<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0"  >
<channel>
  <title>Vincent's blog</title>
  <link>http://www.vicentdelft.be/rss</link>
  <description>Vincent's ideas</description>
  <lastBuildDate>Sun, 08 Mar 2026 18:11:00 +0100</lastBuildDate>
  
   <item>
      <pubDate>Sun, 08 Mar 2026 18:11:00 +0100</pubDate>
      <link>http://www.vincentdelft.be/post/post_20260308</link> 
      <guid>http://www.vincentdelft.be/post/post_20260308</guid> 
      <title>Thanks to log2table I'm able to secure my servers</title>
      <description>
![Generated by AI](/static/post/post_20260308/log2table.png "Generated by AI")
As for each server on internet, I receive lot of bad requests. Thanks to a continuous check on different log files, I'm able to automatically add bad IPs in the pf firewall (OpenBSD). 
This blog will explain how I've setup log2table and how I treat those bad IPs

</description>
   </item>
   
   <item>
      <pubDate>Fri, 13 Jul 2018 12:42:00 +0100</pubDate>
      <link>http://www.vincentdelft.be/post/post_20180713</link> 
      <guid>http://www.vincentdelft.be/post/post_20180713</guid> 
      <title>Hardening your openbsd machine.</title>
      <description>
You have selected OpenBSD because this is one of the most secured OS (maybe the most secured :-) ), but people around you ask to go further. 
Your current machine is directly facing internet and some people fear that this machine could be compromised. In this blog I will explain what I did to secure one of my machine. 

</description>
   </item>
   
   <item>
      <pubDate>Sat, 27 May 2017 20:41:00 +0100</pubDate>
      <link>http://www.vincentdelft.be/post/post_20170517</link> 
      <guid>http://www.vincentdelft.be/post/post_20170517</guid> 
      <title>Log2table to protect your machines from intrusions</title>
      <description>
Log2table allows you to continuously monitor your logfiles. You can trigger actions when a specific message comes in your audited logfiles or when a specific number of occurrences are present. 
</description>
   </item>
   
   <item>
      <pubDate>Sun, 06 Nov 2016 17:04:00 +0100</pubDate>
      <link>http://www.vincentdelft.be/post/post_20161106</link> 
      <guid>http://www.vincentdelft.be/post/post_20161106</guid> 
      <title>Block bad visitors with PF</title>
      <description>
Those days, when you fire-up a new machine, it takes few hours that bad persons are trying to connect to your machine via ssh, try default URL with default passwords, ... 

This post will explain how OpenBSD can easily helps you to ban those persons out of your machine for quite a long time. 

</description>
   </item>
   
   <item>
      <pubDate>Thu, 14 Jul 2016 15:25:00 +0100</pubDate>
      <link>http://www.vincentdelft.be/post/post_20160714</link> 
      <guid>http://www.vincentdelft.be/post/post_20160714</guid> 
      <title>How I've tuned OpenBSD to become my house's firewall</title>
      <description>
In this post I'll explain what I did to filter the internet access in my house. 
You will see that the access is based on simple rules and is not the same for every users. 
</description>
   </item>
   
   <item>
      <pubDate>Tue, 12 Jul 2016 12:06:00 +0100</pubDate>
      <link>http://www.vincentdelft.be/post/post_20160712</link> 
      <guid>http://www.vincentdelft.be/post/post_20160712</guid> 
      <title>Build a Read only system with OpenBSD</title>
      <description>
When you have machines that must run 24x7, you must take into account the problem of powercut. 
To my eyes there is 2 possible solutions:

- use an UPS
- have a readonly operating system

In this post, I'll describe how you can easily transform your OpenBSD machine into a Read-only system. 
</description>
   </item>
   
  </channel>
</rss>