2025-11-28
If I were sent to a deserted digital island and allowed to take only one networking utility — I would unhesitatingly choose Netcat.
The official documentation (man nc) dryly states: “a utility for reading from and writing to network connections using TCP or UDP.”
In practice it’s the Swiss army knife of the network engineer, replacing dozens of specialized programs.
The article uses examples for OpenBSD netcat — this is the one that ships by default in Ubuntu 20.04+, Debian 10+, Fedora, Arch, Alpine and most modern distributions.
2025-11-17
WordOps is a powerful open-source tool for managing WordPress sites hosted on a VPS. It’s designed for web developers and system administrators who need fast deployments, an optimized stack, and convenient caching, SSL, and site maintenance tools.
WordOps is a fork of EasyEngine v3, positioned as a more performant, simpler, and actively developed solution. Below is a full overview of features, installation, and practical usage scenarios.
What is WordOps?
WordOps is a Python CLI tool that automates the deployment of a server stack:
2025-11-13
Every time you type google.com into your browser, some magic happens. Your computer doesn’t know where that site physically lives. To find out, it asks the DNS (Domain Name System) — a giant distributed database often called “the Internet’s phone book.”
This book consists of records, each of which tells the world something specific about your domain: where your site lives, where to send email, or how to verify that you own the domain.
2025-11-12
Do you have an application spread across hundreds of client devices? Or a fleet of IoT sensors sending telemetry?
Sooner or later the question arises: “What’s actually happening over there?”
And right after it — “How do I collect logs without bankrupting myself on Splunk or Datadog?”
If your clients can send HTTP requests, you already have ninety percent of the solution. HTTP(S) is a universal and firewall-friendly protocol.
All we need is a listener (endpoint) that will accept these logs.
2025-11-06
Jitsi Meet is an open videoconferencing platform that easily integrates with Active Directory (AD). Such integration allows using corporate accounts for login, simplifying administration and improving security.
In this guide we’ll go through how to connect Jitsi Meet (in Docker) to AD based on Windows Server 2016, and show proven debugging methods that help avoid common errors.
Important: using LDAP without encryption is insecure. For testing this is acceptable, but in production you must use LDAPS (port 636) with valid certificates.
2025-11-05
How to run Jitsi Meet (Docker) behind an Nginx Reverse Proxy
In the previous article we deployed a basic Jitsi Meet server using Docker.
This is a great way to quickly start video conferencing, but in production a Jitsi server often needs to run on the same host where other web applications are already running.
To keep everything peaceful, you should hide Jitsi behind an Nginx reverse proxy.
Nginx will take care of SSL, ports 80/443 and will proxy requests to the Jitsi containers running on internal ports.
2025-10-29
This guide will show how to configure two Linux servers so that all the Internet traffic from a specific local subnet (for example, 10.100.10.0/24) is routed not via its default gateway but through an IPIP tunnel to a remote server, which will then put that traffic onto the Internet.
This is useful if you need services in one subnet to go out to the world with the IP address of another server — for example, to bypass restrictions, centralize NAT, or hide the source.
2025-10-24
In a world where data privacy and access to resources are often restricted by geoblocks or corporate policies, tools like ProxyChains become indispensable assistants. ProxyChains — or more precisely its modern fork ProxyChains-NG — is an open utility for Unix-like systems (Linux, macOS, etc.) that allows routing the network traffic of any application through a chain of proxy servers. It is especially popular among developers, pentesters, and security enthusiasts. In this article we’ll cover what ProxyChains can do, why it’s useful for developers, provide usage examples, and discuss its limitations.
2025-10-23
Hello! If you’re new to the world of remote server administration, you’re probably familiar with SSH — a reliable tool for connecting to remote machines. But what do you do when the connection is unstable: Wi‑Fi drops, you switch to mobile data, or your laptop “sleeps”? This is where Mosh (Mobile Shell) comes in — a “mobile shell” that makes remote work comfortable even in poor conditions.
In this article we’ll look at what Mosh is, why it’s better than SSH in certain scenarios, how to install and use it. Everything simple and step‑by‑step — for absolute beginners. Let’s get started!
2025-10-17
In today’s world of networking technologies, combining two remote offices into a single entity is a fairly routine task. Usually, L3 tunnels are used for this (for example, IPIP or IPsec). However, there are situations when simple routing is not enough and full L2 connectivity is required, as if remote devices were connected to the same switch.
Let’s figure out when this is necessary and how to configure such connectivity correctly so that it is not only working but also fault-tolerant.