Links
Add
Sublime Text 3 Essential Tweaks « Cheng's Blog
http://cheng.logdown.com/posts/2015/06/29/sublime-text-3-essential-tweaks
Added 8 years ago
Added 10 years ago
Added 7 years ago
Setting up Ubuntu 12.04 and Xen on Hetzner | clarkdave.net
http://clarkdave.net/2012/11/setting-up-ubuntu-12-04-and-xen-on-hetzner/
Added 10 years ago
VBScript “shortcuts” virus removal | Security on Steroids
http://cleanbytes.net/vbscript-shortcuts-virus-removal#more-2258
Everybody likes music, so many people are downloading music albums or collages from untrusted sources be they illegal torrents containing copyrighted material, P2P networks or files hosting website…
Cloud Connect Summit | Cloud Computing and Technology
http://cloudconnectsummit.com/
Added 8 years ago
Cloud Surfing
http://cloudsurfing.gdhour.com/
Here is the latest news from David Gans, producer and host of the nationally syndicated radio program, The Grateful Dead Hour.
Added 6 years ago
Contact Us @ - Creative Labels of Vermont Inc.Creative Labels of Vermont Inc.
http://clov.com/blog/contact-us/
Added 10 years ago
cmh: Update on using Graphite with FreeNAS
http://cmhramblings.blogspot.com/2015/12/update-on-using-graphite-with-freenas.html
Added 6 months ago
Perfect Workflow in Sublime Text: Free Course! - Tuts+ Code Article
http://code.tutsplus.com/articles/perfect-workflow-in-sublime-text-free-course--net-27293
Added 10 years ago
[python] dvrown.py - CodeGist
http://codegists.com/snippet/python/dvrownpy_ylluminate_python
Discover the ultimate cricket betting experience at Crickex! Dive into an array of options, including thrilling in-play bets, with unbeatable odds. Join Crickex now and grab your free bonus up to ₹10,000!
Added 7 years ago
Coding Laboratory: Hacking a pager (part 1)
http://codinglab.blogspot.com/2009/05/hacking-pager-part-1.html
Added 10 years ago
The Cypherpunks Mailing List ()
http://comments.gmane.org/gmane.comp.security.cypherpunks/11664
Added 9 years ago
No Voicemail greeting message played - Solved! - FreePBX / Installation - FreePBX Community Forums
http://community.freepbx.org/t/no-voicemail-greeting-message-played-solved/5601/3
Hi
I am using freepbx 2.2.1
I have my all extensions configured with voicemail (with the default voicemail greeting).
By default, after no answer/unavailable/busy, the call should go to the extensions voicemail.
I…
Added 10 years ago
[FAQ] How can I setup my Phone / Provisioning / D... - Polycom Community
http://community.polycom.com/t5/VoIP/FAQ-How-can-I-setup-my-Phone-Provisioning-Download-Upgrade/td-p/4203
Added 10 years ago
[FAQ] Unable to Dial number if Off Hook or on 2nd ... - Polycom Community
http://community.polycom.com/t5/VoIP/FAQ-Unable-to-Dial-number-if-Off-Hook-or-on-2nd-Call-in-a/td-p/4233
Added 8 years ago
How to manually update a SoundPoint IP 335 - Polycom Community
http://community.polycom.com/t5/VoIP/How-to-manually-update-a-SoundPoint-IP-335/td-p/24924
Added 10 years ago
Incoming calls always prefixed "sip:" - Polycom Community
http://community.polycom.com/t5/VoIP/Incoming-calls-always-prefixed-quot-sip-quot/m-p/8546
Added 10 years ago
Polycom SNTP Client does not sync with NTP Server - Polycom Community
http://community.polycom.com/t5/VoIP/Polycom-SNTP-Client-does-not-sync-with-NTP-Server/td-p/2549
Added 10 years ago
Remove sip: from dialing a misssed call. - Polycom Community
http://community.polycom.com/t5/VoIP/Remove-sip-from-dialing-a-misssed-call/td-p/37156
Added 10 years ago
Configure OpenBSD as a routing firewall for a VLAN
http://computing.geology.ucdavis.edu/security/openbsd_routing_firewall-worksheet.php
Added 9 years ago
consolecowboys: Swann Song - DVR Insecurity
http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html
Added 7 years ago
How To Get Drupal To Work Through Strato's SSL Reverse Proxy
http://constantin.glez.de/blog/2010/01/how-get-drupal-work-through-stratos-ssl-reverse-proxy
Added 10 years ago
samsung Knox Manage
http://contents-ap.manage.samsungknox.com/onlinehelp/en/013_appendix_3.html
Added 5 years ago
The Sandbox | Understanding CyberForensics
http://cwsandbox.org/
We need to get some definitions out of the way so we all know what we are talking about. WHAT IS A SANDBOX: A "sandbox", as it relates to computer security, is a designated, separate and restricted environment (or "container", with tight control and permissions, where computer code can run without the ability to cause damage or infection. Just like in a real playground where children can play in the sandbox -- but are not allowed to play anywhere outside of the sand box. And the box around the "sand box" is designed to keep the sand in and not make a mess all around. At that moment, the sandbox is their "virtual world". WHAT IS VIRTUALIZATION and VIRTUAL MACHINES / VIRTUAL WORLD: "Virtualization" provides a separate environment within a computer that can function independently from all other environments on the computer. One virtual container cannot change or modify another virtual container. A "sandbox" and a "virtual machine" are not the same. When you run an application in a sandbox, it has access to run as if it were not in a sandbox. Anything the application attempts to create or change, however, is lost (or NOT saved) when the application stops running. In a "virtual machine", anything created or changed by the application is allowed, and everything that happens stay within the virtual machine. Similar to the "Las Vegas" theory; "What happens in Las Vegas stays in Las Vegas". Once testing is completed, the virtual machine in use can be deleted without concern for anything that was done to it by the running of the questionable application. WHAT IS A HONEYPOT? As it relates to computer security, a "honeypot" is typically a computer, network or a data system that appears to be part of a larger system, but is actually a controlled, standalone "bait" vehicle, designed to attract those wanting to infect and abuse. If you watch US television, you will most likely be familiar with the police action show "Bait Car". The difference being that the criminals get caught immediately in the tv show. Real life "honeypots" don't necessary lead to that same outcome. There are different types of "honey pots". For years, anti-spam companies "baited" forums, and web sites, and Usenet, and every source they could find, with email addresses in order to received spam. The spam received researched to identify where the spam comes from as well as other general patterns. The type of honeypot we utilize in this discussion applies to the collection, research, identification and analysis of "MalWare". Virus prevention software can't act on infections until it is taught about specific threats and Malware. WHAT IS MALWARE: "Malware" is a shortened form of "malicious software". Malicious software is used to gain control of your computer, allowing the malware creator to do whatever he wants. The ultimate goal of gaining control is to disrupt the normal operations of the target; obtain sensitive or secret information; or gain access to private computer networks and system for other purposes. Malware includes Trojans, viruses, ransom ware, spy ware, and yes, adware! In order for "malware" to be caught, classified, added to virus protection software, etc., it has to be "caught". So the web is full of "spider webs for malware", or "honeypots"! Honeypot creation can be as simple as placing an old computer (or server that is too old or too slow for any valid purpose), install honeypot software, and connect it to the network. (Honeypot software is available as an open source product by the way). It won't take long before your system sees malicious activity, as hackers begin scanning for weaknesses, and attempting to break in. In a test this year, a security blogger leased server space in various countries and created honeypots. Within five minutes of being active, some of the machines had already been "hit" or scanned more than nineteen times! These were unknown machines, without any public awareness of their name, location, or status. The number of hacking attempts increased exponentially over the next few days! Once hackers gain access to our system, they spend time looking around, searching for anything they can find. Since these systems are honeypots, they won't find anything. The next step is for the hacker to upload his malware to our system. At this point, the hacker will attempt to run his malware, but our system ignores him, and eventually he moves on or uploads other malware. Either way we have now harvested copies of malware being used in real-life. SO WHERE DOES THE SANDBOX FIT IT? Honeypots are equipped with a "sandbox" in order to contain and prevent the code or malware from wreaking havoc. Sandboxes are also used to analyze and learn about the specific malware threat. From a press release dated November 19, 2013, "Threat Track" (which is the new name for "CWSandbox"), bills itself as the complete "malware analysis solution". To maintain congruity, we will continue to refer to "Threat Track" and "CWSandbox" simply as the "sandbox". The main job of the sandbox is to enable "users to automate the sample submission process; completely analyze any threat; and quickly act to protect sensitive data". Once the sandbox gets the malware, it is able to analyze and evaluate the actions and processes of the malicious software. This allows system administrators to evaluate the potential exposure of their networks and take the appropriate action to secure against the latest threats. Although malware authors are trying to stay ahead of sandbox technology, sandbox has managed to implement new features and controls that mimic the actions required by the malware. For example, some malware "stalls" or as kids like to say, "plays possum", waiting for a period of time to pass or a particular action to occur – such as a system reboot. As part of the analysis, sandbox mimics a system reboot and then looks to see how the malware responds to the fake reboot. Need more proof? The Federal Bureau of Investigation (FBI) bid on the public market looking to use sandbox on "any machine owned or controlled by the FBI". The knew the value of the software. One final comment about why we need sandbox. "Automated malware must be analyzed (1) automatically, (2) effectively, and (3) correctly. … This is important to realistically assess the threat posed by the malware sample." For more information, go to http://www.threattracksecurity.com/
Added 10 years ago
Parse and Extract PST and OST Mailboxes – CyberFibers
http://cyberfibers.com/2014/08/place2/
Libpff is a powerful mail examination tool. The tool will allow you to examine and extract data without having to attach the PST to Outlook and has the ability to view emails that are encrypted. In my example below, I will be using the tool via the SANS SIFT workstation as it is already installed.
Added 8 years ago
Systems Administration for Cyborgs — System Administration for Cyborgs
http://cyborginstitute.org/projects/administration/
Added 10 years ago
Concisest guide to setting up Time Machine server on Ubuntu Server 12.04, 14.04 & Debian | Dae’s blog
http://dae.me/blog/1660/concisest-guide-to-setting-up-time-machine-server-on-ubuntu-server-12-04/
Added 9 years ago
PF Dual WAN Fail Over Issue (one box) - DaemonForums
http://daemonforums.org/showthread.php?t=6605
PF Dual WAN Fail Over Issue (one box) OpenBSD Security
Added 9 years ago
Toshiba E-Studio Default Administrator Username and Password — danblee.com
http://danblee.com/toshiba-e-studio-default-administrator-username-and-password/
Added 9 years ago
Emotionless guy on slingshot theme park ride set to Simon & Garfunkel’s ‘The Sound of Silence’ | Dangerous Minds
http://dangerousminds.net/comments/emotionless_guy_on_slingshot_theme_park_ride_set_to_simon_garfunkels_the_so
I remember when this video went viral back in 2011. It’s of a young guy giving zero fucks while on a slingshot ride somewhere in Florida. Well, thanks to the Internet—where old memes and viral videos just won’t die—it’s reemerged again with a soundtrack of Simon & Garfunkel’s “The Sound of Silence.”
The longer the video goes on—especially when the guy locks eyes with the camera—the more ridiculous it becomes. Stay with it.
via Geekologie
Added 9 years ago
Fascinating vintage promo film on the making of Stanley Kubrick’s ‘2001: A Space Odyssey’ | Dangerous Minds
http://dangerousminds.net/comments/fascinating_vintage_promo_film_on_the_making_of_stanley_kubricks_2001_a_spa
In 1964, Stanley Kubrick wrote to Arthur C. Clarke. He told the science fiction author he was a “a great admirer” of his books, and “had always wanted to discuss with [him] the possibility of doing the proverbial really good science-fiction movie.”
Kubrick briefly outlined his ideas:
My main interest lies along these broad areas, naturally assuming great plot and character:
The reasons for believing in the existence of intelligent extra-terrestrial life.
The impact (and perhaps even lack of impact in some quarters) such discovery would have on Earth in the near future.
A space probe with a landing...
Added 9 years ago
Inked ladies: Vintage photos of women with full body tattoos | Dangerous Minds
http://dangerousminds.net/comments/inked_ladies_vintage_photos_tattoos
The 1991 discovery of the well-preserved body of a 3,000-year-old corpse revealed (amongst many other things) that ancient humans tattooed their bodies. The mummified body was called “Ötzi the Iceman” after the Ötztal Alps where his remains were found. Ötzi had 50-odd tattoos across his body, which some scientists have suggested may be evidence of an early form of acupuncture—which if true, would put this form of treatment 2,000 years before its first documented appearance in China.
Tattoos have a long and culturally significant history—being used as a sign of initiation, association, clan, tribe, ownership, or sexual and personal...
Added 9 years ago
Let it snow: Shameless cocaine ads of the 1970s | Dangerous Minds
http://dangerousminds.net/comments/let_it_snow_shameless_cocaine_ads_of_the_1970s
Ah the 1970s, when disco dust was plentiful and there were cocaine paraphernalia ads galore in head magazines. Dig the Hoover-themed coke spoons! Or the “what the hell were they thinking” handmade ivory straws. And if your nose is a little clogged from too much coke, why not try “Noze: the nose wash”?
So as the majority of the taglines in these magazine clippings say, “Let it snow!”
via The World’s Best Ever
Added 9 years ago
Turn on, tune in and listen to Timothy Leary’s psychedelic jam with Jimi Hendrix on bass | Dangerous Minds
http://dangerousminds.net/comments/turn_on_tune_in_and_listen_to_timothy_learys_psychedelic_jam_with_jimi_hend
If you just got a contact high after reading the title of this post, then congratulations. Take two tabs of acid and call me in the morning! But only after you’ve listened to the three tracks from Harvard psychologist and drug guru Timothy Leary’s album (which was recorded in 1968), You Can Be Anyone This Time Around.
Timothy Leary and his bass player
Leary recorded the album, in part as a way to raise cash to fund his ill-fated run for Governor of California against the then incumbent, GOP golden god, Ronald Reagan. His campaign slogan was “...
Added 9 years ago
Vintage Japanese Young Person’s Guide to Sex | Dangerous Minds
http://dangerousminds.net/comments/vintage_japanese_young_persons_guide_to_sex
Added 9 years ago
Calomel.org :: Open Source Research and Reference
http://dant.net.ru/calomel/index.html
Apache Access Logs to MySQL Database - Dasun Hegoda
http://dasunhegoda.com/apache-access-logs-to-mysql-database/953/
Apache access Logs to MySQL, Configuring Apache to log each access request to MySQL database rather than storing it in a flat file. Centralising Apache logs
Added 9 years ago
my notes: OSSEC Rules 101
http://ddpbsd.blogspot.com/2010/10/ossec-rules-101.html
Added 10 years ago
Rolling out an API for your cakePHP app Part 1: The Problems | Deadly Technology
http://deadlytechnology.com/php/api-cakephp-app/
Rolling out an API for your cakePHP app Part 1: The Problems
Added 10 years ago
Grateful Dead Sources: 1974: Wall of Sound Technical Specs
http://deadsources.blogspot.com/2012/12/1974-wall-of-sound-technical-specs.html?m=1
Added 6 years ago
Setting up a Linux server for OS X clients – Deepport.net
http://deepport.net/archives/setting-up-a-linux-server-for-os-x-clients/
Added 10 years ago
Setting up a Linux server for OS X clients – Deepport.net
http://deepport.net/archives/setting-up-a-linux-server-for-os-x-clients/#linux-setup-and-configuration
Added 10 years ago
Setting up a Linux server for OS X clients – Deepport.net
http://deepport.net/archives/setting-up-a-linux-server-for-os-x-clients/#linux-setup-and-configuration
Added 10 years ago
GrassBlade LRS
http://demo.nextsoftwaresolutions.com/grassblade-lrs/Reports/dashboard
Added 10 years ago
Quand les attitudes deviennent forme - Studio XX
http://dev.studioxx.org/events/performance-3/
Added 9 years ago
Quand les attitudes deviennent forme - Studio XX
http://dev.studioxx.org/events/performance-3/
Added 9 years ago
Watch A Woodworker Build A Couch Desk From Start To Finish - Digg
http://digg.com/video/couch-desk-build-matthias-wandel?utm_medium=email&utm_source=digg
Added 9 years ago
Morning Edition | Vermont Public Radio
http://digital.vpr.net/programs/morning-edition#stream/0
Every weekday for more than 40 years, NPR's Morning Edition has taken listeners around the country and the world with multi-faceted stories and commentaries that inform challenge and occasionally amuse Morning Edition is the most listened-to news radio program in the country.>> Visit the Morning Edition website for more detailed program information.Music on Morning Edition Looking for a song you heard during Morning Edition? We call them "music beds" and all of Jenn Jarecki's selections are listed below in the searchable archive. If you can't find a song you heard, it was probably an NPR selection: visit NPR's Morning Edition site to view their music beds.
Added 7 years ago
The Digital Cave - Time Capsule Setup (Debian Wheezy)
http://digitalcave.ca/resources/computer/timemachine.jsp
Added 9 years ago
How to turn an old dresser into a seating furniture | DIY projects for everyone!
http://diyprojects.ideas2live4.com/2015/12/30/old-dresser-to-seating-furniture/
Added 9 years ago
Installing Cucumber on Ubiquiti UniFi AC - Cucumber Knowledge Base
http://docs.cucumberwifi.io/article/334-installing-cucumber-on-ubiquiti-unifi-ac
Added 9 years ago
Installing Cucumber on Ubiquiti UniFi AC - Cucumber Knowledge Base
http://docs.cucumberwifi.io/article/334-installing-cucumber-on-ubiquiti-unifi-ac
Added 9 years ago
docs.linuxtone.org/ebooks/Security/Linux-security.pdf
http://docs.linuxtone.org/ebooks/Security/Linux-security.pdf
Added 10 years ago
docs.linuxtone.org/ebooks/Shell/Wiley.Linux.Command.Line.and.Shell.Scripting.Bible.May.2008.pdf
http://docs.linuxtone.org/ebooks/Shell/Wiley.Linux.Command.Line.and.Shell.Scripting.Bible.May.2008.pdf
Added 10 years ago
cliff – Command Line Interface Formulation Framework — cliff 1.12.1.dev6 documentation
http://docs.openstack.org/developer/cliff/index.html
Added 10 years ago
Command-line Applications — The Hitchhiker's Guide to Python
http://docs.python-guide.org/en/latest/scenarios/cli/
Added 10 years ago
Index of /documents/fbifiles
http://documents.theblackvault.com/documents/fbifiles/
Added 5 years ago
5 Steps to Teaching Your Dog To Pee and Poop On Command
http://dogs.kinja.com/5-steps-to-teaching-your-dog-to-pee-and-poop-on-command-511788518
Added 10 years ago
Index of /repositories/home:/jgeboski/xUbuntu_16.04/amd64
http://download.opensuse.org/repositories/home:/jgeboski/xUbuntu_16.04/amd64/
Added 9 years ago
Index of /pub/telephony/res_digium_phone/firmware
http://downloads.digium.com/pub/telephony/res_digium_phone/firmware/
Added 5 years ago
downloads.polycom.com/voice/voip/sip_sw_releases_matrix.html
http://downloads.polycom.com/voice/voip/sip_sw_releases_matrix.html
Added 10 years ago
downloads.polycom.com/voice/voip/uc/UC_Software_4_0_8_Rev_C_Release_Notes.pdf
http://downloads.polycom.com/voice/voip/uc/UC_Software_4_0_8_Rev_C_Release_Notes.pdf
Added 10 years ago
DrPeering White Paper - Internet Transit Prices - Historical and Projections
http://drpeering.net/white-papers/Internet-Transit-Pricing-Historical-And-Projected.php
Internet Peering definition.
Added 8 years ago
Look up musicbrainz disc id and freedb id from EAC/XLD log
http://eac-log-lookup.blogspot.com/
tmux is sweet as heck / fuzzy notepad
http://eev.ee/blog/2012/03/21/tmux-is-sweet-as-heck/
People occasionally ask me why tmux is significantly better than screen, and I end up mumbling the first few things that come to mind. This has yet to sway anyone. Here,
Added 10 years ago
Deploying & Updating UltraVNC with Active Directory
http://elmaskubilay.blogspot.com/2012/03/deploying-updating-ultravnc-with-active.html
Women and Business: Women-Powered Farms - Enterprise
http://enterprise.vnews.com/2015/09/30/women-and-business-women-powered-farms/
Added 8 years ago
Asterisk Caller ID Blocking Recipe | Erics Tech Blog
http://eric.lubow.org/2007/system-administration/asterisk-pbx/asterisk-caller-id-blocking-recipe/
Here’s another quick little Asterisk recipe that I threw together. It’s a handy because it only takes about 10 minutes to setup and is infinitely useful to the sales types. Just a note, this was done with Asterisk 1.4.8. I wanted to do a little in AEL just to get a feel for it. It …
Added 10 years ago
1 Extension, Multiple Phones | Erics Tech Blog
http://eric.lubow.org/2008/system-administration/asterisk-pbx/1-extension-multiple-phones/
In order to setup Asterisk to ring multiple phones from the same dialed extension, you will need to create a phantom extension. I accomplished this by doing the following… Before we go any further, let’s use the following information as true. The extension we want to have ring in multiple places is extension 100. For …
Added 10 years ago
Quickly Build RESTful APIs in PHP with Slim – Part 4 » Things I Sort of Know
http://ericbrandel.com/2013/01/24/quickly-build-restful-apis-in-php-with-slim-part-4/
The fourth and final part of this series is focusing on using the Slim Framework’s middleware functionality to validate (to a degree) RESTful API requests. This post will show how to add a si…
Added 10 years ago
Apple Mac Pro 4-Core 2.8GHz (4-Core x 1) - 800MHz Memory Bus - Early 2008
http://eshop.macsales.com/MyOWC/Upgrades.cfm?model=283
Easily find compatible Memory Upgrades for Mac Pro (2.80 GHz, Early 2008).
Added 10 years ago
Blocking Telemarketers - Etel
http://etel.wiki.oreilly.com/wiki/index.php/Blocking_Telemarketers
Gain technology and business knowledge and hone your skills with learning resources created and curated by O'Reilly's experts: live online training, video, books, our platform has content from 200+ of the world's best publishers.
Added 7 years ago
Prettify Logs using FHC and Bunyan
http://evanshortiss.com/development/rhmap/2016/05/25/pretty-print-logs-using-fhc.html
Added 7 years ago
Evolix, Hosting && Outsourcing open source infrastructures / dedicated Linux servers in Marseille / Aix / Paris
http://evolix.com/
Evolix est une société spécialisée en hébergement et infogérance d'infrastructures Open Source à base de serveurs dédiés sous Linux et BSD.
Added 7 years ago
Evolix, Hébergement && Infogérance d'infrastructures Open Source / serveurs dédiés Linux à Marseille
http://evolix.com/emploi.html
Evolix est une société marseillaise spécialisée en hébergement et infogérance d'infrastructures Open Source à base de serveurs dédiés sous Linux et BSD.
Added 7 years ago
[E.O.M.S.]: The Robo Porn of Kathy McGinty
http://exileonmoanstreet.blogspot.com/2010/09/robo-porn-of-kathy-mcginty.html
Added 9 years ago
FarmersToYou
http://farmerstoyou.com/
Discover the convenience of farm-fresh groceries delivered to your door. We work with local farmers, ensuring quality and sustainability in every bite.
Added 10 years ago
How to Become Insanely Well-Connected | First Round Review
http://firstround.com/review/how-to-become-insanely-well-connected/
Chris Fralic is a world-class super-connector. Here's how the long-time First Round Partner has methodically built bonds spanning years and careers.
Added 8 years ago
Flyingvan: Something You Need To Know About Power Tools
http://flyingvan.blogspot.com/2013/02/something-you-need-to-know-about-power.html
Added 7 years ago
Timber Framing Hand Tools for Sale in For Sale
http://forestryforum.com/board/index.php?topic=50674.0
Timber Framing Hand Tools for Sale
Added 7 years ago
Arduino Controlled Wifi Antenna
http://forum.arduino.cc/index.php?topic=63761.0
Greetings,
I would like to devellop an arduino program that rotates a wave-guide antenna 360 degree's using a pan servo, and then points to the strongest signal, and then tracks it. I am fine on the hardware side, but I…
Added 10 years ago
Pirate Radio Stations Broadcasting On Shortwave Radio
http://freeradiocafe.com/
Pirate Radio Stations Broadcasting On Shortwave Radio
http://freeradiocafe.com/
Index of /lede/snapshots/targets/ar71xx/generic
http://ftp.halifax.rwth-aachen.de/lede/snapshots/targets/ar71xx/generic/
Added 7 years ago
Mp3 Info Tag revision 1 Specifications
http://gabriel.mp3-tech.org/mp3infotag.html
Everybody loves Eric Raymond » ELER highlights 2008
http://geekz.co.uk/lovesraymond/archive/eler-highlights-2008
Added 10 years ago
GeodSoft How-To Harden OpenBSD, Configuration Change Control
http://geodsoft.com/howto/harden/OpenBSD/no_changes.htm
GeodSoft: Web Site Design And Development.
How-to Harden OpenBSD using BSD's configuration change controls:
immutable files, securelevels, read only file systems, mount options.
Added 10 years ago
Giselle Zeno
http://gisellezeno.com/
Former Senior Software Engineer turned Machine Learning Researcher, now seeking ML Research / ML Engineering roles. I obtained my PhD in Computer Science at Purdue University , working with Prof. Jennifer Neville in the Network Learning & Discovery Lab . My research interests are in data mining and machine learning on relational data, including …
Added 10 years ago
Godai Group | Free Tools - Godai Group
http://godaigroup.net/free-tools/
BinPack (2010-2012) – BinPack is a portable appstore for Windows /w a focus on security. With 100+ security tools in the repository, you can easily convert any system into a pentesting platform in minutes. Nessus Parsing Tools (2008-2010) – Nessus Parsing Tools (npt for short) is a project to help people that use Nessus during vulnerability assessments or penetration tests. All nessus findings are converted from the nbe file to a sqlite database and there are several report modes to help save time finding vulnerabilities.
Added 7 years ago
gordon.dewis.ca | Replacement for my Unlimitel dialplan
http://gordon.dewis.ca/2008/04/11/replacement-for-my-unlimitel-dialplan/
When I started using Voice over IP technology, I acquired a wholesale DID from Unlimitel for an extremely reasonable monthly cost. Shortly thereafter I created an Asterisk-friendly version of the d…
Added 10 years ago