Automation with SSH tunneling

Automation with SSH tunneling

In the last post I covered how SSH key pairs can be used as a form of two factor authentication, commonly known as 2FA.  In this post I’ll be covering SSH as a means to establish secure communications between systems.  Using SSH will provide a way to run commands on remote hosts, whether they be on node on a local network or accross the globe.  The key pair security is a way to set the remote host to only allow…

Read More Read More

Two Factor Authentication

Two Factor Authentication

Internet facing services are under constant attack.  They are a coveted resource that provide footing when exploited.  It’s prudent to not loose control of your services to abuse.  One way to do this is to enable two factor authentication, commonly known as 2FA. Traditional authentication is based on what you know, a user name and a password.  With 2FA, the second factor of authentication is what you have, a number token.  In this post I’ll be covering how to setup…

Read More Read More

Metering electrical service to the home

Metering electrical service to the home

This project involves working near and around the electrical service panel.  Do not perform these steps unless you are a licensed and qualified electrician.  You assume all risk and liability.  The information contained here is merely for reference purposes, I do not take any responsibility for the loss of property or life should anyone not follow this warning. Home energy use accounts for 11% of the total energy consumed nation wide.  Typically, homes have a variety of energy services provided…

Read More Read More