In the last few years, I started to work (pro bono) on a different topic: personal digital security. In this post, I want to discuss post-mortem security: how to minimize family threats after death.
As human beings, due to our evolutionary background, we struggle to perceive the dangers of the digital world. We have always been accustomed to assessing risk based on our physical environment, evaluating the context (location, people, etc.
On my home Linux box, I implemented Let’s Encrypt to properly manage secure HTTPs connections. To properly configure it we need to: Make the directory /.well-known reachable via HTTP and mapped locally under /var/www/html/.
Git repositories are very interesting from an OSInt perspective. There are a few commands to find out deleted files and recover them in seconds: # Find deleted files git log --diff-filter D --pretty="format:" --name-only | sed '/^$/d' > deleted_files.
Every time I need to work with Linux SNMP utilities, I have to re-learn some commands. This post summarizes useful SNMP commands for anyone who needs a reference guide. Common options Usually, I need to build a custom and trusted MIB repository.