Tools

Hosting a Tor-Accessible Hugo Website with Docker

Craig Wilson
Hosting a Tor-Accessible Hugo Website with Docker In this guide, I will go over setting up a hidden service using Docker on an Ubuntu Linux host. This setup will use a simple Python HTTP server behind the Tor network to serve a Hugo static website. Docker will ensure both Tor and the web server remain operational and accessible through a .onion address. Why use Python to host the web server and not NGINX, just wanted something easy to test.

How to Enable APA 7th Edition in Microsoft Word

Craig Wilson
How to Enable APA 7th Edition in Microsoft Word When working on academic papers, the APA (American Psychological Association) style is one of the most commonly used citation formats. However, as of now, Microsoft Word does not natively support the APA 7th edition. Fortunately, a community member named Mike Slagle has provided a solution, enabling the use of APA 7th edition in Microsoft Word. Here’s a simple guide to set it up on your computer.

How to Export Your Spotify Playlists to a JSON File Using PowerShell

Craig Wilson
How to Export Your Spotify Playlists to a JSON File Using PowerShell I need to move off Spotify for a specific reason and was looking for a way to move my music lists to other platforms. There are a number of website that can perform this task for you, here I will go over how to export your playlists so you can use them to build up your new collections in other platforms.

Checking Windows License Status and KMS Configuration with PowerShell

Craig Wilson
Checking Windows License Status and KMS Configuration with PowerShell In this blog post, I will walk you through a PowerShell script that helps you check the current license status of a Windows host, verify if it’s using a Key Management Service (KMS), determine if it’s part of a domain, and check the DNS KMS settings if applicable. What Does the Script Do? This PowerShell script performs several important tasks: Retrieves and displays the current license status of the Windows host.

Automating Agent and Log Forwarding to New Relic on Ubuntu

Craig Wilson
Automating Agent and Log Forwarding to New Relic on Ubuntu In this post, we’ll walk through the steps to automate the installation and configuration of the New Relic Infrastructure agent on an Ubuntu system. Additionally, we’ll show how to dynamically configure log forwarding for all log files in the /var/log directory and its subdirectories. This script has been tested on Ubuntu 22.04 LTS on ARM, but should work for other versions of Ubuntu.

Azure CLI: Installing CLI on Mint Linux

Craig Wilson
Azure CLI on Linux Mint Today, I embarked on an exploration of Linux Mint as a potential new desktop environment. Linux Mint stands out as an operating system recognized for its robustness, user-centric design, and unparalleled stability. Its foundation on Ubuntu, which draws from Debian, positions Linux Mint as an exemplary choice for the Linux community. The system’s interface, celebrated for its elegance and simplicity and an extensive software repository, ensures a seamless user experience.

SSL Automation: Azure Resources and Let's Encrypt SSL Certificate

Craig Wilson
Azure Resources and Let’s Encrypt SSL Certificate Automation In the digital age, securing your web applications with SSL/TLS certificates is not just an option—it’s a necessity. Microsoft Azure users have a powerful toolset at their disposal to automate this process, using a combination of Azure resources, Bicep, and Let’s Encrypt. This guide dives into the specifics of setting up Azure resources with Bicep and automating SSL certificate generation and renewal with Let’s Encrypt, highlighting the integration with Azure Key Vault for secure storage of certificates and service principle details.

Hydra: The Simple Guide

Craig Wilson
Hydra: The Simple Guide Introduction to Hydra Hydra, often referred to as THC-Hydra, is a powerful and fast network authentication cracker. It is widely recognized for its ability to rapidly guess or crack login credentials across a wide range of protocols and services. Developed by “The Hacker’s Choice” (THC), Hydra has become an indispensable tool in the arsenal of penetration testers, security analysts, and unethical hackers alike. Why Use Hydra?

NMAP: The Simple Guide

Craig Wilson
NMAP: The Simple Guide Introduction to NMAP NMAP, short for Network Mapper, is an indispensable open-source tool for network exploration and security auditing. Since its initial release in 1997 by Gordon Lyon, NMAP has become a staple in the cybersecurity and IT professional’s toolkit. It excels in scanning large networks rapidly, but it’s equally effective against single hosts. Utilizing raw IP packets in innovative ways, NMAP can discover hosts, services, operating systems, packet filters/firewalls, and numerous other characteristics.