A discussion of techniques to accelerate development with the Linux Kernel and related when working with the Yocto Project and an NXP i.MX EVK system.
Iptables enables the blocking & logging of network traffic entering, exiting, or being forwarded across a Linux CPU. This article discusses its configuration and application to protecting surveillance cameras.
Various Notes on Using and Managing a Linux System from the Command Line
A brief summary of getting started with cgit on Ubuntu Linux along with debugging a segfault we encountered
Various Notes and Examples for Using and Managing a Network from the Linux Command Line
This article reviews building a simple OpenCV 4 video playback application using the OpenCV Git repos with Ubuntu Linux 18.04.
We review basic steps to clone, build, and configure PostgreSQL Master Branch (12+) on Ubuntu Linux 18.04. PostgreSQL is one of the most advanced and popular relational databases in the world. And best of all, it's open source.
We show the steps to configure a proxy using macOS System Preferences Panel
A Step-by-Step cookbook to install Apache and Django using WSGI on Ubuntu Linux
Use public key authentication (asymmetric encryption) to automate your SSH login on LInux and macOS
A brief review of cloning, building, debugging, and experimenting with the master branch of the OpenSSL project. Includes stepping into the crypto library with GDB.
Article discusses a Python3 redirector for Squid for the purpose of filtering content. Example provides a starting point for developing a full content filter / ad blocker
Squid is a proxy and caching server. Also, it works with content filters to implement black lists that are used to block requests to undesirable web sites.
Configure a Linux host to act as a DHCP server and assign known IP addressees to the nodes on your network. Configuration and debug tips are provided for both Ubuntu 18.04 and Yocto systems.
We review some options and examples for use of tcpdump in network testing and probing.
Article discusses using Python with sockets to create and deploy a honey pot for the purpose of detecting malicious activity on a network. A sample Python 3 script is provided.
For some Python packages, we prefer to work with the Git repos in the cloud, but there can be some issues in setting it up.
Bare metal / no-stack implementation of ICMP ECHO ( ping ) based on insight from the implementation of ping on Linux
Review of steps to create a local Git repo and clone it into a bare, centralized Git repo (git clone --bare)
Use Java to determine whether another host is present and responsive on a network. Two approaches are provided: low level and layer 4, connection oriented. The lower level approach will result in a ping if used with the right permissions.
Each working command and option presented during Pablo's talk is executed on a live Linux embedded system
A high level overview of a home or small business network utilizing a Linux server to perform functions such as filtering, reporting, intrusion detection, management, and segmentation.
Brief writeup on mounting an ISO image locally without having to burn it to CD