Advanced Search
Search Results
26 total results found
Linux Command Cheat Sheet
Process Monitoring and Logs ps -e -f -ef report a snapshot of the current processes. run alone will give a quick list under logged in user context. every process detailed all processes with these columns, UID PID PPID C STIME ...
Food Trailer Water Storyboard
Intro: Tools used: OBS - Configure OBS with templates and Slides to manage the Video Flow. GoPro Videos Phone Videos Still Pics Blender Animation - Applio - AI Text to Voice using Tim Allen's voice Hedra - Make a Tim the Toolman head Overview of ...
Camera Reviews for Cavalry Cast
Overview There are tons of cameras on the market today. These cameras range from simple and cheap webcams high end production cameras that usually have multi function. The cameras that I'm looking for should serve dual purposes for a standard podcast. I would...
Optimus Radius Server Settings
Server Information Server Name Distributor ID: UbuntuDescription: Ubuntu 22.04.5 LTSRelease: 22.04Codename: jammy lsb_release -a Released End of Standard Support End of Ubuntu Pro Support ...
RADIUS Concept
Connecting your Mikrotik and Ubiquiti routers to a RADIUS (Remote Authentication Dial-In User Service) server in your ISP network serves several key purposes, primarily centered around centralized authentication, authorization, and accounting (AAA) for your ne...
MikroTik RADIUS Configuration
Summary RADIUS, short for Remote Authentication Dial-In User Service, is a remote server that provides authentication and accounting facilities to various network appliances. RADIUS authentication and accounting allows the ISP or network administrator to ma...
Applying SSL Certificates to MikroTik Routers
Overview To secure your connection to your MikroTik router using SSL (more accurately, TLS, as SSL is outdated but often still used colloquially), you’ll typically want to enable HTTPS access to the router’s web interface (WebFig) or secure other services lik...
Code Snippets
Creating a Script File and Editing it Log into a MikroTik router and open the Terminal. There are a few ways to do this, but here are the two best ones, IMO. When a script file is created, permissions are tagged to the user logged in at the time. In order ...
Basic Scripts
Installing Zerotier Client Linux/Windows
ZeroTier Network Linux Client Install Open Terminal with SUDO privileges With persistent Sudo privileges sudo -s curl -s https://install.zerotier.com/ | bash With in-line sudo privileges curl -s https://install.zerotier.com/ | sudo bash Activate ...
NginX Proxy
docker-compose.yml services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format <host-port>:<container-port> - '8989:80' # Public HTTP Port - '8943:443' # Public HTTP...
MikroTik Router Automated Firewall Address List
Yes, you can create a firewall address list remotely and upload it to a MikroTik router, which is particularly useful for managing the Town of Collbran’s network issues (e.g., blocking `23.162.216.0/24` or other suspicious IPs like `79.127.159.187` and `176.65...
Wazuh and Suricata
Wazuh and Suricata are both powerful open-source security tools, but they serve different purposes and are often best used together to create a comprehensive security solution. Here’s a comparison to help you decide whether to use one, the other, or both: ###...
Wazuh Installation
Suricata Installation
Local PCAP processing
How to capture a trace and process it on the Suricata Server Capture a PCAP Remote into a Router and run a Packet Sniff Save the output file to the router Copy the .pcap file to the Suricata Server From the local workstation run the following co...
Automate Cybersecurity Tasks with Python - Module 4 - Automating Tasks In CI/CD
Automating Tasks in CI/CD Automating Tasks in CI/CD: Using Python to Build Security Directly Into Your Pipeline You’ve learned learned how important automation is for security and you’ve also seen how Python can automate security tasks. Now, let’s explore ho...
Essential Python components for automation
Throughout this course, you explored coding in Python. You've focused on variables, conditional statements, iterative statements, functions, and a variety of ways to work with strings and lists. In this reading, you will explore why these are all essential com...
Import files into Python
Previously, you explored how to open files in Python, convert them into strings, and read them. In this reading, you'll review the syntax needed for this. You'll also focus on why the ability to work with files is important for security analysts using Python, ...
Work with files in Python
You previously explored how to open files in Python as well as how to read them and write to them. You also examined how to adjust the structure of file contents through the .split() method. In this reading, you'll review the .split() method, and you'll also l...