Graylog & Unraid Logo

Run Graylog with Docker Compose on Unraid

Introduction Logging and traffic monitoring are of utmost importance in information security. Having searchable stored logs can allow visibility into a variety of critical activities related to a data breach. For example, individual computer event logs can provide insight into an attacker’s lateral movement within an environment. Active Directory authentication logs can provide more detail into this lateral movement and even help to establish a timeline of this movement. Firewall logs can provide insight into an attacker’s first contact or the first time an attacker utilized a particular command or control domain....

March 27, 2022 · 7 min · Robert D. White
Tails + Unraid Logo

Tails OS with Encrypted Persistence on Unraid as a VM

This post will show you how to run Tails OS as a VM with the Persistence feature enabled. Running Tails as a VM is not recommended generally as it defeats many of the security features in Tails. For example, virtualization requires that you trust the hypervisor host, as the hypervisor has extra privileges over a VM that can reduce security and privacy of the VM. I recommend reading Tails’s official documentation about virtualization considerations before continuing: https://tails....

January 24, 2022 · 5 min · Robert D. White
Twitter Icon

How to Access Twitter Without an Account, Anonymously

Interestingly, after my previous post describing how to route Docker containers through VPN on Unraid, I received a substantial lot of questions via email about my hints at accessing Twitter anonymously. This post is my response to those questions, and I will describe my workflow to access Twitter feeds anonymously, without an account. This post will assume you have read my post on how to route Docker containers through VPN on Unraid or that you already know how to accomplish this....

November 19, 2021 · 4 min · Robert D. White
Docker VPN Graphic

How to Route Any Docker Container Through VPN in Unraid

Today’s post will cover how you can route any Docker container through a VPN. There are many reasons you might want to route a Docker container through a VPN. Some common considerations are privacy, anonymity, and security. I always recommend a VPN provider that values privacy, and in your search, you should consider providers that do not keep access logs that can be tied back to you (I use Private Internet Access [PIA])....

November 17, 2021 · 4 min · Robert D. White
OSSIM + Unraid Graphic

How to Run AlienVault OSSIM as a VM on Unraid

Introduction For this post, I will show you how to setup Unraid to run AlienVault OSSIM as a VM. OSSIM is a powerful open-source SIEM that you can leverage on your network for free. I use OSSIM for network-wide vulnerability scanning and endpoint host intrusion detection. OSSIM’s integrated HIDS is a fork from OSSEC. Additionally, OSSIM integrates with Open Threat Exchange (OTX), which can be installed on Windows, Mac, and Linux endpoints and servers for an up-to-date, open-source vulnerability scanning tool....

October 1, 2021 · 4 min · Robert D. White