Setup a selfhosted newsletter using listmonk

Listmonk is an amazing feature packed selfhosted email newsletter manager. It offers loads of features like analytics (clicks, opens, bounces), templates, public subscription pages, importing subscribers and much more!

SSH Remote Access NO Port-Forwarding NO Cloudflare

In this article I will show you how I securely connect to my remote machines without having to configure port forwarding. Requirements: A computer “server” (running linux) A internet connection Another computer to connect to your server (running linux) Why? If you want to access your server without portforwarding in a extremely secure fashion you will want to follow this tutorial. You will be connecting to the server via tor which will make it harder for anyone to find the url of the server and ill show you how to setup keybased auth for even more security!...

October 4, 2023 467 words 3 min

Create a MultiBoot USB using ventoy

With ventoy, you don’t need to format the disk over and over, you just need to copy the ISO files to the USB drive and boot them directly. Whats ventoy? Ventoy is a free and open-source utility used for writing image files such as .iso, .wim, .img, .vhd(x), and .efi files onto storage media to create bootable USB flash drives. Once Ventoy is installed onto a USB drive, there is no need to reformat the disk to update it with new installation files; it is enough to copy the ....

March 6, 2023 289 words 2 min

How to Set Up Your Own Git Server: A Simple Guide

Thinking about setting up your own Git server? There are plenty of perks to doing so instead of relying on platforms like GitHub. For starters, you’ll have complete control over your code, ensuring it can’t be used for profit or deleted by anyone but you. What You’ll Need A Computer for Your Server: Ideally running Linux (Debian is a solid choice). Internet Connection: Pretty essential for accessing your server remotely. Another Computer with Git Installed: This is what you’ll use to interact with your server....

Host your own private search engine — searX

We rely on google more and more, but it’s interesting to know how much data Google is now handling. Alphabet aka Google describes its extensive data collection practices in its privacy policy. The company stores an astounding quantity of data. An estimated 15 exabytes of YOUR data are stored by Google. Google is tracking your every move. What is searX? Searx is a free and open-source metasearch engine, available under the GNU Affero General Public License version 3, with the aim of protecting the privacy of its users....

Become anonymous and somewhat untraceable with tails os

In this article we will talk about what tails is and how to install and more. What is tails? Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity.It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB, and leaves no digital footprint on the machine unless explicitly told to do so....

Get ad free web with Pi-hole

In this article, I will show you how to set up Pi-hole. Pi-hole will allow you to block in-app ads, improve your network’s performance, and monitor statistics. Pi-hole also allows you to create a VPN. What is Pi-hole? Pi-hole is a Linux network-level advertisement and Internet tracker blocking application that acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network capability, such as the Raspberry Pi, but can be installed on any Linux machine....

Securing ssh with Key-Based authentication

SSH keys provide an extremely secure way of logging into your server. SSH Password Based VS Key Based Authentication Clients can be authenticated by an SSH server in a variety of ways. The most basic is password authentication, which is simple to use but not particularly secure. The more advanced and secure way is via ssh keys.Brute-forcing a password-protected account is quite possible thanks to modern computing power and automated scripts....