Continue reading

Posted in Uncategorized, Virtualisation | Tagged , | Leave a comment

Framework expansion-card for Token2 T2F2 security-key

While using the hardware security keys from Token2 on a Framework Laptop, one thing became clear: the Token2 T2F2 perfectly fits the Framework laptop design. The Token2 The Token2 T2F2-NFC-Slim TypeC is a FIDO2 hardware security key from the Swiss … Continue reading

Posted in Security | Tagged , , , , | Comments Off on Framework expansion-card for Token2 T2F2 security-key

Setup postfix to send emails through another mail server

Modern email servers use a number of modern techniques to reduce the amount of spam. Most noticeable to this topic are SPF, DKIM and DMARC. With those techniques in place, the time of sending emails from any host directly and … Continue reading

Posted in Mailserver | Tagged , , | Comments Off on Setup postfix to send emails through another mail server

FIDO2 security-key login for ID-Austria

FIDO2 provides a secure and modern way of performing authentication. Even government websites like ID-Austria have started using FIDO2 authentication for their online services. While most modern authentication works the same way, ID-Austria works differently. What is ID-Austria ID-Austria is … Continue reading

Posted in Security | Tagged , , , | Comments Off on FIDO2 security-key login for ID-Austria

Security keys and open source

Security keys advertised everywhere as the solution for modern security and password problems and many open source projects welcome the new technology, but what about the security keys themselves? How open are security keys and the technology they are based … Continue reading

Posted in Security | Tagged , , , | Comments Off on Security keys and open source

DNS and DNSSEC

Many stories begin with “In the good old days …” but were the old days always so good? In the case of DNS, the old days go back a long way. You can read more about DNS itself at DNS … Continue reading

Posted in DNS | Tagged , | Comments Off on DNS and DNSSEC

FIDO2 security key management via commandline

FIDO2 Security keys are starting to take off. Many online services support them and the number is growing every day. At this point it seems FIDO Security keys are the way forward. FIDO2 being the second iteration of the FIDO … Continue reading

Posted in Security | Tagged , , , , | Comments Off on FIDO2 security key management via commandline

What’s the fuss about FIDO

So many discussions are everywhere about FIDO, so what is all that fuss about? Lets look into why FIDO is argued to be the next big thing in authentication. Before getting into it, let me say thanks to all the … Continue reading

Posted in Security | Tagged , , , | Comments Off on What’s the fuss about FIDO

Secure authentication and how it changed over time

For decades, users have authenticated on systems with usernames and passwords. This method of authentication has not changed since the beginning of the Internet. As the Internet became a more hostile place and threats emerged, password rules were introduced. Those … Continue reading

Posted in Encryption, Security | Tagged , , , , , , , , , , | Comments Off on Secure authentication and how it changed over time

Git and multiple remotes

Git is the de-facto standard version control system nowadays. It enables developers not only to version their code but also push repositories to a central server. Sometimes it makes sense to push it to more than one remote server. Add … Continue reading

Posted in Uncategorized | Tagged | Comments Off on Git and multiple remotes