<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>WhiteMatterTech</title>
    <link>/</link>
    <description>Recent content on WhiteMatterTech</description>
    <image>
      <title>WhiteMatterTech</title>
      <url>/brain.jpg</url>
      <link>/brain.jpg</link>
    </image>
    <generator>Hugo -- 0.142.0</generator>
    <language>en</language>
    <copyright>2026 WhiteMatterTech</copyright>
    <lastBuildDate>Sun, 08 Feb 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>ADSB on Kubernetes</title>
      <link>/posts/adsb-kubernetes/</link>
      <pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate>
      <guid>/posts/adsb-kubernetes/</guid>
      <description>&lt;h1 id=&#34;setting-up-an-adsb-flight-tracker-with-a-cheap-antenna-on-kubernetes-rke2-and-argocd&#34;&gt;Setting Up an ADS‑B Flight Tracker with a Cheap Antenna on Kubernetes (RKE2 and ArgoCD)&lt;/h1&gt;
&lt;p&gt;This is the Kubernetes version of &lt;a href=&#34;https://w3rdw.radio/posts/adsb/&#34;&gt;my earlier Docker‑based ADS‑B guide&lt;/a&gt;. In this
setup, everything is defined in YAML and deployed via ArgoCD, and changes are
tracked in Git and synced automatically to the cluster. Access is handled
through an NGINX Ingress with TLS from cert‑manager, which is how I publish
the ADS‑B UI at &lt;a href=&#34;adsb.w3rdw.radio&#34;&gt;adsb.w3rdw.radio&lt;/a&gt;. If you’re comfortable editing YAML and
committing to Git, you’ll feel right at home.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using a New NTLM Hash Lookup Bulk Check API</title>
      <link>/posts/ntlm-lookup-api/</link>
      <pubDate>Wed, 20 Dec 2023 00:00:00 +0000</pubDate>
      <guid>/posts/ntlm-lookup-api/</guid>
      <description>&lt;h1 id=&#34;using-a-new-ntlm-hash-lookup-bulk-check-api&#34;&gt;Using a New NTLM Hash Lookup Bulk Check API&lt;/h1&gt;
&lt;p&gt;In today&amp;rsquo;s cybersecurity landscape, organizations and security professionals are continually searching for efficient ways to detect and mitigate threats. One such method involves using NTLM hash lookup services. If you&amp;rsquo;re looking to validate multiple NTLM hashes quickly, a bulk check API can be invaluable. In this post, we&amp;rsquo;ll delve into the specifics of using a NTLM hash lookup bulk check API and guide you through the process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ADSB</title>
      <link>/posts/adsb/</link>
      <pubDate>Sun, 22 Oct 2023 00:00:00 +0000</pubDate>
      <guid>/posts/adsb/</guid>
      <description>&lt;h1 id=&#34;w3rdw-blog---first-post&#34;&gt;W3RDW Blog - First Post&lt;/h1&gt;
&lt;p&gt;This post is copied from a separate site where I plan to document content related to one of my hobbies, HAM radio. This post is the first post I shared on my other site, &lt;a href=&#34;https://w3rdw.radio&#34;&gt;https://w3rdw.radio&lt;/a&gt;. In the future, I plan to only post HAM radio content on the W3RDW site. You can find a link in the top right corner of my WhiteMatterTech site.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;setting-up-an-ads-b-flight-tracker-with-a-cheap-antenna-and-docker-on-ubuntu&#34;&gt;Setting Up an ADS-B Flight Tracker with a Cheap Antenna and Docker on Ubuntu&lt;/h1&gt;
&lt;p&gt;In this tutorial, I&amp;rsquo;ll walk you through the process of setting up an ADS-B flight tracker using a cheap antenna and Docker on Ubuntu. ADS-B (Automatic Dependent Surveillance – Broadcast) is a surveillance technology that allows aircraft to determine their position via satellite navigation and periodically broadcast it. By setting up your own ADS-B receiver, you can track flights in your area and contribute to the global flight tracking network.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Roadmap to a Rewarding Career in Cybersecurity: A Guide for Beginners</title>
      <link>/posts/cybersecurity-career/</link>
      <pubDate>Mon, 11 Sep 2023 00:00:00 +0000</pubDate>
      <guid>/posts/cybersecurity-career/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;/posts/cybersecurity-career/images/cyber-unsplash.jpg&#34; alt=&#34;&#34;  /&gt;
&lt;/p&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;Are you considering a career in cybersecurity? That&amp;rsquo;s a fantastic choice! The world of cybersecurity is dynamic, challenging, and highly rewarding. Whether you&amp;rsquo;re a recent graduate or someone looking to make a career change, there&amp;rsquo;s a place for you in this ever-evolving field.&lt;/p&gt;
&lt;p&gt;A cybersecurity bootcamp student recently reached out to me on &lt;a href=&#34;https://linkedin.white.fm&#34;&gt;LinkedIn&lt;/a&gt; to ask exactly how to do this. In this post, I will share some of my advice in a more blog-friendly format. I&amp;rsquo;ll walk you through some steps to break into the cybersecurity industry successfully.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Unlocking Digital Transformation: The Crucial Role of IT Services</title>
      <link>/posts/digital-transformation/</link>
      <pubDate>Sun, 10 Sep 2023 00:00:00 +0000</pubDate>
      <guid>/posts/digital-transformation/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;In today&amp;rsquo;s rapidly evolving business landscape, digital transformation has become more than just a buzzword—it&amp;rsquo;s a strategic imperative. Organizations worldwide are harnessing technology to enhance processes, elevate customer experiences, and stay ahead in the competitive race. Amid this digital revolution, IT services emerge as indispensable allies, guiding and empowering organizations in their transformative journey. Let&amp;rsquo;s explore how IT services play a pivotal role in driving this essential shift.&lt;/p&gt;
&lt;h2 id=&#34;1-technology-assessment-and-planning&#34;&gt;1. Technology Assessment and Planning&lt;/h2&gt;
&lt;p&gt;IT services providers begin by meticulously evaluating your existing IT infrastructure, systems, and processes. Through this comprehensive assessment, they identify gaps, recognize untapped potential, and craft a well-defined roadmap for your digital transformation endeavors.&lt;/p&gt;</description>
    </item>
    <item>
      <title>My Encrypted Matrix Server with Docker-Compose</title>
      <link>/posts/encrypted-matrix-server/</link>
      <pubDate>Sun, 16 Apr 2023 00:00:00 +0000</pubDate>
      <guid>/posts/encrypted-matrix-server/</guid>
      <description>&lt;h1 id=&#34;overview&#34;&gt;Overview&lt;/h1&gt;
&lt;p&gt;In this post, I will detail how I run my Matrix Server with Docker-Compose, how I use my Matrix Server as an encrypted notifications hub, and how I federate my Matrix Server over a Cloudflare tunnel (using Cloudflare&amp;rsquo;s Zero Trust interface).&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;short-cybersecurity-note&#34;&gt;Short Cybersecurity Note&lt;/h3&gt;
&lt;p&gt;Matrix Servers can be a part of your cybersecurity stack in your homelab or business. The component pertinent to cybersecurity related to Matrix Servers is &lt;strong&gt;encryption&lt;/strong&gt;. If you&amp;rsquo;re pursuing a CISSP, you will want to be highly familiar with encryption and the process by which it is achieved.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Policy Based Routing with Unifi, PIA, and pfSense: How I Route My IoT External Traffic through PIA VPN</title>
      <link>/posts/vpn-policy-based-routing-with-unifi-and-pia/</link>
      <pubDate>Mon, 07 Nov 2022 00:00:00 +0000</pubDate>
      <guid>/posts/vpn-policy-based-routing-with-unifi-and-pia/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;In this post, I will show you how to use policy-based routing in Unifi to route specific traffic through a VPN client &lt;em&gt;(I use &lt;a href=&#34;http://www.privateinternetaccess.com/pages/buy-a-vpn/1218buyavpn?invite=U2FsdGVkX19vJeCiFLTHejdg7_UKL-kbJpMDRcdZ8ZM%2CwwbqkM0Pr8u1JywwOJHsqq-mX14&#34;&gt;Private Internet Access&lt;/a&gt;)&lt;/em&gt; on pfSense. This setup allows you to retain complete control of your devices and subnets via Unifi&amp;rsquo;s Network app while taking advantage of pfSense&amp;rsquo;s ability to host a VPN client.&lt;/p&gt;
&lt;p&gt;With this setup, I am getting my full ISP speeds on devices using a VPN for encryption. Depending on your hardware, you should be able to get full speeds as well.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Use pfSense and Unifi to Anonymize and Encrypt VLAN Tagged Traffic</title>
      <link>/posts/how-to-use-pfsense-and-unifi-to-anonymize-and-encrypt-vlan-tagged-traffic/</link>
      <pubDate>Sat, 05 Nov 2022 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-use-pfsense-and-unifi-to-anonymize-and-encrypt-vlan-tagged-traffic/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;update-11052022&#34;&gt;#UPDATE 11/05/2022&lt;/h1&gt;
&lt;p&gt;Original post date: 2021-04-05&lt;/p&gt;
&lt;p&gt;This update contains specific configuration options to use &lt;em&gt;&lt;strong&gt;4096 bit RSA keys&lt;/strong&gt;&lt;/em&gt;, &lt;em&gt;&lt;strong&gt;SHA256 Auth digest algorithm&lt;/strong&gt;&lt;/em&gt;, and &lt;em&gt;&lt;strong&gt;AES256 encryption&lt;/strong&gt;&lt;/em&gt;. The original post used the default key length of 2048 from PIA, SHA1, and allowed for AES128.&lt;/p&gt;
&lt;p&gt;Throughout the post, I will tag updated information with &lt;em&gt;&lt;strong&gt;#Update&lt;/strong&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;This post aims to show you how to use pfSense within a Unifi network behind a Unifi Gateway &lt;em&gt;[in my case, the gateway is the &lt;a href=&#34;https://www.amazon.com/gp/product/B086967C9X/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B086967C9X&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=4fc0624a437d4bfe761f2ebb02ca61bd&#34;&gt;Unifi Dream Machine Pro&lt;/a&gt; (hereafter referred to as UDMP)]&lt;/em&gt;. I will explain my current network configuration including applicable subnets, VLANs, and wireless SSIDs needed to make this setup successful. The end goal is to be able to add a client on my Unifi network to a particular VLAN either by joining this client wirelessly to a particular SSID or by tagging the client&amp;rsquo;s physical port to that VLAN. This VLAN will be tied to a subnet that sends data through the pfSense machine which is acting as a VPN client &lt;em&gt;(I use &lt;a href=&#34;http://www.privateinternetaccess.com/pages/buy-a-vpn/1218buyavpn?invite=U2FsdGVkX19vJeCiFLTHejdg7_UKL-kbJpMDRcdZ8ZM%2CwwbqkM0Pr8u1JywwOJHsqq-mX14&#34;&gt;Private Internet Access&lt;/a&gt;)&lt;/em&gt;. This method allows the UDMP to continue to act as the DHCP server for these clients while allowing pfSense to anonymize and encrypt the data of the clients in question.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Run Dockerized MacOS on Unraid</title>
      <link>/posts/run-dockerized-macos-on-unraid/</link>
      <pubDate>Tue, 25 Oct 2022 00:00:00 +0000</pubDate>
      <guid>/posts/run-dockerized-macos-on-unraid/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;For this tutorial, I will show you how to run a Dockerized version of MacOS on Unraid. The project we will use is &lt;a href=&#34;https://github.com/sickcodes/Docker-OSX&#34;&gt;sickcodes/Docker-OSX&lt;/a&gt;, which is intended for conducting MacOS security research in containerized environments on Linux and Windows.&lt;/p&gt;
&lt;p&gt;For this tutorial, I will show you how to use Unraid&amp;rsquo;s Docker-Compose functionality to manage the container. We will also be building a special VNC-compatible image, which is required for Unraid. If you are not using Unraid, building the default image will likely work better for you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cloudflare Static Site Hosting</title>
      <link>/posts/cloudflare-static-site-hosting/</link>
      <pubDate>Mon, 27 Jun 2022 00:00:00 +0000</pubDate>
      <guid>/posts/cloudflare-static-site-hosting/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;In &lt;a href=&#34;https://whitematter.tech/posts/migrating-from-wordpress-to-hugo/&#34;&gt;this previous post&lt;/a&gt;, I detailed my transition from WordPress to Hugo static sites. This post discussed hosting the site locally in a Docker container web server and exposing ports 80 and 443 to a reverse proxy on my DMZ network. Today, I will show you how you can host your Hugo static site on Cloudflare&amp;ndash;&lt;strong&gt;FREE&lt;/strong&gt;. This will absolve your responsibility to host the site, expose ports to the public, and deal with SSL certs. Cloudflare will automatically take care of all of this for you, and Clouflare will even automatically build your site from a Git repo when changes are pushed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cloudflare Tunneling to Internal Resources with Cloudflared</title>
      <link>/posts/cloudflare-tunneling/</link>
      <pubDate>Mon, 27 Jun 2022 00:00:00 +0000</pubDate>
      <guid>/posts/cloudflare-tunneling/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;This post will cover how to set up a Docker container of Cloudflared on your internal network to provide a private tunnel from Cloudflare to your internal resources. After setting up the Cloudflared tunnels, you will no longer need to expose ports 80 and 443.&lt;/p&gt;
&lt;p&gt;This post assumes you currently have a vibrant and functioning internal network with a reverse proxy (in my case, &lt;a href=&#34;https://whitematter.tech/posts/run-a-reverse-proxy-using-docker/&#34;&gt;Nginx Proxy Manager&lt;/a&gt;) already configured. Additionally, this post assumes you have a Cloudflare account with the ability to modify DNS records for your domain(s).&lt;/p&gt;</description>
    </item>
    <item>
      <title>&#39;Split-Brain DNS&#39; for Internal HTTPS with Let&#39;s Encrypt</title>
      <link>/posts/https-for-homelab-internal-resources/</link>
      <pubDate>Fri, 13 May 2022 00:00:00 +0000</pubDate>
      <guid>/posts/https-for-homelab-internal-resources/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;In &lt;a href=&#34;https://whitematter.tech/posts/how-to-connect-to-your-unifi-dream-machine-or-unvr-with-ssl-from-lets-encrypt/&#34;&gt;this previous post&lt;/a&gt;, I showed how to connect to a Unifi router with HTTPS, effectively ridding you of the tedious words, &amp;ldquo;&lt;strong&gt;Your connection is not private&lt;/strong&gt;.&amp;rdquo;
&lt;img loading=&#34;lazy&#34; src=&#34;/posts/how-to-connect-to-your-unifi-dream-machine-or-unvr-with-ssl-from-lets-encrypt/header_how-to-connect-to-your-unifi-dream-machine-or-unvr-with-ssl-from-lets-encrypt.png&#34; alt=&#34;&#34;  /&gt;

However, the method shown in that post directs your connection to an external DNS server &lt;em&gt;(e.g., CloudFlare)&lt;/em&gt; in order to resolve your Unifi router. This adds some latency by requiring your traffic to flow out and in rather than staying local. Additionally, it requires opening some ports externally. While this is not necessarily bad, it certainly increases the risks and attack surface of your network.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Manage Linux Logs on AlienVault OSSIM</title>
      <link>/posts/managing-linux-logs-ossim/</link>
      <pubDate>Tue, 19 Apr 2022 00:00:00 +0000</pubDate>
      <guid>/posts/managing-linux-logs-ossim/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;OSSIM is a powerful open source security information and event management (SIEM) operating system. AlienVault OSSIM is the open source version of AlienVault, which is sold by AT&amp;amp;T.&lt;/p&gt;
&lt;p&gt;I have used OSSIM in professional deployments in the past, and I currently use OSSIM for vulnerability scanning, asset management, and security alerts. OSSIM can often be overly complicated to set up and install, and the documentation available for troubleshooting is sparse. I have learned a lot of great tricks over the years by trial and error.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Run Graylog with Docker Compose on Unraid</title>
      <link>/posts/run-graylog-with-docker-compose-on-unraid/</link>
      <pubDate>Sun, 27 Mar 2022 00:00:00 +0000</pubDate>
      <guid>/posts/run-graylog-with-docker-compose-on-unraid/</guid>
      <description>&lt;hr&gt;
&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;Logging and traffic monitoring are of utmost importance in information security. Having searchable stored logs can allow visibility into a variety of critical activities related to a data breach.&lt;/p&gt;
&lt;p&gt;For example, individual computer event logs can provide insight into an attacker&amp;rsquo;s lateral movement within an environment. Active Directory authentication logs can provide more detail into this lateral movement and even help to establish a timeline of this movement. Firewall logs can provide insight into an attacker&amp;rsquo;s first contact or the first time an attacker utilized a particular command or control domain. NetFlow logs allow visibility into how a user interacts with other devices internally.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Migrating from Wordpress to Hugo</title>
      <link>/posts/migrating-from-wordpress-to-hugo/</link>
      <pubDate>Sun, 20 Mar 2022 00:00:00 +0000</pubDate>
      <guid>/posts/migrating-from-wordpress-to-hugo/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;When I initially began posting publicly on this site, my goal was to be able to host my site fully with Docker for containerization. I hadn&amp;rsquo;t experienced any other decent blogging platform besides WordPress at the time, and I was bent on getting WordPress self-hosted with Docker.&lt;/p&gt;
&lt;p&gt;This goal was achieved, and &lt;a href=&#34;https://whitematter.tech/posts/hosting-your-own-site-with-traefik-and-wordpress/hosting-your-own-site-with-traefik-and-wordpress/&#34;&gt;my first public post&lt;/a&gt; details how I used docker-compose to deploy my blog using containers for WordPress and Traefik.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Privacy Policy</title>
      <link>/privacy-policy/</link>
      <pubDate>Thu, 10 Mar 2022 00:00:00 +0000</pubDate>
      <guid>/privacy-policy/</guid>
      <description>&lt;pre&gt;&lt;code&gt;									&amp;lt;h1&amp;gt;Privacy Policy for WhiteMatterTech&amp;lt;/h1&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;At WhiteMatterTech, accessible from https://whitematter.tech, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by WhiteMatterTech and how we use it.&lt;/p&gt;
&lt;p&gt;If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us.&lt;/p&gt;
&lt;h2&gt;Log Files&lt;/h2&gt;
&lt;p&gt;WhiteMatterTech follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services&#39; analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users&#39; movement on the website, and gathering demographic information. Our Privacy Policy was created with the help of the &lt;a href=&#34;https://www.privacypolicygenerator.org&#34;&gt;Privacy Policy Generator&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Terms and Conditions</title>
      <link>/terms-and-conditions/</link>
      <pubDate>Thu, 10 Mar 2022 00:00:00 +0000</pubDate>
      <guid>/terms-and-conditions/</guid>
      <description>&lt;h1&gt;Terms and Conditions&lt;/h1&gt;
&lt;p&gt;Last updated: March 14, 2022&lt;/p&gt;
&lt;p&gt;Please read these terms and conditions carefully before using Our Service.&lt;/p&gt;
&lt;h1&gt;Interpretation and Definitions&lt;/h1&gt;
&lt;h2&gt;Interpretation&lt;/h2&gt;
&lt;p&gt;The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.&lt;/p&gt;
&lt;h2&gt;Definitions&lt;/h2&gt;
&lt;p&gt;For the purposes of these Terms and Conditions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Affiliate&lt;/strong&gt; means an entity that controls, is controlled by or is under common control with a party, where &amp;quot;control&amp;quot; means ownership of 50% or more of the shares, equity interest or other securities entitled to vote for election of directors or other managing authority.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Recommended Products</title>
      <link>/recommended-products/</link>
      <pubDate>Mon, 07 Mar 2022 00:00:00 +0000</pubDate>
      <guid>/recommended-products/</guid>
      <description>&lt;p&gt;&lt;em&gt;As an Amazon Associate, I earn from qualifying purchases.&lt;/em&gt; Thank you for supporting the maintenance of this blog. Pricing is the same for you whether you use my links or not.&lt;/p&gt;

&lt;p&gt;This page is my central list of gear and tools I use and recommend across my tutorials.&lt;/p&gt;
&lt;h2 id=&#34;homelab-networking-and-security&#34;&gt;Homelab Networking and Security&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/gp/product/B086967C9X/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B086967C9X&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=4fc0624a437d4bfe761f2ebb02ca61bd&#34;&gt;Unifi Dream Machine Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/gp/product/B019PBEI5W/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B019PBEI5W&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=6c6cfd4f08014ed587a37392b9bb957f&#34;&gt;Unifi Gateway Device (USG)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Yubico-Authentication-Security-Supported-Accounts/dp/B08DHL1YDL/ref=sr_1_4?dchild=1&amp;amp;keywords=yubikey&amp;amp;qid=1632281315&amp;amp;sr=8-4&amp;amp;tag=whitematter-20&#34;&gt;YubiKey Hardware Security Key&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/s?k=mini&amp;#43;pc&amp;#43;intel&amp;#43;n100&amp;amp;tag=whitematter-20&#34;&gt;Nginx Proxy Manager Host Hardware (Mini PCs)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Related tutorials:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tails OS with Encrypted Persistence on Unraid as a VM</title>
      <link>/posts/tails-os-with-encrypted-persistence-on-unraid-as-a-vm/</link>
      <pubDate>Mon, 24 Jan 2022 00:00:00 +0000</pubDate>
      <guid>/posts/tails-os-with-encrypted-persistence-on-unraid-as-a-vm/</guid>
      <description>&lt;p&gt;This post will show you how to run Tails OS as a VM with the Persistence feature enabled.&lt;/p&gt;
&lt;p&gt;Running Tails as a VM is not recommended generally as it defeats many of the security features in Tails. For example, virtualization requires that you trust the hypervisor host, as the hypervisor has extra privileges over a VM that can reduce security and privacy of the VM.&lt;/p&gt;
&lt;p&gt;I recommend reading Tails&amp;rsquo;s official documentation about virtualization considerations before continuing: &lt;a href=&#34;https://tails.boum.org/doc/advanced_topics/virtualization/&#34;&gt;&lt;/a&gt;&lt;a href=&#34;https://tails.boum.org/doc/advanced_topics/virtualization/&#34;&gt;https://tails.boum.org/doc/advanced_topics/virtualization/&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Xbox2Discord: How to Forward Audio from Xbox Live to Discord</title>
      <link>/posts/xbox2discord-how-to-forward-audio-from-xbox-live-to-discord/</link>
      <pubDate>Fri, 07 Jan 2022 00:00:00 +0000</pubDate>
      <guid>/posts/xbox2discord-how-to-forward-audio-from-xbox-live-to-discord/</guid>
      <description>&lt;p&gt;If you game on PC, you probably have Discord installed to chat with your friends as you game. Discord has relatively decent audio, and it far surpasses the in-game chat capabilities built into most games.&lt;/p&gt;
&lt;p&gt;When gaming cross-platform, however, you&amp;rsquo;re stuck either using in-game chat or the tedious Xbox Companion app with limited controls and annoying party configs.&lt;/p&gt;
&lt;p&gt;This post will show you how to configure a setup to forward audio from an Xbox party directly to Discord, and &lt;em&gt;visa versa&lt;/em&gt;. This way, you can game with your Xbox friends and still use the far superior Discord.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Arduino MQ-3B Ethanol Sensor: Behavioral Neuroscience Research</title>
      <link>/posts/arduino-mq-3b-ethanol-sensor-behavioral-neuroscience-research/</link>
      <pubDate>Sat, 11 Dec 2021 00:00:00 +0000</pubDate>
      <guid>/posts/arduino-mq-3b-ethanol-sensor-behavioral-neuroscience-research/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;Recently, I had the opportunity to collaborate with a university research lab to build some vapor sensors to roughly measure ethanol (EtOH) vapor within an operant chamber. This project was a lot of fun.&lt;/p&gt;
&lt;p&gt;With extremely limited circuit documentation on the web and never having personally used Arduino before, there were a lot of interesting hiccups I ran into. Overall, this project was a bit out of my wheelhouse, but with much determination, the finished product turned out rather nicely.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Access Twitter Without an Account, Anonymously</title>
      <link>/posts/how-to-access-twitter-without-an-account-anonymously/</link>
      <pubDate>Fri, 19 Nov 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-access-twitter-without-an-account-anonymously/</guid>
      <description>&lt;p&gt;Interestingly, after my previous post describing &lt;a href=&#34;https://whitematter.tech/2021/how-to-route-any-docker-container-through-vpn-in-unraid/&#34;&gt;how to route Docker containers through VPN on Unraid,&lt;/a&gt; I received a substantial lot of questions via email about my hints at accessing Twitter anonymously. This post is my response to those questions, and I will describe my workflow to access Twitter feeds anonymously, without an account.&lt;/p&gt;
&lt;p&gt;This post will assume you have read my post on &lt;a href=&#34;https://whitematter.tech/2021/how-to-route-any-docker-container-through-vpn-in-unraid/&#34;&gt;how to route Docker containers through VPN on Unraid&lt;/a&gt; or that you already know how to accomplish this. If you do not, start &lt;a href=&#34;https://whitematter.tech/2021/how-to-route-any-docker-container-through-vpn-in-unraid/&#34; title=&#34;https://whitematter.tech/2021/how-to-route-any-docker-container-through-vpn-in-unraid/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Do An In-Place Upgrade To Windows Server 2022</title>
      <link>/posts/how-to-do-an-in-place-upgrade-to-windows-server-2022/</link>
      <pubDate>Fri, 19 Nov 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-do-an-in-place-upgrade-to-windows-server-2022/</guid>
      <description>&lt;p&gt;I recently had to upgrade two domain controllers to Windows Server 2022. The main controller was still on Windows Server 2016 while the secondary was Windows Server 2019. Both in-place upgrades went without issue.&lt;/p&gt;
&lt;p&gt;Both servers were running &lt;em&gt;Hyper-V, Bitlocker, and AD Controller&lt;/em&gt;. The 2019 server had an &lt;em&gt;SMTP server&lt;/em&gt; that it was running, but Microsoft has deprecated the SMTP stack and associated management tools, including the IIS tools. There very well may be other deprecated software or tools, and I highly recommend searching for specific functionality you utilize on your Win Servers before attempting the upgrade.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Route Any Docker Container Through VPN in Unraid</title>
      <link>/posts/how-to-route-any-docker-container-through-vpn-in-unraid/</link>
      <pubDate>Wed, 17 Nov 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-route-any-docker-container-through-vpn-in-unraid/</guid>
      <description>&lt;p&gt;Today&amp;rsquo;s post will cover how you can route any Docker container through a VPN.&lt;/p&gt;
&lt;p&gt;There are many reasons you might want to route a Docker container through a VPN. Some common considerations are privacy, anonymity, and security.&lt;/p&gt;
&lt;p&gt;I always recommend a VPN provider that values privacy, and in your search, you should consider providers that do not keep access logs that can be tied back to you &lt;em&gt;(I use &lt;a href=&#34;http://www.privateinternetaccess.com/pages/buy-a-vpn/1218buyavpn?invite=U2FsdGVkX19vJeCiFLTHejdg7_UKL-kbJpMDRcdZ8ZM%2CwwbqkM0Pr8u1JywwOJHsqq-mX14&#34;&gt;Private Internet Access&lt;/a&gt; [PIA])&lt;/em&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Ultimate Coffee Gear List for WFH</title>
      <link>/posts/coffee-gear/</link>
      <pubDate>Fri, 15 Oct 2021 00:00:00 +0000</pubDate>
      <guid>/posts/coffee-gear/</guid>
      <description>&lt;p&gt;Many of us have had the pleasure (or the curse) of working from home (better known as WFH on social media or your company Teams chat) over the COVID-19 pandemic. I, for one, welcomed the increased WFH time, but the lack of open and available coffee shops over the time was definitely a bummer (among other things, obviously).&lt;/p&gt;
&lt;p&gt;While &lt;strong&gt;&lt;em&gt;designing cloud architecture&lt;/em&gt;&lt;/strong&gt; or &lt;strong&gt;&lt;em&gt;developing organizational NIST-compliant security policies&lt;/em&gt;&lt;/strong&gt;, I require the aromatic scent of freshly ground espresso or single-origin coffee beans followed by an exquisitely crafted cortado or glass of nitro cold brew.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Run a Locally Hosted Docker Registry GUI with Harbor</title>
      <link>/posts/how-to-run-a-locally-hosted-docker-registry-gui-with-harbor/</link>
      <pubDate>Mon, 04 Oct 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-run-a-locally-hosted-docker-registry-gui-with-harbor/</guid>
      <description>&lt;p&gt;For this post, I will show you how to easily run a Docker Registry GUI with Harbor. I am running Docker on a Ubuntu VM. Therefore, my registry will be run through Docker, and the container will reside on a Ubuntu VM. This tutorial will use docker-compose to build the required containers.&lt;/p&gt;
&lt;h2 id=&#34;download-and-expand-the-harbor-installer&#34;&gt;Download and Expand the Harbor Installer&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;wget https://github.com/goharbor/harbor/releases/download/v2.3.1/harbor-offline-installer-v2.3.1.tgz

tar -xzf harbor-offline-installer-v2.3.1.tgz

cd harbor/
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;generate-ssl-certs---internal-only&#34;&gt;Generate SSL Certs - INTERNAL ONLY&lt;/h2&gt;
&lt;p&gt;These steps should only be taken if you plan to use your registry internally. If you plan to host your registry for external access, you should obtain certs from a trusted CA to use. With that said, these steps will work on a Linux host only (if you are using Windows, you could use &lt;a href=&#34;https://docs.microsoft.com/en-us/windows/wsl/install&#34;&gt;WSL&lt;/a&gt; to follow these steps).&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Run AlienVault OSSIM as a VM on Unraid</title>
      <link>/posts/how-to-run-alienvault-ossim-as-a-vm-on-unraid/</link>
      <pubDate>Fri, 01 Oct 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-run-alienvault-ossim-as-a-vm-on-unraid/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;For this post, I will show you how to setup &lt;a href=&#34;https://www.unraid.net/&#34;&gt;Unraid&lt;/a&gt; to run &lt;a href=&#34;https://cybersecurity.att.com/products/ossim&#34;&gt;AlienVault OSSIM&lt;/a&gt; as a VM. OSSIM is a powerful open-source SIEM that you can leverage on your network for free. I use OSSIM for network-wide vulnerability scanning and endpoint host intrusion detection.&lt;/p&gt;
&lt;p&gt;OSSIM&amp;rsquo;s integrated HIDS is a fork from OSSEC. Additionally, OSSIM integrates with &lt;a href=&#34;https://otx.alienvault.com/&#34;&gt;Open Threat Exchange (OTX)&lt;/a&gt;, which can be installed on Windows, Mac, and Linux endpoints and servers for an up-to-date, open-source vulnerability scanning tool. I deploy the OTX installer via my free &lt;a href=&#34;https://mybusiness.mosyle.com/&#34;&gt;Mosyle&lt;/a&gt; account &lt;em&gt;(MDM for MacOS)&lt;/em&gt; and &lt;a href=&#34;https://endpoint.microsoft.com/&#34;&gt;Intune&lt;/a&gt; (&lt;em&gt;MDM for Windows&lt;/em&gt;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Usability Evaluations: Findability</title>
      <link>/posts/usability-evaluations-findability/</link>
      <pubDate>Tue, 28 Sep 2021 00:00:00 +0000</pubDate>
      <guid>/posts/usability-evaluations-findability/</guid>
      <description>&lt;h2 id=&#34;abstract&#34;&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;This review investigated findability and its relationship to usability and usability evaluations. Definitions of usability, findability, usability evaluations, and other sub-components of these terms including navigability are discussed, and the importance of research studies using similar terminologies is considered. A series of six usability evaluation studies is presented, and the terminologies presented in each are described. Goals, findings, and conclusions of each study are considered, and applications from the conclusions are drawn. This review concludes that clear definitions of these topics are crucial to successful implementation of various study methodologies and presentation of results. The review further concluded that, based on the available research, findability is a critical factor of usability that, when effectively present, leads to greater usability and overall user satisfaction of a product or website.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Quick Note on Leading Geographically Dispersed Teams</title>
      <link>/posts/a-quick-note-on-leading-geographically-dispersed-teams/</link>
      <pubDate>Mon, 27 Sep 2021 00:00:00 +0000</pubDate>
      <guid>/posts/a-quick-note-on-leading-geographically-dispersed-teams/</guid>
      <description>&lt;p&gt;The ability for geographically dispersed teams to interact, engage, and collaborate effectively is a concern for increasing numbers of corporations, teams, and leadership, especially in the post-COVID-19 era workplace. Adoption of technological solutions for computer-mediated communication can mitigate some of the inherent complexities and difficulties of the geographical dispersion problem, and research teams have increased efforts to both understand the problem and design groupware solutions to support virtual team collaboration (Morrison-Smith &amp;amp; Ruiz, 2020). Researchers suggest that, along with the physical demands of distance for virtual teams, leaders should consider cognitive, social and emotional concerns at the forefront of the discussion in order to best address the problems and create a positive collaborative environment (Morrison-Smith &amp;amp; Ruiz, 2020).&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Connect to Your Unifi Dream Machine or UNVR with SSL from Let&#39;s Encrypt</title>
      <link>/posts/how-to-connect-to-your-unifi-dream-machine-or-unvr-with-ssl-from-lets-encrypt/</link>
      <pubDate>Wed, 22 Sep 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-connect-to-your-unifi-dream-machine-or-unvr-with-ssl-from-lets-encrypt/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Update 05/09/2022&lt;/strong&gt;:
The conclusions of this post will route your traffic externally, requiring your local devices to reach external DNS servers (e.g., in my case, CloudFlare) in order to resolve your Unifi Gateway address. If you want to handle all of this completely locally/internally, check out my newer post: &lt;a href=&#34;https://whitematter.tech/2022/05/001&#34;&gt;HTTPS for Internal Resources&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;Alright, if you have a Unifi device like a &lt;a href=&#34;https://amzn.to/3zvS2nd&#34;&gt;&lt;em&gt;Dream Machine&lt;/em&gt;&lt;/a&gt;, &lt;em&gt;&lt;a href=&#34;https://www.amazon.com/gp/product/B086967C9X/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B086967C9X&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=4fc0624a437d4bfe761f2ebb02ca61bd&#34;&gt;Dream Machine Pro&lt;/a&gt;&lt;/em&gt;, &lt;em&gt;&lt;a href=&#34;https://amzn.to/3Cze3TN&#34; title=&#34;https://amzn.to/3Cze3TN&#34;&gt;UNVR&lt;/a&gt;&lt;/em&gt;, &lt;em&gt;&lt;a href=&#34;https://amzn.to/2W1CZUz&#34; title=&#34;https://amzn.to/2W1CZUz&#34;&gt;CloudKey&lt;/a&gt;&lt;/em&gt;, or other device, you likely have been met with the dreaded red triangle followed by the tedious words, &amp;ldquo;&lt;strong&gt;Your&lt;/strong&gt; &lt;strong&gt;connection is not private&lt;/strong&gt;.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Easily Run A Reverse Proxy using Docker</title>
      <link>/posts/run-a-reverse-proxy-using-docker/</link>
      <pubDate>Tue, 17 Aug 2021 00:00:00 +0000</pubDate>
      <guid>/posts/run-a-reverse-proxy-using-docker/</guid>
      <description>&lt;p&gt;Reverse proxies are powerful tools used typically to forward client traffic to a server. In contrast to a forward proxy, a reverse proxy sits in front of web servers or other servers and forwards client traffic to the appropriate server. In this post, I will show you how to easily setup a reverse proxy using Docker, forward the necessary ports to the reverse proxy, and configure the reverse proxy to forward traffic to various servers on your network. Specifically, I will show how to setup the reverse proxy for se with WordPress, though the applications of this reverse proxy are endless!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Live Better with Circadian Lighting</title>
      <link>/posts/live-better-with-circadian-lighting/</link>
      <pubDate>Tue, 25 May 2021 00:00:00 +0000</pubDate>
      <guid>/posts/live-better-with-circadian-lighting/</guid>
      <description>&lt;p&gt;&lt;strong&gt;A Little Background and Some Thoughts&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With today&amp;rsquo;s technology, we are constantly bombarded with High Energy Visible (HEV) blue light from our screens as well as inconsistent lighting throughout the day within our homes and workplaces. Like all mammalian species, we humans have our own circadian rhythms which occur naturally and are vitally important to our health and well-being. Rather than writing an essay on the importance of our natural circadian rhythms, check out the educational write-up from the &lt;a href=&#34;https://www.nigms.nih.gov/education/fact-sheets/Pages/circadian-rhythms.aspx&#34; title=&#34;https://www.nigms.nih.gov/education/fact-sheets/Pages/circadian-rhythms.aspx&#34;&gt;NIH here&lt;/a&gt;. Hopefully this will help explain the &amp;ldquo;why&amp;rdquo; of this particular post.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Add VLAN Segmentation for HomeKit IoT Devices with Unifi</title>
      <link>/posts/how-to-add-vlan-segmentation-for-homekit-iot-devices-with-unifi/</link>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-add-vlan-segmentation-for-homekit-iot-devices-with-unifi/</guid>
      <description>&lt;h2 id=&#34;iot-overview&#34;&gt;IoT Overview&lt;/h2&gt;
&lt;p&gt;The smart world of Internet-of-Things (IoT) devices is ever growing. From everyday lightbulbs to the sprinkler out front, just about every household appliance and utility has a smart-counterpart. For example, my smart home is fully Apple HomeKit compatible and consists of a &lt;a href=&#34;https://www.amazon.com/gp/product/B07XH4KDR5/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B07XH4KDR5&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=df6ecd2d3d2499551ee4fb509a49587b&#34;&gt;Hue bridge with lightbulbs&lt;/a&gt;, &lt;a href=&#34;https://www.amazon.com/gp/product/B00KLAXFQA/ref=as_li_qf_asin_il_tl?ie=UTF8&amp;amp;tag=whitematter-20&amp;amp;creative=9325&amp;amp;linkCode=as2&amp;amp;creativeASIN=B00KLAXFQA&amp;amp;linkId=7921a6374b4b40c94161f4278c1b33d8&#34; title=&#34;https://www.amazon.com/gp/product/B00KLAXFQA/ref=as_li_qf_asin_il_tl?ie=UTF8&amp;amp;tag=whitematter-20&amp;amp;creative=9325&amp;amp;linkCode=as2&amp;amp;creativeASIN=B00KLAXFQA&amp;amp;linkId=7921a6374b4b40c94161f4278c1b33d8&#34;&gt;Lutron Caseta smart dimmers/switches&lt;/a&gt;, &lt;a href=&#34;https://www.amazon.com/gp/product/B08FBHCPPF/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B08FBHCPPF&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=5505218457879d684052765e37db35fa&#34; title=&#34;https://www.amazon.com/gp/product/B08FBHCPPF/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B08FBHCPPF&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=5505218457879d684052765e37db35fa&#34;&gt;Eve Aqua outdoor water hose control&lt;/a&gt;, &lt;a href=&#34;https://www.amazon.com/gp/product/B07Q1J7RZM/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B07Q1J7RZM&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=dae9862d26805fd0af1e8817bd8645c2&#34; title=&#34;https://www.amazon.com/gp/product/B07Q1J7RZM/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B07Q1J7RZM&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=dae9862d26805fd0af1e8817bd8645c2&#34;&gt;iSmartGate garage door opener&lt;/a&gt;, &lt;a href=&#34;https://www.amazon.com/gp/product/B00YUPE85Y/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B00YUPE85Y&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=f1f239d916e964e7ba0ed727e7ad4d14&#34; title=&#34;https://www.amazon.com/gp/product/B00YUPE85Y/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B00YUPE85Y&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=f1f239d916e964e7ba0ed727e7ad4d14&#34;&gt;Schlage deadbolt&lt;/a&gt;, &lt;a href=&#34;https://www.amazon.com/gp/product/B01MAV39M8/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B01MAV39M8&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=3c4d273460c2b1f2a7201582bb50342e&#34;&gt;Eve motion sensor&lt;/a&gt;, &lt;a href=&#34;https://www.amazon.com/gp/product/B07W6RYRZM/ref=as_li_qf_asin_il_tl?ie=UTF8&amp;amp;tag=whitematter-20&amp;amp;creative=9325&amp;amp;linkCode=as2&amp;amp;creativeASIN=B07W6RYRZM&amp;amp;linkId=c06286ddb9cac861e2da524be2f6acc4&#34;&gt;Sonos speakers&lt;/a&gt; throughout the house, a &lt;a href=&#34;https://www.amazon.com/gp/product/B07HMPY7RX/ref=as_li_qf_asin_il_tl?ie=UTF8&amp;amp;tag=whitematter-20&amp;amp;creative=9325&amp;amp;linkCode=as2&amp;amp;creativeASIN=B07HMPY7RX&amp;amp;linkId=3bc57ed9890dc0278b52db28c3d42511&#34;&gt;Vocolinc oil diffuser&lt;/a&gt;, &lt;a href=&#34;https://www.amazon.com/gp/product/B083NFNN99/ref=as_li_qf_asin_il_tl?ie=UTF8&amp;amp;tag=whitematter-20&amp;amp;creative=9325&amp;amp;linkCode=as2&amp;amp;creativeASIN=B083NFNN99&amp;amp;linkId=fc19219e0df43f4a1c56d63749dbad2c&#34;&gt;Vocolionc power strip&lt;/a&gt;, a couple &lt;a href=&#34;https://www.amazon.com/gp/product/B08C4JXBPF/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B08C4JXBPF&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=7500e53510ab70cfb9e0d237978fe197&#34;&gt;iRobot Roomba&lt;/a&gt; vacuum cleaners, some &lt;a href=&#34;https://www.amazon.com/gp/product/B07NJRS8TX/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B07NJRS8TX&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=5ab28257a60b56e62c85132b2afce653&#34;&gt;Vocolinc pluggable outlets&lt;/a&gt;, an &lt;a href=&#34;https://www.amazon.com/gp/product/B06W56TBLN/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B06W56TBLN&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=59b864438ae9a389b269066a2902cdde&#34;&gt;Ecobee thermostat&lt;/a&gt; to replace each analog thermostat in the house, and a &lt;a href=&#34;https://www.amazon.com/gp/product/B08L3X9ZZX/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B08L3X9ZZX&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=19dd1b06c1c8884232de18bc438fefa1&#34;&gt;Unifi G4 Doorbell&lt;/a&gt; (the doorbell is not technically compatible with HomeKit, but I added support with a third-party tool known as &amp;ldquo;&lt;a href=&#34;https://homebridge.io/&#34;&gt;Homebridge&lt;/a&gt;&amp;rdquo;). On top of all these smart home devices, I have a handful of other Unifi Protect cameras around my property.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Harden Your Network Security for Your In-Home Web Hosting</title>
      <link>/posts/network-hardening-webhosting/</link>
      <pubDate>Tue, 06 Apr 2021 00:00:00 +0000</pubDate>
      <guid>/posts/network-hardening-webhosting/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;The purpose of this post is to provide some tips to address some network security concerns when &lt;a href=&#34;https://whitematter.tech/2021/04/01/hosting-your-own-site-with-traefik-and-wordpress/&#34;&gt;hosting an externally-facing web server&lt;/a&gt; from a device within your home network. For this post, I will be using Unifi networking gear. My screenshots will be of the Unifi controller on my &lt;em&gt;&lt;a href=&#34;https://www.amazon.com/gp/product/B086967C9X/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B086967C9X&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=4fc0624a437d4bfe761f2ebb02ca61bd&#34;&gt;Unifi Dream Machine Pro&lt;/a&gt;&lt;/em&gt; &lt;em&gt;(UDMP)&lt;/em&gt;, but I will do my best to overview the concepts so you can replicate with your own networking gear. Let&amp;rsquo;s get started!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Host Your Own Free Wordpress Site with Traefik and Docker</title>
      <link>/posts/hosting-your-own-site-with-traefik-and-wordpress/</link>
      <pubDate>Fri, 02 Apr 2021 00:00:00 +0000</pubDate>
      <guid>/posts/hosting-your-own-site-with-traefik-and-wordpress/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Update 03/20/2022&lt;/strong&gt;:
I no longer host my site with Traefik, and my site is no longer built on WordPress. I now host my site internally using an Nginx proxy hosted in Docker. My site is built with Hugo. Learn more about my transition from WordPress to Hugo on my post here: &lt;a href=&#34;https://whitematter.tech/posts/migrating-from-wordpress-to-hugo/&#34;&gt;Migrating from WordPress to Hugo&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;My first post will, appropriately, show you how to build your own self-hosted Wordpress site utilizing Docker (just like this site)! For this setup, I am using a Ubuntu bare-metal machine behind a &lt;em&gt;&lt;a href=&#34;https://www.amazon.com/gp/product/B086967C9X/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=9325&amp;amp;creativeASIN=B086967C9X&amp;amp;linkCode=as2&amp;amp;tag=whitematter-20&amp;amp;linkId=4fc0624a437d4bfe761f2ebb02ca61bd&#34;&gt;Unifi Dream Machine Pro&lt;/a&gt;&lt;/em&gt; . You can use a VPS or an OS on bare-metal capable of running Docker &lt;em&gt;(for this tutorial though, we will use tools only applicable to Ubuntu, but you can make adjustments where necessary if you are familiar with Docker and choose not to use Ubuntu).&lt;/em&gt; Check out &lt;a href=&#34;https://github.com/robertomano24/WhiteMatterWP&#34;&gt;this project&amp;rsquo;s GitHub page&lt;/a&gt; for examples and help.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
