Anubhav Gain - DevSecOps Engineer & Technical Writer
Explore cutting-edge technology insights from Anubhav Gain
Welcome to Anubhav Gain's technical blog. Discover in-depth articles on DevSecOps, cybersecurity, cloud security, and modern infrastructure by Anubhav Gain.
Featured
Wazuh 4.12.0 + OpenSearch 2.19.2 + Filebeat Integration Guide
Published: at 08:30 AMComplete setup guide for Wazuh with OpenSearch and Filebeat, implementing advanced alert correlation, custom dashboards, and real-time threat detection.
Read moreXDR Security Platform: Comprehensive Architecture and Deployment Guide
Published: at 04:59 AMA comprehensive guide to deploying an Extended Detection and Response (XDR) security platform using Docker, OpenSearch, and microservices architecture for advanced threat detection and monitoring.
Read moreJava Secure Coding Practices: OWASP Top 10 Mitigation Guide
Published: at 12:32 PMComprehensive guide to secure Java coding practices with code examples addressing OWASP Top 10 vulnerabilities including injection attacks, authentication flaws, and data exposure.
Read moreIndustry-Grade Java Secure Coding: Complete Enterprise Security Framework
Published: at 05:51 PMComprehensive enterprise-grade Java secure coding framework covering threat modeling, advanced security patterns, AI/LLM considerations, and compliance requirements for production systems.
Read moreSecurity Analysis for macOS SecurityStatusApp: Critical Vulnerabilities and Fixes
Published: at 02:12 PMComprehensive security analysis of a macOS SecurityStatusApp revealing critical XPC connection vulnerabilities, authentication flaws, and recommended security improvements with code examples.
Read moreProduction-Grade macOS Launch Agents: Building Robust Background Services
Published: at 10:15 PMComplete guide to implementing production-grade macOS Launch Agents for persistent background services, including XPC integration, lifecycle management, and security considerations.
Read moreWebAssembly (WASM) Comprehensive Guide: From Basics to Production
Published: at 09:56 PMComplete guide to WebAssembly covering fundamentals, React integration, FFmpeg usage, AssemblyScript development, performance testing, and production deployment strategies.
Read moreForce Group Policy Update: Complete Technical Guide for Windows Domain Administration
Published: at 03:17 PMComprehensive technical guide to forcing Group Policy updates in Windows domain environments, including security implications, troubleshooting, and best practices for enterprise deployment.
Read morePodman Rootless Containers - Architecture, Security, and Production Deployment
Published: at 01:00 PMA comprehensive architectural guide to Podman rootless containers, covering container architecture, systemd integration, volume management, and production deployment patterns with detailed Mermaid diagrams.
Read moreOpenSearch and Wazuh Integration - Building a Comprehensive Security Analytics Platform
Published: at 12:00 PMA comprehensive architectural guide to integrating OpenSearch with Wazuh for building an enterprise-grade security analytics platform, including detailed diagrams for architecture, data flow, and certificate management.
Read moreBuilding a Secure Service Mesh with SPIFFE/SPIRE - Complete Implementation Guide
Published: at 11:00 AMA comprehensive guide to implementing a secure service mesh using SPIFFE/SPIRE for identity management, including architecture diagrams, network policy enforcement, and production deployment strategies.
Read moreDeep Dive into Distrobox Architecture and Advanced Setup
Published: at 10:00 AMA comprehensive technical analysis of Distrobox architecture, including system integration patterns, container interaction workflows, and security architecture with detailed Mermaid diagrams.
Read moreComplete Wazuh to OpenSearch Migration Guide: Indexer Replacement and Data Migration
Published: at 04:00 PMComprehensive guide for migrating from Wazuh indexer to OpenSearch, including data migration, configuration updates, and step-by-step replacement procedures.
Read moreElasticsearch and OpenSearch Cluster Health Troubleshooting Guide
Published: at 03:00 PMComplete troubleshooting guide for Elasticsearch and OpenSearch cluster health issues, including yellow status fixes, unassigned shards resolution, and security best practices.
Read moreEnterprise Database Security: Data Masking, Subsetting, and Encryption Solutions
Published: at 03:00 PMA comprehensive guide to data masking, subsetting, and encryption capabilities in enterprise databases including Oracle, SQL Server, PostgreSQL, MongoDB, and more.
Read moreUTMStack Correlation Engine - Complete Technical Documentation
Published: at 12:05 PMUTMStack's proprietary correlation engine was built from scratch to analyze data before ingestion and maximize real-time correlation, resulting in extremely fast threat detection and response times.
Read moreWazuh Snapshot Migration Guide: Data Analysis, Rule Engine, and Windows Monitoring
Published: at 12:00 PMComplete guide for Wazuh data analysis, rule engine configuration, snapshot migration procedures, and Windows monitoring with WMI and Icinga integration.
Read moreCross-Platform Rust-Based SIEM Platform Implementation Plan
Published: at 01:59 AMA comprehensive security monitoring solution leveraging Rust's memory safety and performance for enterprise-grade threat detection across Windows, macOS, and Linux environments.
Read moreNetwork Unisolation Security Commands: Complete Guide to Windows Firewall Recovery
Published: at 03:50 PMComprehensive guide to network unisolation commands for Windows systems, including firewall recovery, security restoration, and proper incident response procedures.
Read moreIntegrating HashiCorp Vault with CoreDNS: Secure DNS and Secrets Management
Published: at 10:00 PMA comprehensive guide to integrating HashiCorp Vault with CoreDNS for secure DNS resolution, dynamic secrets management, and certificate automation in modern infrastructure.
Read moreBuilding a DNS Sinkhole: Complete Implementation Guide for Network Security
Published: at 09:00 PMA comprehensive guide to implementing a DNS sinkhole for blocking malicious domains, advertisements, and tracking at the network level using various technologies and approaches.
Read moreSecuring SSH with Google Authenticator: Two-Factor Authentication Setup
Published: at 06:00 PMA comprehensive guide to implementing two-factor authentication for SSH using Google Authenticator, enhancing server security with time-based one-time passwords (TOTP).
Read moreMastering Container Management with Podman Quadlet: Complete Guide
Published: at 05:00 PMA comprehensive guide to using Podman Quadlet for container management, enabling systemd-native container deployment with automatic updates, dependencies, and lifecycle management.
Read moreComplete CoreDNS and StepCA Setup on CoreOS with Quadlet
Published: at 03:00 PMA comprehensive, production-ready guide for deploying CoreDNS and Smallstep CA on Fedora CoreOS using Podman Quadlet, providing secure DNS and certificate management without Kubernetes.
Read moreCoreDNS and StepCA with Kubernetes Using Quadlet
Published: at 02:00 PMA comprehensive guide to deploying CoreDNS and Smallstep CA on Kubernetes using Podman Quadlet, providing secure DNS and certificate management for your Kubernetes infrastructure.
Read moreComplete Guide to Managing CA Certificates in Podman
Published: at 12:00 PMA comprehensive guide on adding and managing Certificate Authority (CA) certificates in Podman environments, including integration with custom PKI infrastructure and automated workflows.
Read moreComprehensive Guide to Using Podman with Kubernetes
Published: at 11:00 AMA complete guide explaining how to use Podman as a Docker alternative with Kubernetes, including manifest generation, image management, and development workflows.
Read moreCreating a Complete Certificate Authority Infrastructure with Shell Scripting
Published: at 10:00 AMA comprehensive shell script for creating and managing a complete Certificate Authority infrastructure including Root CA, Intermediate CA, and server certificates with automated certificate chain generation.
Read moreUnderstanding DNS - The Internet's Phone Book
Published: at 06:30 AMA comprehensive guide to the Domain Name System (DNS), including its purpose, how it works, and a visual representation of the DNS resolution process.
Read moreMastering Kubernetes Storage - PersistentVolumes, PersistentVolumeClaims, and StorageClasses
Published: at 06:30 AMA comprehensive guide to Kubernetes storage concepts, including PersistentVolumes, PersistentVolumeClaims, and StorageClasses, with practical examples demonstrating their implementation and usage.
Read moreUnderstanding Docker Storage - Volumes, Bind Mounts, and Persistent Data
Published: at 06:30 AMA comprehensive guide to Docker storage mechanisms, including volumes and bind mounts, with practical examples to demonstrate persistent data management in containerized environments.
Read moreMastering Kubernetes - Setting Up a Multi-Node Cluster with Kubeadm 1.29
Published: at 06:30 AMA comprehensive, step-by-step guide to setting up a multi-node Kubernetes 1.29 cluster using kubeadm, including master and worker node configuration, networking with Calico, and essential add-ons installation.
Read moreMastering Kubernetes Network Policies - A Hands-On Guide
Published: at 06:30 AMA comprehensive guide to implementing and understanding Kubernetes Network Policies, with practical examples using Kind and Calico.
Read moreUnderstanding Kubernetes Service Accounts - A Practical Guide
Published: at 06:30 AMA comprehensive exploration of Kubernetes Service Accounts, their role in RBAC, and how to effectively use them in your cluster.
Read moreMastering Kubernetes RBAC - ClusterRoles and ClusterRoleBindings
Published: at 06:30 AMAn in-depth exploration of ClusterRoles and ClusterRoleBindings in Kubernetes RBAC, with practical examples and key insights for effective implementation.
Read moreMastering Kubernetes RBAC - A Hands-On Guide
Published: at 06:30 AMA practical guide to implementing and understanding Role-Based Access Control (RBAC) in Kubernetes, with step-by-step examples and explanations.
Read moreDemystifying Kubernetes Authentication and Authorization
Published: at 06:30 AMA comprehensive guide to understanding and implementing authentication and authorization in Kubernetes, including practical examples and best practices.
Read moreMastering JSONPath and Advanced kubectl Commands for CKA Exam
Published: at 01:30 PMA comprehensive guide to using JSONPath and advanced kubectl commands in Kubernetes, with practical examples relevant to the Certified Kubernetes Administrator (CKA) exam.
Read moreMastering Worker Node Troubleshooting in Kubernetes - A CKA Exam Guide
Published: at 12:30 PMA comprehensive guide to troubleshooting worker node failures in Kubernetes, with practical examples and strategies relevant to the Certified Kubernetes Administrator (CKA) exam.
Read moreMastering Kubernetes Cluster Troubleshooting - A CKA Exam Guide
Published: at 11:30 AMAn in-depth guide to troubleshooting Kubernetes cluster component failures, with a focus on techniques relevant to the Certified Kubernetes Administrator (CKA) exam.
Read moreMastering Kubernetes Application Troubleshooting - A CKA Exam Perspective
Published: at 10:30 AMA comprehensive guide to troubleshooting application failures in Kubernetes, focusing on techniques and strategies relevant to the Certified Kubernetes Administrator (CKA) exam.
Read moreMastering Kubernetes Monitoring and Logging - A Practical Guide
Published: at 09:30 AMA comprehensive guide to implementing monitoring and logging in Kubernetes clusters, including the installation of Metrics Server and best practices for observability.
Read moreMastering ETCD Backup and Restore in Kubernetes
Published: at 08:30 AMA comprehensive guide to backing up and restoring ETCD in Kubernetes clusters, including step-by-step instructions and best practices for disaster recovery.
Read moreA Comprehensive Guide to Upgrading a Multi-Node Kubernetes Cluster with Kubeadm
Published: at 07:30 AMA step-by-step guide to safely upgrading a multi-node Kubernetes cluster using kubeadm, including best practices and troubleshooting tips.
Read moreWorking with TLS Certificates in Kubernetes - A Step-by-Step Guide
Published: at 06:30 AMA comprehensive guide on generating, managing, and working with TLS certificates in Kubernetes, including creating CSRs, approving them, and retrieving certificates.
Read moreMastering Kubernetes Ingress - A Step-by-Step Guide
Published: at 06:30 AMA comprehensive guide to deploying applications, creating services, and exposing them to the external world using Kubernetes Ingress, with practical examples and best practices.
Read moreDemystifying Kubernetes Networking and Container Network Interface (CNI)
Published: at 05:30 AMA comprehensive exploration of Kubernetes networking concepts, Container Network Interface (CNI), and practical demonstrations of network namespaces and veth pairs.
Read moreUnderstanding CoreDNS in Kubernetes - A Deep Dive
Published: at 04:30 AMAn in-depth exploration of CoreDNS in Kubernetes, its role in service discovery, and how it enhances cluster networking capabilities.
Read moreDemystifying SSL/TLS - A Visual Guide to Secure Communication
Published: at 02:30 PMAn in-depth exploration of how SSL/TLS works, with custom diagrams and animations to illustrate the handshake process and encryption mechanisms.
Read moreMastering ConfigMaps and Secrets in Kubernetes - A Practical Guide
Published: at 01:30 PMA comprehensive guide to implementing and understanding ConfigMaps and Secrets in Kubernetes, with practical examples of injecting configuration and sensitive data into pods.
Read moreMastering Kubernetes Health Probes - A Practical Guide
Published: at 12:30 PMA comprehensive guide to implementing and understanding health probes in Kubernetes, with practical examples of liveness and readiness probes.
Read moreMastering Kubernetes Autoscaling - A Hands-On Guide to HPA
Published: at 11:30 AMA comprehensive, hands-on guide to implementing and understanding Horizontal Pod Autoscaling (HPA) in Kubernetes, with practical examples and key insights.
Read moreExploring Resource Requests and Limits in Kubernetes - A Practical Guide
Published: at 10:30 AMA hands-on guide to implementing and understanding resource requests and limits in Kubernetes, with step-by-step instructions and practical examples.
Read moreMastering Node Affinity in Kubernetes - A Practical Guide
Published: at 09:30 AMA hands-on guide to implementing and understanding Node Affinity in Kubernetes, with step-by-step instructions and real-world examples.
Read moreMastering Taints and Tolerations in Kubernetes - A Hands-On Guide
Published: at 08:30 AMA comprehensive, hands-on guide to understanding and implementing taints and tolerations in Kubernetes, with step-by-step instructions and practical examples.
Read moreHands-On with Kubernetes - Manual Scheduling, Static Pods, and Label Selectors
Published: at 07:30 AMA practical guide to manually scheduling pods, working with static pods, and using labels and selectors in Kubernetes, with step-by-step instructions and examples.
Read moreMastering DaemonSets and CronJobs in Kubernetes
Published: at 07:00 AMA comprehensive guide to understanding and implementing DaemonSets and CronJobs in Kubernetes, with practical examples and clear explanations.
Read moreMastering Multi-Container Pods and Environment Variables in Kubernetes
Published: at 06:30 AMA comprehensive guide to creating multi-container pods and working with environment variables in Kubernetes, with practical examples and clear explanations.
Read moreDeep Dive into Kubernetes Namespaces
Published: at 04:30 AMA comprehensive guide to Kubernetes Namespaces, including practical exercises on creating resources, networking between namespaces, and DNS resolution.
Read moreUnderstanding Kubernetes Services - ClusterIP, NodePort, and LoadBalancer
Published: at 04:30 AMA comprehensive guide to Kubernetes Services, including ClusterIP, NodePort, and LoadBalancer, with practical exercises and discussions.
Read moreMastering Kubernetes ReplicaSets and Deployments
Published: at 04:30 AMA hands-on guide to creating and managing Kubernetes ReplicaSets and Deployments, with practical exercises and troubleshooting tips.
Read moreCreating Kubernetes Objects - Imperative vs Declarative Approaches
Published: at 01:00 PMExplore different methods of creating Kubernetes objects, including imperative and declarative approaches, with practical examples and troubleshooting tips.
Read moreSetting Up Kubernetes Clusters with KIND
Published: at 12:00 PMLearn how to set up single-node and multi-node Kubernetes clusters using KIND (Kubernetes IN Docker) on your local machine.
Read moreKubernetes Architecture Deep Dive
Published: at 11:00 AMExplore Kubernetes architecture, control plane components, and the flow of kubectl commands, with easy-to-understand explanations and diagrams.
Read moreKubernetes - When to Use It and When Not To
Published: at 10:00 AMExplore the challenges of standalone containers, how Kubernetes addresses them, and when to use (or not use) Kubernetes in your projects.
Read moreDockerizing a Node.js - Application with Multi-Stage Builds
Published: at 08:30 AMLearn how to dockerize a Node.js application using multi-stage builds, explore Docker best practices, and understand the docker init command.
Read moreDockerizing a Simple Web Application - A Step-by-Step Guide
Published: at 05:30 AMLearn how to dockerize a simple web application, explore the docker init command, and understand the process step-by-step.
Read moreDocker Architecture and Workflow - A Beginner's Guide
Published: at 04:30 AMExplore Docker's architecture and workflow with clear explanations and diagrams, perfect for beginners and experienced developers alike.
Read moreDeploying Backstage on Kubernetes - A Comprehensive Guide
Published: at 10:00 AMA detailed, step-by-step guide to deploying Spotify's Backstage developer portal on Kubernetes using Docker, Terraform, and best practices for production environments.
Read moreManaging Podman Containers with Systemd - Traditional Methods vs. Quadlet
Published: at 10:00 AMA comprehensive guide to integrating Podman containers with systemd, comparing the traditional service file approach with the modern Quadlet method, with detailed examples and best practices.
Read moreThis is a simple, lightweight GUI-based Linux distribution designed to run on QEMU.
Updated: at 08:59 AMThis is a simple, lightweight GUI-based Linux distribution designed to run on QEMU.
Read moreBuilding a Complete PKI Infrastructure - Creating Your Own Certificate Authority
Published: at 10:00 AMA comprehensive guide to building a robust, multi-tier PKI infrastructure with your own Certificate Authority (CA), including detailed explanations, automation scripts, and security best practices for enterprise deployments.
Read moreMonitoring and Managing System Services with invinservicedemon
Published: at 01:00 PMAn in-depth look at invinservicedemon, a Rust application designed for monitoring and managing system services, developed by Anubhav Gain.
Read morePersonalized Zsh Theme for a Professional Workspace
Published: at 05:00 AMA detailed guide on creating a personalized Zsh theme for a professional and efficient workspace, designed by Anubhav Gain.
Read moreDeploying OpenSearch with Podman and Quadlet for Containerized Search at Scale
Published: at 10:00 AMA step-by-step guide to deploying OpenSearch using Podman and Quadlet for a lightweight, secure, and systemd-integrated search solution without Docker or Kubernetes.
Read moreRunning OpenSearch in Rootless Podman Containers - A Complete Guide
Published: at 10:00 AMA comprehensive guide to setting up and running OpenSearch in rootless Podman containers with proper security configuration and systemd integration.
Read moreBuilding a Secure Service Mesh Without Kubernetes Using SPIFFE, SPIRE, and Cilium
Published: at 10:00 AMA comprehensive guide to implementing a zero-trust service mesh on Linux VMs without Kubernetes, using SPIFFE/SPIRE for identity management, Cilium for networking, and private DNS for service discovery.
Read moreDistrobox - Running Any Linux Distribution as a Container
Published: at 10:00 AMA comprehensive guide to Distrobox - the powerful tool that enables seamless use of any Linux distribution inside your terminal through containers, with full integration with your host system.
Read moreSecure RSyslog Configuration - A Comprehensive Guide
Published: at 02:30 PMA comprehensive guide to implementing a secure, production-grade RSyslog configuration with TLS encryption, certificate authentication, queue management, and security best practices.
Read moreProduction-Grade Kubernetes on CoreOS - Multi-Node Deployment Guide
Published: at 10:00 AMA comprehensive guide for deploying a secure, production-grade Kubernetes cluster on CoreOS with CRI-O runtime, SELinux integration, and robust networking using kube-router.
Read moreComprehensive Elasticsearch/OpenSearch Cluster Health Troubleshooting Guide
Published: at 10:00 AMA detailed technical guide for diagnosing and resolving common Elasticsearch and OpenSearch cluster health issues, including practical commands, solutions for yellow/red status, and preventive measures.
Read moreTechnical Guide to Forcing Group Policy Updates in Windows Domain Environments
Published: at 12:00 PMA comprehensive technical guide to forcing Group Policy updates across domain-joined computers, including process flows, network requirements, security implications, and troubleshooting best practices.
Read moreBuilding Production-Grade Background Services on macOS with launchd
Published: at 03:00 PMA comprehensive guide on using macOS launchd to create robust, production-grade background services that run independently of your main application, with detailed implementation steps and best practices.
Read moreComprehensive OpenSearch Deployment Guide for Production
Published: at 02:00 PMA detailed guide for deploying and configuring OpenSearch in production environments, covering single-node and cluster setups, security configuration, performance tuning, and best practices.
Read moreProduction Deployment Guide - OpenSearch Dashboards as a Systemd Service
Published: at 09:00 AMA comprehensive guide for deploying OpenSearch Dashboards as a systemd service in production environments, including configuration settings, permissions management, and common troubleshooting steps.
Read moreOpenSearch NFS Mount Configuration for Cluster Data Migration
Published: at 06:00 PMA comprehensive guide for configuring NFS mounts to facilitate OpenSearch data migration across cluster nodes, including step-by-step instructions, troubleshooting tips, and security considerations.
Read moreRemote Windows System Monitoring from Linux Using WMI and winexe
Published: at 04:30 PMA comprehensive guide to remotely monitoring and managing Windows systems from Linux using winexe, wmic, and WQL queries with practical examples and troubleshooting tips.
Read moreMonitoring Windows Systems Remotely Through WMI with Icinga
Published: at 02:00 PMA comprehensive guide to setting up remote Windows monitoring using WMI and the check_wmi_plus plugin with Icinga, without requiring an agent on the Windows servers.
Read moreUnderstanding Wazuh Data Analysis and Rule Engine
Published: at 09:00 AMA comprehensive technical deep-dive into Wazuh's data analysis process, rule engine, and ruleset configuration, with detailed diagrams explaining how logs are collected, decoded, and matched against rules.
Read moreWazuh Log Collection and Transmission - An In-Depth Technical Guide
Published: at 08:00 PMA comprehensive technical examination of how Wazuh collects, processes, compresses, and securely transmits logs from agents to the manager, including architecture diagrams and code-level insights.
Read moreOpenSearch/Wazuh Indexer Setup and Management Guide
Published: at 06:30 PMA comprehensive guide for setting up, configuring, and managing an OpenSearch cluster that serves as a Wazuh indexer, including installation, backup procedures, and health checks.
Read moreComparing VMware Disk Provisioning Types - Which One Should You Choose?
Published: at 04:00 PMA detailed comparison of VMware's disk provisioning options - Thin Provisioned, Thick Provisioned Lazily Zeroed, and Thick Provisioned Eagerly Zeroed - to help you choose the right option for your workloads.
Read moreCIS Benchmark-Aligned Partitioning Scheme for Rocky Linux 9.5
Published: at 02:00 PMA comprehensive guide to creating a secure, CIS Benchmark-compliant partitioning scheme for Rocky Linux 9.5 installations with 400 GiB of storage.
Read moreHigh-Performance SMS Gateway Architecture (2000 SMS/second)
Published: at 11:30 AMA detailed architecture for a production-grade open-source SMS gateway capable of handling ~2000 SMS/second, using tools like Jasmin or Kannel.
Read moreWazuh Admin API Authentication Guide
Published: at 10:00 AMA comprehensive guide for authenticating with the Wazuh API and creating admin users with elevated privileges for effective security management.
Read moreFrom NeoVim to LunarVim
Published: at 08:45 AMGuide for transitioning from NeoVim to LunarVim, an IDE layer for Neovim.
Read morevsFTP on Ubuntu
Published: at 08:40 AMGuide for setting up vsFTP on Ubuntu.
Read moreWindows Control
Published: at 08:38 AMVenting frustrations and providing solutions for managing Windows features.
Read moreGetting Started with Windows Server 2019
Published: at 08:36 AMA guide to getting started with Windows Server 2019, including setting up user accounts, an IIS web server, and adding a static website.
Read moreElgato on Archlinux
Published: at 08:34 AMGuide on setting up the Elgato Streamdeck on Arch Linux, including installing necessary packages, configuring the environment, and accessing Elgato devices.
Read moreWindows Server 2019 - Scripting and Sharing
Published: at 08:34 AMGuide for scripting tasks and setting up sharing on Windows Server 2019.
Read moreWindows Server 2019 - Active Directory Installation
Published: at 08:32 AMStep-by-step guide for installing Active Directory on Windows Server 2019.
Read moreActive Directory Setup on Windows Server 2019
Published: at 08:29 AMGuide to setting up Active Directory on Windows Server 2019, including PowerShell commands for OU management.
Read moreInstalling Docker on Windows Server 2019
Published: at 08:29 AMGuide to installing Docker on Windows Server 2019, both via OneGet and manual download methods.
Read moreTheseus OS
Published: at 08:29 AMTheseus is a new OS written from scratch in Rust to experiment with novel OS structure, better state management, and how to leverage intralingual design principles to shift OS responsibilities like resource management into the compiler.
Read moresysunixlog
Published: at 10:59 AMThis is a simple Rust program that demonstrates how to log a message to the system log on a Linux-based system using the syslog crate.
Read moreSimple Linux OS
Published: at 08:59 AMDeveloped as a successor to the original Linux Kernal and Busybox based operating system.
Read morePowerful ChatGPT Desktop Application
Published: at 12:59 PMDeveloped as a successor to the original ChatGPT desktop application concept, gpt.rs brings a host of new features and improvements, ensuring a seamless and efficient user experience.
Read moreFile Monitoring using eBPF
Published: at 10:02 PMThis utility alerts you instantly whenever changes occur in your files, ensuring you're always in the loop.
Read moreJourney into eBPF
Published: at 06:07 PMDynamically programming of the Linux kernel to perform a variety of tasks efficiently.
Read moreWelcome!
Published: at 08:12 PMwelcome blog!
Read more🦀 rusty install
Published: at 08:12 PMinstallation of rust in windows/linux/mac.
Read more
Recent Posts
Secure Kafka UI Helm Configuration for Kubernetes
Published: at 10:30 AMProduction-ready Helm values configuration for Kafka UI with enhanced security settings, network policies, and best practices for Kubernetes deployment.
Read moreWazuh Agent Status to NATS Integration - Rust POC
Published: at 10:00 AMRust-based service that monitors Wazuh agent status changes and publishes them to NATS for real-time security event distribution across XDR/OXDR platforms.
Read moreWazuh Core Integration with NATS - C/C++ POC Implementation
Published: at 09:30 AMIntegrate NATS messaging capabilities directly into Wazuh manager codebase to publish real-time agent status events and security alerts for XDR/OXDR platforms.
Read moreWazuh Manager-Side Keep-Alive Integration with NATS
Published: at 09:00 AMModify Wazuh manager to send remote keep-alive messages and publish agent status events to NATS for XDR/OXDR platform integration with real-time monitoring.
Read more