Advanced Search
Search Results
48 total results found
Personal Projects
Project I'm working on. Anything from 3D, Books, Drawings, etc.
AI Tools
Here we keep track of the Tools I use for anything from Animation, Voices and Music.
Linux Command Cheat Sheet
These are the most used Linux Terminal Commands I use to manage my servers.
Zak the Sad Yak
References and processes behind Zak the Sad Yak
YouTube Video Creation
This book will contain the YouTube Video creation processes for the videos I'm creating.
Optimus Communictations
All documentation specific to Optimus Communications
Security and Pen Testing
A collection of Workflows for deploying Security settings, Hardening techniques and Penetration Testing.
Networking and Configurations
A collection of Networking Basics and Step-by-step configuration guides.
Code Snippets
These are a collection of Code Snippets and Functions for the most useful processes. Each Chapter will collect a different language.
Processes and Procedures
These are Step-by-Step procedures and Workflows on how I get stuff done.
Application Development
Applications Under Development. Scripting and Programming
Video Creation
Notes and Storylines for Video Creations.
Fixing the Water in the Food Trailer
Living on this property, the Food Trailer needs dedicated Water. And, it cannot freeze.
UFW Configurations
This is not a complete guide to UFW. It outlines most common configurations.
RADIUS Configurations
Burp Suite
Tool used for testing the Security of Web Applications and sites.
MikroTik Scripting Language
MiKroTik Scripting Language is a proprietary language only available in the RouterOS. While the language is proprietary, the scripting portion is open source. Several resources are available to learn from. Scripting - RouterOS - MikroTik Documentation
ZeroTier Configurations
Processes for setting up ZeroTier on Network Clients
SIEM/XDA - NIDS/NIPS Security Systems
These are the network and client tools used for security establishment.
Google Cyber Security Course
Coursera Training from Google on CyberSecurity class notes.
Router and Switch Management
This started out as the MicroTik backups, but has evolved into a complete management system.
Proxmox Procedures
Pages for instructions for performing certain tasks like Import/Export VMs from outside sources.
Transfering files
How to safely copy files from one Linux computer to another
RC Truck Frame
Creating a lifted frame bracket for an RC Truck.
Linux Command Cheat Sheet
Process Monitoring and Logs ps -e -f -ef report a snapshot of the current processes. run alone will give a quick list under logged in user context. every process detailed all processes with these columns, UID PID PPID C STIME ...
Food Trailer Water Storyboard
Intro: Tools used: OBS - Configure OBS with templates and Slides to manage the Video Flow. GoPro Videos Phone Videos Still Pics Blender Animation - Applio - AI Text to Voice using Tim Allen's voice Hedra - Make a Tim the Toolman head Overview of ...
Camera Reviews for Cavalry Cast
Overview There are tons of cameras on the market today. These cameras range from simple and cheap webcams high end production cameras that usually have multi function. The cameras that I'm looking for should serve dual purposes for a standard podcast. I would...
Optimus Radius Server Settings
Server Information Server Name Distributor ID: UbuntuDescription: Ubuntu 22.04.5 LTSRelease: 22.04Codename: jammy lsb_release -a Released End of Standard Support End of Ubuntu Pro Support ...
RADIUS Concept
Connecting your Mikrotik and Ubiquiti routers to a RADIUS (Remote Authentication Dial-In User Service) server in your ISP network serves several key purposes, primarily centered around centralized authentication, authorization, and accounting (AAA) for your ne...
MikroTik RADIUS Configuration
Summary RADIUS, short for Remote Authentication Dial-In User Service, is a remote server that provides authentication and accounting facilities to various network appliances. RADIUS authentication and accounting allows the ISP or network administrator to ma...
Applying SSL Certificates to MikroTik Routers
Overview To secure your connection to your MikroTik router using SSL (more accurately, TLS, as SSL is outdated but often still used colloquially), you’ll typically want to enable HTTPS access to the router’s web interface (WebFig) or secure other services lik...
Code Snippets
Creating a Script File and Editing it Log into a MikroTik router and open the Terminal. There are a few ways to do this, but here are the two best ones, IMO. When a script file is created, permissions are tagged to the user logged in at the time. In order ...
Basic Scripts
Installing Zerotier Client Linux/Windows
ZeroTier Network Linux Client Install Open Terminal with SUDO privileges With persistent Sudo privileges sudo -s curl -s https://install.zerotier.com/ | bash With in-line sudo privileges curl -s https://install.zerotier.com/ | sudo bash Activate ...
NginX Proxy
docker-compose.yml services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format <host-port>:<container-port> - '8989:80' # Public HTTP Port - '8943:443' # Public HTTP...
MikroTik Router Automated Firewall Address List
Yes, you can create a firewall address list remotely and upload it to a MikroTik router, which is particularly useful for managing the Town of Collbran’s network issues (e.g., blocking `23.162.216.0/24` or other suspicious IPs like `79.127.159.187` and `176.65...
Wazuh and Suricata
Wazuh and Suricata are both powerful open-source security tools, but they serve different purposes and are often best used together to create a comprehensive security solution. Here’s a comparison to help you decide whether to use one, the other, or both: ###...
Wazuh Installation
Suricata Installation
Local PCAP processing
How to capture a trace and process it on the Suricata Server Capture a PCAP Remote into a Router and run a Packet Sniff Save the output file to the router Copy the .pcap file to the Suricata Server From the local workstation run the following co...
Automate Cybersecurity Tasks with Python - Module 4 - Automating Tasks In CI/CD
Automating Tasks in CI/CD Automating Tasks in CI/CD: Using Python to Build Security Directly Into Your Pipeline You’ve learned learned how important automation is for security and you’ve also seen how Python can automate security tasks. Now, let’s explore ho...
Essential Python components for automation
Throughout this course, you explored coding in Python. You've focused on variables, conditional statements, iterative statements, functions, and a variety of ways to work with strings and lists. In this reading, you will explore why these are all essential com...
Import files into Python
Previously, you explored how to open files in Python, convert them into strings, and read them. In this reading, you'll review the syntax needed for this. You'll also focus on why the ability to work with files is important for security analysts using Python, ...
Work with files in Python
You previously explored how to open files in Python as well as how to read them and write to them. You also examined how to adjust the structure of file contents through the .split() method. In this reading, you'll review the .split() method, and you'll also l...