Links
Add
2 Million+ New Pages – Searchable transcripts of UFO podcasts, videos etc : Leveraging AI : UFOs
https://www.reddit.com/r/UFOs/comments/eyu1fa/2_million_new_pages_searchable_transcripts_of_ufo/
Added 6 years ago
VLAN numbering | IT Help and Support
https://help.uis.cam.ac.uk/service/network-services/techref/vlan-numbering
Jump to: Scheme details, VLANs 1-999, VLANs 1000-4094 VLANs using IEEE 802.1Q are given tags/IDs between 1 and 4094. These tags can be used on links between the University Data Network (UDN - the University backbone network) and institutional networks and must match at both ends.
Added 9 months ago
Cheat Sheet - Loki - Seb's IT blog
https://megamorf.gitlab.io/cheat-sheets/loki/
LogQL: Log Query LanguageLoki comes with its very own language for querying logs called LogQL. LogQL can be considered a distributed grep with labels for fil...
Added 2 years ago
4_ch_smart_security_dvr_english_manual_v1.pdf
https://www.defender-usa.com/downloads/dl/file/id/971/product/287/4_ch_smart_security_dvr_english_manual_v1.pdf
Added 7 years ago
Full disk encryption (including boot) on Debian Bookworm ☯ Daniel Wayne Armstrong
https://www.dwarmstrong.org/fde-debian/
Libre all the things
Added 1 year ago
Broken
How to Detect CVEs Using Nmap Vulnerability Scan Scripts
https://securitytrails.com/blog/nmap-vulnerability-scan
Added 1 year ago
Network Admin Toolbox : networking
https://www.reddit.com/r/networking/comments/7k90x3/network_admin_toolbox/
Added 8 years ago
php - WordPress WPML permalink error in admin - Stack Overflow
https://stackoverflow.com/questions/31086468/wordpress-wpml-permalink-error-in-admin
Added 10 years ago
GitHub - Grashjs/cmms: #1 Self hosted CMMS web & mobile application that allows you to manage enterprise maintenance for free - Computerized Maintenance Management System
https://github.com/Grashjs/cmms
#1 Self hosted CMMS web & mobile application that allows you to manage enterprise maintenance for free - Computerized Maintenance Management System - Grashjs/cmms
Added 5 months ago
XT-4800 Series | Xirgo Technologies
http://www.xirgotech.com/products-page/xt-4800-series
Added 8 years ago
Basic Woodworking Methods
http://www-personal.umich.edu/~mrwizard/wkshps/gen/horses.html
Added 7 years ago
Atlas of Surveillance
https://atlasofsurveillance.org/
Documenting Police Tech in Our Communities with Open Source Research
Added 1 year ago
GitHub - wuvt/johnny-six: Simple radio automation system built with Liquidsoap
https://github.com/wuvt/johnny-six
This is the automation system for WUVT-FM powered by Liquidsoap. It schedules all traffic (station IDs, PSAs, etc.) in compliance with FCC regulations and supports playing different playlists depending on the day and time. It also supports logging track metadata to the main site using the Trackman API.
Added 1 year ago
tight agressive poker - Google Search
https://www.google.com/search?q=tight+agressive+poker&oq=tight+agressive+poker&aqs=chrome..69i57.2613j0j7&sourceid=chrome&ie=UTF-8
Added 6 years ago
Choosing Optimal Subnet Sizes for Efficient VLAN Design - Exam-Labs
https://www.exam-labs.com/blog/choosing-optimal-subnet-sizes-for-efficient-vlan-design
Virtual Local Area Networks, commonly known as VLANs, provide a powerful method to segment networks logically, allowing devices to communicate as though they are on the same physical network even when they are not. Subnets, on the other hand, help partition IP address spaces to ensure that networks can be divided into smaller, manageable pieces.
Added 9 months ago
isc-projects/stork: Stork is a dashboard for BIND 9 and Kea DHCP. *** ISC is hiring for a full-stack developer and a QA engineer for Stork. Please apply at https://www.isc.org/careers/
https://github.com/isc-projects/stork?tab=readme-ov-file
Stork is a dashboard for BIND 9 and Kea DHCP. *** ISC is hiring for a full-stack developer and a QA engineer for Stork. Please apply at https://www.isc.org/careers/ - isc-projects/stork
Added 9 months ago
Amazon.com: Sneaky Cards Card Game: Toys & Games
http://www.amazon.com/dp/B00UBD808K/ref=cm_sw_su_dp
Amazon.com: Gamewright Sneaky Cards Card Game, Multi-colored, 5" : Toys & Games
Added 10 years ago
Major Lazer & DJ Snake - Lean On (feat. MØ) [1 Hour] - YouTube
https://www.youtube.com/watch?v=x0xWoK5QEBQ
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Installing and Troubleshooting Netbox
https://notawful.org/installing-and-troubleshooting-netbox/
There's a story to this. Short version is a friend posted about netbox, an IP address management and data center infrastructure tool. Later I wanted to redo my virutal lab environment from scratch but with better documentation. I figured I'd set up an instance of netbox to document how my
Added 1 year ago
VoIP: SIP-over-TLS and sRTP: Grandstream
https://www.traud.de/voip/grandstream.htm
Added 4 years ago
Broken
Been Here a While, Figured I would finally share. : r/homelab
https://www.reddit.com/r/homelab/comments/1nubsjn/been_here_a_while_figured_i_would_finally_share/?%24deep_link=true&correlation_id=aedeb4d5-1e3b-47b0-8ed7-fdf9239c8ec5&post_fullname=t3_1nubsjn&post_index=0&ref=email_digest&ref_campaign=email_digest&ref_source=email&target_user=TheRealGreybeard&utm_content=post_title
Added 7 months ago
GitHub - brandonyoungdev/tldx: Domain Availability Research Tool
https://github.com/brandonyoungdev/tldx
Domain Availability Research Tool. Contribute to brandonyoungdev/tldx development by creating an account on GitHub.
Added 11 months ago
GitHub - tmuxinator/tmuxinator: Manage complex tmux sessions easily
https://github.com/tmuxinator/tmuxinator?tab=readme-ov-file
Manage complex tmux sessions easily. Contribute to tmuxinator/tmuxinator development by creating an account on GitHub.
Added 10 months ago
Asterisk time based routing – IT Blog
https://ixnfo.com/en/asterisk-time-based-routing.html
Here is an example of routing calls over time in Asterisk. Assume that the /etc/asterisk/extensions.conf file has a configured context for the trunk with the following parameters: And to resolve the time calls to different phones, we will point out for the context of this trunk only nested contexts: In fact, daytime, nighttime, sunday are … Continue reading "Asterisk time based routing"
Added 7 years ago
MIC-710IVA - Advantech
https://www.advantech.com/en-us/products/7514cce2-46ae-4b55-ac6d-b9698a6fb448/mic-710iva/mod_ace03424-2b2c-4a9e-933e-be90af7cbfb6
8ch AI Video System on NVIDIA® Jetson Nano™
GitHub - Marak/node_hash: a super simple hashing library for node.js
https://github.com/Marak/node_hash
a super simple hashing library for node.js. Contribute to Marak/node_hash development by creating an account on GitHub.
Added 9 years ago
Reddit - Dive into anything
https://www.reddit.com/r/FREEMEDIAHECKYEAH/wiki/index/
Recommendations for Appropriate Repairs to Historic Barns and Other Agricultural Buildings
http://www.thebarnjournal.org/resource/technical3.html
Added 9 years ago
How to build a multiroom audio system based on Raspberry Pi and Hifiberry – HiFiBerry
https://support.hifiberry.com/hc/en-us/articles/205699981-How-to-build-a-multiroom-audio-system-based-on-Raspberry-Pi-and-Hifiberry
Added 8 years ago
awesome-jellyfin/awesome-jellyfin: A Collection of Awesome Jellyfin Plugins, Themes, Guides and More!
https://github.com/awesome-jellyfin/awesome-jellyfin
A Collection of Awesome Jellyfin Plugins, Themes, Guides and More! - awesome-jellyfin/awesome-jellyfin
Added 8 months ago
Broken
Global hack on Microsoft product hits U.S., state agencies, researchers say - The Washington Post
https://www.washingtonpost.com/technology/2025/07/20/microsoft-sharepoint-hack/
Added 9 months ago
Monsta Island Czars - Wikipedia
https://en.wikipedia.org/wiki/Monsta_Island_Czars
Added 9 months ago
eBook: Managed Hosting Top 9 Benefits | Internap
http://www.internap.com/resources/managed-hosting-top-9-benefits/
Added 10 years ago
GitHub - wiggels/ansible-role-snipe-it: Ansible role to install, configure, and update a Snipe-IT server
https://github.com/wiggels/ansible-role-snipe-it
Ansible role to install, configure, and update a Snipe-IT server - wiggels/ansible-role-snipe-it
Added 1 year ago
GitHub - alacritty/alacritty-theme: Collection of Alacritty color schemes
https://github.com/alacritty/alacritty-theme
Collection of Alacritty color schemes. Contribute to alacritty/alacritty-theme development by creating an account on GitHub.
Added 10 months ago
MEGA
https://mega.nz/#F!3aYWVCLI!ANL-nkpm7wd5DTco1rSAJQ!nXR1EIiQ
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Added 6 years ago
e-mail alert for every root logins | STRIKER24X7- Asterisk-Vicidial-Goautodial-vicibox-vicidialnow-freepbx-elastix
https://striker24x7.blogspot.com/2011/05/e-mail-alert-for-every-root-logins.html
Added 7 years ago
SYSADMIN BADASS - Conseil en hébergement - Architecture d'infra web
http://www.sysadminbadass.com/#
Votre site web a beaucoup de succès mais votre serveur ne suit plus ? Vous n'arrivez pas à régler un problème de sécurité ? Vous avez besoin de fiabilité pour sécuriser vos revenus ? Ou encore vous n'avez plus confiance en votre hébergement actuel car le support ne répond pas assez vite ? SYSADMIN BADASS est là pour vous aider !
Added 10 years ago
Shortwave Pirate
https://www.hfunderground.com/board/index.php/board,3.0.html
North American Shortwave Pirate
The morning habits of successful tech executives - Business Insider
http://www.businessinsider.com/morning-habits-successful-tech-executives-2015-9
The entire flow of your day can all depend on how you start it. Here's how some of the most successful people in the tech industry do each morning.
Added 10 years ago
Broken
DIY 10” Rack : r/minilab
https://www.reddit.com/r/minilab/comments/1gt4ksz/diy_10_rack/
Added 7 months ago
Demo Snipe-IT - Snipe-IT Free Open Source Asset Management Software
https://snipeitapp.com/demo
Snipe-IT is a free, open source IT asset management system written in PHP
Added 8 years ago
GitHub - seemoo-lab/mobisys2018_nexmon_software_defined_radio: Proof of concept project for operating Broadcom Wi-Fi chips as arbitrary signal transmitters similar to software-defined radios (SDRs)
https://github.com/seemoo-lab/mobisys2018_nexmon_software_defined_radio
Proof of concept project for operating Broadcom Wi-Fi chips as arbitrary signal transmitters similar to software-defined radios (SDRs) - seemoo-lab/mobisys2018_nexmon_software_defined_radio
https://raw.githubusercontent.com/skull-candy/Proxmox-Scripts/main/proxmox.sh
https://raw.githubusercontent.com/skull-candy/Proxmox-Scripts/main/proxmox.sh
nathom/streamrip: A scriptable music downloader for Qobuz, Tidal, SoundCloud, and Deezer
https://github.com/nathom/streamrip
A scriptable music downloader for Qobuz, Tidal, SoundCloud, and Deezer - nathom/streamrip
How to Remove SIP or Plus Prefixes from Incoming Calls on FreePBX? - Server Fault
https://serverfault.com/questions/582458/how-to-remove-sip-or-plus-prefixes-from-incoming-calls-on-freepbx
Added 10 years ago
Insect Eavesdropper: Creating a High-Gain Parabolic Microphone
http://www.instructables.com/id/Insect-Eavesdropper-Creating-a-High-Gain-Paraboli/
Insect Eavesdropper: Creating a High-Gain Parabolic Microphone: My undergraduate minor was Evolutionary Biology and I always particularly loved my insect classes and learning how they evolve and coevolve with plants, animals, and predator/prey insects. I've been a big fan of insect sonograms and love the s…
Added 7 years ago
(157) A Great Evil Was Done To Me - YouTube
https://www.youtube.com/watch?v=uWOL308a6KI
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 8 months ago
(1) Discord | #stream-chat | Something Like Mayer
https://discord.com/channels/1116203783857385492/1122222453570162689
Discord is great for playing games and chilling with friends, or even building a worldwide community. Customize your own space to talk, play, and hang out.
Library-Wood Magazine
http://www.survivorlibrary.com/library-download/8-category/150-library-wood-magazine
Added 7 years ago
EUD Security Guidance: Samsung devices with Knox Workspace - NCSC Site
https://www.ncsc.gov.uk/guidance/eud-security-guidance-samsung-devices-knox-workspace
Added 7 years ago
How do you prevent sore wrists on your "mouse hand"? : sysadmin
https://www.reddit.com/r/sysadmin/comments/3bvnzf/how_do_you_prevent_sore_wrists_on_your_mouse_hand/?ref=search_posts
Added 10 years ago
netxms/netxms: NetXMS - Open Source network and infrastructure monitoring and management
https://github.com/netxms/netxms
NetXMS - Open Source network and infrastructure monitoring and management - netxms/netxms
Added 1 year ago
How to Use Eye Contact to Improve Your Business and Love Life | The Art of Manliness
http://www.artofmanliness.com/2012/02/12/look-em-in-the-eye-part-ii-how-to-make-eye-contact-the-right-way-in-life-business-and-love/
Learn how to look people in the eye to improve your romantic life, your business life. Also eye contact tips so you don't look creepy.
Added 10 years ago
Tyblog | 35 Million Hot Dogs: Benchmarking Caddy vs. Nginx
https://blog.tjll.net/reverse-proxy-hot-dog-eating-contest-caddy-vs-nginx/
Have you ever wondered about the performance delta between Caddy and Nginx? Wonder no more.
Added 9 months ago
jackjackbits (jack) · GitHub
https://github.com/jackjackbits
jackjackbits has 3 repositories available. Follow their code on GitHub.
Added 9 months ago
ANXS/logwatch · GitHub
https://github.com/ANXS/logwatch
Ansible role for logwatch. Contribute to ANXS/logwatch development by creating an account on GitHub.
Added 10 years ago
Save temporary ansible shell scripts instead of deleting - Stack Overflow
http://stackoverflow.com/questions/30060164/save-temporary-ansible-shell-scripts-instead-of-deleting
Added 10 years ago
Movers in Jacksonville, FL | Stewart Moving & Storage
https://stewartmovingandstorage.com/jacksonville/
Stewart Moving & Storage - Reputable Jacksonville FL moving company for local, long distance. Our professional movers Jacksonville FL ensure a stress-free move.
Added 5 years ago
https://bennettbusinessconnections.files.wordpress.com/2013/01/site-details-template-example1.pdf
https://bennettbusinessconnections.files.wordpress.com/2013/01/site-details-template-example1.pdf
Added 10 years ago
hubert3/iSniff-GPS · GitHub
https://github.com/hubert3/iSniff-GPS
Passive sniffing tool for capturing and visualising WiFi location data disclosed by iOS devices - hubert3/iSniff-GPS
Added 10 years ago
Katz Got Your Tongue
http://yehudakatz.com/
Long-form writing by Yehuda Katz, co-creator of Ember.js and serial Open Sourcerer.
Added 8 years ago
MPD to Sonos with Icecast :: jasper.la
https://jasper.la/posts/mpd-to-sonos-with-icecast/
Before I switched to Sonos as my primary way of listening to audio I’ve used MPD for years. As such I collected a fair amount of audio files that Rdio, Tidal or Spotify claim I’m not allowed to stream in my region. And while Sonos is great, there’s not really a way to control it the way you can control an MPD server for which there are many clients and libraries.
slimphp/Slim: Slim Framework source code
https://github.com/slimphp/Slim
Slim is a PHP micro framework that helps you quickly write simple yet powerful web applications and APIs. - slimphp/Slim
Added 10 years ago
(2) ʞǝllou˙ on Twitter: "#FF inspired by @SushiDude. Let start some info sec fanboying! @PhillipWylie @EanMeyer @n1c_fury @TC_Johnson @purpl3f0xsec @havochaos @blenster @HumanMalware @j_opdenakker @bsdbandit @Stealthsploit @rebootuser @ravici @DHAhole
https://twitter.com/KxBenson/status/1157296438608461825
Added 6 years ago
rpi-clone | A shell script to clone a booted disk on a Raspberry Pi.
https://rpi-clone.jeffgeerling.com/
A shell script to clone a booted disk on a Raspberry Pi.
Added 1 year ago
How It Works – Hearts You Hold
https://heartsyouhold.org/how-it-works
Recipients request specific items they need or want. They do this by working with a Connecting Organization. Once the Request Form is filled out, the Connecting Organization submits it to HYH for approval. Once approved, the requests are posted on the website.
Microsoft Word - AN142(POCSAG)).doc
http://www.raveon.com/pdfiles/AN142(POCSAG).pdf
Added 7 years ago
Why we hate Plesk and CPanel - Web and dedicated hosting tutorials by Anchor
http://www.anchor.com.au/hosting/development/we_hate_plesk_and_cpanel
Added 10 years ago
USB-WiFi/home/The_Short_List.md at main · morrownr/USB-WiFi · GitHub
https://github.com/morrownr/USB-WiFi/blob/main/home/The_Short_List.md
USB WiFi Adapter Information for Linux. Contribute to morrownr/USB-WiFi development by creating an account on GitHub.
GitHub - PeteDavidson/t38modem: T38modem version 2.0.0 + Improvements
https://github.com/PeteDavidson/t38modem
T38modem version 2.0.0 + Improvements. Contribute to T38Modem/t38modem development by creating an account on GitHub.
Added 8 years ago
Protect Democracy | Security Specialist
https://protectdemocracy.recruitee.com/o/security-specialist-2023
Vital Communities Groups - lists
https://lists.vitalcommunities.org/lists/lists
Research | Convert your Model M Keyboard to Bluetooth with Bluefruit EZ-Key HID | Adafruit Learning System
https://learn.adafruit.com/convert-your-model-m-keyboard-to-bluetooth-with-bluefruit-ez-key-hid/code
Because nothing screams "portable" like a 6 lb keyboard.
Added 10 years ago
What addons/self-hosted stuff do you use? - Third party integrations - Home Assistant Community
https://community.home-assistant.io/t/what-addons-self-hosted-stuff-do-you-use/160890/5
Not sure if this is the right category, but after coming across a couple of very interesting projects that give people that self-host access to high-quality software that would otherwise have a subscription cost, I figur…
Salt Typhoon Hack Keeps Getting Worse, Telecoms Tell Employees To Stop Looking For Evidence Of Intrusion | Techdirt
https://www.techdirt.com/2025/06/20/salt-typhoon-hack-keeps-getting-worse-telecoms-tell-employees-to-stop-looking-for-evidence-of-intrusion/
Late last year, eight major U.S. telecoms were the victim of a massive intrusion by Chinese hackers who managed to spy on public U.S. officials for more than a year. The “Salt Typhoon” hack was so severe, the intruders spent a year rooting around the ISP networks even after discovery. AT&T and Verizon, two of the compromised companies,…
Added 10 months ago
SoundPoint® IP 335 - Support - Polycom
http://support.polycom.com/PolycomService/support/apac/support/voice/soundpoint_ip/soundpoint_ip335.html
Added 10 years ago
Homelab Security with OSSEC, Loki, Prometheus, and Grafana on a Raspberry Pi | Grafana Labs
https://grafana.com/blog/2019/08/22/homelab-security-with-ossec-loki-prometheus-and-grafana-on-a-raspberry-pi/
A guide to using Loki with Prometheus and Grafana to visualize the OSSEC security application, all running on a Raspberry Pi
Added 1 year ago
GRUB2 Rescue Mode “error: unknown filesystem” | Lisenet.com :: Linux | Security | Networking
https://www.lisenet.com/2014/grub2-rescue-mode-error-unknown-filesystem/
Technical blog about Linux, Security, Networking and IT. Study guides for RHCE, LPIC and more.
Added 11 months ago
Container-Based Electronic Control Unit Virtualisation: A Paradigm Shift Towards a Centralised Automotive E/E Architecture
https://www.mdpi.com/2079-9292/13/21/4283
The past 40 years have seen automotive Electronic Control Units (ECUs) move from being purely mechanical controlled to being primarily digital controlled. While the safety of passengers and efficiency of vehicles has seen significant improvements, rising ECU numbers have resulted in increased vehicle weight, greater demands placed on power, more complex hardware and software, ad hoc methods for updating software, and subsequent increases in costs for both vehicle manufacturers and consumers. To address these issues, the research presented in this paper proposes that virtualisation technologies be applied within automotive electrical/electronic (E/E) architecture. The proposed approach is evaluated by comprehensively studying the CPU and memory resource requirements to support container-based ECU automotive functions. This comprehensive performance evaluation reveals that lightweight container virtualisation has the potential to welcome a paradigm shift in E/E architecture, promoting consolidation and enhancing the architecture by facilitating power, weight, and cost savings. Container-based virtualisation will also enable efficient and robust online dynamic software updates throughout a vehicle’s lifetime.
Pirate Radio Stations Broadcasting On Shortwave Radio
http://freeradiocafe.com/
Timber frame mailbox post - household items - by owner - housewares sale
https://nh.craigslist.org/hsh/d/belmont-timber-frame-mailbox-post/6871961194.html
Added 7 years ago
PyInstaller Manual — PyInstaller 6.6.0 documentation
https://pyinstaller.org/en/stable/
Dead & Co. - Times Union Center - 10-29-15 - Full Show - YouTube
https://www.youtube.com/watch?v=0IZUofnrgDY
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
9th Wonder - Tutenkhamen Beat Tape (FULL) - YouTube
https://www.youtube.com/watch?v=DBX_ADoO-7E
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Information page on the IBM model M keyboard, based on the design of mechanical typewriters. - Model M buyer's guide
http://www.clickeykeyboards.com/model-m-buyers-guide/
Added 10 years ago
Configuring NUT for the Eaton 3S UPS on Ubuntu Linux
http://blog.srackham.com/posts/configuring-nut-for-the-eaton-3s-ups-on-ubuntu-linux/
Added 8 years ago
Snipe Agent Experiences : r/Snipe_IT
https://www.reddit.com/r/Snipe_IT/comments/1bf9k0y/snipe_agent_experiences/
GitHub - jrswab/lsq: A command-line tool for quickly creating and editing Logseq journal entries with both TUI and external editor support.
https://github.com/jrswab/lsq?tab=readme-ov-file
A command-line tool for Logseq to quickly create and edit journal entries. - jrswab/lsq
Added 10 years ago
Quote by Timothy Leary: “Admit it. You aren’t like them. You’re not even...”
http://www.goodreads.com/quotes/514216-admit-it-you-aren-t-like-them-you-re-not-even-close
Timothy Leary — ‘Admit it. You aren’t like them. You’re not even close. You may occasionally dress yourself up as one of them, watch the same mindless te...
Added 9 years ago
The Sandbox | Understanding CyberForensics
http://cwsandbox.org/
We need to get some definitions out of the way so we all know what we are talking about. WHAT IS A SANDBOX: A "sandbox", as it relates to computer security, is a designated, separate and restricted environment (or "container", with tight control and permissions, where computer code can run without the ability to cause damage or infection. Just like in a real playground where children can play in the sandbox -- but are not allowed to play anywhere outside of the sand box. And the box around the "sand box" is designed to keep the sand in and not make a mess all around. At that moment, the sandbox is their "virtual world". WHAT IS VIRTUALIZATION and VIRTUAL MACHINES / VIRTUAL WORLD: "Virtualization" provides a separate environment within a computer that can function independently from all other environments on the computer. One virtual container cannot change or modify another virtual container. A "sandbox" and a "virtual machine" are not the same. When you run an application in a sandbox, it has access to run as if it were not in a sandbox. Anything the application attempts to create or change, however, is lost (or NOT saved) when the application stops running. In a "virtual machine", anything created or changed by the application is allowed, and everything that happens stay within the virtual machine. Similar to the "Las Vegas" theory; "What happens in Las Vegas stays in Las Vegas". Once testing is completed, the virtual machine in use can be deleted without concern for anything that was done to it by the running of the questionable application. WHAT IS A HONEYPOT? As it relates to computer security, a "honeypot" is typically a computer, network or a data system that appears to be part of a larger system, but is actually a controlled, standalone "bait" vehicle, designed to attract those wanting to infect and abuse. If you watch US television, you will most likely be familiar with the police action show "Bait Car". The difference being that the criminals get caught immediately in the tv show. Real life "honeypots" don't necessary lead to that same outcome. There are different types of "honey pots". For years, anti-spam companies "baited" forums, and web sites, and Usenet, and every source they could find, with email addresses in order to received spam. The spam received researched to identify where the spam comes from as well as other general patterns. The type of honeypot we utilize in this discussion applies to the collection, research, identification and analysis of "MalWare". Virus prevention software can't act on infections until it is taught about specific threats and Malware. WHAT IS MALWARE: "Malware" is a shortened form of "malicious software". Malicious software is used to gain control of your computer, allowing the malware creator to do whatever he wants. The ultimate goal of gaining control is to disrupt the normal operations of the target; obtain sensitive or secret information; or gain access to private computer networks and system for other purposes. Malware includes Trojans, viruses, ransom ware, spy ware, and yes, adware! In order for "malware" to be caught, classified, added to virus protection software, etc., it has to be "caught". So the web is full of "spider webs for malware", or "honeypots"! Honeypot creation can be as simple as placing an old computer (or server that is too old or too slow for any valid purpose), install honeypot software, and connect it to the network. (Honeypot software is available as an open source product by the way). It won't take long before your system sees malicious activity, as hackers begin scanning for weaknesses, and attempting to break in. In a test this year, a security blogger leased server space in various countries and created honeypots. Within five minutes of being active, some of the machines had already been "hit" or scanned more than nineteen times! These were unknown machines, without any public awareness of their name, location, or status. The number of hacking attempts increased exponentially over the next few days! Once hackers gain access to our system, they spend time looking around, searching for anything they can find. Since these systems are honeypots, they won't find anything. The next step is for the hacker to upload his malware to our system. At this point, the hacker will attempt to run his malware, but our system ignores him, and eventually he moves on or uploads other malware. Either way we have now harvested copies of malware being used in real-life. SO WHERE DOES THE SANDBOX FIT IT? Honeypots are equipped with a "sandbox" in order to contain and prevent the code or malware from wreaking havoc. Sandboxes are also used to analyze and learn about the specific malware threat. From a press release dated November 19, 2013, "Threat Track" (which is the new name for "CWSandbox"), bills itself as the complete "malware analysis solution". To maintain congruity, we will continue to refer to "Threat Track" and "CWSandbox" simply as the "sandbox". The main job of the sandbox is to enable "users to automate the sample submission process; completely analyze any threat; and quickly act to protect sensitive data". Once the sandbox gets the malware, it is able to analyze and evaluate the actions and processes of the malicious software. This allows system administrators to evaluate the potential exposure of their networks and take the appropriate action to secure against the latest threats. Although malware authors are trying to stay ahead of sandbox technology, sandbox has managed to implement new features and controls that mimic the actions required by the malware. For example, some malware "stalls" or as kids like to say, "plays possum", waiting for a period of time to pass or a particular action to occur – such as a system reboot. As part of the analysis, sandbox mimics a system reboot and then looks to see how the malware responds to the fake reboot. Need more proof? The Federal Bureau of Investigation (FBI) bid on the public market looking to use sandbox on "any machine owned or controlled by the FBI". The knew the value of the software. One final comment about why we need sandbox. "Automated malware must be analyzed (1) automatically, (2) effectively, and (3) correctly. … This is important to realistically assess the threat posed by the malware sample." For more information, go to http://www.threattracksecurity.com/
Added 10 years ago
GitHub - sigoden/upt: Universal Package-management Tool for any OS.
https://github.com/sigoden/upt
Universal Package-management Tool for any OS. Contribute to sigoden/upt development by creating an account on GitHub.
Added 9 months ago
Multi-player, serverless, durable terminals
https://s2.dev/blog/s2-term
S2 instead of sshd. You can just try things.
Added 10 months ago
Server Backup Policy
http://www.tamug.edu/computing/About%20Information%20Services/Policies1/ServerBackupPolicy.html
Added 10 years ago
riverloopsec/killerbee: IEEE 802.15.4/ZigBee Security Research Toolkit
https://github.com/riverloopsec/killerbee
IEEE 802.15.4/ZigBee Security Research Toolkit. Contribute to riverloopsec/killerbee development by creating an account on GitHub.
Added 7 years ago
Slboat The TL WR703N Mod 64MBYTE RAM 16MBYTE Flash and Ttlout Inside MicroUSB 935364051668 | eBay
http://www.ebay.com/itm/SLBoat-The-TL-WR703N-Mod-64Mbyte-RAM-16Mbyte-Flash-And-TTLout-Inside-MicroUSB-/181078954797?pt=LH_DefaultDomain_0&hash=item2a2925932d
Added 10 years ago
How to create spectrograms for audio files using sox | the penguin
https://thepenguin.eu/2017-09-27-create-spectrograms-with-sox/
Using Unbound as an Authoritative Nameserver :: Ari Codes
https://www.aricodes.net/posts/unbound-authoritative-zone/
Unbound is commonly paired with [Pi-hole](https://pi-hole.net/) for local DNS resolution. But what if we want our own private zone that's only available on the local network? This post explores and documents just how to do that.
Added 8 months ago
encryption - How secure is Chrome storing a password? - Information Security Stack Exchange
https://security.stackexchange.com/questions/170481/how-secure-is-chrome-storing-a-password?utm_medium=organic&utm_source=google_rich_qa&utm_campaign=google_rich_qa
Added 7 years ago
Calomel.org :: Open Source Research and Reference
http://dant.net.ru/calomel/index.html
Focusrite Saffire Pro 40 - Google Search
https://www.google.com/search?client=firefox-b-1-e&q=Focusrite+Saffire+Pro+40
details_installation_set-up_of_debian_based_linux_servers [Linux Server Details]
http://wiki.kartbuilding.net/details_installation_set-up_of_debian_based_linux_servers
The Best Galaxy Note 8 Cases and Covers for Your Samsung Phablet | Digital Trends
https://www.digitaltrends.com/mobile/best-galaxy-note-8-cases/
If you're still hanging on to your Note 8, then you'll want to take steps to protect it. These are some of the best Samsung Galaxy Note 20 cases available now.
Added 7 years ago