How to Rename Macs Automatically With Jamf

I wanted to create a better naming scheme than only serial number or generic “Mati’s Mac”. More convenient is to rename computers with their owner’s and computer model’s name. Why? Because when you’re looking reports from your deployments or what ever, you can tell straight away what you are dealing with.

Continue reading

Automated test and deployment pipeline


Creating workflow that automates testing and deployment. Key components are Docker, Git, Travis-CI and Elastic Beanstalk on AWS.

Purpose of creating workflows such as this is to make repetitive testing and deployments easy as possible, minimize use of time and possibility to human error. What could go wrong if software tests and go-live deployments are done by computers?


Description automatically generated
I learned this flow from Stephen Grider in his course:
Continue reading

Project for Information Security Course: Clientless SSL VPN Connection

SSL Clientless VPN works as a secured tunnel from client to company’s LAN.


ciscoasa(config)#username matias password matiasrichterich
ciscoasa(config)#group-policy vpn internal
ciscoasa(config)#group-policy vpn attributes
ciscoasa(config-group-policy)#vpn-tunnel-protocol ssl-clientless
ciscoasa(config-group-webvpn)#url-list value Server4
ciscoasa(config-group-webvpn)#tunnel-group matiasvpn type remote-access
ciscoasa(config)#tunnel-group matiasvpn general-attributes
ciscoasa(config-tunnel-general)#default-group-policy vpn
ciscoasa(config-tunnel-general)#username matias attributes
ciscoasa(config-username)#vpn-group-policy vpn
ciscoasa(config-webvpn)#enable outside

Project for Information Security Course: Connecting Devices and Configuring DHCP server


Getting started

I thought that it would be important first step to plan the addressing scheme. I segmented every department in their own VLAN and every VLAN has it’s own host range. For getting known a little better with subnetting math, I didn’t assign easiest /24 bit masks for every subnet. For sake of complexity and training, subnets has /25, /26 or /30 bit long masks. Continue reading