Links
Add
Raspberry Pi PirateBox
http://www.instructables.com/id/Raspberry-Pi-PirateBox/
Raspberry Pi PirateBox: A PirateBox is a Linux based system built using free software for the Raspberry Pi that provides private sharing of digital content. The PirateBox creates a local WiFi network, independent from the Internet, with anonymous file sharing and chatting…
Added 10 years ago
ClearOS – OS for your Server, Network, and Gateway Systems
https://www.clearos.com/
Added 10 years ago
IT Services - Information Technology Services - NCSA Wiki
https://wiki.ncsa.illinois.edu/display/ITS/IT+Services?src=contextnavchildmode
Added 10 years ago
linux - How do I find out what hard disks are in the system? - Unix & Linux Stack Exchange
https://unix.stackexchange.com/questions/4561/how-do-i-find-out-what-hard-disks-are-in-the-system
Added 10 years ago
Linux: emergency reboot or shutdown with magic commands - major.io
https://major.io/2009/01/29/linux-emergency-reboot-or-shutdown-with-magic-commands/
Added 10 years ago
Connecting
https://portal.moovmanage.com/greyhound-att-vz/t/connect.php?res=notyet&uamip=10.0.0.1&uamport=3990&challenge=a002c6a7d1123554578da1d38a19ee6f&userurl=http://kurthbemis.com/&nasid=16396&mac=D8-50-E6-30-FD-69&status=connecting#
Added 10 years ago
Amazon.com: DYMO LabelWriter 450 Turbo Thermal Label Printer (1752265): Office Products
http://www.amazon.com/DYMO-LabelWriter-Thermal-Printer-1752265/dp/B0027JIIKQ
Amazon.com : DYMO Label Printer | LabelWriter 450 Turbo Direct Thermal Label Printer, Fast Printing, Great for Labeling, Filing, Mailing, Barcodes and More, Home & Office Organization : Label Makers : Office Products
Added 10 years ago
12030368_10153224092812057_53277875596031167_o.jpg (1000×792)
https://scontent.xx.fbcdn.net/hphotos-xaf1/t31.0-8/12030368_10153224092812057_53277875596031167_o.jpg
Added 10 years ago
[Build Log] The Rackosauras: FreeNAS Server and 12U SOHO Network Rack
http://www.overclock.net/t/1535490/build-log-the-rackosauras-freenas-server-and-12u-soho-network-rack
Added 10 years ago
The Best Self-Hosted Alternatives to Popular Services
http://lifehacker.com/the-best-self-hosted-alternatives-to-popular-services-1579866571
Most of us use services like Gmail, Feedly, and Instapaper to get through the day—but that means giving up privacy and locking into a service you don'
Added 10 years ago
How to improve ZFS performance | ICESQUARE – Solve Computer Server Problems, Computer Help, Server Support, Server Help
https://icesquare.com/wordpress/how-to-improve-zfs-performance/
Added 10 years ago
ZFS Raidz Performance, Capacity and Integrity Comparison @ Calomel.org
https://calomel.org/zfs_raid_speed_capacity.html
Added 10 years ago
Securing the Virtual Environment: How to Defend the Enterprise Against Attack - Davi Ottenheimer, Matthew Wallace - Google Books
https://books.google.com/books?id=k5eYiYIC2pUC&pg=PA377&lpg=PA377&dq=debian+installed+xen+uname&source=bl&ots=jscERgmmoQ&sig=VbxZLOA6cspRUbrUUtc5zcsUueg&hl=en&sa=X&ved=0CFwQ6AEwCWoVChMIlIDZ2bCGyAIVy5ENCh1QVgaS#v=onepage&q=debian%20installed%20xen%20uname&f=false
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations Accompanying DVD includes hands-on examples and code This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.
Added 10 years ago
Broken debian package · Issue #3103 · zfsonlinux/zfs · GitHub
https://github.com/zfsonlinux/zfs/issues/3103
Hello, today I'm trying to install on clean debian zfs. It is not going well. ((( sudo wget http://archive.zfsonlinux.org/debian/pool/main/z/zfsonlinux/zfsonlinux_4_all.deb --2015-02-13 15:14:44-- http://archive.zfsonlinux.org/debian/poo...
Added 10 years ago
Days Of The New - Touch, Peel And Stand - YouTube
https://www.youtube.com/watch?v=Wg-HZd4Lb2Q&index=13&list=PLtSKbhYGglhM2M3Wy82Xc8A08NIwgSZUk
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Understanding Nginx Server and Location Block Selection Algorithms | DigitalOcean
https://www.digitalocean.com/community/tutorials/understanding-nginx-server-and-location-block-selection-algorithms
Nginx is one of the most popular web servers in the world. In this guide, we will discuss how Nginx selects the server and location block that will handle a…
Added 10 years ago
The Chase (1994 ) - YouTube
https://www.youtube.com/watch?v=kHyaSVBa93k&feature=youtu.be&t=3047
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
image-jpg.25277 (621×960)
https://squattheplanet.com/attachments/image-jpg.25277/
Added 10 years ago
Shaun's Video's - Shaun Paul Knight | Facebook
https://www.facebook.com/sh0rne.the.prawn/videos/10153456992263006/
Added 10 years ago
rdesktop(1): Remote Desktop Protocol client - Linux man page
http://linux.die.net/man/1/rdesktop
Added 10 years ago
Agile Testing: Configuring OpenLDAP as a replacement for NIS
http://agiletesting.blogspot.ca/2005/10/configuring-openldap-as-replacement.html
Added 10 years ago
CakePHP: the rapid development php framework: Users
http://nvx.academieneovox.ca/nvx/
Added 10 years ago
Virtualizing MySQL , are you stupid ? | Everything is a Freaking DNS problem
http://www.krisbuytaert.be/blog/node/757
Added 10 years ago
Multiple SSID with VLAN | Trizelka's Weblog
https://trizelka.wordpress.com/openwrt-multiple-ssid-with-vlan/
Basic idea is to make the device tl-wr1043ND with multiple virtual SSID. Each SSID using VLANs. On the switch, will be connected to a specific operator with the corresponding vlan. Client can opt for a specific SSID, which will correlate with a particular operator. For example, the SSID OpenWrt1, is the operator "A" which is…
Added 10 years ago
Creating a Virtual Network Interface in Debian - www.bentasker.co.uk
https://www.bentasker.co.uk/documentation/linux/255-creating-a-virtual-network-interface-in-debian
There are times when you might want to assign more than one IP to a system, even if it only has a single physical NIC. This documentation details how to create a virtual network interface (known as aliasing) under Debian (see here for how to alias in Centos 6). We'll assume that your NIC is eth0, if not then simply use the name of your network interface
Added 10 years ago
Virtual Machine (VM), Windows Virtual PC & BrowserStack : Microsoft Edge Dev
https://dev.modern.ie/tools/vms/linux/
Added 10 years ago
MMA fighter & IWW member Jeff Monson (the IWW sabo-cat is tattooed on his shoulder) | MMA | Pinterest
https://www.pinterest.com/pin/156992736984410664/
Added 10 years ago
Jeff Monson - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Jeff_Monson
Added 10 years ago
Venuerater's Blog | Just another WordPress.com site
https://venuerater.wordpress.com/
Just another WordPress.com site
Added 10 years ago
Renewable Technology Resources
http://renewabletechnologyresources.com/
Apple Dell Lenovo HP Hewlett Packard Asus Chromebook ipad iphone laptop tablet convertible desktop ios osx android windows office repair virus removal data recovery screen repair hard drive replacement ram memory upgrade installation wholesale recycling IT equipment RAM HDD Hard Drives adapters motherboards logic board
Added 10 years ago
Create the root pair — OpenSSL Certificate Authority — Jamie Nguyen
https://jamielinux.com/docs/openssl-certificate-authority/create-the-root-pair.html
Added 10 years ago
https://www.colorado.edu/oit/sites/default/files/ossec_training.pdf
https://www.colorado.edu/oit/sites/default/files/ossec_training.pdf
Added 10 years ago
www.ossec.net/files/Making_the_Most_of_OSSEC.pdf
http://www.ossec.net/files/Making_the_Most_of_OSSEC.pdf
Added 10 years ago
https://blog.savoirfairelinux.com/wp-content/uploads/2014/03/SFL-ED01-OSSec-the-quick-and-dirty-way-140326-01.pdf
https://blog.savoirfairelinux.com/wp-content/uploads/2014/03/SFL-ED01-OSSec-the-quick-and-dirty-way-140326-01.pdf
Added 10 years ago
OpenPGP Key Transition Statement | Simon Josefsson's blog
http://blog.josefsson.org/2014/06/23/openpgp-key-transition-statement/
Added 10 years ago
Offline GnuPG Master Key and Subkeys on YubiKey NEO Smartcard | Simon Josefsson's blog
http://blog.josefsson.org/2014/06/23/offline-gnupg-master-key-and-subkeys-on-yubikey-neo-smartcard/
Added 10 years ago
$25 GL.iNet 6416A is an Hackable OpenWRT Router with Easy UART and GPIO Access
http://www.cnx-software.com/2014/08/25/25-gl-inet-6416a-is-an-hackable-openwrt-router-with-easy-uart-and-gpio-access/
There are plenty of low cost routers supporting OpenWRT, but GL.iNet 6416A has several advantages compared to devices like TP-Link WR703N. Both are based
Added 10 years ago
The ultimate OpenBSD router | Hacker News
https://news.ycombinator.com/item?id=9482696
Added 10 years ago
Ask HN: Best current model routers for OpenWRT, DD-WRT, Tomato, etc.? | Hacker News
https://news.ycombinator.com/item?id=6828699
Added 10 years ago
FreeBSD 10.0 on Ubiquiti EdgeRouter Lite | Hacker News
https://news.ycombinator.com/item?id=7281991
Added 10 years ago
How To Set Up a Local OSSEC Installation on Debian 8 | DigitalOcean
https://www.digitalocean.com/community/tutorials/how-to-set-up-a-local-ossec-installation-on-debian-8
OSSEC is an open-source, host-based intrusion detection system (HIDS) that performs log analysis, integrity checking, Windows registry monitoring, rootkit de…
Added 10 years ago
my notes: OSSEC Rules 101
http://ddpbsd.blogspot.com/2010/10/ossec-rules-101.html
Added 10 years ago
Tracking Malicious IP & Users with OSSEC - /dev/random
https://blog.rootshell.be/2011/02/02/tracking-malicious-ip-users-with-ossec/
A few months ago I blogged about Active Lists in OSSEC. Active lists are common in SIEM environments to store temporary sensitive data like IP addresses, user names or any other relevant information. Once stored in active lists, data can be reused in rules and the security of an infrastructure
Added 10 years ago
Vox Popoli: More social justice convergence in action
http://voxday.blogspot.ca/2015/09/more-social-justice-convergence-in.html
Added 10 years ago
The morning habits of successful tech executives - Business Insider
http://www.businessinsider.com/morning-habits-successful-tech-executives-2015-9
The entire flow of your day can all depend on how you start it. Here's how some of the most successful people in the tech industry do each morning.
Added 10 years ago
https://www.paypal-knowledge.com/infocenter/index?page=content&id=FAQ1766&expand=true&locale=en_US
https://www.paypal-knowledge.com/infocenter/index?page=content&id=FAQ1766&expand=true&locale=en_US
Transfer money online in seconds with PayPal money transfer. All you need is an email address.
Added 10 years ago
ownCloud Forums • View topic - [Solved]Owncloud subdirectory : This content failed to load.
https://forum.owncloud.org/viewtopic.php?f=31&t=27661
ownCloud Central: Discuss - Learn - Ask
Added 10 years ago
Asterisk firewall rules - voip-info.org
http://www.voip-info.org/wiki/view/Asterisk+firewall+rules
This is an example on how to configure a Linux IPTables firewall for Asterisk
Added 10 years ago
Install ownCloud in a subdirectory using nginx | aelog
http://www.aelog.org/install-owncloud-in-a-subdirectory-using-nginx/
Added 10 years ago
Added 10 years ago
Parse PHP file variables from Python script - Stack Overflow
https://stackoverflow.com/questions/16881577/parse-php-file-variables-from-python-script
Added 10 years ago
SSD in WatchGuard Firebox x750e
http://jelmerbruijn.nl/ssd-in-watchguard-x750e/
Adding an SSD to a firewall appliance
Added 10 years ago
Coding Laboratory: Hacking a pager (part 1)
http://codinglab.blogspot.com/2009/05/hacking-pager-part-1.html
Added 10 years ago
POCSAG Pager Decoding | nathan.chantrell.net
http://nathan.chantrell.net/old-stuff/radio/radio-scanning/pocsag-pager-decoding/
Added 10 years ago
Ham Radio: Pagers => Build a POCSAG decoder using a BRAVO receiver board instead of a scanner
http://www.hamradio.cc/forum/index.php?goto=70&t=msg
Added 10 years ago
Bringing A Legacy Pager Network Back to Life | Hackaday
http://hackaday.com/2014/12/30/bringing-a-legacy-pager-network-back-to-life/
[Jelmer] recently found his old pager in the middle of a move, and decided to fire it up to relive his fond memories of receiving a page. He soon discovered that the pager’s number was no lon…
Added 10 years ago
websec.io - API Authentication: HMAC with Public/Private Hashes
http://websec.io/2013/02/14/API-Authentication-Public-Private-Hashes.html
Added 10 years ago
ICT Security-Sécurité PC et Internet | Scoop.it
http://www.scoop.it/t/securite-pc-et-internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Added 10 years ago
The Sandbox | Understanding CyberForensics
http://cwsandbox.org/
We need to get some definitions out of the way so we all know what we are talking about. WHAT IS A SANDBOX: A "sandbox", as it relates to computer security, is a designated, separate and restricted environment (or "container", with tight control and permissions, where computer code can run without the ability to cause damage or infection. Just like in a real playground where children can play in the sandbox -- but are not allowed to play anywhere outside of the sand box. And the box around the "sand box" is designed to keep the sand in and not make a mess all around. At that moment, the sandbox is their "virtual world". WHAT IS VIRTUALIZATION and VIRTUAL MACHINES / VIRTUAL WORLD: "Virtualization" provides a separate environment within a computer that can function independently from all other environments on the computer. One virtual container cannot change or modify another virtual container. A "sandbox" and a "virtual machine" are not the same. When you run an application in a sandbox, it has access to run as if it were not in a sandbox. Anything the application attempts to create or change, however, is lost (or NOT saved) when the application stops running. In a "virtual machine", anything created or changed by the application is allowed, and everything that happens stay within the virtual machine. Similar to the "Las Vegas" theory; "What happens in Las Vegas stays in Las Vegas". Once testing is completed, the virtual machine in use can be deleted without concern for anything that was done to it by the running of the questionable application. WHAT IS A HONEYPOT? As it relates to computer security, a "honeypot" is typically a computer, network or a data system that appears to be part of a larger system, but is actually a controlled, standalone "bait" vehicle, designed to attract those wanting to infect and abuse. If you watch US television, you will most likely be familiar with the police action show "Bait Car". The difference being that the criminals get caught immediately in the tv show. Real life "honeypots" don't necessary lead to that same outcome. There are different types of "honey pots". For years, anti-spam companies "baited" forums, and web sites, and Usenet, and every source they could find, with email addresses in order to received spam. The spam received researched to identify where the spam comes from as well as other general patterns. The type of honeypot we utilize in this discussion applies to the collection, research, identification and analysis of "MalWare". Virus prevention software can't act on infections until it is taught about specific threats and Malware. WHAT IS MALWARE: "Malware" is a shortened form of "malicious software". Malicious software is used to gain control of your computer, allowing the malware creator to do whatever he wants. The ultimate goal of gaining control is to disrupt the normal operations of the target; obtain sensitive or secret information; or gain access to private computer networks and system for other purposes. Malware includes Trojans, viruses, ransom ware, spy ware, and yes, adware! In order for "malware" to be caught, classified, added to virus protection software, etc., it has to be "caught". So the web is full of "spider webs for malware", or "honeypots"! Honeypot creation can be as simple as placing an old computer (or server that is too old or too slow for any valid purpose), install honeypot software, and connect it to the network. (Honeypot software is available as an open source product by the way). It won't take long before your system sees malicious activity, as hackers begin scanning for weaknesses, and attempting to break in. In a test this year, a security blogger leased server space in various countries and created honeypots. Within five minutes of being active, some of the machines had already been "hit" or scanned more than nineteen times! These were unknown machines, without any public awareness of their name, location, or status. The number of hacking attempts increased exponentially over the next few days! Once hackers gain access to our system, they spend time looking around, searching for anything they can find. Since these systems are honeypots, they won't find anything. The next step is for the hacker to upload his malware to our system. At this point, the hacker will attempt to run his malware, but our system ignores him, and eventually he moves on or uploads other malware. Either way we have now harvested copies of malware being used in real-life. SO WHERE DOES THE SANDBOX FIT IT? Honeypots are equipped with a "sandbox" in order to contain and prevent the code or malware from wreaking havoc. Sandboxes are also used to analyze and learn about the specific malware threat. From a press release dated November 19, 2013, "Threat Track" (which is the new name for "CWSandbox"), bills itself as the complete "malware analysis solution". To maintain congruity, we will continue to refer to "Threat Track" and "CWSandbox" simply as the "sandbox". The main job of the sandbox is to enable "users to automate the sample submission process; completely analyze any threat; and quickly act to protect sensitive data". Once the sandbox gets the malware, it is able to analyze and evaluate the actions and processes of the malicious software. This allows system administrators to evaluate the potential exposure of their networks and take the appropriate action to secure against the latest threats. Although malware authors are trying to stay ahead of sandbox technology, sandbox has managed to implement new features and controls that mimic the actions required by the malware. For example, some malware "stalls" or as kids like to say, "plays possum", waiting for a period of time to pass or a particular action to occur – such as a system reboot. As part of the analysis, sandbox mimics a system reboot and then looks to see how the malware responds to the fake reboot. Need more proof? The Federal Bureau of Investigation (FBI) bid on the public market looking to use sandbox on "any machine owned or controlled by the FBI". The knew the value of the software. One final comment about why we need sandbox. "Automated malware must be analyzed (1) automatically, (2) effectively, and (3) correctly. … This is important to realistically assess the threat posed by the malware sample." For more information, go to http://www.threattracksecurity.com/
Added 10 years ago
SSH Brute Force - The 10 Year Old Attack That Still Persists - Sucuri Blog
https://blog.sucuri.net/2013/07/ssh-brute-force-the-10-year-old-attack-that-still-persists.html
Brute force attacks are always evolving. We see brute force attacks not only against admin panels, but also attacks against SSH and FTP passwords.
Added 10 years ago
Tractors vs Riot Police - YouTube
https://www.youtube.com/watch?v=Xv-5rAkh6VI
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Rakim – The 18th Letter / The Book Of Life (2xCD) (1997) (FLAC + 320 kbps) | 80s And 90s Hip-Hop Blog
http://www.1994hiphop.com/2014/04/rakim-the-18th-letter-the-book-of-life-2xcd-1997-flac-320-kbps/
Added 10 years ago
Eric B. & Rakim - In The Ghetto - YouTube
https://www.youtube.com/watch?v=JEgKRuA_eSw
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Detecting Kippo SSH honeypots, bypassing patches, and all that jazz - Andrew Morris
http://morris.guru/detecting-kippo-ssh-honeypots/
Added 10 years ago
I'm Tim Ferriss, and This Is How I Work
http://lifehacker.com/5961603/im-tim-ferriss-and-this-is-how-i-work
When we kicked off the How I Work series in August, we encouraged readers to tell us whose productivity tips and tricks they were dying to know. No
Added 10 years ago
William Bilancio - System Administration, Blogging, Conference Organizing, LOPSA, Cooking, BBQ
https://bilancio.org/
Radio DJ and Owner, Antiques Dealer, Comic Book Collector, Writer, Philosopher, Photographer, Traveler, Foodie, Cook, BBQ Pitmaster and Judge
Added 10 years ago
T-Pot: A Multi-Honeypot Platform
https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html
Added 10 years ago
HoneyDrive honeypot bundle distro - BruteForce Lab's Blog
https://bruteforce.gr/honeydrive
HoneyDrive is a virtual appliance that contains various honeypot packages and pre-configured scripts to analyze and visualize the data it can capture.
Added 10 years ago
CodeIgniter Nginx Rewrite Rules · anvoz/CodeIgniter-Skeleton Wiki
https://github.com/anvoz/CodeIgniter-Skeleton/wiki/CodeIgniter-Nginx-Rewrite-Rules
A decent starter for most web apps. Includes HMVC, jQuery, Bootstrap, Bootstrap TLDR, Ajax and Template libraries. Unit tests with PHPUnit and vfsStream. - CodeIgniter Nginx Rewrite Rules · anvoz/CodeIgniter-Skeleton Wiki
Added 10 years ago
breadcrumbs - place in functions.php and call in your theme with dimox_breadcrumbs() [Source](http://dimox.net/wordpress-breadcrumbs-without-a-plugin/)
https://gist.github.com/melissacabral/4032941
breadcrumbs - place in functions.php and call in your theme with dimox_breadcrumbs()
[Source](http://dimox.net/wordpress-breadcrumbs-without-a-plugin/) - wp-dimox-breadcrumbs.php
Added 10 years ago
Andy Wilkerson (@AndyInTheWild) | Twitter
https://twitter.com/AndyInTheWild?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
Added 10 years ago
15 useful Wordpress Functions you probably don’t know | Kriesi.at - Premium WordPress Themes
http://www.kriesi.at/archives/15-useful-wordpress-functions-you-probably-dont-know
While I was building my first premium Wordpress Plugin - the Avia Feedback Box - I needed to solve quite a few problems I have never encounterd when creating themes. During my research I stumbled upon several really cool wordpress functions that I want to share with you.
Added 10 years ago
ircmaxell's blog: The True Problem With PHP
http://blog.ircmaxell.com/2012/07/true-problem-with-php.html
There’s been a lot of traffic lately about what’s wrong with PHP, and counter posts about how good it is. I’ve even fallen into the fray in an earlier article trying to step up and defend the language
Added 10 years ago
Linux: 25 PHP Security Best Practices For Sys Admins
http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html
Added 10 years ago
Doc Searls Weblog · Thoughts on privacy
http://blogs.law.harvard.edu/doc/2013/08/31/thoughts-on-privacy/
In Here Is New York, E.B. White opens with this sentence: “On any person who desires such queer prizes, New York will bestow the gift of loneliness and the gift of privacy.” Sixty-four …
Added 10 years ago
Doc Searls Weblog · Thoughts on privacy
http://blogs.law.harvard.edu/doc/2013/08/31/thoughts-on-privacy/
In Here Is New York, E.B. White opens with this sentence: “On any person who desires such queer prizes, New York will bestow the gift of loneliness and the gift of privacy.” Sixty-four …
Added 10 years ago
Asterisk Configuration Examples - voip-info.org
http://www.voip-info.org/wiki/view/Asterisk+Configuration+Examples
Added 10 years ago
Hack | A typeface designed for source code
http://sourcefoundry.org/hack/
Hack | A typeface designed for source code
Added 10 years ago
WordPress XML-RPC Password Brute Force · GitHub
https://gist.github.com/erwanlr/2ea10082148887ac1ae8
WordPress XML-RPC Password Brute Force. GitHub Gist: instantly share code, notes, and snippets.
Added 10 years ago
Configuring Sublime Text :: Scott Granneman
http://www.granneman.com/webdev/editors/sublime-text/configuring-sublime-text/
How to set it up in general, & for specific languages.
Added 10 years ago
Keeping WordPress Secure - The Complete Guide to WP Security
https://premium.wpmudev.org/blog/keeping-wordpress-secure-the-ultimate-guide/
This comprehensive, deep-dive guide into WordPress security covers everything you need to know to keep your website safe and secure.
Added 10 years ago
Nerd Vittles » Tips & Tricks to Turbocharge Your Asterisk@Home PBX
http://nerdvittles.com/?p=63
Added 10 years ago
Well-heeled hacker installs pentest kit in her size 8s | Naked Security
https://nakedsecurity.sophos.com/2015/08/24/meet-sexycyborg-and-her-high-heeled-shoes-with-hacking-tools-inside/
Added 10 years ago
You Can't Understand Security Without These Classic Works | WIRED
http://www.wired.com/2015/09/wargames-crypto-sneakers14-core-security-related-works/
Essential background material for helping you understand the worlds of security and government today.
Added 10 years ago
NSA Releases ‘Security Enhanced Android’, Offering Government Level Protection For Your Device | Droid Life
http://www.droid-life.com/2012/01/19/nsa-releases-security-enhanced-android-offering-government-level-protection-for-your-device/
Do you sometimes feel that your phone just isn’t as secure as it should be? Then allow me to introduce Security Enhanced Android (SEA), brought to you by the wonderful folks over at the National Security Agency (NSA). Taken from the AOSP and then beefed up to... #NSA #SecurityEnhancedAndroid
Added 10 years ago
Security-Enhanced Linux in Android | Android Open Source Project
https://source.android.com/devices/tech/security/selinux/
Added 10 years ago
- Moto G (2nd Generation) - Android™ 5.0 Lollipop - Release Notes
https://motorola-global-portal.custhelp.com/app/answers/prod_answer_detail/a_id/102639
Added 10 years ago
https://www.internetsociety.org/sites/default/files/02_4.pdf
https://www.internetsociety.org/sites/default/files/02_4.pdf
Added 10 years ago
XMPP and Asterisk integration - a practical example part 2
http://www.mundoopensource.com.br/xmpp-asterisk-integration-practical-example-part-2/
Another example showing the possibilities of using the XMPP and VoIP integration.
Added 10 years ago
Caller ID in SIP and Asterisk – Part 2 – The Smartvox Knowledgebase
http://kb.smartvox.co.uk/asterisk/how-it-works/caller-id-in-sip-and-asterisk-part-2/
Added 10 years ago
Asterisk VoIP : Getting your outbound CallerID to show properly | David Vassallo's Blog
http://blog.davidvassallo.me/2013/07/23/asterisk-voip-getting-your-outbound-callerid-to-show-properly/
We lately ran into a scenario where our asterisk server is connected via SIP trunk to our DID provider (mydivert.com). Our PABX server opens a single SIP trunk to the provider, however we have multiple DIDs running over this trunk. Having multiple DIDs means we can use multiple phone numbers, in different countries, benefiting from…
Added 10 years ago
At the Car Lot | This American Life
http://www.thisamericanlife.org/at-the-car-lot/
Added 10 years ago
At the Car Lot | This American Life
http://www.thisamericanlife.org/at-the-car-lot/
Added 10 years ago
Asterisk Caller ID Blocking Recipe | Erics Tech Blog
http://eric.lubow.org/2007/system-administration/asterisk-pbx/asterisk-caller-id-blocking-recipe/
Here’s another quick little Asterisk recipe that I threw together. It’s a handy because it only takes about 10 minutes to setup and is infinitely useful to the sales types. Just a note, this was done with Asterisk 1.4.8. I wanted to do a little in AEL just to get a feel for it. It …
Added 10 years ago
Any Way to Assign Different Caller IDs to Different Outbound Routes | PBX in a Flash Forum
http://pbxinaflash.com/community/index.php?threads/any-way-to-assign-different-caller-ids-to-different-outbound-routes.4055/
Added 10 years ago
[FREEPBX-1417] Strip characters off incoming caller id by trunk. - FreePBX Issue Tracker
http://issues.freepbx.org/browse/FREEPBX-1417
The unified FreePBX issue tracker. Contribute to FreePBX/issue-tracker development by creating an account on GitHub.
Added 10 years ago
Dialplan drop plus on incoming caller id | PBX in a Flash Forum
http://pbxinaflash.com/community/index.php?threads/dialplan-drop-plus-on-incoming-caller-id.11079/
Added 10 years ago
16 tips on OpenVPN security · blog.g3rt.nl
https://blog.g3rt.nl/openvpn-security-tips.html
16 tips in securing your OpenVPN configuration.
Added 10 years ago
Open source solutions for a home security camera system | JacobyTech Blog
http://www.jacobytech.net/2011/05/26/open-source-solutions-for-a-home-security-camera-system/
Free (almost) ways to use an old computer as your home or small business video surveillance system. You’ll need to purchase some network cameras of course, as well as cables (unless the camer…
Added 10 years ago
Inside Amy Schumer - Finger Blasters - YouTube
https://www.youtube.com/watch?v=RfPRAE2xfcc
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Information Systems Knowledge Base
http://help.wfu.edu/
AskDeac is an easy-to-use technology help portal and ticketing platform for WFU faculty, students, staff, and guests.
Added 10 years ago
Authentication/PasswordSchemes - Dovecot Wiki
http://wiki2.dovecot.org/Authentication/PasswordSchemes
Added 10 years ago
Comparison to Commercial Alternatives - PFSenseDocs
https://doc.pfsense.org/index.php/Comparison_to_Commercial_Alternatives
Added 10 years ago