Category Archives: Network Technologies

Network Technologies

Raspberry Pi photo frame using your pictures on your Google Drive

Intro All my spouse’s digital photo frames are either broken or nearly broken – probably she got them from garage sales. Regardless, they spend 99% of the the time black. Now, since I had bought that Raspberry Pi PiDisplay awhile … Continue reading

Posted in Network Technologies, Raspberry Pi | Tagged , , , | Leave a comment

F5 Big-IP: When your virtual server does not present your chain certificate

Intro While I was on vacation someone replaced a certificate which had expired on the F5 Big-IP load balancer. Maybe they were not quite as careful as I would like to hope I would have been. In any case, shortly … Continue reading

Posted in IT Operational Excellence, Network Technologies, Web Site Technologies | Leave a comment

How to test if a web site requires a client certificate

Intro I can not find a link on the Internet for this, yet I think some admins would appreciate a relatively simple test to know is this a web site which requires a client certificate to work? The errors generated … Continue reading

Posted in Admin, Linux, Network Technologies, Raspberry Pi, Security, Web Site Technologies | Tagged | Leave a comment

Postfix Operational tips

Intro I’m trying out the system-supplied postfix on a SLES system. i had been using sendmail but there doesn’t seem to be any development on that software. Some commands I needed right away Well, right away I had thousands of … Continue reading

Posted in Admin, Network Technologies | Tagged , | Leave a comment

Live stream to YouTube from a Raspberry Pi + webcam or USB microphone

Intro I’ve been looking at this off and on for awhile now. I finally made a breakthrough this week and started to generate some decent live streams on my Youtube channel, after a lot of misfires. Note this is applicable … Continue reading

Posted in Linux, Network Technologies, Raspberry Pi | Tagged , , , , , , | Leave a comment

The IT Detective agency: Live hack caught, partially stopped

Intro In my years at cybersecurity I’ve been sufficiently removed from the action that I’ve rarely been involved in an actual case. Until last night. A friend, whom I’ll call Jute, got a formal complaint about one of his hosted … Continue reading

Posted in Admin, DNS, Network Technologies, Security | Tagged , | Leave a comment

Voice and data vlans on one switch port, no vlan tagging: how does that work?

Intro We had a Cisco video conference unit pick up an IP from a data vlan whereas we expected it to pick it up from a voice vlan, where we had assigned it a static IP. What happened? The details … Continue reading

Posted in Network Technologies | Tagged , | Leave a comment

Linux tip: how to enable remote syslog on SLES

Intro I write this knowing I still don’t know anything to speak of about syslog, but, sometimes you gotta act without knowing. I needed to send syslog to somewhere in a big hurry so I figured out the absolute minimum … Continue reading

Posted in Admin, Linux, Network Technologies, SLES | Tagged , , | Leave a comment

LDAP authentication on the F5 BigIP without Access Policy Manager

Intro I recently received revised guidelines for dmz best practices which mentioned a requirement to implement application-independent authentication using the F5 web application firewall. I had never heard of it and didn’t think it was possible without buying the very … Continue reading

Posted in Network Technologies, Security | Tagged , , | Leave a comment

The IT Detective agency: Some insights into 4096-bit SSL keys

Intro I was recently asked if a new certificate a web site is about to deploy would require any changes to our clients such as needing to import this certificate into their Java keystore. The details Well, I saved the … Continue reading

Posted in Admin, Network Technologies, Security | Leave a comment