Pi-hole using Docker on ODroid-C2

Just recently experimented with the use of Pi-hole (running on an ARM based SBC) as the Network-wide Ads and Internet Tracking blocker.

This article provides the step-by-step instructions to get Pi-hole running on Docker.

Here is the link to the article:

Pi-hole using Docker on ODroid-C2

Enjoy 🙂 !!!

Linux Capabilities Unraveled

In the traditional Unix world, the typical way to grant a command (executable file) the superuser (root) privileges is to enable the SUID bit and have it owned by root. Look at the permission of the ping command in Linux – it does *NOT* have the SUID bit set and yet is able to open a raw socket connection … curious to know more ???

Here is the link to the article:

Linux Capabilities Unraveled

Enjoy 🙂 !!!

Hands-on with HashiCorp Vault

Wish you all a Happy, Healthy, Prosperous, & Peaceful 2021

In this article, we will setup and demonstrate the HashiCorp Vault for managing and controlling access to sensitive enterprise assets such as Passwords, Access Tokens, Certificates, etc., on a 3-node VirtualBox based VMs. Here is the link to the article:

Hands-on with HashiCorp Vault

Enjoy 🙂 !!!

Understanding OAuth2 and OpenID Connect

OAUTH2 and OpenID Connect are popular Authorization and Authentication mechanisms and a lot of confusion around these standards.

In this article, we will unravel the OAUTH2  and OpenID Connect standards and practically demonstrate the various flows.

Here is the link to the article:

Understanding OAuth2 and OpenID Connect

Enjoy 😉 !!!