I’ve been using IRC since late 1990’s, and I continue to do so to this day due to it (still) being one of the driving development forces in various open source communities. Especially in Linux development … and some of my acquintances I can only get in touch with via IRC :)
On my Synology NAS I run ZNC (IRC bouncer/proxy) to which I connect using various IRC clients (irssi/XChat Azure/AndChat) from various platforms (Linux/Mac/Android). In this case ZNC serves as a gateway and no matter which device/client I connect from, I’m always connected to same IRC servers/chat rooms/settings when I left off.
This is all fine and dandy, but connecting from external networks to ZNC means you will hand in your ZNC credentials in plain text. Which is a problem for me, even thought we’re “only” talking about IRC bouncer/proxy.
With that said, how do we encrypt external traffic to our ZNC?
more “Secure traffic to ZNC on Synology with Let’s Encrypt”
Secure public access to your Synology?
Every time I’m outside of my home network, and I need to get something from my Synology NAS, I’m facing the same dillema. Who’s sniffing the network I’m on, and who will I hand over my credentials in plain text using HTTP.
Of course, you can add extra security to your Synology account by using 2 step authentication, or first establishing connection to (preferably private) VPN connection. But even then … footprint of sensitive data you’re leaving behind you is just not worth it.
To resolve this problem, you could get a self-signed SSL certificate, but whole process will cost you time and money. But thanks to good people at Let’s Encrypt, this whole process now takes 15 minutes process and is free!
Secure (HTTPS) access to Synology NAS using Let’s Encrypt (free) SSL certificate
There are couple of tutorials which cover this same topic, however reason why I wrote my own is because none of them worked for me.
more “Secure (HTTPS) public access to Synology NAS using Let’s Encrypt (free) SSL certificate”
Today it’s not easy to anonymize internet traffic and protect our online privacy. From advertisers to various other parties, everyone seems to be interested in what we’re doing online, and it’s our traffic that allows them to track our behaviour and interests.
To make our internet traffic anonymous we could turn to various VPN/Proxy solutions, but in the end need you still need to have ultimately trust that your traffic on other side of the tunnel won’t end up in wrong hands.
That’s why if I want anonymity I’ll always turn to Tor (anonymity network).
Turn Raspberry Pi 3/or any other Debian Linux based device into a (Tor) WiFi Hotspot
You need two things:
- Clone anon-hotspot git repo
- Raspberry PI 3 or any other Debian Linux based device with ethernet port and wifi card
more “anon-hotspot: On demand Debian Linux (Tor) Hotspot setup tool”
I use DisplayLink at work for multi display setup/Ethernet/etc, all by connecting to a single USB port. Although it’s a nifty little device, its software support isn’t that great.
Only Linux driver they have is for Ubuntu. Which is only optimized to work with 14.04, and latest kernel they support is 3.19!
Their installer script can be modified to work with Debian and Systemd, but even so if you’re using any Linux kernel version other then >=3.14 && <=3.19 you’re not going to have a good time.
That’s why I decided to take things in my own hands, and created displaylink-debian.
Tool which allows you to seamlessly install and uninstall DisplayLink drivers on Debian/Ubuntu based Linux distributions.
more “Kernel agnostic, DisplayLink Debian GNU/Linux driver installer (Debian/Ubuntu/Elementary)”
Some time ago, Juniper Networks sold their beloved Junos Pulse SSL VPN, and thus new company called Pulse Secure was created. Which resulted in Pulse Secure client, which is used to establish secure authentication to the (VPN) tunnel.
Since Juniper never supported Linux, it comes as no surprise that successor company client supports every other platform except Linux.
Setting Juniper VPN/Secure Pulse on Linux is pain. Basically, it comes down to using Java applet in web browser or using 3rd party hacks and scripts. Something I refused to accept.
Getting it to work in a web browser
Although, it can be bit confusing on 64 bit architecture, getting VPN access via web browser is simple. You just need to install right packages:
sudo apt-get install icedtea-7-plugin openjdk-7-jre:i386 libstdc++6:i386 lib32z1 lib32ncurses5 libxext6:i386 libxrender1:i386 libxtst6:i386 libxi6:i386
more “Juniper/Pulse Secure VPN on Linux (2015 edition)”