Categories
Raspberry Pi

Raspberry Pi Configured as a Hotel WiFi with VPN Privacy

What is Wrong With Hotel WiFi? Using hotel Wi-Fi presents significant security risks due to its open and shared nature. Often, these networks lack robust encryption, making it easier for cybercriminals to intercept data transmitted over them. This vulnerability exposes users to potential threats such as man-in-the-middle attacks, where hackers can eavesdrop on or alter […]

Categories
Linux Technology

Kernel panic – not syncing: VFS: Unable to mount root fs on unknown-block(0,0)

Kernel panic – not syncing: VFS: Unable to mount root fs on unknown-block(0,0) So that is a scary error message to see on a server, and more so on a remote server. This error message appeared after updating and rebooting a Fedora 37 server. This was a remote server droplet at DigitalOcean which could only […]

Categories
Linux Technology

Configure Jenkins with a Self Signed SSL Certificate and Root CA Certificate

This article will go over the steps required to create a root CA certificate and a self signed certificate for installation on a Jenkins linux server. Using a self signed certificate is great for a small organization or personal use where the server is on a private network. If the server is intended for public […]

Categories
Linux Technology

Preventing Fedora 38 Gnome Suspend

After upgrading to Fedora 38, anyone using Gnome desktop will likely experience a system suspend after about 10 – 15 minutes. This is due to some new make the world a better place policy but for those of us using Gnome on a server environment, it’s a new surprise. Imagine running a server with Gnome […]

Categories
Linux Technology

Configure GitLab with a Self Signed SSL Certificate and Root CA Certificate

This article will go over the steps required to create a root CA certificate and a self signed certificate for installation on a gitlab linux server. Using a self signed certificate is great for a small organization or personal use where the server is on a private network. If the server is intended for public […]

Categories
Technology

Synology DSM Manual Update 6 to 7

Synology DSM 7 has been out for a while now but you may have a NAS that is still running on DSM version 6.x. As you can see this Rackstation RS814+ is running version 6.2.4 and no updates are available and it says it is up-to-date. There are several reasons why no updates are available […]

Categories
Uncategorized

WordPress Twentytwenty Theme – Expanding Width

By default, the latest Twentytwenty theme for WordPress has a bias towards mobile devices. It does look nice on a phone and tablet but on the desktop or laptop, the width is too narrow and makes things very unpleasant to read. The fix is easy, and just requires a custom change to the CSS. First, […]

Categories
Technology

VirtualBox Snapshots from Command Line

Creating a snapshot of your VirtualBox VM is easy to do from the GUI tool but did you know it is also just as easy from command line? This is one of the most powerful features of any VM system and it should be a common practice that you use before upgrading anything on your […]

Categories
Linux

Configuring a Fedora Email Server

This article covers the how to steps for configuring an email server on Fedora 35. This move was instigated by the demise of the free Google Suite service which ultimately decided to convert into a pay service. What was promised as free for many years had become an irrationally priced service and therefore the move […]

Categories
Java Technology

Spring Security – Access Denied SpEL Changes

If you use Spring Security to lock down a web application and you use the hasAnyRole or hasAnyAuthority you are likely using a comma separated list of roles or authorities. If you upgrade to Spring Framework 5.3.13 or higher your roles will not parse correctly if the entire comma separated list is contained in single […]