-
Recent Posts
- Fishcam using Raspberry Pi and some network tricks
- The IT Detective agency: Live hack caught, partially stopped
- Evaluation of WPI’s multiple camera coprocessor using Raspberry Pi
- Google Hangouts Meet – what do these IPs all have in common?
- Consumer Tech: amazing little Bluetooth adapter for your car
- Great serial port concentrator: Raritan Dominion
- Counting active leases on an old ISC DHCP server
- The IT Detective Agency: Cisco Jabber Carriage Return problem fixed
- Latest spear phishing: your password plus extortion
- Voice and data vlans on one switch port, no vlan tagging: how does that work?
- Solution to this week’s NPR puzzle using simple Linux commands, again
- The IT detective agency: rogue IPv6 device messes up DHCP for entire subnet
- Where is my IP without the aggressive ads
- What credit card fraud looks like
- NJ homeowners: how to sell your SRECs from your solar panels
- Linux tip: how to enable remote syslog on SLES
- Suppress /apple-touch-icon URLs on an F5 ASM
- Pi-hole: it’s as easy as pi to get rid of your advertisements
- Docker on CentOS 6: FAIL
- Future project idea: Interplanetary file system, IPFS
-
Recent Comments
Archives
Categories
- Admin
- Ajax
- Apache
- CentOS
- Consumer Tech
- Digital Currency
- DNS
- Exchange Online
- First Robotics
- flot
- Home Computing
- Hosting Service
- Image Manipulation
- Internet Mail
- IT Operational Excellence
- JavaScript
- jquery
- Linux
- Network Technologies
- ntp
- Perl
- Popular Science
- Proxy
- Python
- Raspberry Pi
- Scams
- Security
- SLES
- Spam
- TCP/IP
- Uncategorized
- Web Site Technologies
Meta
Category Archives: Admin
Fishcam using Raspberry Pi and some network tricks
Intro There are more articles about running a webcam using Raspberry Pi than Carter has pills. Why bother to create another? This one is unique insofar as I created a fishcam at a school with a restricted network. None of … Continue reading
The IT Detective agency: Live hack caught, partially stopped
Intro In my years at cybersecurity i’ve been sufficiently removed from the action that I’ve rarely been involved in an actual case. Until last night. A friend, whom I’ll call Jute, got a formal complaint about one of his hosted … Continue reading
Google Hangouts Meet – what do these IPs all have in common?
173.194.207.127 209.85.232.127 64.233.177.127 64.233.177.103 74.125.196.127 They all have been used by Google’s Hangouts Meet based on my observation. If you have an environment which uses proxy authentication, the above IPs do not play well with that. So you’ll need to … Continue reading
Great serial port concentrator: Raritan Dominion
Intro Every now and then you find a product that is a leap ahead of where you were. Such is the case for us with regards to our product of choice for serial consoles. The old For Bluecoat (Symantec) proxy … Continue reading
Posted in Admin, Security
Tagged DigiConnect, Dominion SXii, Raritan, terminal server
Leave a comment
Counting active leases on an old ISC DHCP server
Intro Checkpoint Gaia offers a DHCP service, but it ias based on a crude and old dhcp daemon implementation frmo ISC. Doesn’t give you much. Mostly just the file /var/lib/dhcpd/dhcpd.leases, which it constantly updates. A typical dhcp client entry looks … Continue reading
Linux tip: how to enable remote syslog on SLES
Intro I write this knowing I still don’t know anything to speak of about syslog, but, sometimes you gotta act without knowing. I needed to send syslog to somewhere in a big hurry so I figured out the absolute minimum … Continue reading
The IT Detective Agency: the vanishing certificate error
Intro I was confronted with a web site certificate error. A user was reluctant – correctly – to proceed to an internal web site because he saw a message to the effect: I tried it myself with IE and got … Continue reading
The IT Detective agency: Some insights into 4096-bit SSL keys
Intro I was recently asked if a new certificate a web site is about to deploy would require any changes to our clients such as needing to import this certificate into their Java keystore. The details Well, I saved the … Continue reading
Posted in Admin, Network Technologies, Security
Leave a comment
A taste of the Instagram API
Intro I always want to know more about how things really work behind the scenes, so I was excited when I overheard talk about how one company uses the Instagram API to do some cool things. An API is an … Continue reading
Measuring bandwidth on Checkpoint Gaia
Intro Sometimes you don’t have the tools you want but you have enough to make do. Such is the case with the command line utilities of the CLI of Checkpoint Gaia. It’s like a basic Linux. The company I consult … Continue reading