Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

48 total results found

Personal Projects

Project I'm working on.  Anything from 3D, Books, Drawings, etc.

AI Tools

Here we keep track of the Tools I use for anything from Animation, Voices and Music.

Linux Command Cheat Sheet

These are the most used Linux Terminal Commands I use to manage my servers.

commands
linux
Terminal

Zak the Sad Yak

References and processes behind Zak the Sad Yak

YouTube Video Creation

This book will contain the YouTube Video creation processes for the videos I'm creating.

Optimus Communictations

All documentation specific to Optimus Communications

Optimus

Security and Pen Testing

A collection of Workflows for deploying Security settings, Hardening techniques and Penetration Testing.

Security
Hardening
Hacking
Pen testing

Networking and Configurations

A collection of Networking Basics and Step-by-step configuration guides.

Network
Configuration
SSL

Code Snippets

These are a collection of Code Snippets and Functions for the most useful processes.  Each Chapter will collect a different language.

Processes and Procedures

These are Step-by-Step procedures and Workflows on how I get stuff done.

Application Development

Applications Under Development.  Scripting and Programming 

Programming
Scripting

Video Creation

Notes and Storylines for Video Creations.

Fixing the Water in the Food Trailer

YouTube Video Creation

Living on this property, the Food Trailer needs dedicated Water.  And, it cannot freeze.

UFW Configurations

Linux Command Cheat Sheet

This is not a complete guide to UFW.  It outlines most common configurations.

RADIUS Configurations

Optimus Communictations

Burp Suite

Security and Pen Testing

Tool used for testing the Security of Web Applications and sites.

MikroTik Scripting Language

Code Snippets

MiKroTik Scripting Language is a proprietary language only available in the RouterOS.  While the language is proprietary, the scripting portion is open source.  Several resources are available to learn from. Scripting - RouterOS - MikroTik Documentation

ZeroTier Configurations

Networking and Configurations

Processes for setting up ZeroTier on Network Clients

SIEM/XDA - NIDS/NIPS Security Systems

Security and Pen Testing

These are the network and client tools used for security establishment.

Security
Server
Virus
Intrusion

Google Cyber Security Course

Security and Pen Testing

Coursera Training from Google on CyberSecurity class notes.

Router and Switch Management

Application Development

This started out as the MicroTik backups, but has evolved into a complete management system.

Proxmox Procedures

Optimus Communictations

Pages for instructions for performing certain tasks like Import/Export VMs from outside sources.

Proxmox
VMs
VMWare
XenOrchestra

Transfering files

Linux Command Cheat Sheet

How to safely copy files from one Linux computer to another

Files
Transfer

RC Truck Frame

Video Creation

Creating a lifted frame bracket for an RC Truck.

Linux Command Cheat Sheet

Linux Command Cheat Sheet

Process Monitoring and Logs ps   -e   -f   -ef report a snapshot of the current processes.  run alone will give a quick list under logged in user context. every process detailed  all processes with these columns, UID  PID  PPID  C  STIME ...

Food Trailer Water Storyboard

YouTube Video Creation Fixing the Water in the Food Trailer

Intro: Tools used: OBS - Configure OBS with templates and Slides to manage the Video Flow. GoPro Videos Phone Videos Still Pics Blender Animation -  Applio - AI Text to Voice using Tim Allen's voice Hedra - Make a Tim the Toolman head Overview of ...

Camera Reviews for Cavalry Cast

YouTube Video Creation

Overview There are tons of cameras on the market today. These cameras range from simple and cheap webcams high end production cameras that usually have multi function. The cameras that I'm looking for should serve dual purposes for a standard podcast. I would...

Optimus Radius Server Settings

Linux Command Cheat Sheet UFW Configurations

Server Information Server Name Distributor ID: UbuntuDescription:     Ubuntu 22.04.5 LTSRelease:           22.04Codename:      jammy lsb_release -a   Released End of Standard Support End of Ubuntu Pro Support ...

RADIUS Concept

Optimus Communictations RADIUS Configurations

Connecting your Mikrotik and Ubiquiti routers to a RADIUS (Remote Authentication Dial-In User Service) server in your ISP network serves several key purposes, primarily centered around centralized authentication, authorization, and accounting (AAA) for your ne...

MikroTik RADIUS Configuration

Optimus Communictations

Summary RADIUS, short for Remote Authentication Dial-In User Service, is a remote server that provides authentication and accounting facilities to various network appliances. RADIUS authentication and accounting allows the ISP or network administrator to ma...

Applying SSL Certificates to MikroTik Routers

Networking and Configurations

Overview To secure your connection to your MikroTik router using SSL (more accurately, TLS, as SSL is outdated but often still used colloquially), you’ll typically want to enable HTTPS access to the router’s web interface (WebFig) or secure other services lik...

Code Snippets

Code Snippets MikroTik Scripting Language

Creating a Script File and Editing it Log into a MikroTik router and open the Terminal.  There are a few ways to do this, but here are the two best ones, IMO. When a script file is created, permissions are tagged to the user logged in at the time.  In order ...

Basic Scripts

Code Snippets MikroTik Scripting Language

Installing Zerotier Client Linux/Windows

Networking and Configurations ZeroTier Configurations

ZeroTier Network Linux Client Install Open Terminal with SUDO privileges With persistent Sudo privileges   sudo -s curl -s https://install.zerotier.com/ | bash With in-line sudo privileges curl -s https://install.zerotier.com/ | sudo bash Activate ...

NginX Proxy

Optimus Communictations

docker-compose.yml services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format <host-port>:<container-port> - '8989:80' # Public HTTP Port - '8943:443' # Public HTTP...

MikroTik Router Automated Firewall Address List

Optimus Communictations

Yes, you can create a firewall address list remotely and upload it to a MikroTik router, which is particularly useful for managing the Town of Collbran’s network issues (e.g., blocking `23.162.216.0/24` or other suspicious IPs like `79.127.159.187` and `176.65...

Wazuh and Suricata

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Wazuh and Suricata are both powerful open-source security tools, but they serve different purposes and are often best used together to create a comprehensive security solution. Here’s a comparison to help you decide whether to use one, the other, or both: ###...

Wazuh Installation

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Suricata Installation

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Local PCAP processing

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

How to capture a trace and process it on the Suricata Server Capture a PCAP Remote into a Router and run a Packet Sniff Save the output file to the router Copy the .pcap file to the Suricata Server From the local workstation run the following co...

Automate Cybersecurity Tasks with Python - Module 4 - Automating Tasks In CI/CD

Security and Pen Testing Google Cyber Security Course

Automating Tasks in CI/CD Automating Tasks in CI/CD: Using Python to Build Security Directly Into Your Pipeline You’ve learned learned how important automation is for security and you’ve also seen how Python can automate security tasks. Now, let’s explore ho...

Essential Python components for automation

Security and Pen Testing Google Cyber Security Course

Throughout this course, you explored coding in Python. You've focused on variables, conditional statements, iterative statements, functions, and a variety of ways to work with strings and lists. In this reading, you will explore why these are all essential com...

Import files into Python

Security and Pen Testing Google Cyber Security Course

Previously, you explored how to open files in Python, convert them into strings, and read them. In this reading, you'll review the syntax needed for this. You'll also focus on why the ability to work with files is important for security analysts using Python, ...

Work with files in Python

Security and Pen Testing Google Cyber Security Course

You previously explored how to open files in Python as well as how to read them and write to them. You also examined how to adjust the structure of file contents through the .split() method. In this reading, you'll review the .split() method, and you'll also l...