Links
Add
Sandbox your applications with Firejail – Own your bits
https://ownyourbits.com/2017/10/29/sandbox-your-applications-with-firejail/
Added 8 years ago
DNS-Lookup - The Professional DNS Lookup Tool
https://dns-lookup.com/kurthbemis.com
DNS-Lookup is an online tool that will find the IP address and perform a deep DNS lookup of any URL, providing in-depth details on common record types.
Added 8 years ago
GitHub - Alfredredbird/tookie-osint: Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
https://github.com/Alfredredbird/tookie-osint
Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input. Tookie-osint is similar to the tool called Sherlock. It discovers all the user accounts across different websites and Tookie-osint is successful at this task almost 80% of the time. Our tool was created by me and the community and is available for your use. I do not take responsibility for any malicious actions and/or responsibility caused by my tool. :( Please note that Tookie-osint was created to help new programmers or pentesters get into the world of OSINT. My end term goal is to make Tookie-osint as perfect as I can and make it easy for new programmers to understand. Also take note that Tookie-osint is optimized for Python 3.12. If you want to contribute, make a fork and make a pull request to submit your changes. :D
Added 8 months ago
Memory Tecnology Device (MTD) - DAVE Developer's Wiki
http://wiki.dave.eu/index.php/Memory_Tecnology_Device_(MTD)
Added 10 years ago
Convert from 512 byte blocks to Megabyes and Gigabytes
https://www.tachytelic.net/2014/03/posix-size-converter/
Added 7 years ago
Script to download apk file from Google Play a.k.a Android Market. · GitHub
https://gist.github.com/arulrajnet/d50d0e81eaa354297347
Script to download apk file from Google Play a.k.a Android Market. - apkdl.sh
Added 7 years ago
Kleen Laundry? - YouTube
https://www.youtube.com/watch?v=43BlUbYwSuk&feature=youtu.be
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 9 years ago
AutoSetOwnerForQueue - Request Tracker Wiki
https://rt-wiki.bestpractical.com/wiki/AutoSetOwnerForQueue
Added 6 years ago
50 Open Source Tools To Replace Popular Security Software - Datamation
http://www.datamation.com/osrc/article.php/3882711/50-Open-Source-Tools-To-Replace-Popular-Security-Software.htm
While it's pretty painless to convert from commercial office software to an open source version, if you'd like to replace commercial security products
Added 10 years ago
Block с.новым.годом.рф / Referral Spam in Google Analytics - HowToRemove.Guide
http://howtoremove.guide/block-%D1%81-%D0%BD%D0%BE%D0%B2%D1%8B%D0%BC-%D0%B3%D0%BE%D0%B4%D0%BE%D0%BC-%D1%80%D1%84-referral-spam-google-analytics/
Added 9 years ago
FAQ · spacehuhn/esp8266_deauther Wiki · GitHub
https://github.com/spacehuhn/esp8266_deauther/wiki/FAQ
Affordable WiFi hacking platform for testing and learning - FAQ · SpacehuhnTech/esp8266_deauther Wiki
Added 7 years ago
Feature #2718: Config option to use https://secure.gravatar.com - Redmine
https://www.redmine.org/issues/2718
Redmine
Added 9 years ago
Asterisk LiveScreen using Python and AMI – Sagar Borse – Medium
https://medium.com/@sagarborse90/asterisk-livescreen-using-python-and-ami-ba0447071676
Added 6 years ago
The Sandbox | Understanding CyberForensics
http://cwsandbox.org/
We need to get some definitions out of the way so we all know what we are talking about. WHAT IS A SANDBOX: A "sandbox", as it relates to computer security, is a designated, separate and restricted environment (or "container", with tight control and permissions, where computer code can run without the ability to cause damage or infection. Just like in a real playground where children can play in the sandbox -- but are not allowed to play anywhere outside of the sand box. And the box around the "sand box" is designed to keep the sand in and not make a mess all around. At that moment, the sandbox is their "virtual world". WHAT IS VIRTUALIZATION and VIRTUAL MACHINES / VIRTUAL WORLD: "Virtualization" provides a separate environment within a computer that can function independently from all other environments on the computer. One virtual container cannot change or modify another virtual container. A "sandbox" and a "virtual machine" are not the same. When you run an application in a sandbox, it has access to run as if it were not in a sandbox. Anything the application attempts to create or change, however, is lost (or NOT saved) when the application stops running. In a "virtual machine", anything created or changed by the application is allowed, and everything that happens stay within the virtual machine. Similar to the "Las Vegas" theory; "What happens in Las Vegas stays in Las Vegas". Once testing is completed, the virtual machine in use can be deleted without concern for anything that was done to it by the running of the questionable application. WHAT IS A HONEYPOT? As it relates to computer security, a "honeypot" is typically a computer, network or a data system that appears to be part of a larger system, but is actually a controlled, standalone "bait" vehicle, designed to attract those wanting to infect and abuse. If you watch US television, you will most likely be familiar with the police action show "Bait Car". The difference being that the criminals get caught immediately in the tv show. Real life "honeypots" don't necessary lead to that same outcome. There are different types of "honey pots". For years, anti-spam companies "baited" forums, and web sites, and Usenet, and every source they could find, with email addresses in order to received spam. The spam received researched to identify where the spam comes from as well as other general patterns. The type of honeypot we utilize in this discussion applies to the collection, research, identification and analysis of "MalWare". Virus prevention software can't act on infections until it is taught about specific threats and Malware. WHAT IS MALWARE: "Malware" is a shortened form of "malicious software". Malicious software is used to gain control of your computer, allowing the malware creator to do whatever he wants. The ultimate goal of gaining control is to disrupt the normal operations of the target; obtain sensitive or secret information; or gain access to private computer networks and system for other purposes. Malware includes Trojans, viruses, ransom ware, spy ware, and yes, adware! In order for "malware" to be caught, classified, added to virus protection software, etc., it has to be "caught". So the web is full of "spider webs for malware", or "honeypots"! Honeypot creation can be as simple as placing an old computer (or server that is too old or too slow for any valid purpose), install honeypot software, and connect it to the network. (Honeypot software is available as an open source product by the way). It won't take long before your system sees malicious activity, as hackers begin scanning for weaknesses, and attempting to break in. In a test this year, a security blogger leased server space in various countries and created honeypots. Within five minutes of being active, some of the machines had already been "hit" or scanned more than nineteen times! These were unknown machines, without any public awareness of their name, location, or status. The number of hacking attempts increased exponentially over the next few days! Once hackers gain access to our system, they spend time looking around, searching for anything they can find. Since these systems are honeypots, they won't find anything. The next step is for the hacker to upload his malware to our system. At this point, the hacker will attempt to run his malware, but our system ignores him, and eventually he moves on or uploads other malware. Either way we have now harvested copies of malware being used in real-life. SO WHERE DOES THE SANDBOX FIT IT? Honeypots are equipped with a "sandbox" in order to contain and prevent the code or malware from wreaking havoc. Sandboxes are also used to analyze and learn about the specific malware threat. From a press release dated November 19, 2013, "Threat Track" (which is the new name for "CWSandbox"), bills itself as the complete "malware analysis solution". To maintain congruity, we will continue to refer to "Threat Track" and "CWSandbox" simply as the "sandbox". The main job of the sandbox is to enable "users to automate the sample submission process; completely analyze any threat; and quickly act to protect sensitive data". Once the sandbox gets the malware, it is able to analyze and evaluate the actions and processes of the malicious software. This allows system administrators to evaluate the potential exposure of their networks and take the appropriate action to secure against the latest threats. Although malware authors are trying to stay ahead of sandbox technology, sandbox has managed to implement new features and controls that mimic the actions required by the malware. For example, some malware "stalls" or as kids like to say, "plays possum", waiting for a period of time to pass or a particular action to occur – such as a system reboot. As part of the analysis, sandbox mimics a system reboot and then looks to see how the malware responds to the fake reboot. Need more proof? The Federal Bureau of Investigation (FBI) bid on the public market looking to use sandbox on "any machine owned or controlled by the FBI". The knew the value of the software. One final comment about why we need sandbox. "Automated malware must be analyzed (1) automatically, (2) effectively, and (3) correctly. … This is important to realistically assess the threat posed by the malware sample." For more information, go to http://www.threattracksecurity.com/
Added 10 years ago
Linus Said - Music Parody (Momma Said) - YouTube
https://www.youtube.com/watch?v=oHNKTlz1lps
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 7 years ago
IPsec/IKEv2 between Cisco CSR 1000v and OpenIKED | NetFlask
https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/
Added 7 years ago
Building a Managed Service Provider Business With Open Source - DEV Community
https://dev.to/schalkneethling/building-a-managed-service-provider-business-with-open-source-1olk
Let's start by answering the question you may have off the bat. What is a Managed Service Provider?... Tagged with opensource, tools.
Homemade Roku Remote Uses Roku External Control API & HUZZAH ESP8266 « Adafruit Industries – Makers, hackers, artists, designers and engineers!
https://blog.adafruit.com/2018/09/29/homemade-roku-remote-uses-roku-external-control-api-huzzah-esp8266/
lessons learned about TRIM
http://www.tedunangst.com/flak/post/lessons-learned-about-TRIM
Added 11 years ago
10 Things Insanely Healthy People Do Before 9 A.M.
http://www.huffingtonpost.com/2015/12/01/healthy-people-morning_n_8401840.html
10 Things Insanely Healthy People Do Before 9 A.M.
Added 9 years ago
MTBF/FIT for device reliability & high service availability - Teldat
https://www.teldat.com/blog/mtbf-fit-device-reliability-service-availability/
Improve device reliability and offer higher service availability by duplicating parallel power supplies. Understand concepts and corresponding mathetical formaluas
Added 4 months ago
Run ffmpeg multiple commands - Stack Overflow
https://stackoverflow.com/questions/33963263/run-ffmpeg-multiple-commands?utm_medium=organic&utm_source=google_rich_qa&utm_campaign=google_rich_qa
Added 7 years ago
Robert Hunter very rare interview raw footage - Ripley's Philadelphia PA 4/30/81 Grateful Dead - YouTube
https://www.youtube.com/watch?v=DCu7rjbwqK4
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Signal to noise - wrapping custom scripts for errors // Garthwaite.org // Salient Dev and Salty Ops
https://garthwaite.org/snr-wrapping-custom-cron-scripts.html
Garthwaite.org, Salient Dev and Salty Ops
Broken
Ben Stokes (Tiny Projects💡) (@tinyprojectsdev) / X
https://x.com/tinyprojectsdev
Added 4 months ago
Alpha LLC
https://github.com/alphallc
Alpha LLC has 17 repositories available. Follow their code on GitHub.
Added 9 years ago
Rolling out an API for your cakePHP app Part 1: The Problems | Deadly Technology
http://deadlytechnology.com/php/api-cakephp-app/
Rolling out an API for your cakePHP app Part 1: The Problems
Added 10 years ago
ps/2 to USB adapter converter for keyboards
http://www.clickykeyboards.com/index.cfm/fa/items.main/parentcat/11298/subcatid/0/id/124184
Added 10 years ago
GitHub - mschedrin/librenms-ansible-inventory-plugin: LibreNMS inventory plugin for Ansible
https://github.com/mschedrin/librenms-ansible-inventory-plugin
LibreNMS inventory plugin for Ansible. Contribute to mschedrin/librenms-ansible-inventory-plugin development by creating an account on GitHub.
Hikvision Network Mobile DVR Secures Armored Truck of China Merchants Bank
http://www.hikvision.com/ueditor/net/upload/2015-06-10/57806a32-51c0-4ae4-b937-384098c12dc8.pdf
Added 7 years ago
Support for PowerEdge T130 | Documentation | Dell US
https://www.dell.com/support/home/en-us/product-support/servicetag/0-cVdJSHBEUlVBU3htcFlEVUJ2RFcydz090/docs
The New French Hacker-Artist Underground | WIRED
https://www.wired.com/2012/01/ff_ux/
A mysterious group is prowling the network of tunnels below Paris, secretly refurbishing the city's neglected treasures.
Added 5 years ago
The 46 Best Pens for 2025: Gel, Ballpoint, Rollerball, and Fountain Pens | JetPens
https://www.jetpens.com/blog/The-46-Best-Pens-for-2025-Gel-Ballpoint-Rollerball-and-Fountain-Pens/pt/974
We draw on years of testing to crown the best beginner fountain pen, best gel pen, best pen for note-taking, and more. Each recommendation includes links to related guides so that you can evaluate the competition for yourself.
Added 9 months ago
LLDPd - Know your network neighbors
https://tobru.ch/lldpd-know-your-network-neighbors/
An introduction into LLDP
What is LLDP?
LLDP is a network layer 2 protocol, called "Link Layer Discovery Protocol". It
transmits many information about the device and ports to all
network neighbors. It is vendor independent and specified in IEEE 802.1AB
[http://standards.ieee.org/getieee802/download/802.1AB-2009.
Added 8 months ago
wltechblog/thingino-installers: Files and tools for installing Thingino firmware on different camera modls
https://github.com/wltechblog/thingino-installers
Files and tools for installing Thingino firmware on different camera modls - wltechblog/thingino-installers
Added 3 months ago
The Cypherpunks Mailing List ()
http://comments.gmane.org/gmane.comp.security.cypherpunks/11664
Added 9 years ago
POLYCOM® UC SOFTWARE WARNING
http://support.polycom.com/PolycomService/support/us/support/eula/ucs/UCagreement_4_0_8_C_combined.html
Added 10 years ago
Create new VoIP readiness test
https://voipstatus.startrinity.com/VoipReadinessTestNodes/TestCreate?systemTenantId=1
Added 4 years ago
Added 10 years ago
HOS on XM Satellite Radio : R.I.P. - hearts of space | news
https://blog.hos.com/hearts-of-space-on-xm-satellite-radio-rip.html
Creating an Internet Radio Station with Icecast and Liquidsoap
https://dl.acm.org/doi/fullHtml/10.5555/3144519.3144520
Ever wanted to stream prerecorded music or a live event, such as a lecture or
concert for an internet audience? With Icecast and Liquidsoap, you can set up a
full-featured, flexible internet radio station using free software and open
standards.
GitHub - PiLiDAR/PiLiDAR
https://github.com/PiLiDAR/PiLiDAR?tab=readme-ov-file
Contribute to PiLiDAR/PiLiDAR development by creating an account on GitHub.
Added 5 months ago
(16) 15 Unforgettable 'Henry Rollins vs. Everyone' Moments - YouTube
https://www.youtube.com/watch?v=VelEv1zl8vs
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 8 years ago
Tib3rius/AutoRecon: AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
https://github.com/Tib3rius/AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. - Tib3rius/AutoRecon
Added 7 months ago
Microsoft has a Surface Laptop ‘Smurface Edition’ for Smurfs fans. | The Verge
https://www.theverge.com/news/715741/microsoft-surface-laptop-smurface-edition
Microsoft rarely does limited editions of its Surface products, but it has quietly launched a “Smurface Edition” in time for the Smurfs movie. I was expecting it to be a totally blue design, but instead Microsoft has laser-etched the Smurfs to the front, alongside a blue Surface logo. Other than that, it’s a 13-inch Surface Laptop 7 with Qualcomm’s Snapdragon X Plus, 16GB of RAM, and 512GB of storage for $999.99. Only 100 units are available, exclusively at Amazon.
[Image: The Smurface Edition Surface Laptop 7. https://platform.theverge.com/wp-content/uploads/sites/2/2025/07/image_930e28.png?quality=90&strip=all]
Added 3 months ago
Get in losers, we're moving to Linux!
https://world.hey.com/dhh/get-in-losers-we-re-moving-to-linux-5e1b93cd
I've never seen so many developers curious about leaving the Mac and giving Linux a go. Something has really changed in the last few years. Maybe Linux just got better? Maybe powerful mini PCs made it easier? Maybe Apple just fumbled their relationship with developers one too many times? Maybe it's all of it. But whatever the reason, t...
Added 4 months ago
ZFS Raidz Performance, Capacity and Integrity Comparison @ Calomel.org
https://calomel.org/zfs_raid_speed_capacity.html
Added 10 years ago
GitHub - digitalocean/netbox: IP address management (IPAM) and data center infrastructure management (DCIM) tool.
https://github.com/digitalocean/netbox
The premier source of truth powering network automation. Open source under Apache 2. Try NetBox Cloud free: https://netboxlabs.com/free-netbox-cloud/ - netbox-community/netbox
Added 7 years ago
Table of Contents — Unified Streaming
https://docs.unified-streaming.com/index.html
The Shit-Sandwich Generation | sand·wich gen·er·a·tion noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
https://theshitsandwichgeneration.wordpress.com/
sand·wich gen·er·a·tion; noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
Added 9 years ago
Lost Jack Kerouac story found among assassinated mafia boss' estate
https://www.sfgate.com/sf-culture/article/lost-jack-kerouac-chapter-found-mafia-boss-estate-21098566.php
Added 1 day ago
CakeDC | Building an RBAC based application in CakePHP (2/2) | The minds behind CakePHP
https://www.cakedc.com/jorge_gonzalez/2017/10/09/building-an-rbac-based-application-in-cakephp-2
How to debug rules, and provide complex Auth rules to check permissions
Added 7 years ago
X - Certificate and Key management
https://hohnstaedt.de/xca/
XCA is an x509 certificate generation tool, handling RSA, DSA and EC keys, certificate signing requests (PKCS#10) and CRLs. It supports a broad range of import and export formats.
Added 4 months ago
The Horrors-Mirror's Image (With Lyrics) - YouTube
https://www.youtube.com/watch?v=e7tn0Qnm_40
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 9 years ago
OpenBSD on my fanless desktop computer - Roman Zolotarev
https://www.romanzolotarev.com/setup.html
Added 7 years ago
Nationale betoging: rode relschopper slaat politiecommissaris knock-out/ Manifestation nationale: un - YouTube
https://www.youtube.com/watch?v=qBwYcMvuEq4
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 9 years ago
Designer, Creatives and Developers Jobs Board | Authentic Positions
https://authenticjobs.com/
Authentic Jobs is the leading job board for designers, developers, and creative pros. View our listings and start applying
Listen To The Music Play (@GratefulDeadBook@heads.social) - Heads
https://heads.social/@GratefulDeadBook
MarsHotel - Picarto
https://picarto.tv/MarsHotel?fbclid=IwAR3HNsob2Q-cThcfP5xbiEktZqNwZp9CHSPfPswTDURvfbD3sOoy79-WIMA
OpenBSD 6.2 VPN Endpoint for iOS and macOS Gordon Turner
https://blog.gordonturner.com/2018/02/25/openbsd-6-2-vpn-endpoint-for-ios-and-macos/
Added 5 years ago
Configure a guest WLAN [OpenWrt Wiki]
http://wiki.openwrt.org/doc/recipes/guest-wlan
Added 10 years ago
Swagger UI
https://sonicos-api.sonicwall.com/index.html?sonicwallIp=192.168.24.223&sonicwallPort=443&model=SOHO250&version=6.5.4.0-17n
Added 5 years ago
BarracudaCentral.org - Technical Insight for Security Pros
http://barracudacentral.org/account/register
Added 10 years ago
Sonura Studio | AI Powered Digital Audio Workstation
https://app.sonurastudio.com/
Sonura - Digital Audio Workstation with instant music generation. Create samples, loops, stems, compositions, sound design, FX, and one-shots instantly. Arrange and produce complete tracks with built-in content creation tools.
Added 1 day ago
When I Paint My Masterpiece | Lexicon of Song
https://lexiconofsong.org/when-i-paint-my-masterpiece.html
Why Hire a LFCS or LFCE - Linux Foundation Training
https://training.linuxfoundation.org/certification/why-hire-a-lfcs-or-lfce
From Kubernetes to blockchain to Linux training, explore the full list of Linux Foundation Training and Certification offerings.
Added 10 years ago
Introducing Washtub: The Liquidsoap Stream Controller | vinylproject.com
http://vinylproject.com/dp/2009/03/30/introducing-washtub-liquidsoap-stream-controller
Kerberos.io - free and cheap motion detection video surveillance security system
https://www.kerberos.io/
Added 6 years ago
Listen To The Music Play (@GratefulDeadBook@heads.social) - Heads
https://heads.social/@GratefulDeadBook
Solar Sunspaces and Greenhouses
https://www.builditsolar.com/Projects/Sunspace/sunspaces.htm
Information and plans for attahced solar sunspaces and for solar greenhouses.
Added 6 years ago
Grateful Dead Symbols De-Coded part 3: The Terrapin | Grateful Dead Music
https://gratefuldead-music.com/?q=article/grateful-dead-symbols-de-coded-part-3-terrapin
Added 6 years ago
howto/IPsecWithPublicKeys/OpenBSDExample
https://dn42.net/howto/IPsecWithPublicKeys/OpenBSDExample
Added 10 years ago
PrometheanInfoSec/MAD · GitHub
https://github.com/PrometheanInfoSec/MAD
Computer Network Defender's Toolkit, specializing in active defense techniques. - PrometheanInfoSec/TALOS
Added 10 years ago
Broken
Choosing Network Patch Cable Lengths – Nate15329's Blog
https://nate15329.com/2023/04/27/choosing-network-patch-cable-lengths/
Added 2 months ago
A Guide to Building a Kubernetes Cluster with Raspberry Pi’s | by Alexander Sniffin | Medium
https://alexsniffin.medium.com/a-guide-to-building-a-kubernetes-cluster-with-raspberry-pis-23fa4938d420
Our Approach to Employee Security Training | PagerDuty
https://www.pagerduty.com/blog/security-training-at-pagerduty/
Senior Security Engineer Rich Adams shares how the PagerDuty security team approaches security training for employees.
Added 7 years ago
GitHub - boozallen/sdp-images: Repository for building container images for the Solutions Delivery Platform
https://github.com/boozallen/sdp-images
Repository for building container images for the Solutions Delivery Platform - boozallen/sdp-images
Added 2 months ago
How To Build A 300 Square Foot Windproof Hoop House For Under $500
https://www.naturallivingideas.com/windproof-hoop-house-build/
Choosing to build your own greenhouse is an easy decision to make, and it’s not as hard as you may think. As with any project, just break this one down into steps and you won’t
Inked ladies: Vintage photos of women with full body tattoos | Dangerous Minds
http://dangerousminds.net/comments/inked_ladies_vintage_photos_tattoos
The 1991 discovery of the well-preserved body of a 3,000-year-old corpse revealed (amongst many other things) that ancient humans tattooed their bodies. The mummified body was called “Ötzi the Iceman” after the Ötztal Alps where his remains were found. Ötzi had 50-odd tattoos across his body, which some scientists have suggested may be evidence of an early form of acupuncture—which if true, would put this form of treatment 2,000 years before its first documented appearance in China.
Tattoos have a long and culturally significant history—being used as a sign of initiation, association, clan, tribe, ownership, or sexual and personal...
Added 9 years ago
Ruff v0.4.0: a hand-written recursive descent parser for Python
https://astral.sh/blog/ruff-v0.4.0
Ruff migrates to a hand-written recursive descent parser: >2x faster, with error recovery capabilities.
San Francisco Pictures
http://sanfrancisco-pictures.blogspot.com/
Srijan Choudhary's personal website
https://srijan.ch/
Welcome to Srijan Choudhary's personal website. Here you can find details about me, my blog, and notes.
Added 10 months ago
Fortressa
https://fortressa.com/#whoarewe
Replace expensive per-seat SaaS with tap-to-install open-source apps
14 great ways to store your shoes - Living in a shoebox
https://www.livinginashoebox.com/14-great-ways-to-store-your-shoes/
Get your footwear under control and make your home a little more organized with these 14 clever shoe storage solutions.
Added 5 years ago
GitHub - demovibes/watermelon: Next-generation web backend for streaming community radio, based on Django 4.2.
https://github.com/demovibes/watermelon
Next-generation web backend for streaming community radio, based on Django 4.2. - demovibes/watermelon
Added 8 months ago
When The Headhunter Calls, Do This - Forbes
http://www.forbes.com/sites/lizryan/2014/02/05/when-the-headhunter-calls-do-this/
"That was an awesome speech!" said the young man carrying my suitcase. "The second-years gave us a hint of what to expect. You're a riot in person. I can't believe you got our MBA class to sing 'Bohemian Rhapsody.'" "Are you excited about graduation?" I asked the young man. "Yes and no," [...]
Added 10 years ago
Learning Locker · GitHub
https://github.com/LearningLocker
Learning Locker is the open source Learning Record Store for tracking learning data using the Experience API - Learning Locker
Added 10 years ago
DepthAI | Crowd Supply
https://www.crowdsupply.com/luxonis/depthai
An embedded platform for combining Depth and AI, built around Myriad X
Added 4 months ago
NSA Releases ‘Security Enhanced Android’, Offering Government Level Protection For Your Device | Droid Life
http://www.droid-life.com/2012/01/19/nsa-releases-security-enhanced-android-offering-government-level-protection-for-your-device/
Do you sometimes feel that your phone just isn’t as secure as it should be? Then allow me to introduce Security Enhanced Android (SEA), brought to you by the wonderful folks over at the National Security Agency (NSA). Taken from the AOSP and then beefed up to... #NSA #SecurityEnhancedAndroid
Added 10 years ago
GitHub - itiligent/Easy-Guacamole-Installer: Automated install of Gucamole with options for HTTPS reverse proxy, Active Directory integration, MFA, LetsEncrypt, dark theme, MySQL backup, email alerts & more.
https://github.com/itiligent/Easy-Guacamole-Installer
2025 Gucamole installer with options for HTTPS reverse proxy, Active Directory integration, MFA, LetsEncrypt, dark theme, MySQL backup, email alerts & more. - GitHub - itiligent/Easy-Guacamole-Installer: 2025 Gucamole installer with options for HTTPS reverse proxy, Active Directory integration, MFA, LetsEncrypt, dark theme, MySQL backup, email alerts & more.
Charles C. Jones Seminar | Dartmouth College
https://dartmouth.edu/events/event?event=37328
Added 10 years ago
GitHub - petertjmills/escpos-server
https://github.com/petertjmills/escpos-server
Contribute to petertjmills/escpos-server development by creating an account on GitHub.
Added 4 months ago
A Guide to Faxing Over IP Networks - Customer Tip
http://www.office.xerox.com/support/dctips/dc08cc0439.pdf
Added 8 years ago
Download Office 2016 Deployment Tool from Official Microsoft Download Center
https://www.microsoft.com/en-us/download/details.aspx?id=49117
The Office Deployment Tool (ODT) is a command-line tool that you can use to download and deploy Click-to-Run versions of Office, such as Microsoft 365 Apps for enterprise, to your client computers.
Added 8 years ago
How Grateful Dead archivist David Lemieux finds gems in live shows : Here & Now Anytime : NPR
https://www.npr.org/2024/02/16/1196979504/here-now-anytime-02-16-2024
The Washington Post's Mary Ilyushina joins us to discuss the death of Russian opposition leader Alexei Navalny. And, NPR's Ron Elving and NBC's Scott Wong talk about Vice President Kamala Harris' strong defense of NATO and condemnation of Russia. Then, archivist David Lemieux shares his experience listening to thousands of hours of live Grateful Dead shows searching for gems.
Down the Rabbit Hole of SACD Ripping and DSD Extraction – PS Audio
https://www.psaudio.com/blogs/copper/down-the-rabbit-hole-of-sacd-ripping-and-dsd-extraction
I’m a firm believer in fair use when it comes to audio media — if you bought it, you own it, and you’re free to do with it as you please — as long as it’s for your personal enjoyment and you’re not trying to sell it illegally for profit. Apparently the code writers/hackers in the world agree with me, and it’s really gr
Including Single- & Archive- templates for Custom Post Type in WordPress Plugins | Pat Eason - JavaScript and WordPress Developer
http://pateason.com/including-single-archive-templates-custom-post-type-wordpress-plugins/
Added 10 years ago
Generic gulpfile for CakePHP apps. Compiles and minifies sass. Minifies and lints javascript. Generates documentation with yuidoc · GitHub
https://gist.github.com/csrui/10482056
Generic gulpfile for CakePHP apps.
Compiles and minifies sass.
Minifies and lints javascript.
Generates documentation with yuidoc - gulpfile.js
Added 8 years ago
Logging nginx to remote loghost with syslog-ng. - shell script - nginx, loghost, remote logging, syslog-ng
http://snippets.aktagon.com/snippets/247-logging-nginx-to-remote-loghost-with-syslog-ng-
Added 9 years ago
Trying Out Different Ways of SMD Soldering - Air - Iron - Paste - YouTube
https://www.youtube.com/watch?v=fagGxhlAtrU
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 5 years ago
DEF CON 24 Hacking Conference - DEF CON 24 - Tom-Kopchak-SSD-Forensics-Research-WP.pdf
https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEF%20CON%2024%20-%20Tom-Kopchak-SSD-Forensics-Research-WP.pdf
Added 5 months ago
Asterisk - The Open Source VoIP PBX - Section 2.1. Server Hardware Selection
http://www.asterisk.name/asterisk/0596009623/asterisk-chp-2-sect-1.html
Added 7 years ago
Perfect Workflow in Sublime Text: Free Course! - Tuts+ Code Article
http://code.tutsplus.com/articles/perfect-workflow-in-sublime-text-free-course--net-27293
Added 10 years ago
ESP8266 Plug – Medo's Home Page
https://www.medo64.com/esp8266plug/
ESP8266 Plug is a small USB to serial bridge intended to ease debugging of ESP8266 WiFi serial transceiver. Using your computer’s USB for serial port emulation will definitely make debugging easier than doing first time discovery with microcontroller.…
Added 7 years ago