Learn Free software with me!

Student projects: PhisSticks BadUSB simulation (video) Cryptocurrency mining dashboard; Analysing software radio with machine learning; student tag; course projects.

Popular docs: Calendar.txt (HN #1), Install Debian on Virtualbox, Command Line Basics Revisited, Micro editor plugins, Kanasirja offline reference, Cracking passwords with Hashcat, Install WebGoat 8 - Learn Web Pentesting, Crack file password with John, Fuzz URLs to find hidden directories, Translate Offline with AI. Tero's books on Amazon, over 500k sold.

Haaga-Helia offers 25 credits of offensive security courses + 15 credit thesis. And that's just for the offensive side...

Courses 2025p1 early autum. Completed. Linux Palvelimet (Linux Servers), Information Security, Tunkeutumistestaus (penetration testing), Sovellusten hakkerointi ja haavoittuvuudet (application hacking / reverse engineering).

Course 2025p2 late autumn. Ongoing. Palvelinten Hallinta (infra as code, configuration management), Verkkoon tunkeutuminen ja tiedustelu (Network Attacks and Reconnaissance), Cyber Security (Masters).

Courses 2026 early autumn. Enroll in Peppi 2025-11-26 w48 Wed 08:00: Application Hacking and Vulnerabilities (once in English!), Sovellusten hakkerointi ja haavoittuvuudet, Information Security, ICT Infrastructure project (AD hacking, malware keyboard, SDR AI analysis...).

Passwordless Sudo with Ansible

Passwordless Sudo with Ansible

Sudo without password, automatically. Short example role for ansible.

The role

  • creates a new user in "sudoless" group
  • adds a sudoers.d/ NOPASSWD rule for the group
Sudo without password

Sudo without password

Ansible needs root on the slave. One way is to allow 'sudo' without password.

Summary for gurus (the rest of us can read the article):

$ cat /etc/sudoers.d/sudoless
%sudoless ALL = (ALL) NOPASSWD: ALL
DORA & Threat Lead Penetration Testing with Marko

DORA & Threat Lead Penetration Testing with Marko

Banks are now required to do red teaming exercises. Marko Buuri (Bank of Finland) showed us how TIBER-FI helps to create threat intel based red teaming exercises.

Marko's visit was part of my Penetration Testing course. You can join my list to get invitations to similar events.

SSH public key - Login without password

SSH public key - Login without password

SSH is the leading solution for securily logging into servers.

Many products use SSH in the background: git, rsync, ansible...

Public key authentication is quite convenient. You don't need to type your password for every 'git push' or 'ansible-playbook'. Use correctly, it can also make your server more secure.

Hello Ansible

Hello Ansible

Write infrastructure-as-code, control multiple machines easily.

In this Ansible tutorial, we create a single file in /tmp/.

Palvelinten Hallinta

Palvelinten Hallinta

Control 10, 100, 1000 many computers.

Or control 2071 computers, like Jussi did on a earlier course. Or handle 7 different operating systems and OS versions with a single master, like Matias.

Best instance got 5.0 / 5 feedback - all respondents gave the best grade 5.

Tunkeutumistestaus

Tunkeutumistestaus

Learn to hack computers to protect your own. In the course, you will break into target computers.

Excellent feedback, reached 5.0 out of 5.


View all 2025 posts, total 12 posts.

View all 2024 posts, total 16 posts.

View all 2023 posts, total 23 posts.

View all 2022 posts, total 24 posts.

View all 2021 posts, total 40 posts.

View all 2020 posts, total 24 posts.

Visit old site 1998-2019 with 580+ posts and 3900+ comments.