This is part of a blog post I wrote: https://debugging.works/blog/tpm-explained/
- I use it on Arch Linux (systemd 257.3-1)
- Install dependency:
yay tpm2-tools(5.7-1)
| You are ChatGPT, a large language model based on the GPT-5 model and trained by OpenAI. | |
| Knowledge cutoff: 2024-06 | |
| Current date: 2025-08-08 | |
| Image input capabilities: Enabled | |
| Personality: v2 | |
| Do not reproduce song lyrics or any other copyrighted material, even if asked. | |
| You're an insightful, encouraging assistant who combines meticulous clarity with genuine enthusiasm and gentle humor. | |
| Supportive thoroughness: Patiently explain complex topics clearly and comprehensively. | |
| Lighthearted interactions: Maintain friendly tone with subtle humor and warmth. |
This is part of a blog post I wrote: https://debugging.works/blog/tpm-explained/
yay tpm2-tools (5.7-1)A step-by-step guide to setting up Model Context Protocol (MCP) servers for Claude Desktop on Windows.
node --version
npm --versionYou want to:
This guide covers two tools to help with the above:
| # Source: https://gist.github.com/baaf4adb25e9efaba886c17a2ad722a5 | |
| ######################################################## | |
| # How To Auto-Scale Kubernetes Clusters With Karpenter # | |
| # https://youtu.be/C-2v7HT-uSA # | |
| ######################################################## | |
| # Referenced videos: | |
| # - Karpenter: https://karpenter.sh | |
| # - GKE Autopilot - Fully Managed Kubernetes Service From Google: https://youtu.be/Zztufl4mFQ4 |
| # log4j jndi exploit CVE-2021-44228 filter | |
| # Save this file as /etc/fail2ban/filter.d/log4j-jndi.conf | |
| # then copy and uncomment the [log4j-jndi] section | |
| # to /etc/fail2ban/jail.local | |
| # | |
| # [email protected] | |
| # https://jay.gooby.org/2021/12/13/a-fail2ban-filter-for-the-log4j-cve-2021-44228 | |
| # https://gist.github.com/jaygooby/3502143639e09bb694e9c0f3c6203949 | |
| # Thanks to https://gist.github.com/kocour for a better regex | |
| # |
| To rename WSL Distros on Windows follow the steps: | |
| 1. Stop all instances of WSL | |
| On PowerShell run the command: wsl --shutdown | |
| 2. Open Registry Editor and go to HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Lxss | |
| Each subfolder on Lxss represents a distro | |
| 3. Locate and rename the distro you want | |
| Inside each distro folder you have the DistributionName, change it and click ok |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log| Assuming you have followed all the steps to install / setup WSL2 -> https://docs.microsoft.com/en-us/windows/wsl/install-win10 | |
| **Tested on Ubuntu 20.04** | |
| Step 1 - Find out default gateway and DNS servers | |
| - Navigate to `Control Panel\Network and Internet\Network Connections` | |
| - Right click on relevant connection type WiFi or Ethernet and select `Status` | |
| - Status screen will be displayed, click on `Details` button | |
| - Network Connection details screen will be displayed | |
| - Note down `IPv4 default gateway` and `IPv4 DNS Servers` if available |