Privacy-Focused Alternatives to Google Analytics

Privacy-Focused Alternatives to Google Analytics
Icon provided by the unDraw project, created by @NinaLimpi
Introduction A full catalog and review of some analytics tools, that are a more privacy-focused alternative to Google Analytics. The tools are divided into the following categories: Free Cloud-Hosted Free Self-Hosted Paid (Cloud or Self Hosted) All the chosen tools should have the following characteristics: Privacy Focused (No IP logging, Fingerprinting, Tracking, etc) GDPR compliant Open Source (Preferably but not hard criteria) Offer good statistics User-friendly interface (UI/UX) Reasons for choosing an alternative It was a struggle for me to find and choose a different analytics service, but I knew I had to do it if I want to be more respectful of the people that visit my website and try to create a more private and secure internet.
Read more →

Getting Started with AWS

Getting Started with AWS
Amazon Web Services, AWS, the Powered by AWS logo are trademarks of Amazon.com, Inc. or its affiliates. See AWS Trademark Guidelines.
The Amazon Web Services world is an entire beast on its own, and I believe some knowledge around it should be useful to all tech related roles, from programmers to DevOps and system administrators. I am recently trying to explore AWS, so I will try to document my process along the way. In this post I have gathered the steps for signing-up with AWS and the first configurations to make to your account before even starting an instance or a service.
Read more →

Signing Git Commits

Signing Git Commits
Git Logo licensed under the CC Attribution 3.0 Unported. GnuPG Logo licensed under GPL, Wikipedia Commons
Introduction This is a guide to help you sign your Git commits in an open source project, in order to verify that the owner of the submitted code is you and only you. Git enables us to use whatever email and username we want when doing a git commit. This can be easily used for malicious purposes, as anyone can pretend to be another person when commiting a piece of code.
Read more →

SNMP Daemon Configure

SNMP Daemon Configure
The SNMP network management figure by Jinchao Xiao’s Lab is licensed under CC-BY-3.0.
In the system administrator world, a large part of the work is to monitor the servers and all systems in infrastructure to make sure of their correct operation and to prevent any kind of malfunction or problems. One protocol that allows devices to share their status with a monitoring server is SNMP, which is widely used in the networking world, in switches, routers, firewalls, or access points. SNMP’s main benefit is that, if the device supports it, it is very easy to remotely query them for their status and even change their configuration.
Read more →

Pi-hole Docker Install

Pi-hole Docker Install
The Pi-hole logo and Pi-hole® word are registered trademarks.
Pi-hole® is a DNS sinkhole that protects your devices from unwanted content, without installing any client-side software. We will use Pi-hole as our DNS server in our local network in order to block ads on all devices. It is important for Pi-hole to be run on a device or server that is constantly running, as we will configure our router to point to this device for any DNS query. So without it running we will not be able to access any webpage.
Read more →

SUI Configure

SUI Configure
Screenshot of SUI dashboard by Jeroen Pardon licensed under The Unlicense.
SUI is a startpage for your server and / or new tab page. It offers some similar functionalities as Homer. We can use this app in order to have a homepage for all our services, apps and links of our server into one place, and edit only some json files for the content. This guide assumes, that Docker and Docker Compose is already installed in your system. Run Using Docker Clone the repository in your system and navigate into it:
Read more →

GPG Keys - Create & Use

GPG Keys - Create & Use
By GnuPG, GPL, Wikipedia Commons
Introduction If you are into Linux or the Security field you most likely have heard the terms: PGP, GPG, GnuPG, OpenPGP. They sometimes are being used interchangeably to describe e.g. how to encrypt mails or how to verify signatures of installed programs and packages. It might be difficult for new users to understand the differences, and how the PGP encryption works, but it is simple if explained. PGP: Pretty Good Privacy (PGP) is is an encryption program that provides cryptographic privacy and authentication for data communication.
Read more →

HTTPS & SSL Certificate & Certbot

HTTPS & SSL Certificate & Certbot
Original Certbot logo is licensed under CC-BY.
In this post we will see, how we can get an SSL certificate for our Apache or Nginx server with Certbot from Let’s Encrypt. Prerequisites An Ubuntu or Debian server (tested on Ubuntu 18.04 and Debian 10) that you have SSH access and root or sudo privileges. You can follow the SSH Server & UFW Configure guide to set up SSH best practices and configure a basic firewall.
Read more →

Nginx Install

Nginx Install
NGINX and the NGINX logo re trademarks of F5 Networks, Inc. in the U.S. and in certain other countries.
In this post we will see how we can install the Nginx web server in our Ubuntu server, and how to configure it to serve some files. If you have already a web server installed, like Apache, you either have to uninstall it or change the default port that is listening because it will conflict with Nginx. Install Nginx We install nginx and any required dependencies: sudo apt install nginx Adjusting the Firewall After you have followed the initial server setup and enabled the UFW firewall, make sure that your firewall allows HTTP and HTTPS traffic.
Read more →

Node-RED Install

Node-RED Install
Example flow by Paul Wieland on Node-RED flows page.
In this post, we will see how we can run Node-RED using Docker Containers on our Ubuntu Server. Node-RED is a flow-based development tool for visual programming, for wiring together hardware devices, APIs and online services as part of the Internet of Things. The light-weight runtime is built on Node.js, taking full advantage of its event-driven, non-blocking model. The flows created in Node-RED are stored using JSON which can be easily imported and exported for sharing with others.
Read more →