TheJoe.it
  • Policy
    • Cookie PolicyWhat you are visiting is not a commercial site and the articles published in this blog does not contain any form of advertising, even targeted. I firmly believe in the open source philosophy, and I write my articles to help the Internet community to grow for free. My real contribution is the direct payment of the domain and the web space on which it is hosted on this site, also contribute with my items, I write for the good of the community and for which I do not receive any compensation. For this reason I give up right away to the inclusion of my articles on other sites they can develop a financial return (per se or other) the inclusion of these items. Are otherwise conducive to exchanging links, Pingback, or any other form of sharing remains free as long as free, no gain or for me, or for other others. Precise also confirm that this blog can not be called news organization for the purpose of the recent laws and decree-laws now in force.
    • Privacy policy
  • Portfolio
    • Projects
  • Preventive
  • Contacts
  • Portfolio

Security

GNU/Linux

Btrfs party 1: practical guide to data survival

If you run a Linux server or workstation, the file system is not just a place where “park” file, but your first line of defense against data corruption. Today we talk about Btrfs, un file system copy-on-write (CoW) which offers native tools to manage integrity and redundancy. Read more

By TheJoe, 22 hours11 May 2026 ago
Updates

How I was (almost) cheated: the new smartphone was about to cost me dearly

My trusty companion on a thousand digital adventures, a Huawei P30 Pro purchased seven years ago now, has officially reached the end of the line. The drums are struggling, the software hasn't received updates in forever and, although the camera still does its job, overall performance is starting to show signs Read more

By TheJoe, 2 weeks27 April 2026 ago
GNU/Linux

Reverse Engineering of an IP Cam (Part 2): Freeing an old cam from the Chinese Cloud

Posted on 21 January 2026 You know those IoT devices (video intercoms, cameras, sensors) which suddenly become useless because the official app disappears from the stores or the cloud servers in China are turned off, transforming the device into a useless and expensive paperweight? It happened to me with an Unotec based IP Cam Read more

By TheJoe, 3 months16 February 2026 ago
GNU/Linux

Reverse Engineering of an IP Cam (Part 1): Extract the Firmware and its Secrets

It all started with a mystery (and very economical) IP surveillance camera from Unotec. Without documentation and without access to the web interface, the only way to understand how it worked was “get inside”. In this first part, we'll see how I managed to download the internal configuration and decode the file Read more

By TheJoe, 3 months9 February 2026 ago
GNU/Linux

SSH Knock: Safe access with Port Knocking

When we talk about safety in remote access via SSH, One of the least known but potentially useful methods is SSH Knock, based on the Port Knocking technique. The idea is simple: Instead of leaving the ssh door (typically the 22) always open and visible, It is kept closed and opens it Read more

By TheJoe, 9 months18 August 2025 ago
GNU/Linux

Understanding permits in Linux: what they mean 777, 755, 775 and 644

If you have ever worked with a Linux server or install a software, You will probably have met commands like Chmod 755 of chodd 777. But what these numbers really mean? And how they influence access to files? Basic permits in Linux, Each file or folder has Read more

By TheJoe, 9 months11 August 2025 ago
GNU/Linux

Send the shutdown command via the power button

Today we see how to shut down a computer with Debian physically without launching the “poweroff” command line or GUI interaction. Enabling this function can be useful if we are operating on a headless server (a home server for example) to which no peripherals are connected. Without having to connect in SSH Read more

By TheJoe, 3 years22 June 2023 ago
GNU/Linux

SSH authentication with keys

The SSH protocol (Secure SHell) is an encrypted protocol used to establish secure connections between two machines: customer e server. By itself it's already a pretty secure protocol, but with SSH keys you can close SSH access to only specific machines. Here's how. In this mini-guide we will see how Read more

By TheJoe, 3 years1 January 2023 ago
Networking

VNC over SSH for secure connections

Today we see how to control a remote machine via gui with VNC through a secure SSH tunnel. For the uninitiated, in a nutshell, VNC (Virtual Network Computing) is a remote display system that allows you to see an environment “desktop” (GUI) running not only on the machine on which Read more

By TheJoe, 3 years28 December 2022 ago
Networking

Configurare VPN su FRITZ!Box (various models)

In this article we will deal with creating a VPN connection via a PC with Linux and a FRITZ!Box 4020. The instructions in this guide also apply to other FRITZ routers!Box then if the 4020 it is not your model however try to follow the guide, passages often Read more

By TheJoe, 4 years30 October 2022 ago

Posts pagination

1 2 … 5 Next
Speak easy!
EnglishItalianoFrançaisDeutschРусский
Policy.. in few words

TheJoe.it is a blog that deals with IT and Graphics, but it is not a journal as it is updated without any periodicity. TheJoe.it therefore can not be considered an editorial product under Law No.. 62 the 7.03.2001. TheJoe.it is subject to license Creative Commons Noncommercial Sampling Plus 1.0 License. To learn more, please read the page Blog Policy

Legal
Privacy Policy
Contacts

    Navigation
    • Policy
      • Cookie Policy
      • Privacy policy
    • Portfolio
      • Projects
    • Preventive
    • Contacts
    • Portfolio
    logo
  • Creation / Maintenance websites
  • Creating revision logo / brand name
  • SEO
  • Photo Editing
  • creating flyers, brochure, etc..



  • Hestia | Developed by ThemeIsle