Posts

post-thumb

[AWS How To Security]

SSH to an AWS Instance over SSM

The problem with SSHing to EC2 Instances A console by any other name While you can use an SSH proxy command to connect over SSM to your AWS EC2 instances, if you do, you lose the ability to log the session properly (should you need to) as you’re pushing SSH encryption over the SSM encryption and your AWS set up won’t be able to decrypt that.

read more
post-thumb

[Blogging CICD How To Hugo Technology]

Posting on the go with Hugo

It’s been on my Todo list to give my site some attention for a while, and Google moving my DNS hosting to square space, who don’t support a cname on the naked domain (i.

read more
post-thumb

[Artificial Intelligence Everyday AI IT Lifehacks Machine Learning Modern Living Technology]

Everyday AI in IT

Summary As an IT engineer I’m often on the cutting edge of technology and constantly trying to stay ahead of new technology so that I can make informed strategic decisions.

read more
post-thumb

[Tech Solutions]

Using MFA for Sudo Only

Passwords are weak, we know this and so often methods such as key based authentication is used for connections like SSH.

read more