Links
Add
TUTORIAL: Connecting to Freenode via Tor Like A Boss
https://medium.com/@defcon201/tutorial-connecting-to-freenode-via-tor-like-a-boss-f8d74199b634
Added 7 years ago
aaronmac10 has shared 4 photos with you! | Flickr
https://www.flickr.com/photos/86441859@N00/shares/Y58wzc
Added 7 years ago
Howto TP-LINK TL-WR703N & Fast FWR171-3G - Research
https://sites.google.com/site/moosyresearch/fast-fwr171-3g
Added 10 years ago
Storing billions of UUID fields in MySQL InnoDB | Cal Leeming Blog
http://iops.io/blog/storing-billions-uuid-fields-mysql-innodb/
Added 10 years ago
chowalex/media-organizer: A wordpress media organization plugin.
https://github.com/chowalex/media-organizer
A wordpress media organization plugin. Contribute to chowalex/media-organizer development by creating an account on GitHub.
How to check if your FLAC files are really lossless – ERIKSTECHCORNER
https://erikstechcorner.com/2020/09/how-to-check-if-your-flac-files-are-really-lossless/
Different Perspectives In My Room...!
https://differentperspectivesinmyroom.blogspot.com/
MediaWiki Development | Hosting | Maintenance - WikiTeq - United States
https://wikiteq.com/#mediawiki-consulting
WikiTeq is a team of professional wiki developers that will build, host, and support your organization's wiki.
Amazon.com: PiAware MicroSD +Pro Stick USB ADS-B Receiver + 1090MHz Band-pass Filter frm FlightAware - Track Planes Live Near You!: Home Audio & Theater
https://www.amazon.com/dp/B01F8EZK7A/ref=sspa_dk_detail_3?psc=1&pd_rd_i=B01F8EZK7A
Amazon.com: PiAware MicroSD +Pro Stick USB ADS-B Receiver + 1090MHz Band-Pass Filter frm FlightAware - Track Planes Live Near You!
Added 7 years ago
$25 GL.iNet 6416A is an Hackable OpenWRT Router with Easy UART and GPIO Access
http://www.cnx-software.com/2014/08/25/25-gl-inet-6416a-is-an-hackable-openwrt-router-with-easy-uart-and-gpio-access/
There are plenty of low cost routers supporting OpenWRT, but GL.iNet 6416A has several advantages compared to devices like TP-Link WR703N. Both are based
Added 10 years ago
Comcast BVE / Business Voice Edge settings you should hopefully never need – KG4CYX
https://www.kg4cyx.net/comcast-bve-business-voice-edge-settings-you-should-hopefully-never-need/
Useful info for the Comcast Business Voice Edge service: The portal login is at – at the time of this writing the security certificate is expired (way to go Cumcast) To log in as admin, you m…
Added 11 months ago
Compose AI
https://composeai.io/
Digital employees for all businesses and for everyone. Automate your customer support, sales, and marketing and other functions with AI-powered employees.
Added 3 months ago
modernc.org/sqlite with Go - The IT Solutions
https://theitsolutions.io/blog/modernc.org-sqlite-with-go
I had long been aware of the [effort of cznic](https://gitlab.com/cznic/sqlite) to automatically translate the C source of SQLite to Go while avoiding the complexity CGo would introduce. SQLite was always meant to be a database you embed into your application, and I was curious what tradeoffs that meant, if any, and just generally how it differed from the usual suspects (PostgreSQL, etc.).
To explore these trade-offs and differences, I decided to dive deeper into the usage of this library.
SQLite is a single-writer multiple-reader database. Using just a single instance of database/sql.DB will not work well with this, because it will make it hard to avoid receiving SQLITE_BUSY errors when multiple writers try to run at the same time (because sql.DB is a connection pool). So we will need to separate readers from writers by making two instances of database/sql.DB and limiting the writer to a single [MaxOpenConn](https://pkg.go.dev/database/sql#DB.SetMaxOpenConns) and the reader to as many as you require.
So far, SQLite is behaving remarkably like other databases apart from the single-writer gotcha; we still have connections and per-connection settings. The usual way to pass these settings is usually in the DSN you pass to [sql.Open](https://pkg.go.dev/database/sql#Open) and this is [definitely possible](https://pkg.go.dev/modernc.org/sqlite#Driver.Open), but I find that it would be more straightforward if I could just run my custom SQL when a new connection is made[1]. We can do that with [sqlite.RegisterConnectionHook](https://pkg.go.dev/modernc.org/sqlite#RegisterConnectionHook).
Now the question is what settings to use, because [there are quite a few of them](https://www.sqlite.org/pragma.html). These are the ones I am using personally:
- `PRAGMA journal_mode = WAL;`
Use write-ahead-logging. Better concurrency, but with an edge-case: with heavy writers, the wal can grow idefinitely ([see for more](https://www.sqlite.org/cgi/src/doc/wal2/doc/wal2.md)). I don't expect this will happen in my use-case. For a good description on the various jornal modes, [see this blogpost](https://www.mycelial.com/learn/sqlite-journal-mode-options).
- `PRAGMA synchronous = NORMAL;`
Since with the WAL journal mode, this is safe, there is no reason to use FULL.
- `PRAGMA temp_store = MEMORY;`
Let's store temporary indices, tables, etc. in memory, my use-case is not very resource-constrained to require using the filesystem (also, [this is a fun read](https://www.sqlite.org/fasterthanfs.html) if we are talking about additional syscalls to the kernel)
- `PRAGMA mmap_size = 30000000000; -- 30GB`
Just making sure, access to my database is always done with memory-mapped I/O.
- `PRAGMA busy_timeout = 5000;`
How much time to wait in milliseconds after which SQLITE_BUSY is returned when waiting for the db to unlock.
- `PRAGMA automatic_index = true;`
Make sure [automatic indexing](https://www.sqlite.org/optoverview.html#autoindex) is enabled, it can only help, and is a great way to get warnings about indexes that should be created.
- `PRAGMA foreign_keys = ON;`
Make sure foreign key enforcement is enabled.
- `PRAGMA analysis_limit = 1000;`
Make sure [ANALYZE](https://www.sqlite.org/lang_analyze.html#approx) returns quickly in case the DB gets large.
- `PRAGMA trusted_schema = OFF;`
No idea what security audited functions are, but this setting makes sure only those can be run. The manual page tells me to turn it off anyway, so let's do that.
Not all of these settings are per-connection settings, but it doesn't hurt to always run all of these on every connection, and having a single "Init SQL" makes things simpler.
Let's deal with explicit transactions next. The default transaction mode is DEFERRED, meaning that it depends on the next statement what type of transaction is started (if a SELECT statement comes first, a read transaction is started, with the possibility of upgrading it to a write transaction depending on the statements that follow). With our setup, there should never be multiple writers concurrently, so making all transactions write transactions from the get-go (with BEGIN IMMEDIATE) can only help us show if this invariant is violated.
Putting this all together, this is the code we arrive at:
```go
package main
import (
"bytes"
"context"
"crypto/sha1"
"database/sql"
"database/sql/driver"
"encoding/hex"
"fmt"
"time"
"modernc.org/sqlite"
)
type DB struct {
dbPath string
Read *sql.DB
Write *sql.DB
}
const initSQL = `
PRAGMA journal_mode = WAL;
PRAGMA synchronous = NORMAL;
PRAGMA temp_store = MEMORY;
PRAGMA mmap_size = 30000000000; -- 30GB
PRAGMA busy_timeout = 5000;
PRAGMA automatic_index = true;
PRAGMA foreign_keys = ON;
PRAGMA analysis_limit = 1000;
PRAGMA trusted_schema = OFF;
`
func New(ctx context.Context, dbPath string) (db *DB, err error) {
db = &DB{
dbPath: dbPath,
}
// make sure every opened connection has the settings we expect
sqlite.RegisterConnectionHook(func(conn sqlite.ExecQuerierContext, _ string) error {
_, err = conn.ExecContext(ctx, initSQL, nil)
return err
})
write, err := sql.Open("sqlite", "file:"+db.dbPath)
if err != nil {
return
}
// only a single writer ever, no concurrency
write.SetMaxOpenConns(1)
write.SetConnMaxIdleTime(time.Minute)
if err != nil {
return
}
read, err := sql.Open("sqlite", "file:"+db.dbPath)
if err != nil {
return
}
// readers can be concurrent
read.SetMaxOpenConns(100)
read.SetConnMaxIdleTime(time.Minute)
db.Read = read
db.Write = write
return
}
func (db *DB) InTransaction(ctx context.Context, tx func(context.Context, *sql.Conn) error) (err error) {
// cancel anything that takes longer than 5 seconds
var cancel func()
ctx, cancel = context.WithTimeout(ctx, time.Duration(5*time.Second))
defer cancel()
// separate conn thats just for us
// so that the transactions queries are executed together
conn, err := db.Write.Conn(ctx)
if err != nil {
return
}
defer conn.Close()
_, err = conn.ExecContext(ctx, "BEGIN IMMEDIATE TRANSACTION")
if err != nil {
return
}
defer func() {
if r := recover(); r != nil || err != nil {
if _, err = conn.ExecContext(ctx, "ROLLBACK"); err != nil {
return
}
}
}()
err = tx(ctx, conn)
if err != nil {
return
}
_, err = conn.ExecContext(ctx, "COMMIT")
return
}
```
Just as a small added bonus, it's also very easy to register our own go functions that we can then call from SQL. In this example, we define the sha1 function, receiving and returning a single argument, and always returning the same output for the same input (thus the deterministic). For more information, [see the docs](https://www.sqlite.org/appfunc.html)
```go
func registerFuncs() {
// lets add our own sha1 hash function usable from SQL
sqlite.MustRegisterDeterministicScalarFunction(
"sha1",
1,
func(ctx *sqlite.FunctionContext, args []driver.Value) (driver.Value, error) {
var arg *bytes.Buffer
switch argTyped := args[0].(type) {
case string:
arg = bytes.NewBuffer([]byte(argTyped))
case []byte:
arg = bytes.NewBuffer(argTyped)
default:
return nil, fmt.Errorf("expected argument to be a string, got: %T", argTyped)
}
h := sha1.Sum(arg.Bytes())
return hex.EncodeToString(h), nil
},
)
}
```
In conclusion, this solution works perfectly well for most of the usage scenarios out there where immense scaling is neither expected nor needed. There are faster ways to use SQLite with Go (see the [excellent cvilsmeier benchmarks](https://github.com/cvilsmeier/go-sqlite-bench)), but its still plenty-fast enough, and avoiding CGo makes it very convenient also.
[1]: This is another thing that database/sql.DB being a connection pool makes harder.
Added 7 months ago
NeilHanlon/ansible-rt: Ansible role for Request Tracker
https://github.com/NeilHanlon/ansible-rt/tree/main
Ansible role for Request Tracker. Contribute to NeilHanlon/ansible-rt development by creating an account on GitHub.
Added 4 months ago
Polycom configuration - FreeSWITCH Wiki
https://wiki.freeswitch.org/wiki/Polycom_configuration#Register_one_SIP_User_Agent
FreeSWITCH is the leading open-source communication framework that powers some of the world's largest telephony infrastructures. It is maintained and…
Added 10 years ago
The Sandbox | Understanding CyberForensics
http://cwsandbox.org/
We need to get some definitions out of the way so we all know what we are talking about. WHAT IS A SANDBOX: A "sandbox", as it relates to computer security, is a designated, separate and restricted environment (or "container", with tight control and permissions, where computer code can run without the ability to cause damage or infection. Just like in a real playground where children can play in the sandbox -- but are not allowed to play anywhere outside of the sand box. And the box around the "sand box" is designed to keep the sand in and not make a mess all around. At that moment, the sandbox is their "virtual world". WHAT IS VIRTUALIZATION and VIRTUAL MACHINES / VIRTUAL WORLD: "Virtualization" provides a separate environment within a computer that can function independently from all other environments on the computer. One virtual container cannot change or modify another virtual container. A "sandbox" and a "virtual machine" are not the same. When you run an application in a sandbox, it has access to run as if it were not in a sandbox. Anything the application attempts to create or change, however, is lost (or NOT saved) when the application stops running. In a "virtual machine", anything created or changed by the application is allowed, and everything that happens stay within the virtual machine. Similar to the "Las Vegas" theory; "What happens in Las Vegas stays in Las Vegas". Once testing is completed, the virtual machine in use can be deleted without concern for anything that was done to it by the running of the questionable application. WHAT IS A HONEYPOT? As it relates to computer security, a "honeypot" is typically a computer, network or a data system that appears to be part of a larger system, but is actually a controlled, standalone "bait" vehicle, designed to attract those wanting to infect and abuse. If you watch US television, you will most likely be familiar with the police action show "Bait Car". The difference being that the criminals get caught immediately in the tv show. Real life "honeypots" don't necessary lead to that same outcome. There are different types of "honey pots". For years, anti-spam companies "baited" forums, and web sites, and Usenet, and every source they could find, with email addresses in order to received spam. The spam received researched to identify where the spam comes from as well as other general patterns. The type of honeypot we utilize in this discussion applies to the collection, research, identification and analysis of "MalWare". Virus prevention software can't act on infections until it is taught about specific threats and Malware. WHAT IS MALWARE: "Malware" is a shortened form of "malicious software". Malicious software is used to gain control of your computer, allowing the malware creator to do whatever he wants. The ultimate goal of gaining control is to disrupt the normal operations of the target; obtain sensitive or secret information; or gain access to private computer networks and system for other purposes. Malware includes Trojans, viruses, ransom ware, spy ware, and yes, adware! In order for "malware" to be caught, classified, added to virus protection software, etc., it has to be "caught". So the web is full of "spider webs for malware", or "honeypots"! Honeypot creation can be as simple as placing an old computer (or server that is too old or too slow for any valid purpose), install honeypot software, and connect it to the network. (Honeypot software is available as an open source product by the way). It won't take long before your system sees malicious activity, as hackers begin scanning for weaknesses, and attempting to break in. In a test this year, a security blogger leased server space in various countries and created honeypots. Within five minutes of being active, some of the machines had already been "hit" or scanned more than nineteen times! These were unknown machines, without any public awareness of their name, location, or status. The number of hacking attempts increased exponentially over the next few days! Once hackers gain access to our system, they spend time looking around, searching for anything they can find. Since these systems are honeypots, they won't find anything. The next step is for the hacker to upload his malware to our system. At this point, the hacker will attempt to run his malware, but our system ignores him, and eventually he moves on or uploads other malware. Either way we have now harvested copies of malware being used in real-life. SO WHERE DOES THE SANDBOX FIT IT? Honeypots are equipped with a "sandbox" in order to contain and prevent the code or malware from wreaking havoc. Sandboxes are also used to analyze and learn about the specific malware threat. From a press release dated November 19, 2013, "Threat Track" (which is the new name for "CWSandbox"), bills itself as the complete "malware analysis solution". To maintain congruity, we will continue to refer to "Threat Track" and "CWSandbox" simply as the "sandbox". The main job of the sandbox is to enable "users to automate the sample submission process; completely analyze any threat; and quickly act to protect sensitive data". Once the sandbox gets the malware, it is able to analyze and evaluate the actions and processes of the malicious software. This allows system administrators to evaluate the potential exposure of their networks and take the appropriate action to secure against the latest threats. Although malware authors are trying to stay ahead of sandbox technology, sandbox has managed to implement new features and controls that mimic the actions required by the malware. For example, some malware "stalls" or as kids like to say, "plays possum", waiting for a period of time to pass or a particular action to occur – such as a system reboot. As part of the analysis, sandbox mimics a system reboot and then looks to see how the malware responds to the fake reboot. Need more proof? The Federal Bureau of Investigation (FBI) bid on the public market looking to use sandbox on "any machine owned or controlled by the FBI". The knew the value of the software. One final comment about why we need sandbox. "Automated malware must be analyzed (1) automatically, (2) effectively, and (3) correctly. … This is important to realistically assess the threat posed by the malware sample." For more information, go to http://www.threattracksecurity.com/
Added 10 years ago
Inked ladies: Vintage photos of women with full body tattoos | Dangerous Minds
http://dangerousminds.net/comments/inked_ladies_vintage_photos_tattoos
The 1991 discovery of the well-preserved body of a 3,000-year-old corpse revealed (amongst many other things) that ancient humans tattooed their bodies. The mummified body was called “Ötzi the Iceman” after the Ötztal Alps where his remains were found. Ötzi had 50-odd tattoos across his body, which some scientists have suggested may be evidence of an early form of acupuncture—which if true, would put this form of treatment 2,000 years before its first documented appearance in China.
Tattoos have a long and culturally significant history—being used as a sign of initiation, association, clan, tribe, ownership, or sexual and personal...
Added 10 years ago
plutoprint/plutoprint: A Python Library for Generating PDFs and Images from HTML, powered by PlutoBook
https://github.com/plutoprint/plutoprint
A Python Library for Generating PDFs and Images from HTML, powered by PlutoBook - plutoprint/plutoprint
Added 5 months ago
Raspberry Pi Video Surveillance Monitor - Self Hosted Home
https://selfhostedhome.com/raspberry-pi-video-surveillance-monitor/
This post may contain affiliate links. Please read my disclaimer for more info.Have video cameras around your home and property for home defense? Have an easy way to display them? In today’s article, I’m going to walk through turning a Raspberry Pi into a video surveillance monitoring system. You can hook up the Raspberry Pi ... [Read more...]
Added 6 years ago
Outlook is sending winmail.dat attachments
http://www.slipstick.com/problems/outlook-is-sending-winmail-dat-attachments/
Common causes when Microsoft Outlook is sending Winmail.dat attachment to your recipients. How to stop Outlook from sending winmail.dat.
Added 9 years ago
Quickly Build RESTful APIs in PHP with Slim – Part 4 » Things I Sort of Know
http://ericbrandel.com/2013/01/24/quickly-build-restful-apis-in-php-with-slim-part-4/
The fourth and final part of this series is focusing on using the Slim Framework’s middleware functionality to validate (to a degree) RESTful API requests. This post will show how to add a si…
Added 10 years ago
Broken
Choosing Network Patch Cable Lengths – Nate15329's Blog
https://nate15329.com/2023/04/27/choosing-network-patch-cable-lengths/
Added 6 months ago
Broken
SMTP relay for internal and external recipients - what is everyone using? : r/sysadmin
https://www.reddit.com/r/sysadmin/comments/1i907pu/smtp_relay_for_internal_and_external_recipients/
Added 6 months ago
Configure OpenBSD as a routing firewall for a VLAN
http://computing.geology.ucdavis.edu/security/openbsd_routing_firewall-worksheet.php
Added 9 years ago
darcy lynn agt at DuckDuckGo
https://duckduckgo.com/?q=darcy+lynn+agt&ia=web
DuckDuckGo. Privacy, Simplified.
GitHub - tylertreat/comcast: Simulating shitty network connections so you can build better systems.
https://github.com/tylertreat/comcast
Simulating shitty network connections so you can build better systems. - tylertreat/comcast
Monitoring WordPress using syslog and OSSEC | geekery
https://pleasefeedthegeek.wordpress.com/2009/10/07/monitoring-wordpress-using-syslog-and-ossec/
This has got to be one of the unconventional (yet interesting) ideas I've come across. It involves the use of a plugin (currently maintained at OSSEC) to get WordPress to send syslog events for OSSEC to parse. It is a good idea since it is good to monitor any web applications running for anomalies, but…
Added 9 years ago
Changing CakePHP pagination URLs - Sakic.Net
https://www.sakic.net/blog/changing-cakephp-pagination-urls/
High quality Joomla components and modules. Professional Joomla extensions, consulting and services by a co-founder of Joomla.
Added 10 years ago
Broken
AWS Management Console
https://us-east-1.console.aws.amazon.com/console/home?region=us-east-1
Added 2 years ago
Better Logging with Bunyan – Nagesh Bansal – Medium
https://medium.com/@bansalnagesh/better-logging-with-bunyan-eff940d29956
Added 8 years ago
Securing Asterisk - your tips! : VOIP
https://www.reddit.com/r/VOIP/comments/6t2llt/securing_asterisk_your_tips/
Added 8 years ago
Warré-like traditional beekeeping in Japan
http://warre.biobees.com/japan.htm
Parse PHP file variables from Python script - Stack Overflow
https://stackoverflow.com/questions/16881577/parse-php-file-variables-from-python-script
Added 10 years ago
How do I install and run a TFTP server? - Ask Ubuntu
https://askubuntu.com/questions/201505/how-do-i-install-and-run-a-tftp-server
Added 9 years ago
GitHub - sagarkhandve/OpenWrt-TorRouter: Route all your internet traffic anonymously through the TOR relays. Encrypt your internet connection to enforce security and privacy. Prevent data leak and traffic spoofing on the client side. Bypass regional restrictions using public relay providers and escape client side content filters and internet censorship.
https://github.com/sagarkhandve/OpenWrt-TorRouter/tree/main
Route all your internet traffic anonymously through the TOR relays. Encrypt your internet connection to enforce security and privacy. Prevent data leak and traffic spoofing on the client side. Bypass regional restrictions using public relay providers and escape client side content filters and internet censorship. - GitHub - sagarkhandve/OpenWrt-TorRouter: Route all your internet traffic anonymously through the TOR relays. Encrypt your internet connection to enforce security and privacy. Prevent data leak and traffic spoofing on the client side. Bypass regional restrictions using public relay providers and escape client side content filters and internet censorship.
Added 1 year ago
A Pentester's Guide - Part 3 (OSINT, Breach Dumps, & Password Spraying)
https://delta.navisec.io/osint-for-pentesters-part-3-password-spraying-methodology/
Added 6 years ago
Designing and Implementing an IP Paging System (1 of 4) - VoIP Insider
https://www.voipsupply.com/blog/voip-insider/ip-paging-system/
Note: This is the 1st installment of a four part series detailing the design and implementation of an IP paging (paging over VoIP) system. Click here for Part 2, Part 3, and Part 4. In many new or existing voice over IP deployments, integrating existing paging systems or deploying new IP based paging systems is becoming a much […]
Added 7 years ago
Selling Honey for $20 a Pound | Bee Culture
https://www.beeculture.com/selling-honey-20-pound/
Added 6 years ago
Asterisk PBX Feature Codes – swiss network security – swissns GmbH
https://www.swissns.ch/site/2014/03/asterisk-pbx-feature-codes/
FEATURE CODES You can see the FreePBX Feature Codes under the SETUP/FEATURE CODES section of your PBX (after you login). Blacklist *30 - Blacklist a number *32 - Blacklist the...
Added 7 years ago
Eerie Bird Superstitions | Nature Center Magazine
http://www.nc-mag.com/2014/01/eerie-bird-superstitions.html
Added 9 years ago
Planet Libre - utilisation d’un serveur LDAP comme source d’authentification pour des utilisateurs virtuels
http://www.planet-libre.org/index.php?post_id=12548
Added 10 years ago
GitHub - gorilla/mux: Package gorilla/mux is a powerful HTTP router and URL matcher for building Go web servers with 🦍
https://github.com/gorilla/mux
Package gorilla/mux is a powerful HTTP router and URL matcher for building Go web servers with 🦍 - gorilla/mux
Added 7 months ago
GitHub - Threadfin/Threadfin: an M3U proxy for Kernel/Plex/Jellyfin/Emby based on xTeVe
https://github.com/Threadfin/Threadfin
an M3U proxy for Kernel/Plex/Jellyfin/Emby based on xTeVe - Threadfin/Threadfin
Added 5 months ago
Loi Travail. Manifestation et violences / Paris - France 19 mai 2016 - YouTube
https://www.youtube.com/watch?v=jIUSoj4G-1k
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 9 years ago
Okilly Demos | Okilly Dokilly
https://okillydokilly.bandcamp.com/releases
Slaughterhouse by Okilly Dokilly, released 31 January 2020
Bless the grocer
For this wonderful
Bless the grocer
For this wonderful
Meat
Let's not forget the humane but determined
Boys over at the slaughterhouse
Bless the middle men
Who jacked up the
Bless the middle men
Who jacked up the
Prices
Let's not forget the humane but determined
Boys over at the slaughterhouse
Added 10 years ago
Skip the exit interview when you leave your job
https://blog.petdance.com/2017/03/31/skip-the-exit-interview-when-you-leave-your-job/
When it’s time to leave your job, someone from Human Resources may want to sit you down and have an “exit interview”. They’ll ask you questions like “Why are you leaving your position?” and “What was it like to work with your manager.” It’s done with this premise that they’re looking to make the company better.
Added 7 months ago
Prebuilt Packages on Debian 8 · facebook/hhvm Wiki · GitHub
https://github.com/facebook/hhvm/wiki/Prebuilt-Packages-on-Debian-8
A virtual machine for executing programs written in Hack. - Prebuilt Packages on Debian 8 · facebook/hhvm Wiki
Added 10 years ago
GitHub - turtle0x1/LxdMosaic: Web interface to manage multiple instance of lxd
https://github.com/turtle0x1/LxdMosaic
Web interface to manage multiple instance of lxd. Contribute to turtle0x1/LxdMosaic development by creating an account on GitHub.
Added 5 months ago
dev-box-setup/ at master · bashirsouid/dev-box-setup
https://github.com/bashirsouid/dev-box-setup/tree/master
A set of scripts to automatically install apps and configure Windows settings for a new clean development box. - bashirsouid/dev-box-setup
Added 10 months ago
Installing WireGuard, the Modern VPN
https://research.kudelskisecurity.com/2017/06/07/installing-wireguard-the-modern-vpn/
Co-authored by tmlxs and adr13n WireGuard is a network tunnel (VPN) for IPv4 and IPv6 that uses UDP. Currently most of the code resides in the Linux kernel but cross platform implementations are under way. WireGuard features an authentication scheme similar to that of SSH, whereby the VPN server and each client have their own asymmetric key pair. Authorizing…
Added 7 years ago
The Shit-Sandwich Generation | sand·wich gen·er·a·tion noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
https://theshitsandwichgeneration.wordpress.com/
sand·wich gen·er·a·tion; noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
Added 10 years ago
High Gain Wi-fi Helical Antenna
https://www.ab9il.net/wlan-projects/wifi3A.html
Amazon.com: The Ultimate Big Crazy Wifi Antenna Guide: Projects, tips, and mods for longer range wifi: 9798810090540: Collier, Philip: Books
Added 10 years ago
22 Simple Productivity Tools To Help You Do Everything Faster
https://blog.percolate.com/2015/01/22-simple-productivity-tools-that-save-time-and-effort/#prclt-vyjMoDg1
Editor’s picks
Added 11 years ago
Unofficial USG3P Support for OPENWRT / LEDE [No PR due to lack of time]
https://gist.github.com/MartB/99e30df35cb41af7f8f9130cb41c6ddd
Unofficial USG3P Support for OPENWRT / LEDE [No PR due to lack of time] - 0001-Octeon-usg3p-support.patch
elephantrobotics/mycobot_ros: A ros package for myCobot.
https://github.com/elephantrobotics/mycobot_ros
A ros package for myCobot. Contribute to elephantrobotics/mycobot_ros development by creating an account on GitHub.
Added 5 months ago
Who-T: On commit messages
http://who-t.blogspot.com/2009/12/on-commit-messages.html
Added 2 years ago
9780986765902: Master's Guide to Timber Framing - AbeBooks - James Mitchell: 0986765902
https://www.abebooks.com/9780986765902/Masters-Guide-Timber-Framing-James-0986765902/plp
J.D Mitchell Publications - 2011 - Low prices on new and used copies of books. 30 days return policy
Added 6 years ago
subgraph/oz · GitHub
https://github.com/subgraph/oz
OZ: a sandboxing system targeting everyday workstation applications - subgraph/oz
Added 10 years ago
Nginx, reverse proxies and DNS resolution | Jethro Carr
https://www.jethrocarr.com/2013/11/02/nginx-reverse-proxies-and-dns-resolution/
Nginx is a pretty awesome high performance web server and reverse proxy. It’s often used in conjunction with other HTTP servers such as Java/Tomcat and Ruby/Unicorn, as it allows static conte…
Added 10 years ago
Boitier Soekris — OpenWikiBSD
http://www.openbsd-edu.net/index.php?title=Boitier_Soekris
Added 8 years ago
Perfect Sound Forever: Grateful Dead family and LSD
https://www.furious.com/perfect/gratefuldeadlsd.html
Grateful Dead, Dead Heads and their pharmaceuticals
Icecast HTTPS/SSL with Let's Encrypt: Setup Guide - Media Realm
https://www.mediarealm.com.au/articles/icecast-https-ssl-setup-lets-encrypt/
Securing Physical Security Systems on the IP Network
https://www.sdmmag.com/articles/84928-securing-physical-security-systems-on-the-ip-network
Virtual local-area networks (VLANs) provide a logical separation of video surveillance and other physical security information from other network applications.When properly used and configured, IP networks deliver formidable security protection.
Added 7 years ago
ECM - T.38's Dirty Little Secret (And Why It Matters)
http://blog.t38fax.com/blog/ecm-t38-dirty-little-secret
Error Correction Mode (ECM) is one of fax's most vital features. Yet more than 90% of T.38 Fax Over IP (FoIP) services have it intentionally disabled.
Added 8 years ago
12030368_10153224092812057_53277875596031167_o.jpg (1000×792)
https://scontent.xx.fbcdn.net/hphotos-xaf1/t31.0-8/12030368_10153224092812057_53277875596031167_o.jpg
Added 10 years ago
Dartmouth College Applicant Portal | Home
https://searchjobs.dartmouth.edu/
Homepage - Silex - The PHP micro-framework based on the Symfony Components
http://silex.sensiolabs.org/
Added 9 years ago
Bored Consultant | Ambitious but rubbish
https://boredconsultant.com/
Random stories from the IT world
Added 11 months ago
Documents - Mitchell 1 Product Support
https://mitchell1.com/support/manager-se/documents/
Added 6 years ago
Building a Windows 10 21H2 Reference Image using Microsoft Deployment Toolkit (MDT) - Deployment Research
https://www.deploymentresearch.com/building-a-windows-10-21h2-reference-image-using-microsoft-deployment-toolkit-mdt/
Here is a step-by-step quick guide on building the perfect Windows 10 21H2 reference image using Microsoft Deployment Toolkit (MDT) 8456.
Added 6 months ago
My Simple Trick for Quickly Making Secure Passwords | The Nubby Admin
http://thenubbyadmin.com/2014/09/12/my-simple-trick-for-quickly-making-secure-passwords/
Added 10 years ago
Index of /repositories/home:/jgeboski/xUbuntu_16.04/amd64
http://download.opensuse.org/repositories/home:/jgeboski/xUbuntu_16.04/amd64/
Added 9 years ago
garemoko/PHPCan · GitHub
https://github.com/garemoko/PHPCan
Collection of PHP Tin Can code samples. Contribute to garemoko/PHPCan development by creating an account on GitHub.
Added 10 years ago
Provisioning and usage of unprivileged LXC containers via indirect login or script
https://gist.github.com/julianlam/4e2bd91d8dedee21ca6f
Provisioning and usage of unprivileged LXC containers via indirect login or script #blog - provisioning-unprivileged-lxc-containers-via-login-or-script.md
Added 10 years ago
Subgraph OS Release Notes & Instructions
https://support.subgraph.com/private/sgos/pre-alpha/
Added 10 years ago
Added 7 months ago
How To Whistle With Your Fingers | The Art Of Manliness
http://www.artofmanliness.com/2012/04/08/how-to-whistle-with-your-fingers/
Learn to whistle loudly with your fingers.
Added 9 years ago
DEF CON 24 Hacking Conference - DEF CON 24 - Tom-Kopchak-SSD-Forensics-Research-WP.pdf
https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEF%20CON%2024%20-%20Tom-Kopchak-SSD-Forensics-Research-WP.pdf
Added 8 months ago
What I've Learned About Modern Dating: Facebook, Tinder, And Real Life
http://viralwomen.com/post/what_ive_learned_about_modern_dating_facebook_tinder_and_real_life
Added 10 years ago
Streaming Video with Motion - Raspberry Valley
https://raspberry-valley.azurewebsites.net/Streaming-Video-with-Motion/
Wi-Fi on the Command Line | Linux Journal
https://www.linuxjournal.com/content/wi-fi-command-line
Kool Keith & KutMasta Kurt - Grandma's Boyee - YouTube
https://www.youtube.com/watch?v=ofW_7c3Lg-0
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Rolling out an API for your cakePHP app Part 1: The Problems | Deadly Technology
http://deadlytechnology.com/php/api-cakephp-app/
Rolling out an API for your cakePHP app Part 1: The Problems
Added 10 years ago
Baofeng_UV-5R_receiver_sensitivity.pdf
https://baofeng.perm.ru/data/soft/Baofeng_UV-5R_receiver_sensitivity.pdf
Added 8 years ago
The Strange Story of DC's Lost AM Radio Station Still Transmitting Inauguration Road Closures From 2013
https://www.thedrive.com/tech/39549/the-strange-story-of-dcs-lost-am-radio-station-still-transmitting-inauguration-road-closures-from-2013
"Strong 'Fallout 3' vibes," says the man who discovered it.
What is the best Linux terminal emulator? - Slant
http://www.slant.co/topics/794/~what-is-the-best-linux-terminal-emulator
Added 10 years ago
Broken
Entra/InTune : r/Snipe_IT
https://www.reddit.com/r/Snipe_IT/comments/1lcsq11/entraintune/
Added 7 months ago
iPositive Security: [DIY] Testing / Hacking WebDAV
http://ipositivesecurity.blogspot.com/2012/08/diy-testing-hacking-webdav.html
Added 9 years ago
All Job Listings - Community Career Center - Welcome to Non Profit Jobs.org!
https://www.nonprofitjobs.org/search_joblistall
Added 9 years ago
Kenneth Tencio from Costa Rica doesn’t just walk down the stairs – he flips them - YouTube
https://www.youtube.com/watch?v=I5JpNuvEdnE
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 9 years ago
c-r.de: How to tell tcpdump to filter mixed tagged and untagged VLAN (IEEE 802.1Q) traffic
https://christian-rossow.de/articles/tcpdump_filter_mixed_tagged_and_untagged_VLAN_traffic.php
Added 11 months ago
www.sans.org/reading-room/whitepapers/firewalls/building-ipv6-firewall-openbsd-807
http://www.sans.org/reading-room/whitepapers/firewalls/building-ipv6-firewall-openbsd-807
Added 11 years ago
Creating a redmine email filter for postfix with virtual domains - miscellaneous
https://blog.jameskyle.org/2010/06/postfix-virtual-domain-redmine-filter/
Added 5 years ago
TheEssentialHandTools-ChrisSchwarz.pdf
https://static1.squarespace.com/static/52e953e8e4b04e8cd686746b/t/54b4a19ae4b0355fe54d112f/1421123994250/TheEssentialHandTools-ChrisSchwarz.pdf
Added 7 years ago
Convert from 512 byte blocks to Megabyes and Gigabytes
https://www.tachytelic.net/2014/03/posix-size-converter/
Added 7 years ago
gxp2130_gxp2140_gxp2160_gxp2135_gxp2170_quick_user_guide_english..pdf
http://www.grandstream.com/sites/default/files/Resources/gxp2130_gxp2140_gxp2160_gxp2135_gxp2170_quick_user_guide_english..pdf
Added 7 years ago