Run Windows 11 (TPM and Secure Boot) on KVM
How to Install self-hosted Commento and Use Nginx as Reverse Proxy
How to Install self-hosted Commento and Use Nginx as Reverse Proxy
Guide to install Commento and it's required dependencies like PostgreSQL, setting up required Commento configuration and it's SystemD and use Nginx as reverse proxy to serve Commento instance using HTTPS.
Password 101: Best Practices for Secure Online Living
Password 101: Best Practices for Secure Online Living
Discusses how you should create and treat your passwords as well as tips for using a password manager to make it easier to manage unique and random passwords on every site / application you use.
ditatompel Insights
Plex Data Breach 2022 Exposes Emails, Usernames and Encrypted Passwords
Plex discovered that a third-party was able to access a limited subset of their user data that includes emails, usernames, and encrypted passwords
Virt-Manager: sharing data between host and guests (libvirt virtio-fs)
Monitoring Tor through Tor ControlPort with Telegraf and Grafana
Running Matrix Synapse on my 11 years old laptop
Running Matrix Synapse on my 11 years old laptop
I'm running public Matrix Synapse server on HP Pavilion g7 Notebook PC (g7-1260us), 11 years old laptop with just 4GB DDR3 RAM and Sandy Bridge CPU.
DNS Sinkhole, AdGuard Home or PiHole?
DNS Sinkhole, AdGuard Home or PiHole?
Comparing PiHole and AdGuard Home as DNS Sinkhole. Both offer excellent way to block sites, ads, and trackers. But, which one shoud you choose?
Public API Monero Remote Node List
Public API Monero Remote Node List
API documentation to search for monitored Monero remote nodes on xmr.ditatompel.com. You can filter based on nettype, countries and more.
How to Host a STORJ Node
How to Host a STORJ Node
Step by step guide to run STORJ Node, an open-source cloud storage platform, S3-compatible platform and suite of decentralized applications.
ditatompel Insights
Monero Timeline (Cypherpunks, Bitcoin, Bytecoin, and BitMonero) (draft)
The origin of Monero (timeline, notable event, moment and incident). Note: This article is not done yet, working on progress
Self-Hosted Ghost: How to Upgrade Ghost v4.x
Self-Hosted Ghost: How to Upgrade Ghost v4.x
Step-by-step upgrading Self-Hosted Ghost version 4.x, the latest major version of the product.
Guide to Run Monero Node on VPS
Guide to Run Monero Node on VPS
Supporting Monero by building new public nodes on VPS or virtual machine.
Indonesia Public Monero Node
Indonesia Public Monero Node
I host a Monero node that is free to use for everyone as a remote RPC for wallet usage located on Indonesia Data Center 3D in Jakarta, Indonesia.
LibreNMS Distributed Poller on Low-end Server Resources
LibreNMS Distributed Poller on Low-end Server Resources
A personal snippets to run distributed LibreNMS poller on low-end server resources to monitor hundreds of devices and sensors.
Why Inactive Email Accounts is Dangerous
Why Inactive Email Accounts is Dangerous
Malicious users can retrieve deleted email and try to make password reset to every popular sites and original owner will lost their website / app account.
Discourse Rake Posts Snippets from BBCode to Markdown
Discourse Rake Posts Snippets from BBCode to Markdown
After migrated devilzc0de from MyBB to Discourse, many things needs to be done. One of them is to rake and rebake the BBCode tags posts to Markdown.
Set Up IKEv2 VPN Server and Clients
Set Up IKEv2 VPN Server and Clients
IKEv2 contains improvements such as Standard Mobility support. This is my personal snippet to set up IKEv2 VPN server & clients for multiple servers.
Configure IPsec/XAuth VPN Clients
Configure IPsec/XAuth VPN Clients
Following these steps allow you to configure your Android, iOS, MacOS, and Linux machine using IPsec/XAuth (Cisco IPsec) VPN.
Configure IPsec/L2TP VPN Clients
Configure IPsec/L2TP VPN Clients
This is the next part after you successfully set up your own IPsec VPN server. Following these steps allow you to configure your Android, iOS, MacOS, and Linux machine using IPsec/L2TP VPN.
IPsec (L2TP, XAuth, IKEv2) VPN Server Auto Setup
IPsec (L2TP, XAuth, IKEv2) VPN Server Auto Setup
A few years ago, I've found this gem which allow us to set up our own IPsec VPN server with L2TP, XAuth and IKEv2 on Ubuntu, Debian, RHEL, and CentOS.
Trying Gmail Confidential Mode for G Suite Users
Trying Gmail Confidential Mode for G Suite Users
Gmail Confidential mode allow G Suite users sending emails with expiration date, restrict to forward, copy, print, or download email content or attachments.
Story Behind The All New devilzc0de: Migration Process
Story Behind The All New devilzc0de: Migration Process
The struggle migrating from 1 platform to another platform with different database backend and program languages.
ZombieLoad: Serious Intel Processors Security Flaw
ZombieLoad: Serious Intel Processors Security Flaw
ZombieLoad is security flaw in Intel processors that allows malicious hacker to steal any data that’s been recently accessed by the processor.
MacOS Is Not The Same Family Tree With Linux, It Never Been
MacOS Is Not The Same Family Tree With Linux, It Never Been
MacOS isn't associated with Linux in any way. What we call macOS nowadays is operating system developed by NeXT.Inc called NeXTstep and it based from BSD
Windows launch New Open-source Terminal Application
Windows launch New Open-source Terminal Application
Windows launch is a new terminal application for command-line users with features like tabs & theming. As of today, the Windows Terminal & Windows Console is open source.
ditatompel.com v4: New Design Interface and Features
ditatompel.com v4: New Design Interface and Features
It's about 2 years since I create ditatompel.com (v3) using Material UI. Remake the site back to 2013's design interface using Bootstrap.
Compromised Zimbra Server Running zmcat dblaunchs Malware 100% CPU Usage
Compromised Zimbra Server Running zmcat dblaunchs Malware 100% CPU Usage
Recent Zimbra XXE / SSRF Vulnerability Disclosure (CVE-2019-9670) being actively exploited and could allow an attacker to RCE on an affected Zimbra system.
Cloudflare Reverse Proxies are Dumping Uninitialized Memory
Cloudflare Reverse Proxies are Dumping Uninitialized Memory
Between 22 Sep 2016 – 18 Feb 2017 passwords, private messages, API keys, and other sensitive data were leaked by Cloudflare to random requesters.