I did a bit of an experiment with several LLMs and code generation, and one of them actually seemed to perform slightly better from a security perspective.
All tagged security
I did a bit of an experiment with several LLMs and code generation, and one of them actually seemed to perform slightly better from a security perspective.
Unsurprisingly to other techies my server rack has changed over the past year and few months. Warning, nerd territory ahead.
I closed a security hole on my mail server. Granted, one could barely see the hole, and the chances of compromise are quite low, but everything counts. Right? Right?
There are a lot of decent tutorials online about Wireguard setup. I’m not claiming this is one of them, but this is about a real world implementation.
Running Pi-hole in recursive mode has a lot of benefits - especially if you run your own mail server.
To save on server room space as well as power consumption, I migrated three tower systems to Intel NUCs and rack mounted them. Here’s why.
Instead of making predictions, I look back at past predictions, particularly the outlandish ones, just to see how well I did.
Hosting your own Mastodon instance isn’t for everyone, but if you decide to do it, it’s probably easier than you think.
To properly run a mail server, you need your DNS in order. This is my over-the-top method to do just that.
It’s all fun and games until a PRC-sponsored attack group gets personal.
There are reasons I run my own mail server, they may seem paranoid but they are not. Well. not too paranoid...
I moved everything to UniFi, then they had a major breach. I’d do it again the same way regardless.
A handy list of tips for speaking in public, as seen through the eyes of a security guy.