How To Secure Self-Hosted Bamboo and Crucible with Let’s Encrypt SSL Certificates

Author: , September 14th, 2023

Summary In this blog we explore how to use certificates from Let’s Encrypt to secure self-hosted Bamboo and Crucible. Process To Follow Install Certbot Ensure that external DNS resolves to the correct IP addressping Ensure that Port 80 is open from the outside to that IP address so that Let’s Encrypt can validate the […]

How to add and delete security group rules in AWS via the CLI (and list them too!)

Author: , September 13th, 2023

Add inbound rule(s) for a security group ID:

## Delete inbound rule(s) for a security group ID

## List security groups by security group ID

## List inbound rules for a specific security group ID

Thanks to:

How To Get rsync To Work With macOS Ventura – Getting Error “Operation not permitted”

Author: , May 5th, 2023

I have a new iMac running macOS Ventura 13.3.1. I tried to rsync some files from another host and got the following error:

In order to get rsync to have access to the hard drive in macOS Ventura, you need to add rsync and other programs to the Full Disk Access panel under Privacy […]

How To Protect a WordPress Site Using Basic Auth in Apache 2.4

Author: , August 25th, 2016

Apache 2.4 changed the security configuration directives a bit. Here is an example using basic auth:

What tripped me up for a while was that I still had the Require all granted directive inside the container, and that needed to be removed for the auth to work.

OpenSSL Heartbleed Security Flaw Summary and Resources

Author: , April 8th, 2014

Summary TLS heartbeat read overrun (CVE-2014-0160) – A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. OpenSSL Versions Affected The 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including 1.0.1f and 1.0.2-beta1. OpenSSL 1.0.2-beta through 1.0.2-beta1 […]

How to Configure FreeBSD Kernel Security Levels

Author: , October 23rd, 2009

The kernel runs with five different security levels. Any super-user process can raise the level, but no process can lower it. The security levels are: -1: Permanently insecure mode – always run the system in insecure mode. This is the default initial value. 0: Insecure mode – immutable and append-only flags may be turned off. All devices may be […]

How to Improve PHP Security with CGI

Author: , October 14th, 2009