Your cart is currently empty!
Category: Phoenix Blog
Anonymous IDs – The Potential
Anonymous IDs – The Potential Anonymous IDs – The Potential January 27, 2025 In the digital age, governments and the citizens of those governments have been faced with an ever harsher pressing reality, the reality of online anonymity. It has its pluses and minuses to put it lightly, and often governments and individuals are approaching…
Basic Math Ops in Python
Basic Math Ops in Python Basic Math Ops in Python January 2, 2025 This is a brief overview of basic math operations using python covering addition, subtraction, multiplication, division, integer division, exponents, and modulus / remainder division. Basic Math Ops in Python We’ll start with addition andย subtraction in python. Adding and subtracting in python…
T’was the Night Before {Christmas} Deployment
T’was the Night Before {Christmas} Deployment T’was the Night Before {Christmas} Deployment December 31, 2024 Here’s hoping you all had a wonderful Christmas, and in the spirit of the season, a couple weeks back I prompted ChatGPT to generate a tech runoff of Clement C Moore’s “Twas the Night Before Christmas”. I hope you all…
-
Complete Keycloak Docker Install -Traefik -Postgres -Production Ready
Complete Keycloak Docker Install -Traefik -Postgres -Production Ready Complete Keycloak Docker Install -Traefik -Postgres -Production Ready November 11, 2024 Finally! How to install LATEST Keycloak (26.0.5) on Docker using Traefik as a reverse proxy and postgres as a database.ย This tutorial covers installing Keycloak on Docker, using Traefik as a reverse proxy and postgresql as…
Automating Securing Ubuntu w/ Ansible
Automating Securing Ubuntu w/ Ansible Automating Securing Ubuntu w/ Ansible November 9, 2024 In this lightning fast tutorial we’ll go through automating the first 10 minutes on an Ubuntu server (aka securing an Ubuntu server). The playbook includes installing various essential packages, creating users, copying users’ ssh pub keys to the remote servers, installing andย …
Setting up SSH Keys Using Cloud Config
Setting up SSH Keys Using Cloud Config Setting up SSH Keys Using Cloud Config November 8, 2024 In this tutorial we’ll cover setting up SSH keys with cloud config. You can find general cloud config usage examples here: https://cloudinit.readthedocs.io/en/latest/reference/examples.html Cloud config uses yaml syntax. This tutorial assumes you have generated an ssh private – public…
Changing the Root Password in Linux
Changing the Root Password in Linux Changing the Root Password in Linux November 7, 2024 In case anyone was wondering this is how you change the root password in linux. (If you didn’t know, don’t worry, I wrote this tutorial because someone (guess who) didn’t know ๐ ) If you are root: Copy to clipboard…
-
Enhancing Images with AI Using Let’s Enhance
Enhancing Images with AI Using Let’s Enhance Enhancing Images with AI Using Let’s Enhance November 7, 2024 In this post I briefly explore using Lets Enhance AI to enhance image quality. I tested Lets Enhance on a few pictures and found the results to be pretty impressive. Links: Official Let’s Enhance website Using Let’s Enhance…
Deploy Unity & Godot WebGL Games on ANY Web Host
Deploy Unity & Godot WebGL Games on ANY Web Host Deploy Unity & Godot WebGL Games on ANY Web Host November 6, 2024 In this tutorial we will go through deploying Unity & Godot WebGL games on ANY web host that gives you access to the file system, allows you to upload and edit files…
Malicious Captcha’s to Malicious Copy Code Buttons
Malicious Captcha’s to Malicious Copy Code Buttons Malicious Captcha’s to Malicious Copy Code Buttons October 29, 2024 Malicious Captchas Russian APT 28 aka FancyBear was recently discovered to be deploying a very unique phishing scheme against local Ukrainian government workers. The technique involved copying malware to the user’s clipboard when interacting with a malicious captcha.…