Categories
Informatique

Docker Host Networking Explained: Differences on Linux, macOS, and Windows

Docker’s network_mode: host is a powerful feature on Linux. But if you’re running Docker on macOS or Windows, its behavior can be surprising. This article breaks down how host networking works across operating systems, when to use it, and what your alternatives are.

Categories
Informatique IT

Hetzner Cloud: Affordable, Fast and Reliable Cloud Hosting in Europe

If you are looking for affordable cloud servers with excellent performance and reliability, Hetzner Cloud is one of the best options available in 2025. I have personally been using Hetzner for more than 17 years, and it remains my go-to provider for all types of hosting needs — from small projects to production workloads.

By signing up with this link 👉 you’ll even get free credits to try Hetzner Cloud with no risk.

Categories
Informatique

NextDNS review, best DNS for privacy, DNS ad blocker, secure DNS, DNS over HTTPS

Looking for a faster, safer, and more private way to browse the web? Meet NextDNS, the modern DNS service designed to give you full control over your internet traffic. Whether you care about privacy, ad blocking, or parental controls, NextDNS is a game-changer compared to traditional DNS providers like Google or your ISP.

Categories
Informatique

Disabling Google Chrome’s internal DNS client

Google Chrome comes with its own DNS client that can sometimes override the DNS server you have specified at the system level.

For example, if you are using a service like NextDNS, you might notice this behavior. So how can you disable it?

Categories
Informatique

How to Upgrade Debian 12 to Debian 13 (Trixie) – Step-by-Step Guide

Looking to upgrade your system from Debian 12 Bookworm to the latest Debian 13 Trixie? This step-by-step tutorial will guide you through a safe and efficient upgrade process. Perfect for servers and desktop environments, this guide ensures minimal downtime and maximum system stability.

At the end of the post, we are providing you with a script that does the heavy lifting for you.

Categories
Informatique

Cloudflared Docker: getting the health status to work

This guide explains how to use the Docker container of cloudflare/cloudflared:latest with a functioning healthcheck via the metrics & ready endpoints.

The Cloudflared docker image can help you bring secure connectivity to other parts of your Docker setup.

Categories
Informatique

Uninstalling Docker completely from Debian

How to Uninstall Docker Completely from Debian

If you no longer need Docker on your Debian system, here’s how to fully remove Docker and its related components, including docker-compose. Follow these steps for a thorough cleanup:

Categories
Informatique

LogCentral , a great european alternative to Papertrail

OK, DevOps teams love Papertrail for its “frustration‑free log management”: within seconds, all your application, server and router logs stream into a real‑time interface.
Categories
Informatique

Microsoft AutoUpdate – Required Data Notice

If you’re managed Macs and they’ve started to display a “Required Data Notice” popup all the time, a setting in your MDM is upsetting Microsoft AutoUpdate.

Categories
Informatique IT

Blocking Co-Installers in Windows with Intune Remediations

When using Windows 10/11, Windows Plug & Play drivers can automatically install applications (unsecured, dangerous or both) on your computer. This is a feature called Co Installers.

This – initially convenient – behaviour can be undesirable for most of us. For example a bug in Razer’s Synapse software allowed standard users to gain admin access to the machines.

At BoucheCousue, we offer managed services to our customers and our therefore looking to reduce any surface of attack on the machines being used by end users.

How to block CoInstallers?

You can manually edit your registry by adding or changing a key in

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionDevice Installer 

Modify or create the value DisableCoInstallers as a DWORD-32 with a value of 1

Source: BleepingComputer

How to block CoInstallers using Intune Remediations

For Intune, you can use Remediation Scripts to change registry settings automatically.

Here is the detection script to upload:

## DetectCoInstallers - BoucheCousue
## Detection script for Intune Remediation

# Parameters
$regkey="HKLM:SOFTWAREMicrosoftWindowsCurrentVersionDevice Installer"
$name="DisableCoInstallers"
$value=1

# Registry Detection Template
If (!(Test-Path $regkey))
{
Write-Output 'RegKey not available - remediate'
Exit 1
}

$check=(Get-ItemProperty -path $regkey -name $name -ErrorAction SilentlyContinue).$name
if ($check -eq $value){
write-output 'setting ok - no remediation required'
Exit 0
} Else {
write-output 'value not ok, no value or could not read - go and remediate'
Exit 1
}

And the remediation one:

## DetectCoInstallers - BoucheCousue
## Remediation script for Intune Remediation

# Parameters
$regkey="HKLM:SOFTWAREMicrosoftWindowsCurrentVersionDevice Installer"
$name="DisableCoInstallers"
$value=1

#Registry Template
If (!(Test-Path $regkey))
{
New-Item -Path $regkey -ErrorAction stop
}

if (!(Get-ItemProperty -Path $regkey -Name $name -ErrorAction SilentlyContinue))
{
New-ItemProperty -Path $regkey -Name $name -Value $value -PropertyType DWORD -ErrorAction stop
write-output "remediation complete"
exit 0
}

set-ItemProperty -Path $regkey -Name $name -Value $value -ErrorAction stop
write-output "remediation complete"
exit 0

Base script by MikeMDM, customized for the needs of this registry key.

Thanks: Big up to Mattias Melkersen for bringing up this topic on X and to Nathan McNulty for sharing the fix that Will Dormann offered.