Browsed by
Month: May 2017

CLI email using Blat and SSMTP

CLI email using Blat and SSMTP

When you are away from your computer, how do you know it is operating as expected? Some might use a web front end to allow them a way to periodically check it, but that involves taking a few moments to do. Instead of the person initiating the check, how about having the machine initiate its status. One way to do this is using email as the transport method. In this post I’ll cover two command line email tools that will…

Read More Read More

Monitoring Events with Syslog

Monitoring Events with Syslog

There are different ways to view and track how your systems are operating. Logging is a basic method of keeping records of actions taken by a network device. Most operating systems have some type of logging function. In linux, these log files are mostly processed with syslog. Syslog supports logging to remote hosts, which is useful if a system fails and local logs aren’t available. IOS and Windows take some work to get them to use the same feature. By…

Read More Read More

Dynamic DNS and DDClient

Dynamic DNS and DDClient

In my earlier posts I covered network services. The purpose of those services is to provide a function over a network connection. More often than not the internet connection of a network service host can change. In order for a client to access these network services, it needs to know where the host is. To remedy this problem, a “call home” service is used to register the host so the client can find it. This service is referred to as…

Read More Read More

Firewalls and Services

Firewalls and Services

You should consider security anytime you run processes that provide some kind of service over a network. For instance, if you have a website, that service is providing web pages to clients that make a request for it. The service does not pick and choose who gets what content. Instead, it hands that off to lower layer functions. What if a client makes a request that the process doesn’t have instructions on how to handle. Furthermore, what if that client…

Read More Read More

Automation with SSH tunneling

Automation with SSH tunneling

In the last post I covered how SSH key pairs can be used as a form of two factor authentication, commonly known as 2FA.  In this post I’ll be covering SSH as a means to establish secure communications between systems.  Using SSH will provide a way to run commands on remote hosts, whether they be on node on a local network or accross the globe.  The key pair security is a way to set the remote host to only allow…

Read More Read More