Author Archives: john

Fishcam using Raspberry Pi and some network tricks

Intro There are more articles about running a webcam using Raspberry Pi than Carter has pills. Why bother to create another? This one is unique insofar as I created a fishcam at a school with a restricted network. None of … Continue reading

Posted in Admin, Linux, Raspberry Pi | Tagged | Leave a comment

The IT Detective agency: Live hack caught, partially stopped

Intro In my years at cybersecurity I’ve been sufficiently removed from the action that I’ve rarely been involved in an actual case. Until last night. A friend, whom I’ll call Jute, got a formal complaint about one of his hosted … Continue reading

Posted in Admin, DNS, Network Technologies, Security | Tagged , | Leave a comment

Evaluation of WPI’s multiple camera coprocessor using Raspberry Pi

Intro There’s some good and some not-so-good about the new WPI-provided way to handle multiple video streams using a Raspebrry Pi. ELP Cameras problems I have bought many of these ELP cameras last year and this. I may be a … Continue reading

Posted in Linux, Raspberry Pi | Leave a comment

Google Hangouts Meet – what do these IPs all have in common? They all have been used by Google’s Hangouts Meet based on my observation. If you have an environment which uses proxy authentication, the above IPs do not play well with that. So you’ll need to … Continue reading

Posted in Admin, Proxy | Tagged | Leave a comment

Consumer Tech: amazing little Bluetooth adapter for your car

Intro My old car I decided finally needed a touch of Bluetooth connectivity. But how to do it without spending a fortune? The details I found this amazingly inexpensive gadget on Amazon that describes itself as follows: Handsfree Call Car … Continue reading

Posted in Consumer Tech | Tagged | Leave a comment

Great serial port concentrator: Raritan Dominion

Intro Every now and then you find a product that is a leap ahead of where you were. Such is the case for us with regards to our product of choice for serial consoles. The old For Bluecoat (Symantec) proxy … Continue reading

Posted in Admin, Security | Tagged , , , | Leave a comment

Counting active leases on an old ISC DHCP server

Intro Checkpoint Gaia offers a DHCP service, but it ias based on a crude and old dhcp daemon implementation frmo ISC. Doesn’t give you much. Mostly just the file /var/lib/dhcpd/dhcpd.leases, which it constantly updates. A typical dhcp client entry looks … Continue reading

Posted in Admin, Perl | Tagged | Leave a comment

The IT Detective Agency: Cisco Jabber Carriage Return problem fixed

Intro Cisco Jabber is a pretty good IM application. I’ve seen how it is a true productivity enhancer. But not so much when it doesn’t work right. The symptoms I hadn’t rebooted for awhile. I had a bunch of open … Continue reading

Posted in Web Site Technologies | Tagged | 1 Comment

Latest spear phishing: your password plus extortion

Intro Three users that I know at a certain company have all received spear phishing emails worded very much like this one: The details I don’t really have many more details. One user described it to me as follows. He … Continue reading

Posted in Scams, Spam | Leave a comment

Voice and data vlans on one switch port, no vlan tagging: how does that work?

Intro We had a Cisco video conference unit pick up an IP from a data vlan whereas we expected it to pick it up from a voice vlan, where we had assigned it a static IP. What happened? The details … Continue reading

Posted in Network Technologies | Tagged , | Leave a comment