<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>Security - Tag - IT Guy Journals</title>
        <link>https://www.itguyjournals.com/tags/security/</link>
        <description>Security - Tag - IT Guy Journals</description>
        <generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>luka.krapic@gmail.com (Luka Krapić)</managingEditor>
            <webMaster>luka.krapic@gmail.com (Luka Krapić)</webMaster><lastBuildDate>Sat, 05 Jul 2025 19:21:00 &#43;0200</lastBuildDate><atom:link href="https://www.itguyjournals.com/tags/security/" rel="self" type="application/rss+xml" /><item>
    <title>Building a Home Virtualization Server With Proxmox</title>
    <link>https://www.itguyjournals.com/building-a-home-virtualization-server-with-proxmox/</link>
    <pubDate>Sat, 05 Jul 2025 19:21:00 &#43;0200</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/building-a-home-virtualization-server-with-proxmox/</guid>
    <description><![CDATA[<p>Running a dedicated virtualization server at home is a practical way to centralize always-on workloads like self-hosted services, infrastructure tooling, or test environments. In this post, we’ll walk through one possible setup using Proxmox VE as the hypervisor, Ansible for configuration management, and Packer to create reusable virtual machine templates.</p>
<p>The configuration is tailored for a single-node homelab using a compact mini-PC, but the principles can be adapted to larger or different environments. All playbooks, templates, and configuration files used in this guide are available in <a href="https://github.com/LukaK/blog-resources/tree/main/building-virtualization-server-with-proxmox" target="_blank" rel="noopener noreffer ">this GitHub repository</a> for reference and reuse.</p>]]></description>
</item>
<item>
    <title>Building SOHO Network With Ubiquiti UniFi: Step-By-Step Guide</title>
    <link>https://www.itguyjournals.com/building-soho-network-with-ubiquiti-unifi/</link>
    <pubDate>Sun, 22 Sep 2024 16:56:47 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/building-soho-network-with-ubiquiti-unifi/</guid>
    <description><![CDATA[<p>In this guide, we’ll take you through building a segmented, secure SOHO (Small Office/Home Office) network using Ubiquiti UniFi hardware. The network will be tailored to isolate different types of traffic, set up VLANs for specific use cases, and apply strong firewall rules to protect sensitive data and infrastructure.</p>
<p>While the principles outlined here are generally applicable to most networks, this implementation is specifically designed for UniFi OS version 4.06 and Network Application version 8.4.62.</p>]]></description>
</item>
<item>
    <title>Tiered Access To CloudFront Content With Self-Signed Cookies</title>
    <link>https://www.itguyjournals.com/tiered-access-to-cloudfront-content-with-self-signed-cookies/</link>
    <pubDate>Fri, 19 Jul 2024 16:56:47 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/tiered-access-to-cloudfront-content-with-self-signed-cookies/</guid>
    <description><![CDATA[<p>This blog post is a follow-up to our previous post, where we implemented tiered access to S3 data using presigned URLs.</p>
<p>In most production applications, CloudFront is used to serve static content to users.
In this post, we will explore how to implement restricted access when serving content through CloudFront.</p>
<p>You can find the complete example <a href="https://github.com/LukaK/blog-resources/tree/main/cloudfront-signed-cookies?ref=itguyjournals.com" target="_blank" rel="noopener noreffer ">here</a>.</p>
<h2 id="what-is-cloudfront">What is CloudFront?</h2>
<p>In simple terms, CloudFront is a content delivery network (CDN) managed by AWS. A CDN is a network of servers deployed close to end users, serving as a caching layer to improve content delivery speed and reliability.</p>]]></description>
</item>
<item>
    <title>Kubernetes Secrets Management Using Kubernetes Sealed Secrets</title>
    <link>https://www.itguyjournals.com/kubernetes-secrets-management-with-sealed-secrets/</link>
    <pubDate>Thu, 23 May 2024 16:56:47 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/kubernetes-secrets-management-with-sealed-secrets/</guid>
    <description><![CDATA[<p>Security is a major concern in continuous integration (CI), especially when managing sensitive information like API keys, passwords, and other secrets. For Kubernetes resources, Sealed Secrets offer an effective solution for securely managing sensitive information within your repository. In this blog we will explore what are Sealed Secrets, how to use them and some common management tasks around Sealed Secrets.</p>
<h2 id="what-are-sealed-secrets">What are Sealed Secrets?</h2>
<p>Sealed Secrets is a set of Kubernetes resources, controller and custom resource definition, that enables secure storage of secrets in your version control system (VCS). Unlike standard Kubernetes Secrets, which are base64-encoded and easily decoded, Sealed Secrets use asymmetric encryption to ensure your secrets remain encrypted until deployed to your Kubernetes cluster. Once deployed, the Sealed Secrets controller decrypts them into regular Kubernetes secrets, making them accessible to your applications.</p>]]></description>
</item>
<item>
    <title>Securing Kubernetes Cluster With Cert-Manager And Self-Signed Certificates</title>
    <link>https://www.itguyjournals.com/securing-kubernetes-cluster-with-cert-manager-and-self-signed-certificates/</link>
    <pubDate>Mon, 06 May 2024 16:56:47 &#43;0100</pubDate>
    <author>Luka Krapić</author>
    <guid>https://www.itguyjournals.com/securing-kubernetes-cluster-with-cert-manager-and-self-signed-certificates/</guid>
    <description><![CDATA[<p>Kubernetes is an incredible tool for deploying, scaling, and managing containerized applications. One crucial aspect of kubernetes security is ensuring that communication between different entities is secure. By default, kubernetes management network is secure and pod network is handled by 3rd party plugin which mostly support encryption.</p>
<p>Today we will focus on properly securing outside-in web communication to our cluster with Cert-Manager and self-signed certificates. We assume that you have access to working kubernetes cluster with ingress controller.</p>]]></description>
</item>
</channel>
</rss>
