Tag: networking
All the articles with the tag "networking".
-
The Zero-Trust Home Lab
Apply zero-trust principles to your home lab — network segmentation, VLANs, identity-aware proxies, and Tailscale as the glue.
-
SSHFS: Ditch SCP & Access Remote Files
SSHFS mounts remote filesystems over SSH so you can browse and edit files locally — faster than scp for interactive work.
-
Finding the PID of a Process Using a Specific Port in Linux
Something's squatting on port 8080 and you need to know what. ss, lsof, and fuser one-liners to find and kill the culprit fast.
-
The Role of Antivirus and Endpoint Detection and Response Systems
AV vs EDR — traditional antivirus signatures vs behavioral endpoint detection. What each catches, what it misses, and what you actually need.
-
Certificate Pinning: A Secure Connection Guide
Certificate pinning locks your app to a specific TLS cert so MITM attackers can't swap in a rogue CA — how it works and when to use it.
-
Docker Networking Essential Guide for All Skill Levels
Bridge, host, overlay, macvlan, and none — every Docker network mode explained with real use cases from beginner to production.
-
Docker Networking: Connecting to the Host from a Container
Access services on the host machine from inside a Docker container using host-gateway or host.docker.internal — no hardcoded IPs.
-
How to securely deploy Cloudflare Tunnels
Cloudflare Tunnels expose local services to the internet without open ports — secure setup with zero-trust access controls.
-
Advanced UFW Techniques: Enhancing Firewall Security
Go beyond basic UFW rules — rate limiting, geo-blocking, application profiles, logging, and before.rules tricks for serious firewall hardening.
-
SSH Tunneling: A Secure Conduit for Your Data
SSH tunnels forward ports over encrypted connections — local forwarding, remote forwarding, and dynamic SOCKS proxy explained.
-
Socat: The Swiss Army Knife of Networking
socat relays data between almost any two endpoints — TCP, UDP, Unix sockets, files, and serial ports. The netcat you didn't know you needed.
-
Understanding PostgreSQL Connection URIs
Decode the postgresql:// connection string — host, port, database, SSL mode, and the gotchas that cause connection refused at deploy time.