Big Tech has had a long history of spying on us. It's in their DNA, and updated privacy policies aren't going to change a thing...
Many sites are continuing to use third-party trackers (e.g., Google Analytics) on secure pages after you log in. This article discusses issues with this practice, ways to block third party trackers, and encourages you to ask your vendors and suppliers to disable tracking once you log in.
Configure a Linux host to act as a DHCP server and assign predefined IP addressees to the supported hosts on our network. Configuration and debug tips are provided for Ubuntu and Yocto systems.
A brief review of cloning, building, and debugging the master branch of the OpenSSL project along with stepping into the crypto library with GDB. More to come...,
We review some options and examples for use of tcpdump in network testing and probing.
Notes on switching from Ubuntu 16.04 maintained PostgreSQL 9.5 to release 10 built from source out of the official git repository. We remove the packaged version and configure & build the new version for development.
Use Python3 sockets to open and monitor a honey pot port to detect malicious activity on a network
A basic Python URL rewriter is developed and tested searching for both key words and expressions. The test configuration is also reviewed
For some Python packages, we prefer to work with the Git repos in the cloud, but there can be some issues in setting it up.
Bare metal / no-stack implementation of ICMP ECHO ( ping ) based on insight from the implementation of ping on Linux
Review of steps to create a local Git repo and clone it into a bare, centralized Git repo (git clone --bare)
Use Java to determine whether another host is present and responsive on a network. Two approaches are provided: low level and layer 4, connection oriented. The lower level approach will result in a ping if used with the right permissions.
Use asymmetric encryption ( public / private keys ) to automate logins to servers via ssh
Each working command and option presented during Pablo's talk is executed on a live Linux embedded system
Brief summary of configuring Linux Ubuntu 16.04 and gcc invocation for a simple OpenCV 3.2 video playback application
A high level overview of a home or small business network utilizing a Linux server to perform functions such as filtering, reporting, intrusion detection, management, and segmentation.
Testing shows that Don't Track doesn't work. However, identifying tracking sites and blocking them does...
Squid is a proxy and caching server. Also, it works with content filters like SquidGuard to implement black lists that are used to block requests to undesirable web sites.
Brief writeup on mounting an ISO image locally without having to burn it to CD
Iptables enables you to block traffic entering, exiting, or being forwarded across your network. Iptables is extremely powerful, and with its power comes complexity. This article discusses its installation and use on an Ubuntu Linux 12.04 machine.