Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

26 total results found

Linux Command Cheat Sheet

Linux Command Cheat Sheet

Process Monitoring and Logs ps   -e   -f   -ef report a snapshot of the current processes.  run alone will give a quick list under logged in user context. every process detailed  all processes with these columns, UID  PID  PPID  C  STIME ...

Food Trailer Water Storyboard

YouTube Video Creation Fixing the Water in the Food Trailer

Intro: Tools used: OBS - Configure OBS with templates and Slides to manage the Video Flow. GoPro Videos Phone Videos Still Pics Blender Animation -  Applio - AI Text to Voice using Tim Allen's voice Hedra - Make a Tim the Toolman head Overview of ...

Camera Reviews for Cavalry Cast

YouTube Video Creation

Overview There are tons of cameras on the market today. These cameras range from simple and cheap webcams high end production cameras that usually have multi function. The cameras that I'm looking for should serve dual purposes for a standard podcast. I would...

Optimus Radius Server Settings

Linux Command Cheat Sheet UFW Configurations

Server Information Server Name Distributor ID: UbuntuDescription:     Ubuntu 22.04.5 LTSRelease:           22.04Codename:      jammy lsb_release -a   Released End of Standard Support End of Ubuntu Pro Support ...

RADIUS Concept

Optimus Communictations RADIUS Configurations

Connecting your Mikrotik and Ubiquiti routers to a RADIUS (Remote Authentication Dial-In User Service) server in your ISP network serves several key purposes, primarily centered around centralized authentication, authorization, and accounting (AAA) for your ne...

MikroTik RADIUS Configuration

Optimus Communictations

Summary RADIUS, short for Remote Authentication Dial-In User Service, is a remote server that provides authentication and accounting facilities to various network appliances. RADIUS authentication and accounting allows the ISP or network administrator to ma...

Applying SSL Certificates to MikroTik Routers

Networking and Configurations

Overview To secure your connection to your MikroTik router using SSL (more accurately, TLS, as SSL is outdated but often still used colloquially), you’ll typically want to enable HTTPS access to the router’s web interface (WebFig) or secure other services lik...

Code Snippets

Code Snippets MikroTik Scripting Language

Creating a Script File and Editing it Log into a MikroTik router and open the Terminal.  There are a few ways to do this, but here are the two best ones, IMO. When a script file is created, permissions are tagged to the user logged in at the time.  In order ...

Basic Scripts

Code Snippets MikroTik Scripting Language

Installing Zerotier Client Linux/Windows

Networking and Configurations ZeroTier Configurations

ZeroTier Network Linux Client Install Open Terminal with SUDO privileges With persistent Sudo privileges   sudo -s curl -s https://install.zerotier.com/ | bash With in-line sudo privileges curl -s https://install.zerotier.com/ | sudo bash Activate ...

NginX Proxy

Optimus Communictations

docker-compose.yml services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format <host-port>:<container-port> - '8989:80' # Public HTTP Port - '8943:443' # Public HTTP...

MikroTik Router Automated Firewall Address List

Optimus Communictations

Yes, you can create a firewall address list remotely and upload it to a MikroTik router, which is particularly useful for managing the Town of Collbran’s network issues (e.g., blocking `23.162.216.0/24` or other suspicious IPs like `79.127.159.187` and `176.65...

Wazuh and Suricata

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Wazuh and Suricata are both powerful open-source security tools, but they serve different purposes and are often best used together to create a comprehensive security solution. Here’s a comparison to help you decide whether to use one, the other, or both: ###...

Wazuh Installation

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Suricata Installation

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

Local PCAP processing

Security and Pen Testing SIEM/XDA - NIDS/NIPS Security Systems

How to capture a trace and process it on the Suricata Server Capture a PCAP Remote into a Router and run a Packet Sniff Save the output file to the router Copy the .pcap file to the Suricata Server From the local workstation run the following co...

Automate Cybersecurity Tasks with Python - Module 4 - Automating Tasks In CI/CD

Security and Pen Testing Google Cyber Security Course

Automating Tasks in CI/CD Automating Tasks in CI/CD: Using Python to Build Security Directly Into Your Pipeline You’ve learned learned how important automation is for security and you’ve also seen how Python can automate security tasks. Now, let’s explore ho...

Essential Python components for automation

Security and Pen Testing Google Cyber Security Course

Throughout this course, you explored coding in Python. You've focused on variables, conditional statements, iterative statements, functions, and a variety of ways to work with strings and lists. In this reading, you will explore why these are all essential com...

Import files into Python

Security and Pen Testing Google Cyber Security Course

Previously, you explored how to open files in Python, convert them into strings, and read them. In this reading, you'll review the syntax needed for this. You'll also focus on why the ability to work with files is important for security analysts using Python, ...

Work with files in Python

Security and Pen Testing Google Cyber Security Course

You previously explored how to open files in Python as well as how to read them and write to them. You also examined how to adjust the structure of file contents through the .split() method. In this reading, you'll review the .split() method, and you'll also l...