Docker’s network_mode: host is a powerful feature on Linux. But if you’re running Docker on macOS or Windows, its behavior can be surprising. This article breaks down how host networking works across operating systems, when to use it, and what your alternatives are.
If you are looking for affordable cloud servers with excellent performance and reliability, Hetzner Cloud is one of the best options available in 2025. I have personally been using Hetzner for more than 17 years, and it remains my go-to provider for all types of hosting needs — from small projects to production workloads.
Looking for a faster, safer, and more private way to browse the web? Meet NextDNS, the modern DNS service designed to give you full control over your internet traffic. Whether you care about privacy, ad blocking, or parental controls, NextDNS is a game-changer compared to traditional DNS providers like Google or your ISP.
Looking to upgrade your system from Debian 12 Bookworm to the latest Debian 13 Trixie? This step-by-step tutorial will guide you through a safe and efficient upgrade process. Perfect for servers and desktop environments, this guide ensures minimal downtime and maximum system stability.
At the end of the post, we are providing you with a script that does the heavy lifting for you.
If you no longer need Docker on your Debian system, here’s how to fully remove Docker and its related components, including docker-compose. Follow these steps for a thorough cleanup:
OK, DevOps teams love Papertrail for its “frustration‑free log management”: within seconds, all your application, server and router logs stream into a real‑time interface.But as volumes explode and compliance requirements (GDPR, ISO 27001, ANSSI) tighten, many organisations look for an alternative that is more sovereign, more flexible and—above all—more predictable on cost. That’s exactly what LogCentral.io delivers.
If you’re managed Macs and they’ve started to display a “Required Data Notice” popup all the time, a setting in your MDM is upsetting Microsoft AutoUpdate.
When using Windows 10/11, Windows Plug & Play drivers can automatically install applications (unsecured, dangerous or both) on your computer. This is a feature called Co Installers.
Need local admin and have physical access? – Plug a Razer mouse (or the dongle) – Windows Update will download and execute RazerInstaller as SYSTEM – Abuse elevated Explorer to open Powershell with Shift+Right click
At BoucheCousue, we offer managed services to our customers and our therefore looking to reduce any surface of attack on the machines being used by end users.
How to block CoInstallers?
You can manually edit your registry by adding or changing a key in
# Registry Detection Template If (!(Test-Path $regkey)) { Write-Output 'RegKey not available - remediate' Exit 1 }
$check=(Get-ItemProperty -path $regkey -name $name -ErrorAction SilentlyContinue).$name if ($check -eq $value){ write-output 'setting ok - no remediation required' Exit 0 } Else { write-output 'value not ok, no value or could not read - go and remediate' Exit 1 }
And the remediation one:
## DetectCoInstallers - BoucheCousue ## Remediation script for Intune Remediation