Skip to main content

25 docs tagged with "Guides"

View all tags

Cloud Deployment - Intro

So, what is the purpose of this here guide? Primarily these documents will show how to deploy a static website on a variety of cloud platforms. The platforms we will be using are:

Conduct A Security Audit

The following guide will walk you through the process of conducting a security audit on your network. This guide will cover the steps you need to take to identify potential security vulnerabilities and provide recommendations for improving your network security.

Dockerized Deployment of LibreChat

The LibreChat project is built around Docker making deployment a breeze in a variety of environments. In the last section, we created a DigitalOcean Droplet running Ubuntu 22.04. In this section, we will install Docker on the Droplet and deploy the LibreChat project using Docker.

Getting Started with Tailscale

So, you've decided to take the plunge and give Tailscale a try. Great choice! In this guide, we'll walk you through the process of getting Tailscale up and running on your devices. By the end of this guide, you'll be able to securely connect your devices using Tailscale and take advantage of its many features.

LibreChat Configuration

Now that we've got LibreChat up and running, let's dive into the configuration and setup of the chatbot. The LibreChat developers have built a robust platform that allows for a variety of customizations and integrations. In this guide, we will walk through the steps to configure LibreChat to suit your needs. I will focus primarily on enabling the OpenAI API integration and setting up authentication for the chatbot, but a future guide will delve into more advanced configurations and integrations.

Linux - Managing File Permissions

Operating System (OS) hardening is the process of securing an operating system by reducing its attack surface. This is done by configuring the OS to be more secure and less vulnerable to attacks.

Network - Security

COMING SOON -- very soon. This guide is being ported over from my old blog and will be updated with new information.

Network - Subnetting & VLANs

The following guide will walk you through the process of setting up VLANs and subnetting on your network. This guide will be using a Ubiquiti Unifi network as the example, but the concepts can be applied to any network equipment.

Network Hardening Techniques

Operating System (OS) hardening is the process of securing an operating system by reducing its attack surface. This is done by configuring the OS to be more secure and less vulnerable to attacks.

Network Traffic Analysis with Wireshark

Network traffic analysis is a critical skill for any IT professional, especially those working in cybersecurity. Understanding how to analyze network traffic can help you identify security threats, troubleshoot network issues, and optimize network performance. One of the most popular tools for network traffic analysis is Wireshark, a free and open-source packet analyzer. Here we will utilize Wireshark to capture and analyze network traffic.

OS Hardening Techniques

Operating System (OS) hardening is the process of securing an operating system by reducing its attack surface. This is done by configuring the OS to be more secure and less vulnerable to attacks.

Securing a Domain for LibreChat with Nginx

If you've spent some time with the LibreChat app, you may have noticed a few things that are ... well, not quite ... great. This is not because the devs haven't provided the right tools -- you'll see they certainly have -- but rather, the problem is our very basic