We show the steps to configure a proxy using macOS System Preferences Panel
Using a script embedded in the page and the developer console, we review the use of objects, prototypes, and constructors to achieve inheritance.
A brief review of cloning, building, debugging, and experimenting with the master branch of the OpenSSL project. Includes stepping into the crypto library with GDB.
Article discusses a Python3 redirector for Squid for the purpose of filtering content. Example provides a starting point for developing a full content filter / ad blocker
Squid is a proxy and caching server. Also, it works with content filters to implement black lists that are used to block requests to undesirable web sites.
A brief summary of getting started with cgit on Ubuntu Linux along with debugging a segfault we encountered
Configure a Linux host to act as a DHCP server and assign known IP addressees to the nodes on your network. Configuration and debug tips are provided for both Ubuntu 18.04 and Yocto systems.
Various Notes on Using and Managing a Linux System from the Command Line
We review some options and examples for use of tcpdump in network testing and probing.
Article discusses using Python with sockets to create and deploy a honey pot for the purpose of detecting malicious activity on a network. A sample Python 3 script is provided.
A Step-by-Step cookbook to install Apache and Django using WSGI on Ubuntu Linux
We review basic steps to clone, build, and configure PostgreSQL Release 11 on Ubuntu Linux 18.04. PostgreSQL is one of the most advanced and popular relational databases in the world. And best of all, it's open source.
This article reviews building a simple OpenCV 4 video playback application using the OpenCV Git repos on Ubuntu Linux 18.04.
For some Python packages, we prefer to work with the Git repos in the cloud, but there can be some issues in setting it up.
Bare metal / no-stack implementation of ICMP ECHO ( ping ) based on insight from the implementation of ping on Linux
Review of steps to create a local Git repo and clone it into a bare, centralized Git repo (git clone --bare)
Use Java to determine whether another host is present and responsive on a network. Two approaches are provided: low level and layer 4, connection oriented. The lower level approach will result in a ping if used with the right permissions.
Use asymmetric encryption ( public / private keys ) to automate logins to servers via ssh
Each working command and option presented during Pablo's talk is executed on a live Linux embedded system
A high level overview of a home or small business network utilizing a Linux server to perform functions such as filtering, reporting, intrusion detection, management, and segmentation.
Brief writeup on mounting an ISO image locally without having to burn it to CD
Iptables enables you to block traffic entering, exiting, or being forwarded across your network. Iptables is extremely powerful, and with its power comes complexity. This article discusses its installation and use on an Ubuntu Linux 12.04 machine.