This post was extensively discussed on Hacker News.Alex Buznik, nas.net.ua kindly provided a two-part Russian translation: part1 and part2. This post discusses hardware considerations, installing Linux, setting up software RAID, robustness and dealing with data corruption. I've been running for a decade a self-built NAS at home, so I thought I'd write down my experience … Continue reading Building the perfect, cheap DIY NAS
Context: as a tenant administrator you can't inspect KeyVault contents created by other people ("you are unauthorized to view these contents"). Solution: assign yourself appropriate permissions like this: Locate the KeyVault in the Azure portal: go to "Access policies"click "+Add Access Policy"Key permissions: everything under "Key Management Operations" and "Cryptographic Operations"Accordingly for key and certificate … Continue reading Azure diaries: can’t access KeyVault
Slides for a scalable, robust OIDC identity provider with an extensible architecture.
I obtained permission to publish my presentation for an internal gig of a security enterprise architecture. When setting up a security architecture in the enterprise context topics like business continuity, people and processes, governance, services and technology are relevant. https://www.slideshare.net/GeorgeGeorgovassilis/security-architecture-127061728
TL;DR: Recovering data from a password-protected SATA hard disk that was locked by a Thinkpad I wish this post would be as generally valid as the title suggests; at this hour I'm just unspeakably glad to have unlocked a hard disk I didn't even know I had locked and can finally go to bed. What … Continue reading Unlocking a password-protected hard disk