Posts

I passed the second half of LPIC 1 - Linux Administration

Image
    So, that means I am now a certified Linux Administrator... I need to rest now. My brain is braining.... Honestly, I can say: with Codex installed recently, coding is now vibe coding . I personally can say I understand what the AI does—well, at least 80% of it—which is great actually, but I want to do more with it. What we need is a secure, compliant, and stable “coworker” who can do useful stuff. So when I find the time, I will step away from OpenAI and see what I can do locally, without relying on megacorps, and what agents can do that would help me organize my paperwork, not hallucinate, and all that stuff. As someone who worked in the design field, I can tell you the big tech companies steal all your data. You cannot trust them. So if you don't care, fine. If you have to work with lots of personal data, need to fulfill compliance rules and regulations, and want to make sure it does what you want—this is what everybody is thinking about. Unfortunately, I am now starting ...

In the NEWS - Cybercrime and Scam - but no AI news...

We get plenty of cyber news in Germany. That’s why I focus on my area. Still, afaik we don’t get everything covered — or at least I don’t see everything all the time. But since the big blackout in Berlin a few weeks ago, I expect everyone to know that our infrastructure is built on thin ice. Cyberattacks, on the other hand, are still somewhat more niche, I feel. However, we do get frequent news and official warnings about ransomware attacks, like this one from earlier this month: https://www1.wdr.de/nachrichten/westfalen-lippe/cybersicherheit-handwerk-owl-100.html#:~:text=Der%20deutsche%20Mittelstand%20ist%20nur%20schlecht%20auf,kann%20den%20Weg%20f%C3%BCr%20Hacker%20in%20jeden In other news, something I see personally on my Google News feed is trading and investment ads about AI and other trading apps. As a 40-year-old who grew up with IT and who is “in the market” (financial markets), I see these ads regularly and I know how much fake stuff is going on. I mean, I even get emails fr...

My homelab, projects and how I learn for my certificates

Image
The certificates I get are actually very theoretical. They are just to put them in a pdf and send that out along with my other references from school, uni and work. You can — and I did — install VMs and simulate stuff in Packet Tracer and the like for learning and practice, but a lot of it is just memorization of commands, terminology, and workflow steps on top of everything else. However, in order to memorize, learn, and demonstrate things better, I do have my homelab, documentation, Anki cards (flashcards), and whiteboards filled with notes and graphic-facilitation-style images. These are basically visual anchors and memory palaces that use the Loci and Major methods in ways I haven’t seen before.  For example I create a memorable image for rsyslog (the new rocket fast syslog)....  Syslog comes with priorities. I then create images that combine the Major method with Loci. For 0 I often use "sea". Syslog prio 0 is "emergency". So I combine the two and turn it into...

My taxes will be processed by AI - maybe

 The German tax government seems to be advancing in ways that are quite alright IMHO. I think that ELSTER-Online and the use of AI and algorithms in processing the data is just fine and shows how the government can do things right and make progress in their "digitization" endeavors. Bielefeld is facilitating new AI enhanced workflows: https://www.radioguetersloh.de/nachrichten/kreis-guetersloh/finanzamt-bielefeld-testet-ki-einsatz.html I live in Gütersloh though, so I might not be processed by their AI, but I contacted the tax office in Bielefeld for an internship and maybe I will get some more info about the matter.

LPIC 1 - First half completed

Image
It was a lot tougher than what I expected. A lot tougher than my programming classes at the university even... A lot tougher than actual programming with assembler. Not because of math or logic stuff. Simply because of so many tools and options and paths to memorize. I guess if you have work experience in Linux for a couple of years it's a lot easier though.  Anyways I got some great "learnings" and learning techniques implemented which should help me now with the second part.

In the NEWS - More Security issues from where I live.

Image
 A gas and energy provider close to where I live got attacked recently. Just because they unknowingly shared stuff publicly they were not supposed to. Using Censys Internet Map, Heise shows in their article that it was easy to access files via HTTP and network share.   https://www.heise.de/news/Stadtwerke-Detmold-nach-IT-Vorfall-offline-11082906.html As a "junior IT guy" who is just following the news about cybersecurity a bit, I am happy there is a need for professional help, obviously, but at the same time, when I read the comments from more advanced members of the community, I am getting afraid about how deeply rooted the problem is, including a false sense of security by government and community. https://www.heise.de/forum/heise-online/Kommentare/IT-Vorfall-Stadtwerke-Detmold-nicht-mehr-erreichbar/Was-will-man-auch-erwarten/posting-45741595/show/ The commenter here says that critical infrastructure is not "critical" enough to be secured properly. The standards a...

A certificate of trust and why I need it

Image
Here’s a cleaned, tighter version that keeps your voice—direct, first-person, no fluff. As I mentioned, I’m currently involved with a company called Helferline and I was also in contact with the Red Cross. Both asked me for a Führungszeugnis —so I got one. Given the current state of society and my experience with different companies in various ways, I’ve been thinking about implementing a kind of Zero Trust mindset in life.  Zero trust means "never trust (nobody, even myself), always verify". That means I want some verification that I can be trusted...as a person.  With that certificate, I’m adding a new “security layer.” In networking/security terms, you’d call this: Certificate-based authentication (and authorization) , built on a Public Key Infrastructure (PKI) . If both sides verify each other with certificates (client and server), that’s mutual TLS (mTLS) . This is my way to show you that I can be trusted and my record is clean. Now—do you have something simi...