So if you’ve tried enterprise log management systems, you’ve likely heard of Syslog. If you haven’t, Syslog, is, well, a protocol designed to allow multiple hosts to send their system logs over the network to some other server where they can be analyzed and stored. It’s another one of those weird UDP protocols, and this one is actually stupid simple, even in both of the commonly used forms! Oh, we’ll also cover the one piece of software that I use that handles Syslog — Graylog, which by itself is also really cool.Continue reading
A first for me, this post is going to come in two parts. This one will cover the tech behind everything, and the second will actually be a new network tour. I’ve finally finished one of the biggest, if not the biggest project I’ve undertaken in a while: overhauling pretty much my entire network.Continue reading
If you’re just curious, MTA-STS relates to SMTP, in the same way that HSTS relates to HTTP. Except, naturally, it relies on, you get three guesses… yes, DNS. And this is what it is, and how to set it up.Continue reading
So here’s the thing about SSH: The first time you connect to a server, you have no real idea of if that’s legitimate or not, right? Well, you could compare the key fingerprint to the fingerprint that the server admin gave you and make sure they match, but nobody does that.
Well… there is a way. Using everyone’s favorite always-broken service, DNS.Continue reading
There’s a few common ways to do this:
- Web Key Directory
Let’s discuss how they all work.Continue reading
Pretty Good Privacy, or as it’s more commonly known as by it’s most popular client’s name, GNU Privacy Guard, is a method of encrypting and/or signing your messages using the power of public key cryptography. And, while it can get extremely complex, the basics of using PGP are, actually, pretty simple. So in the words of the great Angus Deveson, Let’s get started.Continue reading
For those of you that have ever tried to setup email on your phone that’s more than just GMail, you’ve likely been asked how you want to access the account, either POP or IMAP, and were likely told the difference is that “IMAP keeps messages on the server.” Well, let’s go over the specific differences here, to actually give a more complete understanding of what each protocol is like.Continue reading
Git and Bitcoin: the Similarities
Fun fact: I’m writing articles on initialcommit.com now! I’ve worked with Jacob in the past to bring you the evolution of version control systems (go look that up there, hugo doesn’t like links in the body of link posts, hah), but now I’ve actually got articles under my name there. If you like Git things, check it out.
Anyways, to the point. Did you know that Git and Bitcoin are actually based on some very similar concepts and at the very low level are nearly identical in implementation? In the two-post series over there, I pick apart just how closely related the two are.