Tech Couch

A Comfy Corner for Software, Security, Cloud, and AI

Written by engineers, not ai

Setting up port knocking for SSH

Hiding important services from unauthorized eyes

Running local text to speech using chatterbox

Multi-language text to speech with optional voice cloning without external services

Modern backup management with restic

Reliable backups from storage to recovery

Web security fuzzing with gobuster

Finding accidentally exposed files

Upgrading to the next linux debian release

From bookworm to trixie without the headache

Hardening sudo against privilege ecalation attacks

Preventing privilege escalation through privileged commands

Penetration testing reconnaissance for web targets

How security professionals evaluate a website

An overview of C2PA

Adding more metadata to images

A guide to OCI container runtimes

Not all containers are made equal

Detecting suspicious filesystem changes with aide

Keeping track of changes made by intruders