Logo Atlas
  • Home
  • About Me
  • Skills
  • Education
  • Recent Posts
  • Certifications
  • Posts
  • English
    Español English
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • ACLs
  • ANDORID
  • APACHE
  • ARP
  • ASIR
  • ASO
  • AW
  • BIND9
  • CENTOS
  • CI/CD
  • CISCO
  • CMS
  • Comands
  • Containers
  • Contenedores
  • Controladores NVIDIA
  • DEBIAN
  • Debian 12
  • DHCP
  • DNAT
  • DNS
  • DNSMASQ
  • Docker
  • Enrutamiento
  • FIREWALL
  • FORENSE
  • FORTINET
  • FORWARDING
  • FTP
  • GNS3
  • HTTPS
  • IPTABLES
  • IPv4
  • IPv6
  • ISO
  • IWEB
  • Jenkins
  • Jenkis
  • Kubernetes
  • KVM
  • LAMP
  • LEMP
  • LINUX
  • MariaDB
  • Metrics
  • Mysql
  • NAT
  • Network
  • Networking
  • NFTABLES
  • NVIDIA Drivers
  • Observability
  • OPENVPN
  • Oracle
  • PostgreSQL
  • Prometheus
  • Redes
  • REDHAT
  • ROCKY
  • Routing
  • Services
  • Servicios
  • Sistemas
  • SMR
  • SNAT
  • SSH
  • STRONGSWAN
  • Switches
  • VPN
  • Windows
  • WIREGUARD
  • Wireshark
  • WordPress
Hero Image
How to Choose Which GPU to Use on My Laptop with Linux

If you have a Linux laptop with an NVIDIA GPU, you may have noticed that the video ports are not working properly after installing the graphics drivers. If this sounds familiar, don’t worry—I’ve got you covered. I’ve been investigating and found a tool that can save you several headaches. It’s called EnvyControl, a command-line utility (CLI) that allows you to easily choose which graphics card you want to use on your computer. This is especially useful if your laptop has a hybrid graphics configuration, such as Intel + NVIDIA or AMD + NVIDIA.

  • NVIDIA Drivers
  • Linux
Sunday, September 1, 2024 | 3 minutes Read
Hero Image
Installation of NVIDIA Controllers in Debian 12

The installation of NVIDIA drivers in the Linux universe has traditionally been a challenge, especially in distributions such as Debian, where free software policies often complicate the process. In this post I will explain a simple way to install NVIDIA drivers using the official Debian repositories. In addition, at the end of the article, you will learn to install a key tool called Nvidia Optimus, which will provide you with the ability to select which graphics card you will use.

  • Controladores NVIDIA
  • Linux
Sunday, September 1, 2024 | 5 minutes Read
Hero Image
Comparative between OpenVPN and Wireguard

The goal of this post is to compare the different VPNs software most used by seeing which is faster, for which we will support in speed test using iperf3. [NOTE] The comparative part of the posts in this section in which we mount each type of VPN. Speed without VPN I’m gonna start by comparing the speeds of these 2 systems, using iperf3. For this I have removed the cisco router as I had it configured with FastEthernet interfaces and changed it to a Linux router with GigabitEthernet interfaces.

  • VPN
  • LINUX
  • DEBIAN
  • WIREGUARD
  • OPENVPN
Thursday, March 28, 2024 | 9 minutes Read
Hero Image
Create certification authority (CA) and self-signed certificates in Linux

At first a student will establish a Certified Authority and sign a certificate for the other student’s page. We will then test it on the Apache and Nginx web servers. Create the certifying authority Step 1: Creating directories and files The first step will be to generate a directory in which you will locate your certification authority, in order to maintain an organization at all times. The directory name will be CA /. In turn, you have to generate several subdirectories within it:

  • LINUX
  • DEBIAN
  • HTTPS
Thursday, March 28, 2024 | 15 minutes Read
Hero Image
Forensic computer

Forensics is the set of techniques that allows us to obtain as much information as possible after a computer incident or crime. In this practice, you will perform the evidence-taking and analysis phase on one Linux machine and another Windows. We’ll assume we caught the criminal ‘in fraganti’ and the machines were on. Optionally, you can perform an Android device analysis. On each of the machines you must do a memory and a hard drive, taking the necessary measures to certify the chain of custody.

  • LINUX
  • DEBIAN
  • WINDOWS
  • FORENSE
Thursday, March 28, 2024 | 23 minutes Read
Hero Image
Implementation of a perimeter firewall with Fortinet I

Before you start the practice, the scenario you see in the practice is as similar as I can ride to the original practice. I have used version 7.0.9-1 of FortiGate, as the higher versions bring some restrictions. You can download the image from this [link](https://drive.google.com/drive/folders/ 1VGmeLN5inkWNNNUsIvq9ewGUzJLTLkiM). Firewall start-up FortiGate devices are made with the IP 192.168.1.99 / 24, as I am from GNS3 do not need to connect to this interface with a device and change the configuration. Since I can do it from the console.

  • FIREWALL
  • LINUX
  • DEBIAN
  • FORTINET
Thursday, March 28, 2024 | 10 minutes Read
Hero Image
Implementation of a perimeter firewall with Fortinet II

Now let’s emulate firewall practice II, but on GNS3. To this end, I have transformed client 1 into Odin, and added Thor and Loki as virtual machines instead of containers on the LAN network. I have also created a new network called DMZ, in which will be the Hela machine. Since I have transformed the previous scenario into this new one, we have some rules created earlier. Therefore, I will remove from the statement those that are already created, such as making SSH to Odin from port 2222, but with the service listening in the 22.

  • FIREWALL
  • LINUX
  • DEBIAN
  • FORTINET
Thursday, March 28, 2024 | 16 minutes Read
Hero Image
Implementation of a perimeter firewall with Nftables I

In this post on a Debian machine scenario, we will apply rules with Nfables to match the traffic that goes into and out of our network, trying to imitate a scenario. [NOTE] To deploy the stage to perform these exercises you will need to deploy the .yaml file you will find in the link to the next paragraph. This will be in charge of deploying 2 machines one that will make firewall and one that will simulate a client that will be connected to the first machine to simulate a local network.

  • FIREWALL
  • LINUX
  • DEBIAN
  • NFTABLES
Thursday, March 28, 2024 | 27 minutes Read
Hero Image
Implementation of a perimeter firewall with Nftables II

On the stage created in the service module with the Odin (Router), Hela (DMZ), Loki and Thor (LAN) machines and using nftables, it sets up a perimeter firewall on the Odin machine so that the stage continues to function completely taking into account the following points: • The creation of different chains for each traffic flow (from LAN to the outside, from LAN to DMZ, etc.) will be valued. • Default DROP policy for all chains. • You can use the extensions that we create appropriate, but at least you should follow the connection when necessary. • We must implement the firewall to work after a machine reboot. • You must show proof of operation of all rules.

  • FIREWALL
  • LINUX
  • DEBIAN
  • NFTABLES
Thursday, March 28, 2024 | 42 minutes Read
Hero Image
Installation of android in GNS3 with KVM

To download the android image you can do it from this page – > https://www.fosshub.com/Android-x86.html: wget https://www.fosshub.com/Android-x86.html?dwl=android-x86_64-9.0-r2.iso Create a KVM machine as if it were a Debian, I’ve given it 2GB of RAM and 2 Cores: In our case we can launch an automatic installation: When you have the machine installed, turn off the machine and we’ll import it in gns3. To do this we will take the KVM disk and import it into the directory where we have installed the GNS3 images, then property the copied disk to your user.

  • GNS3
  • ANDORID
  • LINUX
  • DEBIAN
  • KVM
Thursday, March 28, 2024 | 1 minute Read
Hero Image
Remote access VPN with Ipsec StrongSwan

StrongSwan is a VPN (Virtual Private Network) implementation based on IPsec, open source, multiplatform, complete and widely used. It works on operating systems such as Linux, FreeBSD, OS X, Windows, Android and iOS. Mainly, it is a key exchange demon that supports Internet Key Exchange protocols (IKEv1 and IKEv2) to establish security associations (SA) between two pairs. [NOTE] I will start from the VPN post remote access with OpenVPN, so you may refer to this during this article. If you want to have the same scenario go first to this.

  • VPN
  • LINUX
  • DEBIAN
  • STRONGSWAN
Thursday, March 28, 2024 | 6 minutes Read
Hero Image
Remote access VPN with OpenVPN and x509 certificates

One of the two teams (which will act as a server) will be connected to two networks For the authentication of the extremes, digital certificates shall be used, which shall be generated using openssl and stored in the / etc / openvpn directory, together with the Diffie- Helman parameters and the certificate of the Certification Authority itself. Network addresses 10.99.99.0 / 24 will be used for VPN virtual addresses. The address 10.99.99.1 shall be assigned to the VPN server. The server and client configuration files will be created in the / etc / openvpn directory of each machine, and will be called servor.conf and cliente.conf respectively. After the establishment of the VPN, the client machine must be able to access a machine on the other network to which the server is connected. Riding the stage To perform this exercise I have mounted the following scenario on GNS3:

  • VPN
  • CISCO
  • LINUX
  • DEBIAN
  • OPENVPN
Thursday, March 28, 2024 | 17 minutes Read
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
Navigation
  • About Me
  • Skills
  • Education
  • Recent Posts
  • Certifications
Contact me:
  • contacto@javiercd.es
  • javierasping
  • Francisco Javier Cruces Doval

Liability Notice: This theme is under MIT license. So, you can use it for non-commercial, commercial, or private uses. You can modify or distribute the theme without requiring any permission from the theme author. However, the theme author does not provide any warranty or takes any liability for any issue with the theme.


Toha Theme Logo Toha
© 2023 Copyright.
Powered by Hugo Logo