From 097f024caf17d0c8da589d58f26d409950a8dd35 Mon Sep 17 00:00:00 2001 From: Muhammad Nauman Raza Date: Fri, 31 May 2024 20:56:35 +0100 Subject: [PATCH] chore: update copyright notice --- config.toml | 2 +- public/blog/adblock-blocky/index.html | 2 +- public/blog/hoaxes-overview/index.html | 2 +- public/blog/home-server-security/index.html | 2 +- public/blog/index.html | 2 +- public/blog/nfc-misconceptions/index.html | 2 +- public/blog/selfhost-search-engine/index.html | 2 +- public/blog/selfhost-tailscale/index.html | 2 +- public/blog/server-hardware-selection/index.html | 2 +- public/blog/setting-up-zola-nixos/index.html | 2 +- public/projects/index.html | 2 +- public/tags/adblock/index.html | 2 +- public/tags/blocky/index.html | 2 +- public/tags/hacking/index.html | 2 +- public/tags/hardening/index.html | 2 +- public/tags/hardware/index.html | 2 +- public/tags/headscale/index.html | 2 +- public/tags/hoax/index.html | 2 +- public/tags/home-lab/index.html | 2 +- public/tags/homelab/index.html | 2 +- public/tags/index.html | 2 +- public/tags/nfc/index.html | 2 +- public/tags/nixos/index.html | 2 +- public/tags/privacy/index.html | 2 +- public/tags/searxng/index.html | 2 +- public/tags/selfhosted/index.html | 2 +- public/tags/social-engineering/index.html | 2 +- public/tags/sysadmin/index.html | 2 +- public/tags/tailscale/index.html | 2 +- public/tags/zola/index.html | 2 +- 30 files changed, 30 insertions(+), 30 deletions(-) diff --git a/config.toml b/config.toml index bb00224..3b81c8b 100644 --- a/config.toml +++ b/config.toml @@ -79,7 +79,7 @@ outdate_alert_days = 120 # How many days will a post be outdated by outdate_alert_text_before = "This article was last updated " outdate_alert_text_after = " days ago and may be out of date." -footer_copyright = "© 2024 Muhammad Nauman Raza" +footer_copyright = "© 2023-2024 Muhammad Nauman Raza" footer_credits = true # Whether to show "powered by zola and serene" in footer not_found_title = "404" diff --git a/public/blog/adblock-blocky/index.html b/public/blog/adblock-blocky/index.html index 97d2051..1b6a952 100644 --- a/public/blog/adblock-blocky/index.html +++ b/public/blog/adblock-blocky/index.html @@ -24,4 +24,4 @@ 24 }; 25 }; 26}; -

Why isn't it running?

You might need to reboot after running a nixos-rebuild switch, or move/kill any process running on port 53 for this to work.

Custom DNS mapping

You can use blocky to map a domain of your choice to an IP of your choice - refer to the documentation for more information.

Here, I've used two upstream nameservers for blocky to forward valid DNS requests to (since blocky doesn't do any DNS resolution itself - except for custom mapping, detailed later). One is Cloudflare's DNS (1.1.1.1) and the other is Quad9 (9.9.9.9).

As indicated by lines 6 through 11, you need to add lists containing URLs you want to be filtered from your DNS requests.

Making it work everywhere#

The thing is, you'll need to set the IP address of the machine running blocky as a nameserver for all of your workstations - it just won't recieve any requests otherwise, so it won't be doing any adblocking if you don't do this.

Of course, if you've got a router worth keeping around, you should be able to set a network-wide DNS resolver, and you can point this to your blocky-running machine in your router's settings.

However, what if you wanted to have this work everywhere you go, perhaps on a portable laptop? Well, if you're using Tailscale or Headscale you can just can edit the nameservers you use in your VPN's settings and set it to the IP address of the device running blocky. This way, any device on your VPN can utilise blocky and have a functioning DNS-level adblocker no matter where you are.

If you're looking to setup headscale, I've made a blog post about it.

Finishing thoughts#

With the existence of browser extensions doing the same thing adblockers like blocky and Pi-hole can, not everyone is going to need something this sophisticated. I think something like this is better suited to those looking for better coverage in their adblocking, or something that gives more control over DNS requests - for example, to easily setup custom DNS mappings or to restrict access to certain websites.

\ No newline at end of file +

Why isn't it running?

You might need to reboot after running a nixos-rebuild switch, or move/kill any process running on port 53 for this to work.

Custom DNS mapping

You can use blocky to map a domain of your choice to an IP of your choice - refer to the documentation for more information.

Here, I've used two upstream nameservers for blocky to forward valid DNS requests to (since blocky doesn't do any DNS resolution itself - except for custom mapping, detailed later). One is Cloudflare's DNS (1.1.1.1) and the other is Quad9 (9.9.9.9).

As indicated by lines 6 through 11, you need to add lists containing URLs you want to be filtered from your DNS requests.

Making it work everywhere#

The thing is, you'll need to set the IP address of the machine running blocky as a nameserver for all of your workstations - it just won't recieve any requests otherwise, so it won't be doing any adblocking if you don't do this.

Of course, if you've got a router worth keeping around, you should be able to set a network-wide DNS resolver, and you can point this to your blocky-running machine in your router's settings.

However, what if you wanted to have this work everywhere you go, perhaps on a portable laptop? Well, if you're using Tailscale or Headscale you can just can edit the nameservers you use in your VPN's settings and set it to the IP address of the device running blocky. This way, any device on your VPN can utilise blocky and have a functioning DNS-level adblocker no matter where you are.

If you're looking to setup headscale, I've made a blog post about it.

Finishing thoughts#

With the existence of browser extensions doing the same thing adblockers like blocky and Pi-hole can, not everyone is going to need something this sophisticated. I think something like this is better suited to those looking for better coverage in their adblocking, or something that gives more control over DNS requests - for example, to easily setup custom DNS mappings or to restrict access to certain websites.

\ No newline at end of file diff --git a/public/blog/hoaxes-overview/index.html b/public/blog/hoaxes-overview/index.html index c80275f..4ad26eb 100644 --- a/public/blog/hoaxes-overview/index.html +++ b/public/blog/hoaxes-overview/index.html @@ -1 +1 @@ -An overview on hoaxes

An overview on hoaxes

2024-01-04

Introduction#

In recent times, hoaxes have become increasingly prevalent as the internet continues to expand and as more people use social media. Misinformation is on a rise - though this is information which isn't really new, the current state of things is horrible, and things really shouldn't be the way they are.

I aim for this to be a brief blog post detailing the effect of hoaxes on society, focusing on why they're so harmful.

What exactly is a hoax?#

Put simply, a hoax is made-up information, be it a story or something else. Hoaxes are created with the intent of spreading false information - for a immense variety of reasons, from jokes and causing embarrassment to provoking politic or social change1. I won't discuss the causes of hoaxes further in this blog post.

The effect of hoaxes#

Hoaxes can cause significant damage to their targets if formulated cleverly. For example:

The stock price of Apple Inc. fell significantly in October 2008 after a hoax story was submitted to CNN's user-generated news site iReport.com claiming that company CEO Steve Jobs had suffered a major heart attack. The source of the story was traced back to 4chan.

With the incredible presence of social media in our lives, spreading harmful misinformation like that above can be as simple as making a few posts - they don't even need to be very convincing! What makes matters worse is how gullible the general population is, even those educated in this sort of thing - this shows just how much influence the internet and it's contents have on us.

I would like to clarify that I'm not suggesting that people should avoid using the internet to gather information - while its reliability is incredibly questionable, the accessibility and openness it provides far beats traditional methods of gathering information (books and such). My suggestion is that people should be much more careful with how they interpret information on the internet, and perform their due diligence in their research into whatever they're aiming to learn; people should make sure that what they're reading is accurate before absorbing any information (here's your tl;dr).

That's about it for this blog post, as it was meant to be a brief way of expressing my thoughts on the matter. Thanks for reading!

powered by zola and serene
\ No newline at end of file +An overview on hoaxes

An overview on hoaxes

2024-01-04

Introduction#

In recent times, hoaxes have become increasingly prevalent as the internet continues to expand and as more people use social media. Misinformation is on a rise - though this is information which isn't really new, the current state of things is horrible, and things really shouldn't be the way they are.

I aim for this to be a brief blog post detailing the effect of hoaxes on society, focusing on why they're so harmful.

What exactly is a hoax?#

Put simply, a hoax is made-up information, be it a story or something else. Hoaxes are created with the intent of spreading false information - for a immense variety of reasons, from jokes and causing embarrassment to provoking politic or social change1. I won't discuss the causes of hoaxes further in this blog post.

The effect of hoaxes#

Hoaxes can cause significant damage to their targets if formulated cleverly. For example:

The stock price of Apple Inc. fell significantly in October 2008 after a hoax story was submitted to CNN's user-generated news site iReport.com claiming that company CEO Steve Jobs had suffered a major heart attack. The source of the story was traced back to 4chan.

With the incredible presence of social media in our lives, spreading harmful misinformation like that above can be as simple as making a few posts - they don't even need to be very convincing! What makes matters worse is how gullible the general population is, even those educated in this sort of thing - this shows just how much influence the internet and it's contents have on us.

I would like to clarify that I'm not suggesting that people should avoid using the internet to gather information - while its reliability is incredibly questionable, the accessibility and openness it provides far beats traditional methods of gathering information (books and such). My suggestion is that people should be much more careful with how they interpret information on the internet, and perform their due diligence in their research into whatever they're aiming to learn; people should make sure that what they're reading is accurate before absorbing any information (here's your tl;dr).

That's about it for this blog post, as it was meant to be a brief way of expressing my thoughts on the matter. Thanks for reading!

powered by zola and serene
\ No newline at end of file diff --git a/public/blog/home-server-security/index.html b/public/blog/home-server-security/index.html index 9cc39db..5a93d76 100644 --- a/public/blog/home-server-security/index.html +++ b/public/blog/home-server-security/index.html @@ -19,4 +19,4 @@ }; }; }; -
  • This probably doesn't need to be said, but use strong passwords!

  • Host a fail2ban instance to ban hosts making bruteforce attempts.

    I think that's all there is for almost everyone, and is basically the minimal amount of effort a home server administrator should do. Personally, I would prefer to enforce a VPN connection in order to access my personal services for that extra layer of security (because why'd they need to be exposed to the internet?). This can be done faily easily with tailscale, and for the slightly more paranoid - headscale is a viable...alternative? Anyways, I've got a blog post that explores headscale in a little more detail, which might be worth checking out.

    Well, that's all I wanted to say. It's been a while since my last blog post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.

    1

    Naturally, you shouldn't just copy and paste the snippets into your own config. Do your research first!

    powered by zola and serene
    \ No newline at end of file +
  • This probably doesn't need to be said, but use strong passwords!

  • Host a fail2ban instance to ban hosts making bruteforce attempts.

    I think that's all there is for almost everyone, and is basically the minimal amount of effort a home server administrator should do. Personally, I would prefer to enforce a VPN connection in order to access my personal services for that extra layer of security (because why'd they need to be exposed to the internet?). This can be done faily easily with tailscale, and for the slightly more paranoid - headscale is a viable...alternative? Anyways, I've got a blog post that explores headscale in a little more detail, which might be worth checking out.

    Well, that's all I wanted to say. It's been a while since my last blog post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.

    1

    Naturally, you shouldn't just copy and paste the snippets into your own config. Do your research first!

    powered by zola and serene
    \ No newline at end of file diff --git a/public/blog/index.html b/public/blog/index.html index fdff946..12230ed 100644 --- a/public/blog/index.html +++ b/public/blog/index.html @@ -1 +1 @@ -Blog Posts
    \ No newline at end of file +Blog Posts
    \ No newline at end of file diff --git a/public/blog/nfc-misconceptions/index.html b/public/blog/nfc-misconceptions/index.html index 32ad013..e75f397 100644 --- a/public/blog/nfc-misconceptions/index.html +++ b/public/blog/nfc-misconceptions/index.html @@ -1 +1 @@ -Misconceptions about NFC

    Misconceptions about NFC

    2024-01-19

    Alert

    I made a mistake while writing this blog post - somehow forgetting that security isn't unambiguous. You can actually skim NFC chips from a certain distance (having a limited distance is still an important factor though!), and though I think some of what I said below still applies you're better off ignoring it all.

    There are, of course, a whole range of problems with skimming NFC chips from a distance so my point - don't be so worried - would still stand.

    Either way, I recommend you take this with a grain of salt.

    Introduction#

    NFC (short for Near-Field Communication) is the set of communication protocols which allow for near-field communication between two electronic devices. One of the most prominent uses of this technology are contactless transactions - this includes services like Google and Apple Pay as well as all of your contactless-enabled cards.

    It's been a while since my last blog past, but this one will be brief too - I'm writing here for the sake of clearing up some misconceptions people have about NFC.

    The Misconceptions#

    Inspiration#

    While talking with a friend on a WhatsApp group chat a few days ago about a program I found on my jailbroken iOS device - Aemulo - I was informed of 'subway skimmers'; devices that could supposedly read data from contactless-enabled devices (via NFC) and would be able to emulate them.

    The idea behind the above example was that someone with malicious intent could place such a device in a public location and take their contactless devices for their malicious purposes. When I heard of this, my first thought was: hoax, and I think that it was rightfully so.

    What exactly is wrong with this?#

    Several things. I'm no expert in cybersecurity - everyone's a student in some way, but I was sure that NFC was, as it's name implies, for near-field communication. I'm repeating myself here, but that's kind of the point. Various reliable resources, including Wikipedia, show that NFC has a maximum range of only a few centimetres - which makes sense, no?

    And yet, whatever source my friend had for 'subway skimmers' gave the impression, or otherwise stated, that it would work within a radius of a few feet, which is just impossible. Upon voicing my doubts, I was then told that 'with a powerful enough antenna, it's possible'. Hoaxes sure are convincing, aren't they? Unfortunately, I am not able to find the source of my friend's misinformation.

    See, NFC only works within a few centimetres anyways. Even if it could magically work within a radius of a few feet, you've got to take in the electromagnetic interference that the clothes and wallets people have would bring to any malicious device. The point of electromagnetic interference is especially true over a huge area of a few feet (relatively), where you've got several NFC-enabled devices.

    Where it's actually an issue#

    Of course, that isn't to say there aren't any issues with NFC and malicious readers - I'm just saying that the word getting around is horribly unrealistic. For example, a realistic example of a malicious NFC reader would be one placed on the card slots in cash machines - you get:

    • The short range (< ~20 cm)
    • Only one device
    • Lots of devices to read!

    And so, you've got someone so much more realistic that poses an actual threat!

    Conclusion#

    The information above, which I deem accurate, is there. What I suggest be taken away from this is pretty much the same as what is was for my blog post on hoaxes - do some fact-checking!

    powered by zola and serene
    \ No newline at end of file +Misconceptions about NFC

    Misconceptions about NFC

    2024-01-19

    Alert

    I made a mistake while writing this blog post - somehow forgetting that security isn't unambiguous. You can actually skim NFC chips from a certain distance (having a limited distance is still an important factor though!), and though I think some of what I said below still applies you're better off ignoring it all.

    There are, of course, a whole range of problems with skimming NFC chips from a distance so my point - don't be so worried - would still stand.

    Either way, I recommend you take this with a grain of salt.

    Introduction#

    NFC (short for Near-Field Communication) is the set of communication protocols which allow for near-field communication between two electronic devices. One of the most prominent uses of this technology are contactless transactions - this includes services like Google and Apple Pay as well as all of your contactless-enabled cards.

    It's been a while since my last blog past, but this one will be brief too - I'm writing here for the sake of clearing up some misconceptions people have about NFC.

    The Misconceptions#

    Inspiration#

    While talking with a friend on a WhatsApp group chat a few days ago about a program I found on my jailbroken iOS device - Aemulo - I was informed of 'subway skimmers'; devices that could supposedly read data from contactless-enabled devices (via NFC) and would be able to emulate them.

    The idea behind the above example was that someone with malicious intent could place such a device in a public location and take their contactless devices for their malicious purposes. When I heard of this, my first thought was: hoax, and I think that it was rightfully so.

    What exactly is wrong with this?#

    Several things. I'm no expert in cybersecurity - everyone's a student in some way, but I was sure that NFC was, as it's name implies, for near-field communication. I'm repeating myself here, but that's kind of the point. Various reliable resources, including Wikipedia, show that NFC has a maximum range of only a few centimetres - which makes sense, no?

    And yet, whatever source my friend had for 'subway skimmers' gave the impression, or otherwise stated, that it would work within a radius of a few feet, which is just impossible. Upon voicing my doubts, I was then told that 'with a powerful enough antenna, it's possible'. Hoaxes sure are convincing, aren't they? Unfortunately, I am not able to find the source of my friend's misinformation.

    See, NFC only works within a few centimetres anyways. Even if it could magically work within a radius of a few feet, you've got to take in the electromagnetic interference that the clothes and wallets people have would bring to any malicious device. The point of electromagnetic interference is especially true over a huge area of a few feet (relatively), where you've got several NFC-enabled devices.

    Where it's actually an issue#

    Of course, that isn't to say there aren't any issues with NFC and malicious readers - I'm just saying that the word getting around is horribly unrealistic. For example, a realistic example of a malicious NFC reader would be one placed on the card slots in cash machines - you get:

    • The short range (< ~20 cm)
    • Only one device
    • Lots of devices to read!

    And so, you've got someone so much more realistic that poses an actual threat!

    Conclusion#

    The information above, which I deem accurate, is there. What I suggest be taken away from this is pretty much the same as what is was for my blog post on hoaxes - do some fact-checking!

    powered by zola and serene
    \ No newline at end of file diff --git a/public/blog/selfhost-search-engine/index.html b/public/blog/selfhost-search-engine/index.html index 68b6ecf..cb51b1e 100644 --- a/public/blog/selfhost-search-engine/index.html +++ b/public/blog/selfhost-search-engine/index.html @@ -33,4 +33,4 @@ 18 }; 19 # ... 20} -

    Note

    The expression highlighted above is used to dynamically adjust the location NGINX will forward requests to, depending on your searx config

    After saving your changes and rebuilding your server's system configuration (as usual), you should have a working private instance of SearXNG that you can access using the serverName you've given it.

    Set your browser to use this as your search engine using the relevant documentation (with Firefox this is as easy as right-clicking on the URL after opening up the page and clicking a button). Enjoy!

    powered by zola and serene
    \ No newline at end of file +

    Note

    The expression highlighted above is used to dynamically adjust the location NGINX will forward requests to, depending on your searx config

    After saving your changes and rebuilding your server's system configuration (as usual), you should have a working private instance of SearXNG that you can access using the serverName you've given it.

    Set your browser to use this as your search engine using the relevant documentation (with Firefox this is as easy as right-clicking on the URL after opening up the page and clicking a button). Enjoy!

    powered by zola and serene
    \ No newline at end of file diff --git a/public/blog/selfhost-tailscale/index.html b/public/blog/selfhost-tailscale/index.html index e95653a..1d40862 100644 --- a/public/blog/selfhost-tailscale/index.html +++ b/public/blog/selfhost-tailscale/index.html @@ -31,4 +31,4 @@ }; }; } -

    And that's it. A self-hosted, truly open-source Wireguard®-based VPN is now at your fingertips. Enjoy! Oh, but please read the conclusion before doing that:

    Conclusion#

    For those of you who wish to have access to something like Tailscale but value your privacy above all, you would genuinely be greatful for Headscale. However, I've found that some are fine with what Tailscale does provide in regards to FOSS, and are satisfied by the raw convenience and simplicity of a non-selfhosted Tailscale control server - exactly what it hopes to provide, as shown by their self-description on their website: 'a zero-config, no-fuss VPN [provider]'.

    Or you could just settle with bare Wireguard®.

    powered by zola and serene
    \ No newline at end of file +

    And that's it. A self-hosted, truly open-source Wireguard®-based VPN is now at your fingertips. Enjoy! Oh, but please read the conclusion before doing that:

    Conclusion#

    For those of you who wish to have access to something like Tailscale but value your privacy above all, you would genuinely be greatful for Headscale. However, I've found that some are fine with what Tailscale does provide in regards to FOSS, and are satisfied by the raw convenience and simplicity of a non-selfhosted Tailscale control server - exactly what it hopes to provide, as shown by their self-description on their website: 'a zero-config, no-fuss VPN [provider]'.

    Or you could just settle with bare Wireguard®.

    powered by zola and serene
    \ No newline at end of file diff --git a/public/blog/server-hardware-selection/index.html b/public/blog/server-hardware-selection/index.html index f80a118..43781c4 100644 --- a/public/blog/server-hardware-selection/index.html +++ b/public/blog/server-hardware-selection/index.html @@ -1 +1 @@ -Selecting hardware for a (home) server

    Selecting hardware for a (home) server

    2024-01-31

    Introduction#

    I see a lot of people worryingly mistaken about what a server needs (specifically, a home server). Some think that a bland and incredibly ignorant '20% budget for CPU, 30% for GPU, and the rest for the rest' plan for selecting hardware is good enough (at least, before choosing specific items) - you can't exactly be wrong when choosing hardware, but this is very, very far from right.

    Requirements#

    Server hardware needs to be low-power and resource-efficient - so as not to waste any money unnessarily, obviously. Your budget will strongly impact the specifications you can get your hands on, but I would think that even $200 is enough for a decent home server - depending on what you want to do with it. Keep in mind that you could always repurpose an old laptop or desktop lying around; it's cheap, and you get what may be a surprisingly decent machine.

    Power consumption#

    The difference between low peak and low idle power should be noted in particular. Running costs can get very high if you don't work to moderate power consumption, and probably wouldn't be something you would ignore when it comes to home servers.

    Usage of the server#

    Naturally, how a server will be used will affect pretty much everything about the hardware chosen for it. For example, if you're looking to stream games remotely, you'd go for a (perhaps powerful) dedicated GPU and would likely invest in some high-speed internet solution. As indicated by the above example of the GPU, you need to be very specific with what you choose - do you need a powerful GPU or do you not? After all, one of the last things you would want, ever, is money going to waste on something you don't need, or failing to buy something that meets your expectations.

    Conclusion#

    I only gave two points of interest when selecting a server - looking at the numbers alone, this might seem like hardly anything to consider at all. My reasons for this are:

    • Power comumption is one factor that people often forego thinking about, and an extremely important one at that.
    • Building on top of the previous point, you (probably) aren't stupid. Knowing (albeit at a very basic level) what to look out for should be enough.
    • It would be extremely difficult for me, or anyone else for that matter, to provide a truly complete solution to everyone's needs for a home server.

    Well, that's it. I wish you luck in selecting your hardware.

    powered by zola and serene
    \ No newline at end of file +Selecting hardware for a (home) server

    Selecting hardware for a (home) server

    2024-01-31

    Introduction#

    I see a lot of people worryingly mistaken about what a server needs (specifically, a home server). Some think that a bland and incredibly ignorant '20% budget for CPU, 30% for GPU, and the rest for the rest' plan for selecting hardware is good enough (at least, before choosing specific items) - you can't exactly be wrong when choosing hardware, but this is very, very far from right.

    Requirements#

    Server hardware needs to be low-power and resource-efficient - so as not to waste any money unnessarily, obviously. Your budget will strongly impact the specifications you can get your hands on, but I would think that even $200 is enough for a decent home server - depending on what you want to do with it. Keep in mind that you could always repurpose an old laptop or desktop lying around; it's cheap, and you get what may be a surprisingly decent machine.

    Power consumption#

    The difference between low peak and low idle power should be noted in particular. Running costs can get very high if you don't work to moderate power consumption, and probably wouldn't be something you would ignore when it comes to home servers.

    Usage of the server#

    Naturally, how a server will be used will affect pretty much everything about the hardware chosen for it. For example, if you're looking to stream games remotely, you'd go for a (perhaps powerful) dedicated GPU and would likely invest in some high-speed internet solution. As indicated by the above example of the GPU, you need to be very specific with what you choose - do you need a powerful GPU or do you not? After all, one of the last things you would want, ever, is money going to waste on something you don't need, or failing to buy something that meets your expectations.

    Conclusion#

    I only gave two points of interest when selecting a server - looking at the numbers alone, this might seem like hardly anything to consider at all. My reasons for this are:

    • Power comumption is one factor that people often forego thinking about, and an extremely important one at that.
    • Building on top of the previous point, you (probably) aren't stupid. Knowing (albeit at a very basic level) what to look out for should be enough.
    • It would be extremely difficult for me, or anyone else for that matter, to provide a truly complete solution to everyone's needs for a home server.

    Well, that's it. I wish you luck in selecting your hardware.

    powered by zola and serene
    \ No newline at end of file diff --git a/public/blog/setting-up-zola-nixos/index.html b/public/blog/setting-up-zola-nixos/index.html index bf75d65..7da5b66 100644 --- a/public/blog/setting-up-zola-nixos/index.html +++ b/public/blog/setting-up-zola-nixos/index.html @@ -27,4 +27,4 @@ }; # ... } -

    Finishing up#

    You should now have your own static site built with Zola! You can use this for a bunch of things, like:

    Help, my changes aren't sticking!

    When you make new markdown files (or any other changes to the structure of your site), remember to run zola build in your site directory (/var/lib/blog) for the changes to build into the actual site.

    powered by zola and serene
    \ No newline at end of file +

    Finishing up#

    You should now have your own static site built with Zola! You can use this for a bunch of things, like:

    Help, my changes aren't sticking!

    When you make new markdown files (or any other changes to the structure of your site), remember to run zola build in your site directory (/var/lib/blog) for the changes to build into the actual site.

    powered by zola and serene
    \ No newline at end of file diff --git a/public/projects/index.html b/public/projects/index.html index 97a11e8..c23dfd7 100644 --- a/public/projects/index.html +++ b/public/projects/index.html @@ -1 +1 @@ -Projects

    altoku

    A TUI japanese media aggregate.

    #tui
    #ratatui
    #rust
    #manga
    #anime
    #ani-cli

    bunbun

    A simple and adorable sysinfo utility.

    #sysinfo
    #neofetch
    #rust
    #cli

    vaporise

    A simple, featureful and blazingly fast memory-safe alternative to rm.

    #rm
    #rust
    #alternative
    #cli

    Ambition

    A textual fast-paced 2D MMORPG.

    #rust
    #bevy
    #mmorpg

    sage

    A collection of utilities for my home lab.

    #rust
    #homelab
    #selfhosted
    #utility
    #cli

    rustboyadvance-ng

    A rusty Nintendo™ Game Boy Advance emulator and debugger. [Deprecated]

    #rust
    #gameboy
    #emulator

    radiant.nvim

    A fast and minimal Neovim configuration framework.

    #neovim

    kagayaki.nvim

    A gorgeously soft colorscheme for Neovim.

    #neovim
    #colorscheme

    DianciEmacs

    A minimal and elegant Emacs configuration framework. [Deprecated]

    #emacs
    #config
    #diancie

    Kagayaki for Emacs

    A gorgeously soft colorscheme for Emacs. [Deprecated]

    #emacs
    #colorscheme
    #theme
    #dark
    powered by zola and serene
    \ No newline at end of file +Projects

    altoku

    A TUI japanese media aggregate.

    #tui
    #ratatui
    #rust
    #manga
    #anime
    #ani-cli

    bunbun

    A simple and adorable sysinfo utility.

    #sysinfo
    #neofetch
    #rust
    #cli

    vaporise

    A simple, featureful and blazingly fast memory-safe alternative to rm.

    #rm
    #rust
    #alternative
    #cli

    Ambition

    A textual fast-paced 2D MMORPG.

    #rust
    #bevy
    #mmorpg

    sage

    A collection of utilities for my home lab.

    #rust
    #homelab
    #selfhosted
    #utility
    #cli

    rustboyadvance-ng

    A rusty Nintendo™ Game Boy Advance emulator and debugger. [Deprecated]

    #rust
    #gameboy
    #emulator

    radiant.nvim

    A fast and minimal Neovim configuration framework.

    #neovim

    kagayaki.nvim

    A gorgeously soft colorscheme for Neovim.

    #neovim
    #colorscheme

    DianciEmacs

    A minimal and elegant Emacs configuration framework. [Deprecated]

    #emacs
    #config
    #diancie

    Kagayaki for Emacs

    A gorgeously soft colorscheme for Emacs. [Deprecated]

    #emacs
    #colorscheme
    #theme
    #dark
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/adblock/index.html b/public/tags/adblock/index.html index 8abeb53..39c4a6f 100644 --- a/public/tags/adblock/index.html +++ b/public/tags/adblock/index.html @@ -1,3 +1,3 @@ Blog Posts
    # adblockAll Tags
    DNS-level adblock on the go with blocky 2024-05-31
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # adblockAll Tags
    DNS-level adblock on the go with blocky 2024-05-31
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/blocky/index.html b/public/tags/blocky/index.html index 684f24b..846ed99 100644 --- a/public/tags/blocky/index.html +++ b/public/tags/blocky/index.html @@ -1,3 +1,3 @@ Blog Posts
    # blockyAll Tags
    DNS-level adblock on the go with blocky 2024-05-31
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # blockyAll Tags
    DNS-level adblock on the go with blocky 2024-05-31
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/hacking/index.html b/public/tags/hacking/index.html index c2348cf..70f004b 100644 --- a/public/tags/hacking/index.html +++ b/public/tags/hacking/index.html @@ -1,3 +1,3 @@ Blog Posts
    # hackingAll Tags
    Misconceptions about NFC 2024-01-19
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # hackingAll Tags
    Misconceptions about NFC 2024-01-19
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/hardening/index.html b/public/tags/hardening/index.html index 397fd49..b4e23f2 100644 --- a/public/tags/hardening/index.html +++ b/public/tags/hardening/index.html @@ -1,3 +1,3 @@ Blog Posts
    # hardeningAll Tags
    Home server security 2024-03-28
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # hardeningAll Tags
    Home server security 2024-03-28
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/hardware/index.html b/public/tags/hardware/index.html index 42cd579..a181ce0 100644 --- a/public/tags/hardware/index.html +++ b/public/tags/hardware/index.html @@ -1,3 +1,3 @@ Blog Posts
    # hardwareAll Tags
    Selecting hardware for a (home) server 2024-01-31
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # hardwareAll Tags
    Selecting hardware for a (home) server 2024-01-31
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/headscale/index.html b/public/tags/headscale/index.html index 4793692..6d997ba 100644 --- a/public/tags/headscale/index.html +++ b/public/tags/headscale/index.html @@ -1,3 +1,3 @@ Blog Posts
    \ No newline at end of file +en">Blog Posts
    \ No newline at end of file diff --git a/public/tags/hoax/index.html b/public/tags/hoax/index.html index 7f81662..becc14d 100644 --- a/public/tags/hoax/index.html +++ b/public/tags/hoax/index.html @@ -1,3 +1,3 @@ Blog Posts
    # hoaxAll Tags
    An overview on hoaxes 2024-01-04
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # hoaxAll Tags
    An overview on hoaxes 2024-01-04
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/home-lab/index.html b/public/tags/home-lab/index.html index 7f288e4..f5e33b2 100644 --- a/public/tags/home-lab/index.html +++ b/public/tags/home-lab/index.html @@ -1,3 +1,3 @@ Blog Posts
    # home labAll Tags
    Selecting hardware for a (home) server 2024-01-31
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # home labAll Tags
    Selecting hardware for a (home) server 2024-01-31
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/homelab/index.html b/public/tags/homelab/index.html index a804e86..91c3752 100644 --- a/public/tags/homelab/index.html +++ b/public/tags/homelab/index.html @@ -1,3 +1,3 @@ Blog Posts
    # homelabAll Tags
    Home server security 2024-03-28
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # homelabAll Tags
    Home server security 2024-03-28
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/index.html b/public/tags/index.html index c92c679..c23f23d 100644 --- a/public/tags/index.html +++ b/public/tags/index.html @@ -1,3 +1,3 @@ Tags
    \ No newline at end of file +en">Tags
    \ No newline at end of file diff --git a/public/tags/nfc/index.html b/public/tags/nfc/index.html index a8438a3..110cbfb 100644 --- a/public/tags/nfc/index.html +++ b/public/tags/nfc/index.html @@ -1,3 +1,3 @@ Blog Posts
    Misconceptions about NFC 2024-01-19
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    Misconceptions about NFC 2024-01-19
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/nixos/index.html b/public/tags/nixos/index.html index 3b7beb4..923121e 100644 --- a/public/tags/nixos/index.html +++ b/public/tags/nixos/index.html @@ -1,3 +1,3 @@ Blog Posts
    \ No newline at end of file +en">Blog Posts
    \ No newline at end of file diff --git a/public/tags/privacy/index.html b/public/tags/privacy/index.html index 751984d..a3c57de 100644 --- a/public/tags/privacy/index.html +++ b/public/tags/privacy/index.html @@ -1,3 +1,3 @@ Blog Posts
    \ No newline at end of file +en">Blog Posts
    \ No newline at end of file diff --git a/public/tags/searxng/index.html b/public/tags/searxng/index.html index c59b30a..f4ed1aa 100644 --- a/public/tags/searxng/index.html +++ b/public/tags/searxng/index.html @@ -1,3 +1,3 @@ Blog Posts
    # searxngAll Tags
    Host your own private search engine with SearXNG 2023-12-31
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # searxngAll Tags
    Host your own private search engine with SearXNG 2023-12-31
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/selfhosted/index.html b/public/tags/selfhosted/index.html index ae50480..436e003 100644 --- a/public/tags/selfhosted/index.html +++ b/public/tags/selfhosted/index.html @@ -1,3 +1,3 @@ Blog Posts
    \ No newline at end of file +en">Blog Posts
    \ No newline at end of file diff --git a/public/tags/social-engineering/index.html b/public/tags/social-engineering/index.html index 5e1b541..7d2b504 100644 --- a/public/tags/social-engineering/index.html +++ b/public/tags/social-engineering/index.html @@ -1,3 +1,3 @@ Blog Posts
    # social engineeringAll Tags
    Misconceptions about NFC 2024-01-19 An overview on hoaxes 2024-01-04
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # social engineeringAll Tags
    Misconceptions about NFC 2024-01-19 An overview on hoaxes 2024-01-04
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/sysadmin/index.html b/public/tags/sysadmin/index.html index 0cce9ca..6892c08 100644 --- a/public/tags/sysadmin/index.html +++ b/public/tags/sysadmin/index.html @@ -1,3 +1,3 @@ Blog Posts
    # sysadminAll Tags
    Selecting hardware for a (home) server 2024-01-31
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # sysadminAll Tags
    Selecting hardware for a (home) server 2024-01-31
    powered by zola and serene
    \ No newline at end of file diff --git a/public/tags/tailscale/index.html b/public/tags/tailscale/index.html index 38e8290..79f549f 100644 --- a/public/tags/tailscale/index.html +++ b/public/tags/tailscale/index.html @@ -1,3 +1,3 @@ Blog Posts
    \ No newline at end of file +en">Blog Posts
    \ No newline at end of file diff --git a/public/tags/zola/index.html b/public/tags/zola/index.html index 77fb395..d37ab2e 100644 --- a/public/tags/zola/index.html +++ b/public/tags/zola/index.html @@ -1,3 +1,3 @@ Blog Posts
    # zolaAll Tags
    Setting up Zola on NixOS 2023-12-29
    powered by zola and serene
    \ No newline at end of file +en">Blog Posts
    # zolaAll Tags
    Setting up Zola on NixOS 2023-12-29
    powered by zola and serene
    \ No newline at end of file