Mount drives In Debian and Ubuntu

What does it means?

When we connect to our machine a drive we are used to see it immediately and to be able to access to it as it is plugged in.

Well this concept doesn’t work on every machines. If we have a server running and more often without graphical interface, for example, this is not going to happen on it’s own.

We have to run some commands before we can read this drive.
Lets see together how to do it.

NOTE: The content of this article doesn’t apply on drives whit NTFS file system.

Discover the connected drives

Firs we got to know the drives connected to our system and the name the system assigned them.

Keep on reading!

Project “Villa”, home automation from Tuya devices

Hello readers,

this time I want to talk with you about a project I’m following for a friend of mine. He have a villa which he recently restructured and he basically started with the electricians to implement in his house this new kind of controllers for lights and curtains.

The system is easy to configure but the problem he had was the fact that the curtain controller was not compatible with the curtains motors he installed.
Basically the controllers was meant to work with a 3 wires motors but the motors are meant to be controlled with RF remote.

What are we using?

The controller is branded Jinvoo and inside is controlled by an ENC8266 on which runs a firmware owned from Tuya.
This controller is installed in a wall-mount and is meant to control a motor through 3 wires. Through this cables he is able to tell the motor in which direction he have to spin and the controller can read the current absorption to learn and check in which position is the roll-up curtain.

Keep on reading!

Secure SSH: basics for your security

Here we are again after my last security post about disabling root account on Ubuntu / Debian. This time I will bring you how I chose to implement some security best practice with OpenSSH on some machines I run with Linux based OS like Ubuntu, but works even with other Debian based distro.

In this guide I will try to explain how to secure a machine service widely used called OpenSSH from malicious attacks. They are usually performed using some vulnerabilities of a non proper configured system leaving your server or pc available to possible hacks.

What is OpenSSH?

OpenSSH or more simply ssh (secure socket shell) is a service hosted by a machine (server or host) which allow another PC (client) to connect to its shell.

Keep on reading!