Various Notes on Using and Managing a Linux System from the Command Line
A brief review of cloning, building, debugging, and experimenting with the master branch of the OpenSSL project. Includes stepping into the crypto library with GDB.
We build Squid Version 5 from source (Git) on Ubuntu Linux and show some basic examples on how to use it.
We show how to checkout, configure, build, and setup a local Apache HTTP Server on Ubuntu 18.04 along with configuring it to work as a smart HTTP Git server.
Clone, build, and configure PostgreSQL Master Branch (13+) on Ubuntu Linux 18.04 and use C language or Python to interact with a basic database via the libpq library
A Step-by-Step cookbook to install Apache and Django using WSGI on Ubuntu Linux
Review of steps to create a local Git repo and clone it into a bare, centralized Git repo (git clone --bare)
Bare metal / no-stack implementation of ICMP ECHO ( ping ) based on insight from the implementation of ping on Linux
A brief summary of getting started with cgit on Ubuntu Linux along with debugging a segfault we encountered
We review some options and examples for use of tcpdump in network testing and probing.
Iptables enables the blocking & logging of network traffic entering, exiting, or being forwarded across a Linux CPU. This article discusses its configuration and application to protecting surveillance cameras.
Various Notes and Examples for Using and Managing a Network from the Linux Command Line
We show the steps to configure a proxy using macOS System Preferences Panel
Use public key authentication (asymmetric encryption) to automate your SSH login on LInux and macOS
Article discusses a Python3 redirector for Squid for the purpose of filtering content. Example provides a starting point for developing a full content filter / ad blocker
Configure a Linux host to act as a DHCP server and assign known IP addressees to the nodes on your network. Configuration and debug tips are provided for both Ubuntu 18.04 and Yocto systems.
Article discusses using Python with sockets to create and deploy a honey pot for the purpose of detecting malicious activity on a network. A sample Python 3 script is provided.
For some Python packages, we prefer to work with the Git repos in the cloud, but there can be some issues in setting it up.
Use Java to determine whether another host is present and responsive on a network. Two approaches are provided: low level and layer 4, connection oriented. The lower level approach will result in a ping if used with the right permissions.
Each working command and option presented during Pablo's talk is executed on a live Linux embedded system
A high level overview of a home or small business network utilizing a Linux server to perform functions such as filtering, reporting, intrusion detection, management, and segmentation.
Brief writeup on mounting an ISO image locally without having to burn it to CD