Having a dashboard installed on your Linux server can be a great way of enhancing remote management capabilities, as well as getting an overview of its resource usage. In this video, I’ll show you Cockpit which is an awesome management system you can install very easily.
-
A Linux PC in the palm of your hand! The Pantera Pico PC from XDO
In this video, Jay provides a quick review of the Pico PC from XDO, which is the smallest Linux PC that’s ever been reviewed on the channel. The Pico PC claims to be ultra quiet and fully compatible with Linux. Check out this review and find out if the Pico PC lives up to its claims.
-
Linux Crash Course – sudo
When you need to run Linux commands with elevated privileges, sudo is the tried and true method to run commands as another user (such as root). In this introductory tutorial, we’ll take a look at some of the inner-workings of sudo.
-
Enterprise Linux Security Episode 16 – Library Poisoning
We’ve discussed supply-chain attacks in the past, and now it’s time to see an actual example that happened recently. However, this particular incident is especially unique as the libraries in question were allegedly poisoned by the actual developer. In this episode, Joao and Jay discuss the recent sabotage regarding two very popular NPM libraries.
-
The Homelab Show Episode 43: Questions & Answers
It’s time for yet another Q&A episode of The Homelab Show. In this episode, Jay and Tom answer your questions about networking, security, and more!
-
The Homelab Show – Episode 42: Security Onion
In the 42nd episode of The Homelab Show (where does the time go?!) Jay and Tom Discuss Security Onion. It’s definitely a very appealing solution for enhancing your security.
-
The Homelab Show Episode 41 – Network Segmentation
Networking is often a difficult subject for newcomers, as some of the concepts are not always the easiest to explain. Since networking is an important element of homelab, it’s definitely something you’ll want to focus on. Network segmentation in particular can give you a foundation on which to build better security rules, but how do you implement it? What’s the actual benefit of segmentation? In this episode, Jay and Tom discuss some foundational concepts around network segmentation specific to homelab.
-
Hands-on with the Turing Pi 2!
The Turing Pi 2 is quite an exciting project that might even be a game-changer when it comes to homelab. With it, you can set up Raspberry Pi Compute Modules as individual servers, and even cluster them! The Turing Pi 2 gives you access to many additional features that Compute Modules wouldn’t normally have access to, such as mPCIe, SATA, and more. This gives you access to build a data-center in a box, and Jay gives it a first-look on the channel in this video.
Relevant links
(more…) -
The Homelab Show Episode 40 – The Turing Pi 2
Happy New Year! In their first podcast of 2022, Jay and Tom talk about the Turing Pi 2. The Turing Pi 2 is a mini-ITX board that supports up to four Raspberry Pi Compute Modules and/or Nvidia Jetson modules, effectively giving you a “data center in a box”. Check out this episode for some thoughts on how this might be a game changer for homelab.
-
Resetting OpenSSH Host Keys (the easy method)
When creating a deployment image or template for distributing Linux to devices or servers, it’s a good idea to make sure that you reset the host keys for SSH. In this video, I’ll show you an easy method I found for automating this.
You can find the systemd unit file I used in the video here.
(more…) -
Enterprise Linux Security Episode 14 – Recovering from Disasters
Disasters in the world of tech are frustrating for everyone, not just the company that experienced the incident. In this episode, Jay and Joao discuss thoughts around what it actually means to recovery from a disaster, and why it’s typically not a quick process.
-
The Log4Shell Vulnerability, and CrowdSec’s Community Response
TheLog4Shell vulnerability is taking the Internet by storm, and it’s already being used for real-world attacks. In this video, Jay discusses the details around Log4Shell vulnerability in Log4j, and also CrowdSec’s community-based response to the situation.
Relevant links: