How to Install Home Assistant Supervised on a Raspberry Pi 4b – the official way

This video describes how to install Home Assistant Supervised. Home Assistant (former is a container-based system for managing your Home Assistant Core installation and related applications. The system is controlled via Home Assistant which communicates with the Supervisor. The Supervisor provides an API to manage the installation. This includes changing network settings or installing and updating software.

Continue reading “How to Install Home Assistant Supervised on a Raspberry Pi 4b – the official way”

Configure the NUT to manage a UPS through the Home Assistant as a Docker container on a Raspberry Pi

The primary goal of the Network UPS Tools (NUT) project is to provide support for Power Devices, such as Uninterruptible Power Supplies, Power Distribution Units, Automatic Transfer Switches, Power Supply Units and Solar Controllers. NUT provides a common protocol and set of tools to monitor and manage such devices, and to consistently name equivalent features and data points, across a vast range of vendor-specific protocols and connection media types.

Continue reading “Configure the NUT to manage a UPS through the Home Assistant as a Docker container on a Raspberry Pi”

Agents of chaos

Despite appearances, this is not a documentary about Russian interference in the 2016 US presidential election. I would call it a revealing of the cards, showing the truth about the Russian invasion and the reasons for the war in Ukraine first in 2014 and then in 2022. It is worth noting the activities of the Russian troll farm – the IRA (Internet Research Agency), for which Ukraine was a test battlefield in cyberspace. Less and more sophisticated methods used by the Internet Research Agency were shown.

Server basic configuration after installing RHEL 8.5 (minimal).

I saved it as, gave it chmod u+x executable permissions and ran it as root ./, although I know that scripts should be run from sudo for security. But I know what I’m doing and why. Everything is described with comments in English. User was created during installation of the system, hence the change. I use sudo and user on a daily basis. Here it is a quick solution. These commands can be executed equally well using sudo.

Continue reading “Server basic configuration after installing RHEL 8.5 (minimal).”

Bash script that blocks web server (apache/nginx/litespeed) scanners.

Bash script that blocks web server (apache/nginx/litespeed) scanners

Bash script that blocks web server (apache/nginx/litespeed) scanners. It checks the 400-408 errors or any other in the log you will choose to scan and extracts IP addresses of scanners which are trying to scan a web server and adds IP addresses to the ipset which drops the connection.

Continue reading “Bash script that blocks web server (apache/nginx/litespeed) scanners.”

The perfect weapon

Based on a best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌

Directed by Emmy-winning filmmaker John Maggio (Panic: The Untold Story of the 2008 Financial Crisis) and featuring interviews with top military, intelligence, and political officials on the frontlines of cyberterrorism, the documentary brings to light the combatants and innocent victims caught in the crosshairs of a hidden war that has been going on for decades — a war that America started, but has no idea how to finish.‌

Traveling from the deserts of Iran and Las Vegas to the back alleys of Beijing and Moscow, the film chronicles America’s pursuit of enemies who have plotted against its institutions, its economy, and its democracy. A never-before-seen look inside the secret world of spies, hackers, and scammers in the lead-up to the 2020 U.S. elections, for which fear of cyberattacks has mounted to an all-time high, The Perfect Weapon is a timely reflection on the ultimate price — and potential “victors” — of this high-stakes conflict.

Using blocklist with iptables and firewalld

If you have any kind of server connected to the Internet, you are no doubt aware that no matter how small or unimportant it might seem, it is frequently probed, tested or subject to various attempts at abuse. These attacks come from so many malicious hosts that it is impossible to keep track by hand. So I started looking for a way to implement an automated blocklist to use with iptables and firewalld which I use on my servers.

Continue reading “Using blocklist with iptables and firewalld”