Skip to main content

Recently Updated Pages

Notes During Build

Video Creation RC Truck Frame

Video Sections Intro: Come up with dialog for intro Describe who I am and what the intent ...

Updated 1 month ago by Jim Seaman

SCP File Transfers

Linux Command Cheat Sheet Transfering files

In Simple Terms *NOTE:  SCP uses SSH to make connections for copying.  If your remote Server has...

Updated 1 month ago by Jim Seaman

Importing XenOrchestra Images to Proxmox

Optimus Communictations Proxmox Procedures

Here's a general approach: 1. Shut down the VM on your XCP-ng/XenServe...

Updated 1 month ago by Jim Seaman

Management Scripting Workflow

Application Development Router and Switch Management

Configurations: Windows Workstation:  When working from my Office Desktop, the directories are l...

Updated 1 month ago by Jim Seaman

Work with files in Python

Security and Pen Testing Google Cyber Security Course

You previously explored how to open files in Python as well as how to read them and write to them...

Updated 2 months ago by Jim Seaman

Import files into Python

Security and Pen Testing Google Cyber Security Course

Previously, you explored how to open files in Python, convert them into strings, and read them. I...

Updated 2 months ago by Jim Seaman

Essential Python components for automation

Security and Pen Testing Google Cyber Security Course

Throughout this course, you explored coding in Python. You've focused on variables, conditional s...

Updated 2 months ago by Jim Seaman

Automate Cybersecurity Tasks with Python - Module 4 - Automating Tasks In CI/CD

Security and Pen Testing Google Cyber Security Course

Automating Tasks in CI/CD Automating Tasks in CI/CD: Using Python to Build Security Directly Int...

Updated 2 months ago by Jim Seaman

Local PCAP processing

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

How to capture a trace and process it on the Suricata Server Capture a PCAP Remote into a R...

Updated 4 months ago by Jim Seaman

Suricata Installation

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Updated 4 months ago by Jim Seaman

Wazuh Installation

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Updated 4 months ago by Jim Seaman

Wazuh and Suricata

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Wazuh and Suricata are both powerful open-source security tools, but they serve different purpose...

Updated 4 months ago by Jim Seaman

MikroTik Router Automated Firewall Address List

Optimus Communictations

Yes, you can create a firewall address list remotely and upload it to a MikroTik router, which is...

Updated 4 months ago by Jim Seaman

NginX Proxy

Optimus Communictations

docker-compose.yml services: app: image: 'jc21/nginx-proxy-manager:latest' restart:...

Updated 6 months ago by Jim Seaman

Installing Zerotier Client Linux/Windows

Networking and Configurations ZeroTier Configurations

ZeroTier Network Linux Client Install Open Terminal with SUDO privileges With persistent Sud...

Updated 6 months ago by Jim Seaman

Basic Scripts

Code Snippets MikroTik Scripting Language

Updated 7 months ago by Jim Seaman

Code Snippets

Code Snippets MikroTik Scripting Language

Creating a Script File and Editing it Log into a MikroTik router and open the Terminal.  There a...

Updated 7 months ago by Jim Seaman

Applying SSL Certificates to MikroTik Routers

Networking and Configurations

Overview To secure your connection to your MikroTik router using SSL (more accurately, TLS, as S...

Updated 7 months ago by Jim Seaman

MikroTik RADIUS Configuration

Optimus Communictations

Summary RADIUS, short for Remote Authentication Dial-In User Service, is a remote server that ...

Updated 7 months ago by Jim Seaman

RADIUS Concept

Optimus Communictations RADIUS Configurations

Connecting your Mikrotik and Ubiquiti routers to a RADIUS (Remote Authentication Dial-In User Ser...

Updated 7 months ago by Jim Seaman