
Prototyping a Larger Project with Proxmox
Introduction Back when I was still doing software development, I relied on simple tools to manage and visualize systems — index cards for tracking requirements, whiteboards for mapping flows, and ...

Introduction Back when I was still doing software development, I relied on simple tools to manage and visualize systems — index cards for tracking requirements, whiteboards for mapping flows, and ...

“The most dangerous phrase in the language is, ‘We’ve always done it this way.’” — Grace Hopper A few years ago, I had an idea for a project focused on building a Linux-based business setup that ...
Companion Guide: Quick reference for tools mentioned in Linux for Business - Exploring Enterprise Security at Small Business Scale. Access Control Mechanisms DAC (Discretionary Access Control)...

Introduction Just hear me out: when it comes to backend servers—the ones tucked away behind locked doors with cold air blowing through the racks—Linux has long held a strong and respected presence...
This document provides answers to common technical questions and caveats when working with a Samba Active Directory (AD) environment. Whether you’re integrating Linux systems, managing domain polic...
This guide walks through the creation and management of users, groups, organizational units (OUs), and access control policies in a Samba Active Directory (AD) environment. It’s designed for IT tea...

In security, having a backup isn’t paranoid — it’s just smart. This article explores how remote verification transforms AIDE from a solo integrity checker into a distributed, tamper-aware system th...
Note: This reference provides the key commands and concepts for building a remote AIDE verification system. For a complete, production-ready implementation with automation scripts, monitoring, and ...

File permissions used to feel super abstract to me. All those numbers and letters — rwx, r--, 755, 644… it was like some secret code I wasn’t in on. Then one morning, I was just enjoying the quiet...

Modular scripting, cryptographic signing, and a tamper-evident ledger for Linux integrity management When it comes to integrity, trust isn’t a setting — it’s a habit. This framework transforms ...