Kubernetes – Connect to Hidden KubeAPI using Comprehensive Shell Script
It is enticing to publicly expose your KubeAPI endpoint. For ease of access, using cloud based automation services (i.e GitHub Workflows) or just plain laziness. Authentication exists for sure, but what about possible exploits or ddos?
Secure SOCKS Proxy Over SSH
Tunneling traffic encrypted through a VPN tunnel is not always necessary. If endpoint anonymity is not an issue, or if its just a matter of carrier/LAN distrust. A Socks Proxy SSH Tunnel will be just fine. Initiate the tunnel like so: Where [ssh.endpoint.tld] is your server of choice. Once the connection is active, point your…
How To: Avoid password theft, Faceraping, Email hijacks etc. On public networks
Has your email been blacklisted? Does your forum-posts suddenly contain nothing but kittens? Did your relationship status become same-sex over night? Well, physical access to your box may be the answer to most of these scenarios. But everything you send on public wire, in plain-text that is, has the potential to be sniffed out or…