- Details
- Written by NX
- Category: Articles
- Hits: 1730
So why a Windows tutorial ?
I stumbled over a email link the other day in an article, where the writer referred to Protonmail, and mentioned that it was a secure email address people could use.
So, I wasn't sure that's how Protonmail worked, as far as I recall, it's based on GPG, and sure enough, it is. So, lets look into it, and figure out how to use Protonmail securely.
- Details
- Written by NX
- Category: Articles
- Hits: 992
So, now we have had a look at building metapackages, let's have som fun with "real" packages. This will be a short tutorial on packaging Debian packages. I should point out that I'm using a Kali based build system, so some things might be different if you're building on something else.
- Details
- Written by NX
- Category: Articles
- Hits: 1008
Hey there :)
in this piece, we're going to look at systemd and systemctl. And what's that you ask ? Well it's the system commands we use to manage services on a system that uses systemd. In the old days, we would use /etc/init.d/service, today it's in systemctl, so knowing how to use it, is a good thing. But, if you're scared of the command line, this article might not be for you :)
But why should you even care about the command line and using it to control services, and debug services state ? Because it's the fastest way if you have to make changes, so I highly recommend you at least read through this piece, and get the most basic commands under your belt.
- Details
- Written by NX
- Category: Articles
- Hits: 1199
Today we're going to look at building meta-packages and doing it fast and easy, and for laughs, we're throwing in a quick repo howto.
This is a quick way to define your own meta-packages and build a small internal repo for local packages or testing. It should not be used for a larger internet hosted mirror, or for any larger distribution, there's better options for that.
For building a private "real" package repository, see Private APT repo with reprepro.
- Details
- Written by NX
- Category: Articles
- Hits: 1447
Hey there :)
I talked to a friend the other day, and she was wondering about different types of online communication, what is good and what is bad, what is actually secure ?
So, I'll throw in my random thoughts about the subject here. I would like to point out, this is by no means a do it all, fix it all solution, and no i won't promise you it's stopping that "Three-letter-acronym-agency".
But is it secure "enough", yes I think so. So, if you're curious about secure communications, read on :)