Server encryption with remote SSH unlock
In this guide, you'll learn how to unlock an encrypted Linux server remotely with SSH.
In this guide, you'll learn how to unlock an encrypted Linux server remotely with SSH.
If everything burns down, and your data is lost, could you regain access to your accounts?
PDF encryption is broken. Here's why and what you can do about it.
Synology made a brain-dead decision that undermines privilege separation, a fundamental concept in IT security.
This is a quick guide on how to create and verify signatures with GnuPG (in a terminal).
There are different kinds of cloud drives, with different levels of reliability, maintenance, cost and privacy... and the state of things is not pleasing.
Do not use Apple's "Hide My Email" together with ProtonMail, or your real address can leak.
Why you shouldn't use SKS, and what to use instead.
A guide to easily prevent ZFS leaks.
You probably heard of the Log4j vulnerability by now, and you probably know that (the original) Minecraft is written in Java, and so is the server, and it uses Log4j. So, Minecraft servers are affected by this. I do run a small Minecraft server network (https://www.bitloco.org) but I haven't had [...]