171 private links
If you are using a Raspberry Pi, the best approach is just to follow the guide over at the Tuya-Convert git and then skip down to Configuring Tasmota for the Brilliant Plug. This approach has been tried and tested and just keeps getting simpler. Over on YouTube digiblurDIY has a great guide following from the Tuya-Convert procedure which is great for beginners.
Kifarunix is blog dedicated to providing tips, tricks and HowTos for Nix enthusiasts; Command cheat sheets, monitoring, server configurations, virtualization, systems security, networking…the whole FOSS technologies. The major aim of all this is to share our Nix skills and knowledge with anyone who is interested especially the upcoming system admins. Stay connected and let us grow together.
Setting up a PI 3 for Docker is already described in several posts on the great wide internet. Below I will describe the method I used including the links for that. No need to reinvent the wheel now is there!
What Really Happens On Your Network? Part Seven – Pi-hole®: A black hole for Internet advertisements
We’re back with the latest iteration of users discovering things on their network via Pi-hole. This post is a compilation of things users have discovered over the past year. Some were bad, some were interesting, and some were enlightening. This isn’t the first time we’ve written a post like this, but we will try to go into more detail about what people have discovered and group together similar discoveries. Below you’ll find previous renditions of this type of post.
Many users have had issues with incorrectly auto detected log sources. In some extreme cases, incorrectly detected devices can have a major performance impact, which would lead to degradation on ecs-ec. The solution for this problem was to move this configuration into the database.
Application security is vitally important for every software project, especially so for security projects. This is why the validation process for QRadar app submissions go through a secure engineering review. As a member of the secure development team, this blog post will hopefully give you (the app developer) some insight regarding what to expect during our app validation process.
I provide support for european customers of QRadar and all of the family products (QVM, QRM, QRIF, QNI). Nowadays, I am more IT consultant than Civil engineer (MSc Eng), but I still have great passion for all reinforced concrete construction around the world.
FireEye’s Mandiant Incident Response and Intelligence teams have identified a wave of DNS hijacking that has affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. While we do not currently link this activity to any tracked group, initial research suggests the actor or actors responsible have a nexus to Iran.
Cisco Talos recently discovered a new campaign targeting Lebanon and the United Arab Emirates (UAE) affecting .gov domains, as well as a private Lebanese airline company. Based on our research, it's clear that this adversary spent time understanding the victims' network infrastructure in order to remain under the radar and act as inconspicuous as possible during their attacks.
Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM and I had to spend many hours to study the logs and figure out what was relevant.
Some tips about problems most of us should see in our network and security jobs, including troubleshooting, configurations, correlation rules, compliance stuff etc.
We ultimately architected UberEATS in much the same way as we would a regular React /Redux web app, eschewing iOS patterns and modules wherever possible. Fortunately for our needs and preferences, web concepts and technologies on the whole translate quite nicely to native development.
Il y a déjà de nombreux blogs uniques et passionnants qui donnent tout les bons conseils pour partir ailleurs. Il existe plein de blogs qui décrivent avec brio et émotion chaque merveille du monde à travers chacune des pérégrinations de leurs si différents auteurs.
Ici, il devrait juste s’agir, en courts billets, d’états d’esprit à l’escale, du caractère (extra)ordinaire de la déambulation. Il sera question d’élans, de transports, de stupeurs, de spleen, d’impatience … et de tout ce qui nous catapulte autour du monde.
Greetings,
My name is Daniel, and I’m an information security practitioner and writer living in San Francisco, California. Most people come for my tutorials, my essays, or the podcast, but you can find some of my most popular content below.
The Foofus.Net team is an assortment of security professionals and wannabes located somewhere in the Midwestern United States. This site exists to support the various tools and ideas that we’ve made public, along with aiding to fill our DefCon beer fund.
I periodically experiment on the Internet with different interests: freelancing, organizing a pseudo-company, collecting and analyzing various kinds of data related to information security, launching a small project or service, self-written or on the basis of some ready-made solution.
A bit of my life. You can try to reach me: zen @ either fish2.com or trouble.org. I sometimes jot things down at trouble.
This website is dedicated to internetworking documentation with FOSS.
It contains articles, guides, labs and presentations which can be used as
teaching or self learning material
As the documents have to be maintained over years, static web pages are the
most suitable way to publish them
Ok, let’s face it : I am a real, true, pure coder.