reformat links to md
This commit is contained in:
parent
be76c4533b
commit
11b905ecf4
1 changed files with 374 additions and 374 deletions
|
|
@ -4,248 +4,248 @@
|
|||
|
||||
## iFoo
|
||||
|
||||
[https://blog.filippo.io/securing-a-travel-iphone/ Securing your iPhone for Travel to a Hostile Environment]<br>
|
||||
[https://www.pubpub.org/pub/direct-radio-introspection Hwang & Snowden Protecting a Phone]<br>
|
||||
[Securing your iPhone for Travel to a Hostile Environment](https://blog.filippo.io/securing-a-travel-iphone/ )<br>
|
||||
[Hwang & Snowden Protecting a Phone](https://www.pubpub.org/pub/direct-radio-introspection )<br>
|
||||
|
||||
### Applications
|
||||
|
||||
[https://boingboing.net/2019/06/20/working-as-intended-3.html How Find My iPhone Works]<br>
|
||||
[How Find My iPhone Works](https://boingboing.net/2019/06/20/working-as-intended-3.html )<br>
|
||||
|
||||
## MacOS
|
||||
|
||||
[https://medium.com/@svinkle/how-to-make-the-touch-bar-slightly-more-tolerable-857d29041f6a How to make the Touch Bar slightly more tolerable]<br>
|
||||
[How to make the Touch Bar slightly more tolerable](https://medium.com/@svinkle/how-to-make-the-touch-bar-slightly-more-tolerable-857d29041f6a )<br>
|
||||
|
||||
### Hacks & Tricks MacOS
|
||||
|
||||
{{{diskutil coreStorage unlockVolume E35BB45E-585C-4CF7-8A1B-329A45F03ED6}}} to mount an encrypted volume<br>
|
||||
[http://osxdaily.com/2013/01/18/add-dashboard-widgets-desktop-mac-os-x/ Add Dashboard Widgets to the Desktop]<br>
|
||||
[https://www.apple.com/support/security/guides/ Apple Security Guides]<br>
|
||||
[http://formalfriday.club/2015/01/05/creating-your-own-homebrew-tap-and-formula.html Creating your own Homebrew Tap and Formula]<br>
|
||||
[http://apple.stackexchange.com/questions/151821/disable-iphoto-auto-launch-when-connecting-an-iphone-in-yosemite Disable iPhoto Auto_launch in Yosemite]<br>
|
||||
[https://github.com/ernw/hardening/blob/master/operating_system/osx/10.11/ERNW_Hardening_OS_X_EL_Captain.md El Capitan Hardening Guide]<br>
|
||||
[https://github.com/ernw/hardening/blob/master/operating_system/osx/10.14/ERNW_Hardening_OS_X_Mojave.md macOS Mojave Hardening Guide]//
|
||||
[https://firstlook.org/theintercept/2015/04/27/encrypting-laptop-like-mean/ Encrypting Your Laptop Like You Mean It]
|
||||
[https://support.apple.com/kb/PH18897?locale=en_US Fast User Switching on Yosemite]<br>
|
||||
```diskutil coreStorage unlockVolume E35BB45E-585C-4CF7-8A1B-329A45F03ED6``` to mount an encrypted volume<br>
|
||||
[Add Dashboard Widgets to the Desktop](http://osxdaily.com/2013/01/18/add-dashboard-widgets-desktop-mac-os-x/ )<br>
|
||||
[Apple Security Guides](https://www.apple.com/support/security/guides/ )<br>
|
||||
[Creating your own Homebrew Tap and Formula](http://formalfriday.club/2015/01/05/creating-your-own-homebrew-tap-and-formula.html )<br>
|
||||
[Disable iPhoto Auto_launch in Yosemite](http://apple.stackexchange.com/questions/151821/disable-iphoto-auto-launch-when-connecting-an-iphone-in-yosemite )<br>
|
||||
[El Capitan Hardening Guide](https://github.com/ernw/hardening/blob/master/operating_system/osx/10.11/ERNW_Hardening_OS_X_EL_Captain.md )<br>
|
||||
[macOS Mojave Hardening Guide](https://github.com/ernw/hardening/blob/master/operating_system/osx/10.14/ERNW_Hardening_OS_X_Mojave.md )//
|
||||
[Encrypting Your Laptop Like You Mean It](https://firstlook.org/theintercept/2015/04/27/encrypting-laptop-like-mean/ )
|
||||
[Fast User Switching on Yosemite](https://support.apple.com/kb/PH18897?locale=en_US )<br>
|
||||
[wiki:MacSearchList Fix DNS Resolver Search List (obsolete)]<br>
|
||||
{{{/Applications/VMware\ Fusion.app/Contents/Library/vmrun VMware Fusion Tool}}}<br>
|
||||
[https://fix-macosx.com/ How to restore privacy]<br>
|
||||
[http://www.dctrwatson.com/2013/07/how-to-update-openssh-on-mac-os-x/ How to Update OpenSSH on Mac OS X]<br>
|
||||
[https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections How to stop Firefox from making automatic connections]<br>
|
||||
[https://www.hypershop.com/products/usb-c-5-in-1-hub-with-pass-though-usb-c-charging HyperDrive USB Type-C 5-in-1 Hub with Pass Through Charging]<br>
|
||||
[http://sud0man.blogspot.fr/2015/05/artefacts-for-mac-os-x.html Internal Files about User (maybe Mountain Lion)]<br>
|
||||
[https://github.com/herrbischoff/awesome-osx-command-line Mac Config Hacks from Command Line]<br>
|
||||
[https://github.com/drduh/OS-X-Yosemite-Security-and-Privacy-Guide OS X Yosemite Security and Privacy Guide]<br>
|
||||
[https://github.com/jipegit/OSXAuditor OSX Auditor]<br>
|
||||
[https://github.com/kirei/fruitpunch Safety hacks for Yosemite]<br>
|
||||
[http://apple.stackexchange.com/questions/34443/remote-management-vs-screen-sharing Screen Sharing over SSH]<br>
|
||||
[https://github.com/nicolashery/mac-dev-setup/blob/master/README.md Setting up a Macintosh as a Development Environment]<br>
|
||||
[http://pondini.org/OSX/Home.html Time Machine and Other Info]<br>
|
||||
[http://arstechnica.com/apple/2016/10/life-after-death-for-apples-xserve/ XServe from Ebay running VMware]<br>
|
||||
[http://www.tuaw.com/2014/11/25/heres-the-root-cause-and-a-workaround-for-ios-8-and-yosemite-wi/?ncid=rss_truncated Yosemite WiFi hacks]<br>
|
||||
```/Applications/VMware\ Fusion.app/Contents/Library/vmrun VMware Fusion Tool```<br>
|
||||
[How to restore privacy](https://fix-macosx.com/ )<br>
|
||||
[How to Update OpenSSH on Mac OS X](http://www.dctrwatson.com/2013/07/how-to-update-openssh-on-mac-os-x/ )<br>
|
||||
[How to stop Firefox from making automatic connections](https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections )<br>
|
||||
[HyperDrive USB Type-C 5-in-1 Hub with Pass Through Charging](https://www.hypershop.com/products/usb-c-5-in-1-hub-with-pass-though-usb-c-charging )<br>
|
||||
[Internal Files about User (maybe Mountain Lion)](http://sud0man.blogspot.fr/2015/05/artefacts-for-mac-os-x.html )<br>
|
||||
[Mac Config Hacks from Command Line](https://github.com/herrbischoff/awesome-osx-command-line )<br>
|
||||
[OS X Yosemite Security and Privacy Guide](https://github.com/drduh/OS-X-Yosemite-Security-and-Privacy-Guide )<br>
|
||||
[OSX Auditor](https://github.com/jipegit/OSXAuditor )<br>
|
||||
[Safety hacks for Yosemite](https://github.com/kirei/fruitpunch )<br>
|
||||
[Screen Sharing over SSH](http://apple.stackexchange.com/questions/34443/remote-management-vs-screen-sharing )<br>
|
||||
[Setting up a Macintosh as a Development Environment](https://github.com/nicolashery/mac-dev-setup/blob/master/README.md )<br>
|
||||
[Time Machine and Other Info](http://pondini.org/OSX/Home.html )<br>
|
||||
[XServe from Ebay running VMware](http://arstechnica.com/apple/2016/10/life-after-death-for-apples-xserve/ )<br>
|
||||
[Yosemite WiFi hacks](http://www.tuaw.com/2014/11/25/heres-the-root-cause-and-a-workaround-for-ios-8-and-yosemite-wi/?ncid=rss_truncated )<br>
|
||||
Cmd-Ctrl-Shift-4, then space (cursor turns from cross hairs to a camera), click once on what I want, and paste wherever I want it is the way to go.<br>
|
||||
[https://elijahcarrel.com/2016/03/31/remote-mac-access-screen-sharing-via-ssh-and-vnc/ Remote Mac Access: Screen Sharing via SSH and VNC without iCloud’s Back to my Mac feature]<br>
|
||||
[https://bombich.com/kb/ccc4/what-makes-volume-bootable What Makes a Mac Volume Bootable]<br>
|
||||
[Remote Mac Access: Screen Sharing via SSH and VNC without iCloud’s Back to my Mac feature](https://elijahcarrel.com/2016/03/31/remote-mac-access-screen-sharing-via-ssh-and-vnc/ )<br>
|
||||
[What Makes a Mac Volume Bootable](https://bombich.com/kb/ccc4/what-makes-volume-bootable )<br>
|
||||
`sudo scutil --set HostName <new host name>` to change Mac hostname<br>
|
||||
[https://apple.stackexchange.com/questions/304124/recovery-key-set-by-my-company-school-or-institution-on-private-laptop Allow MacOS FileVault Recovery Key]<br>
|
||||
[https://github.com/foxlet/macOS-Simple-KVM/ Tools to set up a quick macOS VM in QEMU, accelerated by KVM]<br>
|
||||
[Allow MacOS FileVault Recovery Key](https://apple.stackexchange.com/questions/304124/recovery-key-set-by-my-company-school-or-institution-on-private-laptop )<br>
|
||||
[Tools to set up a quick macOS VM in QEMU, accelerated by KVM](https://github.com/foxlet/macOS-Simple-KVM/ )<br>
|
||||
|
||||
### Applications
|
||||
|
||||
[http://www.tildesoft.com/ Bonjour Browser]<br>
|
||||
[https://www.emacswiki.org/emacs/EmacsForMacOS Emacs for MacOS guide]<br>
|
||||
[https://objective-see.com/products.html Free OS X Security Tools]<br>
|
||||
[https://pqrs.org/osx/karabiner/ Karabiner - A powerful and stable keyboard customizer for OS X]<br>
|
||||
[https://osxfuse.github.io OSXFUSE is a successor to MacFUSE]<br>
|
||||
[https://github.com/knowuh/SnailMail Snail Mail - envelope printer]<br>
|
||||
[Bonjour Browser](http://www.tildesoft.com/ )<br>
|
||||
[Emacs for MacOS guide](https://www.emacswiki.org/emacs/EmacsForMacOS )<br>
|
||||
[Free OS X Security Tools](https://objective-see.com/products.html )<br>
|
||||
[Karabiner - A powerful and stable keyboard customizer for OS X](https://pqrs.org/osx/karabiner/ )<br>
|
||||
[OSXFUSE is a successor to MacFUSE](https://osxfuse.github.io )<br>
|
||||
[Snail Mail - envelope printer](https://github.com/knowuh/SnailMail )<br>
|
||||
|
||||
## Security
|
||||
|
||||
[https://github.com/github/SoftU2F Soft U2F]
|
||||
[https://github.com/sekey/sekey Secure Enclave for SSH Authentication]
|
||||
[https://keepassxc.org/ Multi-Platform KeyPass Fork]
|
||||
[Soft U2F](https://github.com/github/SoftU2F )
|
||||
[Secure Enclave for SSH Authentication](https://github.com/sekey/sekey )
|
||||
[Multi-Platform KeyPass Fork](https://keepassxc.org/ )
|
||||
|
||||
# Conferences
|
||||
|
||||
[http://conferences.sigcomm.org/co-next/2013/program.html CoNEXT 2014]<br>
|
||||
[http://conferences.sigcomm.org/imc/2013/index.html IMC 2013]<br>
|
||||
[http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=13322 Dagstuhl Critical Infrastructure]<br>
|
||||
[http://www.chesworkshop.org/ches2014/program.php CHES 2014]<br>
|
||||
[http://www.dagstuhl.de/no_cache/en/program/calendar/semhp/?semnr=15102 Dagstuhl 2104 Secure Routing]<br>
|
||||
[https://wiki.rg.net/wiki/Btnog2Sec BGNOG2 Security Sep 2015]<br>
|
||||
[https://indico.dns-oarc.net/event/24/timetable/#all.detailed OARC Oct 2015]<br>
|
||||
[https://www.nanog.org/meetings/nanog65/agenda NANOG Oct 2015]<br>
|
||||
[http://conferences2.sigcomm.org/imc/2015/program.html IMC October 2015]<br>
|
||||
[https://irtf.org/raim-2015 IRTF & ISOC Workshop on Research and Applications of Internet Measurements (RAIM) October 2015]<br>
|
||||
[http://www.caida.org/workshops/bgp-hackathon/1602/ CAIDA BGP Hackathon Jan 2016]<br>
|
||||
[CoNEXT 2014](http://conferences.sigcomm.org/co-next/2013/program.html )<br>
|
||||
[IMC 2013](http://conferences.sigcomm.org/imc/2013/index.html )<br>
|
||||
[Dagstuhl Critical Infrastructure](http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=13322 )<br>
|
||||
[CHES 2014](http://www.chesworkshop.org/ches2014/program.php )<br>
|
||||
[Dagstuhl 2104 Secure Routing](http://www.dagstuhl.de/no_cache/en/program/calendar/semhp/?semnr=15102 )<br>
|
||||
[BGNOG2 Security Sep 2015](https://wiki.rg.net/wiki/Btnog2Sec )<br>
|
||||
[OARC Oct 2015](https://indico.dns-oarc.net/event/24/timetable/#all.detailed )<br>
|
||||
[NANOG Oct 2015](https://www.nanog.org/meetings/nanog65/agenda )<br>
|
||||
[IMC October 2015](http://conferences2.sigcomm.org/imc/2015/program.html )<br>
|
||||
[IRTF & ISOC Workshop on Research and Applications of Internet Measurements (RAIM) October 2015](https://irtf.org/raim-2015 )<br>
|
||||
[CAIDA BGP Hackathon Jan 2016](http://www.caida.org/workshops/bgp-hackathon/1602/ )<br>
|
||||
|
||||
# Food
|
||||
|
||||
[http://www.kossarsbialys.com/ Kossar's Bialys]<br>
|
||||
[http://www.zabars.com/on/demandware.store/Sites-Zabars-Site/default/Link-Product?pid=211001P&cgid=Smoked_Fish_Counter Zabar's Smoked Fish]<br>
|
||||
[http://shop.russanddaughters.com/store/department/69/Specialty-Smoked-Fish/ Russ and Daughters Smoked Fish (needs more lead time)]<br>
|
||||
[http://www.japantimes.co.jp/life/2014/11/18/food/warm-shared-hot-pot/ Nabe Mono Basics]<br>
|
||||
[http://bastiaansen-bio.com/index.php?lang=en Artisan Dutch Cheese shop in Amsterdam]<br>
|
||||
[http://www.laederach.com/ch-en.html Swiss Chocolate Shop]<br>
|
||||
[Kossar's Bialys](http://www.kossarsbialys.com/ )<br>
|
||||
[Zabar's Smoked Fish](http://www.zabars.com/on/demandware.store/Sites-Zabars-Site/default/Link-Product?pid=211001P&cgid=Smoked_Fish_Counter )<br>
|
||||
[Russ and Daughters Smoked Fish (needs more lead time)](http://shop.russanddaughters.com/store/department/69/Specialty-Smoked-Fish/ )<br>
|
||||
[Nabe Mono Basics](http://www.japantimes.co.jp/life/2014/11/18/food/warm-shared-hot-pot/ )<br>
|
||||
[Artisan Dutch Cheese shop in Amsterdam](http://bastiaansen-bio.com/index.php?lang=en )<br>
|
||||
[Swiss Chocolate Shop](http://www.laederach.com/ch-en.html )<br>
|
||||
|
||||
# Hardware
|
||||
|
||||
## FPGA Tools
|
||||
|
||||
[http://www.clifford.at/yosys/ YoSys Open Synthesis Suite - Verilogish]<br>
|
||||
[https://github.com/m-labs/migen MiGen - Python Toolbox for Building Hardware (produces VHDL)]<br>
|
||||
[http://www.myhdl.org/ MyHDL - a python syntax for Verilog - Design Hardware with Python, good docs]<br>
|
||||
[https://chisel.eecs.berkeley.edu/ Chisel - Hardware Development Embedded in Scala]<br>
|
||||
[YoSys Open Synthesis Suite - Verilogish](http://www.clifford.at/yosys/ )<br>
|
||||
[MiGen - Python Toolbox for Building Hardware (produces VHDL)](https://github.com/m-labs/migen )<br>
|
||||
[MyHDL - a python syntax for Verilog - Design Hardware with Python, good docs](http://www.myhdl.org/ )<br>
|
||||
[Chisel - Hardware Development Embedded in Scala](https://chisel.eecs.berkeley.edu/ )<br>
|
||||
|
||||
## General Hardware
|
||||
|
||||
[http://www.supermicro.com/products/system/2U/2027/SYS-2027TR-HTRF_.cfm Four hot-pluggable systems (nodes) in a 2U form factor]<br>
|
||||
[http://www.newegg.com/Product/Product.aspx?Item=N82E16820147362 SAMSUNG 850 Pro Series MZ-7KE1T0BW 2.5" 1TB SATA III 3-D Vertical SSD]<br>
|
||||
[http://www.supermicro.com/products/system/2U/2027/SYS-2027TR-HTRF_.cfm SuperServer 2027TR-HTRF+ - Four servers and lotso 2.5" drives in a box]<br>
|
||||
[http://www.seagate.com/files/www-content/product-content/hdd-fam/seagate-archive-hdd/en-us/docs/archive-hdd-dS1834-3-1411us.pdf Seagate 8TB drives]<br>
|
||||
[https://www.crowdsupply.com/inverse-path/usb-armory Open source USB stick computer for security applications]<br>
|
||||
[http://dirtypcbs.com/ Dirty PCBs]<br>
|
||||
[http://www.maths.cam.ac.uk/computing/docs/public/megacli_raid_lsi.html Cheat Sheed for MegaRaid Controllers `megacli`]<br>
|
||||
[http://www.fs.com/16-channels-1ru-rack-mount-duplex-cwdm-mux-demux-p-30414.html CWDM Mux/DeMux]<br>
|
||||
[http://solid-optics.com/multiplexers/cwdm-mux/solid-optics-cwdm-mux-8chupgmon-multiplexer-id1665.html Solid Optics CWDM-MUX-8CH+UPG+MON Multiplexer]<br>
|
||||
[http://www.mcelog.org/ Logs and accounts machine checks (in particular memory, IO, and CPU hardware errors) on modern x86 Linux systems]<br>
|
||||
[https://www.epiphan.com/products/kvm2usb KVM to USB dongle]<br>
|
||||
[https://www.youtube.com/watch?t=5&v=aV_a5KIogCc Bunnie Huang on Good Documntation for Manufacturing]<br>
|
||||
[https://www.youtube.com/watch?v=QFDsYUuU-mY Bunnie Huang on Design for Manufacturing]<br>
|
||||
[Four hot-pluggable systems (nodes) in a 2U form factor](http://www.supermicro.com/products/system/2U/2027/SYS-2027TR-HTRF_.cfm )<br>
|
||||
[SAMSUNG 850 Pro Series MZ-7KE1T0BW 2.5" 1TB SATA III 3-D Vertical SSD](http://www.newegg.com/Product/Product.aspx?Item=N82E16820147362 )<br>
|
||||
[SuperServer 2027TR-HTRF+ - Four servers and lotso 2.5" drives in a box](http://www.supermicro.com/products/system/2U/2027/SYS-2027TR-HTRF_.cfm )<br>
|
||||
[Seagate 8TB drives](http://www.seagate.com/files/www-content/product-content/hdd-fam/seagate-archive-hdd/en-us/docs/archive-hdd-dS1834-3-1411us.pdf )<br>
|
||||
[Open source USB stick computer for security applications](https://www.crowdsupply.com/inverse-path/usb-armory )<br>
|
||||
[Dirty PCBs](http://dirtypcbs.com/ )<br>
|
||||
[Cheat Sheed for MegaRaid Controllers `megacli`](http://www.maths.cam.ac.uk/computing/docs/public/megacli_raid_lsi.html )<br>
|
||||
[CWDM Mux/DeMux](http://www.fs.com/16-channels-1ru-rack-mount-duplex-cwdm-mux-demux-p-30414.html )<br>
|
||||
[Solid Optics CWDM-MUX-8CH+UPG+MON Multiplexer](http://solid-optics.com/multiplexers/cwdm-mux/solid-optics-cwdm-mux-8chupgmon-multiplexer-id1665.html )<br>
|
||||
[Logs and accounts machine checks (in particular memory, IO, and CPU hardware errors) on modern x86 Linux systems](http://www.mcelog.org/ )<br>
|
||||
[KVM to USB dongle](https://www.epiphan.com/products/kvm2usb )<br>
|
||||
[Bunnie Huang on Good Documntation for Manufacturing](https://www.youtube.com/watch?t=5&v=aV_a5KIogCc )<br>
|
||||
[Bunnie Huang on Design for Manufacturing](https://www.youtube.com/watch?v=QFDsYUuU-mY )<br>
|
||||
|
||||
## Novena
|
||||
|
||||
[http://www.kosagi.com/w/index.php?title=Novena_Main_Page Novena Mail Page]<br>
|
||||
[http://www.red-lang.org/2012/03/setting-up-arm-virtual-machine.html Setting up an ARM virtual machine so you can build an SD image]<br>
|
||||
[Novena Mail Page](http://www.kosagi.com/w/index.php?title=Novena_Main_Page )<br>
|
||||
[Setting up an ARM virtual machine so you can build an SD image](http://www.red-lang.org/2012/03/setting-up-arm-virtual-machine.html )<br>
|
||||
|
||||
## Raspberry PI
|
||||
|
||||
[http://www.satsignal.eu/ntp/Raspberry-Pi-quickstart.html NTP on a Raspberry Pi]<br>
|
||||
[NTP on a Raspberry Pi](http://www.satsignal.eu/ntp/Raspberry-Pi-quickstart.html )<br>
|
||||
|
||||
## Toys
|
||||
|
||||
[https://github.com/Nephiel/sdlocker-tiny Attiny85-based device to enable and disable write-protection on any SD card]<br>
|
||||
[http://www.seanet.com/~karllunt/sdlocker.html Build the SD Locker and Make Your SD Cards More Secure]<br>
|
||||
[Attiny85-based device to enable and disable write-protection on any SD card](https://github.com/Nephiel/sdlocker-tiny )<br>
|
||||
[Build the SD Locker and Make Your SD Cards More Secure](http://www.seanet.com/~karllunt/sdlocker.html )<br>
|
||||
|
||||
# Linux / Unix
|
||||
|
||||
[http://without-systemd.org/wiki/index.php/Main_Pagex Wiki of non-systemd Unix/Linux systems]<br>
|
||||
[https://blog.nelhage.com/2011/01/reptyr-attach-a-running-process-to-a-new-terminal/ reptyr: Attach a running process to a new terminal]<br>
|
||||
[https://linode.com/docs/applications/containers/deploying-microservices-with-docker/#using-containers-in-production-best-practices Using Containers in Production: Best Practices]<br>
|
||||
[https://vincent.bernat.im/en/blog/2017-vxlan-linux VXLAN with plain Linux bridges]<br>
|
||||
[https://github.com/yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking Linux Kernel Hacking]<br>
|
||||
[https://www.linuxatemyram.com/ Linux Ate My RAM]<br>
|
||||
[http://dumbnetworkautomation.blogspot.com/2017/09/linux-unnumbered-interface-source-ip.html Linux unnumbered interface source IP behavior]<br>
|
||||
[http://www.brendangregg.com/linuxperf.html Linux Performance Tools]<br>
|
||||
[https://major.io/2015/08/21/understanding-systemds-predictable-network-device-names/ Understanding systemd’s predictable network device names]<br>\
|
||||
[Wiki of non-systemd Unix/Linux systems](http://without-systemd.org/wiki/index.php/Main_Pagex )<br>
|
||||
[reptyr: Attach a running process to a new terminal](https://blog.nelhage.com/2011/01/reptyr-attach-a-running-process-to-a-new-terminal/ )<br>
|
||||
[Using Containers in Production: Best Practices](https://linode.com/docs/applications/containers/deploying-microservices-with-docker/#using-containers-in-production-best-practices )<br>
|
||||
[VXLAN with plain Linux bridges](https://vincent.bernat.im/en/blog/2017-vxlan-linux )<br>
|
||||
[Linux Kernel Hacking](https://github.com/yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking )<br>
|
||||
[Linux Ate My RAM](https://www.linuxatemyram.com/ )<br>
|
||||
[Linux unnumbered interface source IP behavior](http://dumbnetworkautomation.blogspot.com/2017/09/linux-unnumbered-interface-source-ip.html )<br>
|
||||
[Linux Performance Tools](http://www.brendangregg.com/linuxperf.html )<br>
|
||||
[Understanding systemd’s predictable network device names](https://major.io/2015/08/21/understanding-systemds-predictable-network-device-names/ )<br>\
|
||||
|
||||
## Basics
|
||||
|
||||
[http://www.faqs.org/docs/artu/ch01s06.html Basics of the Unix Philosophy]<br>
|
||||
[https://github.com/dave2/ntpstick ntpstick - NTP on a Stick]<br>
|
||||
[https://stribika.github.io/2015/01/04/secure-secure-shell.html SSH Hardening]<br>
|
||||
[https://wiki.apache.org/httpd/OCSPStapling OSCP Stapling in Apache]<br>
|
||||
[https://blog.process-one.net/securing-ejabberd-with-tls-encryption/ ejabberd TLS Security]<br>
|
||||
[https://www.linux.com/learn/understanding-and-using-systemd Understanding and Using Systemd]<br>
|
||||
[Basics of the Unix Philosophy](http://www.faqs.org/docs/artu/ch01s06.html )<br>
|
||||
[ntpstick - NTP on a Stick](https://github.com/dave2/ntpstick )<br>
|
||||
[SSH Hardening](https://stribika.github.io/2015/01/04/secure-secure-shell.html )<br>
|
||||
[OSCP Stapling in Apache](https://wiki.apache.org/httpd/OCSPStapling )<br>
|
||||
[ejabberd TLS Security](https://blog.process-one.net/securing-ejabberd-with-tls-encryption/ )<br>
|
||||
[Understanding and Using Systemd](https://www.linux.com/learn/understanding-and-using-systemd )<br>
|
||||
|
||||
## Emacs
|
||||
|
||||
[http://magit.vc Magit, A Git Porcelain inside Emacs]<br>
|
||||
[Magit, A Git Porcelain inside Emacs](http://magit.vc )<br>
|
||||
|
||||
## Tools
|
||||
|
||||
[https://linux.die.net/man/5/dhcp-options Linux dhcpd Options]<br>
|
||||
[https://stackoverflow.com/questions/359424/detach-move-subdirectory-into-separate-git-repository/17864475#17864475 git move subdirectory of a repo]<br>
|
||||
[Linux dhcpd Options](https://linux.die.net/man/5/dhcp-options )<br>
|
||||
[git move subdirectory of a repo](https://stackoverflow.com/questions/359424/detach-move-subdirectory-into-separate-git-repository/17864475#17864475 )<br>
|
||||
|
||||
## FreeBSD
|
||||
|
||||
[https://www.ateamsystems.com/tech-blog/installing-freebsd-9-gmirror-gpt-partitions-raid-1/ FreeBSD install with gmirror]<br>
|
||||
[https://forums.freebsd.org/threads/convert-from-ports-to-packages.65362/ portmaster to pkg]<br>
|
||||
[https://www.hactrn.net/blog/2018/11/12/dont-panic-upgrading-freebsd-to-112-on-ganeti/ Don't Panic! Upgrading FreeBSD to 11.2 on Ganeti]<br>
|
||||
[FreeBSD install with gmirror](https://www.ateamsystems.com/tech-blog/installing-freebsd-9-gmirror-gpt-partitions-raid-1/ )<br>
|
||||
[portmaster to pkg](https://forums.freebsd.org/threads/convert-from-ports-to-packages.65362/ )<br>
|
||||
[Don't Panic! Upgrading FreeBSD to 11.2 on Ganeti](https://www.hactrn.net/blog/2018/11/12/dont-panic-upgrading-freebsd-to-112-on-ganeti/ )<br>
|
||||
|
||||
## Applications / Linux / Unix
|
||||
|
||||
[http://www.creativebloq.com/web-design/wordpress-tutorials-designers-1012990 WordPress Tutorials]<br>
|
||||
[http://racksburg.com/choosing-an-http-status-code/ Choosing an HTTP Status Code]<br>
|
||||
[https://github.com/danielquinn/paperless Scan, index, and archive all of your paper]<br>
|
||||
[https://github.com/patrikhson/photo-export paf's Export photos from Apple Photo.App]<br>
|
||||
[http://www.fatcatsoftware.com/iplm/ iPhoto Library Manager]<br>
|
||||
[https://objective-see.com/products/blockblock.html BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS]<br>
|
||||
[https://github.com/visit1985/mdp/ Command-line based presentation tool]<br>
|
||||
[https://github.com/warner/magic-wormhole Magic Wormhole - get things from one computer to another, safely]<br>
|
||||
[https://github.com/upspin/upspin Upspin: A framework for naming everyone's everything. https://upspin.io]<br>
|
||||
[WordPress Tutorials](http://www.creativebloq.com/web-design/wordpress-tutorials-designers-1012990 )<br>
|
||||
[Choosing an HTTP Status Code](http://racksburg.com/choosing-an-http-status-code/ )<br>
|
||||
[Scan, index, and archive all of your paper](https://github.com/danielquinn/paperless )<br>
|
||||
[paf's Export photos from Apple Photo.App](https://github.com/patrikhson/photo-export )<br>
|
||||
[iPhoto Library Manager](http://www.fatcatsoftware.com/iplm/ )<br>
|
||||
[BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS](https://objective-see.com/products/blockblock.html )<br>
|
||||
[Command-line based presentation tool](https://github.com/visit1985/mdp/ )<br>
|
||||
[Magic Wormhole - get things from one computer to another, safely](https://github.com/warner/magic-wormhole )<br>
|
||||
[Upspin: A framework for naming everyone's everything. https://upspin.io](https://github.com/upspin/upspin )<br>
|
||||
|
||||
## Hacks / Linux
|
||||
|
||||
[https://help.ubuntu.com/community/Grub2/Upgrading Upgrading grub from 0.97 to grub2]<br>
|
||||
{{{iptables -F sshguard}}} Get sshguard to stop blocking me after I have screwed up.<br>
|
||||
[https://www.kumari.net/index.php/system-adminstration/49-mounting-a-qemu-image Mounting a qcow image as a file system]
|
||||
[https://www.debian.org/releases/ Debian Releases]<br>
|
||||
[https://www.debian.org/doc/manuals/debian-faq/ch-ftparchives Debian Archives Explained]<br>
|
||||
[https://www.rootusers.com/how-to-upgrade-debian-7-wheezy-to-debian-8-jessie/ Upgrade Debian wheezy to jessie]<br>
|
||||
[http://soucy.org/tmp/v6firewall/ip6tables.txt Firewall IPTables for IPv6]<br>
|
||||
[http://blog.scottlowe.org/2013/05/29/a-quick-introduction-to-linux-policy-routing/ A Quick Introduction to Linux Policy Routing]<br>
|
||||
[http://codex.wordpress.org/Resetting_Your_Password Reset WordPress Password from My SQL]<br>
|
||||
[http://www.itzgeek.com/how-tos/mini-howtos/change-default-network-name-ens33-to-old-eth0-on-ubuntu-16-04.html Change default network name (ens33) to old “eth0” on Ubuntu 16.04]<br>
|
||||
[http://www.tcm.phy.cam.ac.uk/~mr349/backup_restore_linux.html Great dump/restore recipies]<br>
|
||||
[https://github.com/ANSSI-FR/pycrate Python library to ease the development of encoders and decoders for various protocols and file formats; contains ASN.1 and CSN.1 compilers]<br>
|
||||
[https://help.ubuntu.com/lts/serverguide/apparmor.html How AppArmor works]<br>
|
||||
[Upgrading grub from 0.97 to grub2](https://help.ubuntu.com/community/Grub2/Upgrading )<br>
|
||||
```iptables -F sshguard``` Get sshguard to stop blocking me after I have screwed up.<br>
|
||||
[Mounting a qcow image as a file system](https://www.kumari.net/index.php/system-adminstration/49-mounting-a-qemu-image )
|
||||
[Debian Releases](https://www.debian.org/releases/ )<br>
|
||||
[Debian Archives Explained](https://www.debian.org/doc/manuals/debian-faq/ch-ftparchives )<br>
|
||||
[Upgrade Debian wheezy to jessie](https://www.rootusers.com/how-to-upgrade-debian-7-wheezy-to-debian-8-jessie/ )<br>
|
||||
[Firewall IPTables for IPv6](http://soucy.org/tmp/v6firewall/ip6tables.txt )<br>
|
||||
[A Quick Introduction to Linux Policy Routing](http://blog.scottlowe.org/2013/05/29/a-quick-introduction-to-linux-policy-routing/ )<br>
|
||||
[Reset WordPress Password from My SQL](http://codex.wordpress.org/Resetting_Your_Password )<br>
|
||||
[Change default network name (ens33) to old “eth0” on Ubuntu 16.04](http://www.itzgeek.com/how-tos/mini-howtos/change-default-network-name-ens33-to-old-eth0-on-ubuntu-16-04.html )<br>
|
||||
[Great dump/restore recipies](http://www.tcm.phy.cam.ac.uk/~mr349/backup_restore_linux.html )<br>
|
||||
[Python library to ease the development of encoders and decoders for various protocols and file formats; contains ASN.1 and CSN.1 compilers](https://github.com/ANSSI-FR/pycrate )<br>
|
||||
[How AppArmor works](https://help.ubuntu.com/lts/serverguide/apparmor.html )<br>
|
||||
|
||||
## Tools
|
||||
|
||||
[http://2014.hackitoergosum.org/bittorrentsync-security-privacy-analysis-hackito-session-results/ BitTorrentsync security & privacy analysis - Hackito Session results]<br>
|
||||
[http://www.techrepublic.com/blog/five-apps/five-portable-antivirus-and-antimalware-tools-to-carry-with-you-at-all-times/ Windows - Five portable antivirus and antimalware tools to carry with you at all times]<br>
|
||||
[https://medium.com/@shazow/ssh-how-does-it-even-9e43586e4ffc SSH Based Chat]<br>
|
||||
[https://www.digitalocean.com/community/tutorials/how-to-create-an-ssh-ca-to-validate-hosts-and-clients-with-ubuntu How To Create an SSH CA to Validate Hosts and Clients]<br>
|
||||
[https://github.com/delvelabs/vane VANE - A Free Fork of WPScan]<br>
|
||||
[https://github.com/rshipp/awesome-malware-analysis curated list of awesome malware analysis tools and resources]<br>
|
||||
[https://www.rstudio.com/resources/cheatsheets/ R Cheat Sheets]<br>
|
||||
[https://github.com/ahf/teneo Regenerable ed25519 keys for OpenSSH ]<br>
|
||||
[http://securityblog.gr/3004/guymager-a-free-forensic-imager/ GUYMAGER a Free Forensic Imager]<br>
|
||||
[https://julianoliver.com/output/log_2015-12-18_14-39 DropKick Detect and disconnect WiFi cameras]<br>
|
||||
[https://alexcabal.com/creating-the-perfect-gpg-keypair/ Adding a Signing GPG Key and Hiding the Master]<br>
|
||||
[https://theconversation.com/six-easy-ways-to-tell-if-that-viral-story-is-a-hoax-47673 How to Tell if an Image, YouTube, etc. are faked]<br>
|
||||
[http://www.tedunangst.com/flak/post/new-openssh-key-format-and-bcrypt-pbkdf new openssh key format and bcrypt pbkdf]<br>
|
||||
[https://alice.sni.velox.ch/ TLS SNI Test Site: alice.sni.velox.ch]<br>
|
||||
[http://sectools.org/ Top 125 Security Tools]<br>
|
||||
[BitTorrentsync security & privacy analysis - Hackito Session results](http://2014.hackitoergosum.org/bittorrentsync-security-privacy-analysis-hackito-session-results/ )<br>
|
||||
[Windows - Five portable antivirus and antimalware tools to carry with you at all times](http://www.techrepublic.com/blog/five-apps/five-portable-antivirus-and-antimalware-tools-to-carry-with-you-at-all-times/ )<br>
|
||||
[SSH Based Chat](https://medium.com/@shazow/ssh-how-does-it-even-9e43586e4ffc )<br>
|
||||
[How To Create an SSH CA to Validate Hosts and Clients](https://www.digitalocean.com/community/tutorials/how-to-create-an-ssh-ca-to-validate-hosts-and-clients-with-ubuntu )<br>
|
||||
[VANE - A Free Fork of WPScan](https://github.com/delvelabs/vane )<br>
|
||||
[curated list of awesome malware analysis tools and resources](https://github.com/rshipp/awesome-malware-analysis )<br>
|
||||
[R Cheat Sheets](https://www.rstudio.com/resources/cheatsheets/ )<br>
|
||||
[Regenerable ed25519 keys for OpenSSH ](https://github.com/ahf/teneo )<br>
|
||||
[GUYMAGER a Free Forensic Imager](http://securityblog.gr/3004/guymager-a-free-forensic-imager/ )<br>
|
||||
[DropKick Detect and disconnect WiFi cameras](https://julianoliver.com/output/log_2015-12-18_14-39 )<br>
|
||||
[Adding a Signing GPG Key and Hiding the Master](https://alexcabal.com/creating-the-perfect-gpg-keypair/ )<br>
|
||||
[How to Tell if an Image, YouTube, etc. are faked](https://theconversation.com/six-easy-ways-to-tell-if-that-viral-story-is-a-hoax-47673 )<br>
|
||||
[new openssh key format and bcrypt pbkdf](http://www.tedunangst.com/flak/post/new-openssh-key-format-and-bcrypt-pbkdf )<br>
|
||||
[TLS SNI Test Site: alice.sni.velox.ch](https://alice.sni.velox.ch/ )<br>
|
||||
[Top 125 Security Tools](http://sectools.org/ )<br>
|
||||
ssh keylength `cat .ssh/id_rsa.pub | cut -c 9-60 | openssl base64 -d | hd`<br>
|
||||
[https://marc.info/?l=openbsd-misc&m=146333151523455&w=2 LetsEncrypt client which drops privs]<br>
|
||||
[https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ Penetration Testing Cheat Sheet]<br>
|
||||
[https://gogs.io/ GOGS - git server in go]<br>
|
||||
[http://www.fluentd.org/ Unified Logging Layer]<br>
|
||||
[https://certsimple.com/blog/ssl-wireshark-mac-osx Use Wireshark to inspect SSL]<br>
|
||||
[https://github.com/gcla/termshark A terminal user-interface for tshark, inspired by Wireshark.]<br>
|
||||
[https://en.wikibooks.org/wiki/LaTeX/Floats,_Figures_and_Captions#Wrapping_text_around_figures LaTeX, Wrapping text around figures]<br>
|
||||
[https://github.com/dspinellis/latex-advice Advice for writing LaTeX documents]<br>
|
||||
[http://aurelio.net/projects/sedsed/ SED Debugger]<br>
|
||||
[https://github.com/dspinellis/unix-history-make Unix History Repository]<br>
|
||||
[https://www.digitalocean.com/community/tutorials/how-to-create-a-pull-request-on-github How To Create a Git Pull Request on GitHub]<br>
|
||||
[http://www.sentex.net/~mwandel/jhead/ JHead - Exif Jpeg header manipulation tool]<br>
|
||||
[https://github.com/firehol/netdata/wiki/Installation NetData, the Linux internal measurement graphing tool from hell]<br>
|
||||
[https://ioparaskev.github.io/git/ A git Tutorial]<br>
|
||||
[http://packeth.sourceforge.net/packeth GUI and CLI packet generator tool for ethernet]<br>
|
||||
[https://github.com/draios/sysdig/wiki Sysdig is a universal system visibility tool with native support for containers]<br>
|
||||
[LetsEncrypt client which drops privs](https://marc.info/?l=openbsd-misc&m=146333151523455&w=2 )<br>
|
||||
[Penetration Testing Cheat Sheet](https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ )<br>
|
||||
[GOGS - git server in go](https://gogs.io/ )<br>
|
||||
[Unified Logging Layer](http://www.fluentd.org/ )<br>
|
||||
[Use Wireshark to inspect SSL](https://certsimple.com/blog/ssl-wireshark-mac-osx )<br>
|
||||
[A terminal user-interface for tshark, inspired by Wireshark.](https://github.com/gcla/termshark )<br>
|
||||
[LaTeX, Wrapping text around figures](https://en.wikibooks.org/wiki/LaTeX/Floats,_Figures_and_Captions#Wrapping_text_around_figures )<br>
|
||||
[Advice for writing LaTeX documents](https://github.com/dspinellis/latex-advice )<br>
|
||||
[SED Debugger](http://aurelio.net/projects/sedsed/ )<br>
|
||||
[Unix History Repository](https://github.com/dspinellis/unix-history-make )<br>
|
||||
[How To Create a Git Pull Request on GitHub](https://www.digitalocean.com/community/tutorials/how-to-create-a-pull-request-on-github )<br>
|
||||
[JHead - Exif Jpeg header manipulation tool](http://www.sentex.net/~mwandel/jhead/ )<br>
|
||||
[NetData, the Linux internal measurement graphing tool from hell](https://github.com/firehol/netdata/wiki/Installation )<br>
|
||||
[A git Tutorial](https://ioparaskev.github.io/git/ )<br>
|
||||
[GUI and CLI packet generator tool for ethernet](http://packeth.sourceforge.net/packeth )<br>
|
||||
[Sysdig is a universal system visibility tool with native support for containers](https://github.com/draios/sysdig/wiki )<br>
|
||||
|
||||
### Certificate Authority Tools
|
||||
|
||||
[http://sourceforge.net/projects/xca/ XCA, a Small CA for Macintosh]<br>
|
||||
[https://techlib.barracuda.com/display/cp/how+to+create+certificates+with+xca XCA Tutorial]<br>
|
||||
[http://www.ejbca.org/ EJBCA, a Large Enterprise Scale CA Toolset - LGPL but in java]<br>
|
||||
[https://packages.debian.org/wheezy/tinyca TinyCA, debian package, may not be maintained]<br>
|
||||
[https://docs.puppetlabs.com/puppet/3.7/reference/ssl_regenerate_certificates.html Regenerate Puppet Certificates]<br>
|
||||
[http://www.zdnet.com//article/five-security-settings-in-ios-10-you-should-change/ Safety Tips for iPhone iOS 10]<br>
|
||||
[https://crt.sh/?q=dom.ain Certificate Transparency Collector]<br>
|
||||
[https://github.com/FiloSottile/mkcert A simple zero-config tool to make locally trusted development certificates with any names you'd like.]<br>
|
||||
[XCA, a Small CA for Macintosh](http://sourceforge.net/projects/xca/ )<br>
|
||||
[XCA Tutorial](https://techlib.barracuda.com/display/cp/how+to+create+certificates+with+xca )<br>
|
||||
[EJBCA, a Large Enterprise Scale CA Toolset - LGPL but in java](http://www.ejbca.org/ )<br>
|
||||
[TinyCA, debian package, may not be maintained](https://packages.debian.org/wheezy/tinyca )<br>
|
||||
[Regenerate Puppet Certificates](https://docs.puppetlabs.com/puppet/3.7/reference/ssl_regenerate_certificates.html )<br>
|
||||
[Safety Tips for iPhone iOS 10](http://www.zdnet.com//article/five-security-settings-in-ios-10-you-should-change/ )<br>
|
||||
[Certificate Transparency Collector](https://crt.sh/?q=dom.ain )<br>
|
||||
[A simple zero-config tool to make locally trusted development certificates with any names you'd like.](https://github.com/FiloSottile/mkcert )<br>
|
||||
|
||||
## VPNs
|
||||
|
||||
{{{ssh randy@xmpp.rg.net -R 4430:127.0.0.1:443}}} from pfSense terminal console shell to backdoor when firewall locks you out.<br>
|
||||
[https://www.softether.org/ SoftEther VPN Project]<br>
|
||||
[https://www.wireguard.com/ WireGuard VPN]<br>
|
||||
```ssh randy@xmpp.rg.net -R 4430:127.0.0.1:443``` from pfSense terminal console shell to backdoor when firewall locks you out.<br>
|
||||
[SoftEther VPN Project](https://www.softether.org/ )<br>
|
||||
[WireGuard VPN](https://www.wireguard.com/ )<br>
|
||||
|
||||
# Languages
|
||||
|
||||
[http://www.snobol4.org/ SNOBOL4]<br>
|
||||
[https://github.com/vinta/awesome-python Awesome Python frameworks, libraries, software and resources]<br>
|
||||
[SNOBOL4](http://www.snobol4.org/ )<br>
|
||||
[Awesome Python frameworks, libraries, software and resources](https://github.com/vinta/awesome-python )<br>
|
||||
|
||||
# Networking
|
||||
|
||||
|
|
@ -253,179 +253,179 @@ ssh keylength `cat .ssh/id_rsa.pub | cut -c 9-60 | openssl base64 -d | hd`<br>
|
|||
|
||||
## DNS Tools
|
||||
|
||||
[http://www.zonemaster.net/ ZoneMaster DNS Zone Checker]<br>
|
||||
[https://www.had-pilot.com/dane/danelaw.html NIST DANE Tester]<br>
|
||||
!YanDex DNS Servers {{{77.88.8.1 and 77.88.8.8}}}<br>
|
||||
[https://zonemaster.net/ AfNIC ZoneMaster Zone checker]<br>
|
||||
[https://dane.sys4.de/ DANE SMTP Validatoe]<br>
|
||||
[https://github.com/PennockTech/smtpdane Phil Pennock's SMTP DANE TLS Checker]<br>
|
||||
[http://www.redsome.com/flush-clear-dns-cache-google-chrome-browser/ Flushing Chrome's DNS Cache]<br>
|
||||
[https://artemix.org/blog/dns-blocking.html Dnsmasq-based DNS blocking]<br>
|
||||
[ZoneMaster DNS Zone Checker](http://www.zonemaster.net/ )<br>
|
||||
[NIST DANE Tester](https://www.had-pilot.com/dane/danelaw.html )<br>
|
||||
!YanDex DNS Servers ```77.88.8.1 and 77.88.8.8```<br>
|
||||
[AfNIC ZoneMaster Zone checker](https://zonemaster.net/ )<br>
|
||||
[DANE SMTP Validatoe](https://dane.sys4.de/ )<br>
|
||||
[Phil Pennock's SMTP DANE TLS Checker](https://github.com/PennockTech/smtpdane )<br>
|
||||
[Flushing Chrome's DNS Cache](http://www.redsome.com/flush-clear-dns-cache-google-chrome-browser/ )<br>
|
||||
[Dnsmasq-based DNS blocking](https://artemix.org/blog/dns-blocking.html )<br>
|
||||
|
||||
## RIRs
|
||||
|
||||
[https://www.nro.net/wp-content/uploads/apnic-uploads/delegated-extended RIR Stats Files Catenated] & [wiki:NROstatsDecode Decode for the above NRO Stats]<br>
|
||||
[https://www.nic.ad.jp/timeline/en/ Internet Timeline from JPNIC]<br>
|
||||
[https://net.t-labs.tu-berlin.de/~prichter/transfer_report/ IPv4 Address Space Transfer Report]<br>
|
||||
[RIR Stats Files Catenated](https://www.nro.net/wp-content/uploads/apnic-uploads/delegated-extended ) & [wiki:NROstatsDecode Decode for the above NRO Stats]<br>
|
||||
[Internet Timeline from JPNIC](https://www.nic.ad.jp/timeline/en/ )<br>
|
||||
[IPv4 Address Space Transfer Report](https://net.t-labs.tu-berlin.de/~prichter/transfer_report/ )<br>
|
||||
|
||||
## Routing
|
||||
|
||||
[http://baturin.org/docs/iproute2/ Linux iproute2 Cheat Sheet]<br>
|
||||
[http://bird.network.cz/?get_doc&f=bird-4.html BIRD Cheat Sheet]<br>
|
||||
[https://vincent.bernat.im/en/blog/2017-ipv6-route-lookup-linux IPv6 route lookup on Linux]<br>
|
||||
[https://lwn.net/Articles/632522/ Linux VRF]<br>
|
||||
[https://netverify.fun/models-of-distributed-protocols/ Models for Distributed Routing Protocols]<br>
|
||||
[Linux iproute2 Cheat Sheet](http://baturin.org/docs/iproute2/ )<br>
|
||||
[BIRD Cheat Sheet](http://bird.network.cz/?get_doc&f=bird-4.html )<br>
|
||||
[IPv6 route lookup on Linux](https://vincent.bernat.im/en/blog/2017-ipv6-route-lookup-linux )<br>
|
||||
[Linux VRF](https://lwn.net/Articles/632522/ )<br>
|
||||
[Models for Distributed Routing Protocols](https://netverify.fun/models-of-distributed-protocols/ )<br>
|
||||
|
||||
### Routers
|
||||
|
||||
[http://www.juniper.net/documentation/en_US/release-independent/junos/topics/reference/specifications/routing-engine-m-mx-t-series-specifications-by-model.html Juniper Routing Engines]
|
||||
[http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-e/sec-usr-ssh-15-e-book/sec-secure-shell-v2.html#GUID-B23486F2-8B65-4E01-8FE5-5F80D307348F Cisco IOS ssh key regeneration]<br>
|
||||
[Juniper Routing Engines](http://www.juniper.net/documentation/en_US/release-independent/junos/topics/reference/specifications/routing-engine-m-mx-t-series-specifications-by-model.html )
|
||||
[Cisco IOS ssh key regeneration](http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-e/sec-usr-ssh-15-e-book/sec-secure-shell-v2.html#GUID-B23486F2-8B65-4E01-8FE5-5F80D307348F )<br>
|
||||
|
||||
### Routing Security / RPKI
|
||||
|
||||
[http://www.jpnap.net/rpki/en/roa_cache/technical_info.html Tomo's Cache Server and Router Configuration Instructions.]<br>
|
||||
[http://certification-stats.ripe.net/ Certificates per RIR]<br>
|
||||
[http://rpki.surfnet.nl/perrir.html RIR Statistics from SurfNet]<br>
|
||||
[http://rpki-monitor.antd.nist.gov/ NIST Global Prefix/Origin Validation using RPKI]<br>
|
||||
[http://www.bgpmon.net/securing-bgp-routing-with-rpki-and-roas/ Securing BGP Routing with RPKI and ROAs]<br>
|
||||
[http://rpki.me/quality.html Daniele's ROA quality Page]<br>
|
||||
[http://rpki.me/dns.html Daniele's Page of Root Nameserver ROA State]<br>
|
||||
[http://rpki-browser.realmv6.org/ RPKI Repository Browser]<br>
|
||||
[http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_14-2/142_bgp.html Internet Protocol Journal on Securing BGP, Huston and Bush]<br>
|
||||
[https://trac.rpki.net/ticket/763 Renew Child Certs]<br>
|
||||
[https://github.com/google/rpki-mgmt/ Google RPKI Puppet Deployment]<br>
|
||||
[https://www.caida.org/workshops/bgp-traceroute/1108/slides/bgp-traceroute1108_rpki_deployment_study.pdf Effects of RPKI Deployment on BGP Security]<br>
|
||||
[Tomo's Cache Server and Router Configuration Instructions.](http://www.jpnap.net/rpki/en/roa_cache/technical_info.html )<br>
|
||||
[Certificates per RIR](http://certification-stats.ripe.net/ )<br>
|
||||
[RIR Statistics from SurfNet](http://rpki.surfnet.nl/perrir.html )<br>
|
||||
[NIST Global Prefix/Origin Validation using RPKI](http://rpki-monitor.antd.nist.gov/ )<br>
|
||||
[Securing BGP Routing with RPKI and ROAs](http://www.bgpmon.net/securing-bgp-routing-with-rpki-and-roas/ )<br>
|
||||
[Daniele's ROA quality Page](http://rpki.me/quality.html )<br>
|
||||
[Daniele's Page of Root Nameserver ROA State](http://rpki.me/dns.html )<br>
|
||||
[RPKI Repository Browser](http://rpki-browser.realmv6.org/ )<br>
|
||||
[Internet Protocol Journal on Securing BGP, Huston and Bush](http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_14-2/142_bgp.html )<br>
|
||||
[Renew Child Certs](https://trac.rpki.net/ticket/763 )<br>
|
||||
[Google RPKI Puppet Deployment](https://github.com/google/rpki-mgmt/ )<br>
|
||||
[Effects of RPKI Deployment on BGP Security](https://www.caida.org/workshops/bgp-traceroute/1108/slides/bgp-traceroute1108_rpki_deployment_study.pdf )<br>
|
||||
|
||||
### Routing Tools
|
||||
|
||||
[https://github.com/irrtoolset/irrtoolset IRR Toolset]<br>
|
||||
[https://github.com/job/bgpq3 bgpq3 - bgp filtering automation for Cisco and Juniper routers]<br>
|
||||
[https://github.com/job/aggregate6 IPv4 and IPv6 prefix aggregation tool]<br>
|
||||
[https://basimaly-wordpress-com.cdn.ampproject.org/c/s/basimaly.wordpress.com/2017/07/03/bgp-visualization-using-python/amp/ BGP Visualize with Python]<br>
|
||||
[IRR Toolset](https://github.com/irrtoolset/irrtoolset )<br>
|
||||
[bgpq3 - bgp filtering automation for Cisco and Juniper routers](https://github.com/job/bgpq3 )<br>
|
||||
[IPv4 and IPv6 prefix aggregation tool](https://github.com/job/aggregate6 )<br>
|
||||
[BGP Visualize with Python](https://basimaly-wordpress-com.cdn.ampproject.org/c/s/basimaly.wordpress.com/2017/07/03/bgp-visualization-using-python/amp/ )<br>
|
||||
|
||||
## Tools
|
||||
|
||||
[https://www.lede-project.org/ OpenWRT Replacement]<br>
|
||||
[https://wiki.openwrt.org/doc/recipes/guest-wlan-webinterface Lede Guest LAN Set-up]<br>
|
||||
[http://baturin.org/tools/encapcalc/ Encapsulation overhead calculator]<br>
|
||||
[http://www.luismg.com/protocol/ Protocol Header Diagram Generator]<br>
|
||||
[OpenWRT Replacement](https://www.lede-project.org/ )<br>
|
||||
[Lede Guest LAN Set-up](https://wiki.openwrt.org/doc/recipes/guest-wlan-webinterface )<br>
|
||||
[Encapsulation overhead calculator](http://baturin.org/tools/encapcalc/ )<br>
|
||||
[Protocol Header Diagram Generator](http://www.luismg.com/protocol/ )<br>
|
||||
|
||||
# Outreach
|
||||
|
||||
## Thailand
|
||||
|
||||
[https://www.flickr.com/photos/127194098@N06/sets/72157648793146330/ BKNIX 2014.11.06]<br>
|
||||
[BKNIX 2014.11.06](https://www.flickr.com/photos/127194098@N06/sets/72157648793146330/ )<br>
|
||||
|
||||
## Workshops
|
||||
|
||||
[https://sec-wkshp.rg.net/ AIT Bangkok 2012.11.19-22]<br>
|
||||
[https://nsrc.org/workshops/2014/sanog23-security/ SANOG/Thimphu 2014.01.13-21]<br>
|
||||
[https://web.nsrc.org/workshops/2015/apricot2015/wiki/Track5Agenda APRICOT 2015]<br>
|
||||
[https://wiki.rg.net/wiki/Btnog2Sec BTNOG2 Thimphu 2015.09.14-17]<br>
|
||||
[https://wiki.rg.net/wiki/Apricot2016Sec APRICOT 2016 Security Workshop]<br>
|
||||
[https://wiki.rg.net/wiki/Apricot2017Sec APRICOT 2017 Security Workshop 2017.02.20-24]<br>
|
||||
[https://github.com/randyqx/bhutannog-sec2017 Bhutan NOG 2017 Security Workshop]<br>
|
||||
[AIT Bangkok 2012.11.19-22](https://sec-wkshp.rg.net/ )<br>
|
||||
[SANOG/Thimphu 2014.01.13-21](https://nsrc.org/workshops/2014/sanog23-security/ )<br>
|
||||
[APRICOT 2015](https://web.nsrc.org/workshops/2015/apricot2015/wiki/Track5Agenda )<br>
|
||||
[BTNOG2 Thimphu 2015.09.14-17](https://wiki.rg.net/wiki/Btnog2Sec )<br>
|
||||
[APRICOT 2016 Security Workshop](https://wiki.rg.net/wiki/Apricot2016Sec )<br>
|
||||
[APRICOT 2017 Security Workshop 2017.02.20-24](https://wiki.rg.net/wiki/Apricot2017Sec )<br>
|
||||
[Bhutan NOG 2017 Security Workshop](https://github.com/randyqx/bhutannog-sec2017 )<br>
|
||||
|
||||
# Research / Computer Science
|
||||
|
||||
## Measurement
|
||||
|
||||
[http://graphite.wikidot.com/ Graphite - Scalable Realtime Graphing]<br>
|
||||
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006 Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization]<br>
|
||||
[http://www.cs.unc.edu/~fabian/Traffic.html Traffic Analysis - Anonymization]<br>
|
||||
[http://net.t-labs.tu-berlin.de/~prichter/transfer_report/ IPv4 Address Transfer Report BETA]<br>
|
||||
[http://sg-pub.ripe.net/emile/ixp-country-jedi/latest/ Emile Country Jedi]<br>
|
||||
[https://python-graph-gallery.com The Python Graph Gallery]<br>
|
||||
[Graphite - Scalable Realtime Graphing](http://graphite.wikidot.com/ )<br>
|
||||
[Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006 )<br>
|
||||
[Traffic Analysis - Anonymization](http://www.cs.unc.edu/~fabian/Traffic.html )<br>
|
||||
[IPv4 Address Transfer Report BETA](http://net.t-labs.tu-berlin.de/~prichter/transfer_report/ )<br>
|
||||
[Emile Country Jedi](http://sg-pub.ripe.net/emile/ixp-country-jedi/latest/ )<br>
|
||||
[The Python Graph Gallery](https://python-graph-gallery.com )<br>
|
||||
|
||||
## Miscellaneous Research
|
||||
|
||||
[https://mailman.caida.org/mailman/private/bgp-hackathon-participants/ CAIDA BGP Hackathon List Archive]<br>
|
||||
[http://blog.caida.org/best_available_data/2016/01/13/caida-bgp-hackathon-2016-participants/ CAIDA BGP Hackathon BLOG]<br>
|
||||
[https://github.com/CAIDA/bgp-hackathon/wiki CAIDA BGP Hackathon wiki]<br>
|
||||
[https://github.com/improbable-public/internet-simulation A full-scale simulation of the Internet based on the Border Gateway Protocol (BGP), built on SpatialOS]<br>
|
||||
[https://www.semanticscholar.org/ Semantic Scholar Paper Cites and Refs]<br>
|
||||
[https://workshape.github.io/visual-graph-algorithms/ Graph Traversal Algorith Visualizations]<br>
|
||||
[https://github.com/veorq/misc/blob/students/STUDENTS.md Guide for students working with JP Aumasson]<br>
|
||||
[https://www.youtube.com/watch?v=g3dkRsTqdDA How to Write a Great Research Paper]<br>
|
||||
[CAIDA BGP Hackathon List Archive](https://mailman.caida.org/mailman/private/bgp-hackathon-participants/ )<br>
|
||||
[CAIDA BGP Hackathon BLOG](http://blog.caida.org/best_available_data/2016/01/13/caida-bgp-hackathon-2016-participants/ )<br>
|
||||
[CAIDA BGP Hackathon wiki](https://github.com/CAIDA/bgp-hackathon/wiki )<br>
|
||||
[A full-scale simulation of the Internet based on the Border Gateway Protocol (BGP), built on SpatialOS](https://github.com/improbable-public/internet-simulation )<br>
|
||||
[Semantic Scholar Paper Cites and Refs](https://www.semanticscholar.org/ )<br>
|
||||
[Graph Traversal Algorith Visualizations](https://workshape.github.io/visual-graph-algorithms/ )<br>
|
||||
[Guide for students working with JP Aumasson](https://github.com/veorq/misc/blob/students/STUDENTS.md )<br>
|
||||
[How to Write a Great Research Paper](https://www.youtube.com/watch?v=g3dkRsTqdDA )<br>
|
||||
|
||||
# Security
|
||||
|
||||
## Cryptography
|
||||
|
||||
[https://cryptocoding.net/index.php/Coding_rules Crypto Coding Rules]<br>
|
||||
[https://www.cs.auckland.ac.nz/~pgut001/cryptlib/ CryptLib Toolkit]<br>
|
||||
[https://github.com/libtom Free, Open Source, Crypto Libraries/Toolkits]<br>
|
||||
[https://cr.yp.to/highspeed/naclcrypto-20090310.pdf NaCl Crypto Primitives]<br>
|
||||
[http://iang.org/ssl/hard_truths_hard_random_numbers.html Hard Truths about the Hard Business of finding Hard Random Numbers]<br>
|
||||
[http://blog.cryptographyengineering.com/2014/12/on-new-snowden-documents.html Matthew Green on December 2014 Snowden Dump]<br>
|
||||
[http://bristolcrypto.blogspot.co.uk/ Blog for the cryptography group of the University of Bristol]<br>
|
||||
[http://publications.jrc.ec.europa.eu/repository/bitstream/JRC91528/lbna26833enn.pdf Performance analysis of different cryptographic algorithms implemented in an FPGA]<br>
|
||||
[http://science.howstuffworks.com/code-breaker.htm How Code Breakers Work]<br>
|
||||
[http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html Jacobian coordinates for short Weierstrass curves (algs to use)]<br>
|
||||
[https://developer.apple.com/cryptography/ Apple Crypto Libraries]<br>
|
||||
[https://github.com/sobolevn/awesome-cryptography Awesome Cryptogtaphy]<br>
|
||||
[https://www.crypto101.io/ An introductory course on cryptography]<br>
|
||||
[http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html A Stick Figure Guide to the Advanced Encryption Standard (AES)]<br>
|
||||
[Crypto Coding Rules](https://cryptocoding.net/index.php/Coding_rules )<br>
|
||||
[CryptLib Toolkit](https://www.cs.auckland.ac.nz/~pgut001/cryptlib/ )<br>
|
||||
[Free, Open Source, Crypto Libraries/Toolkits](https://github.com/libtom )<br>
|
||||
[NaCl Crypto Primitives](https://cr.yp.to/highspeed/naclcrypto-20090310.pdf )<br>
|
||||
[Hard Truths about the Hard Business of finding Hard Random Numbers](http://iang.org/ssl/hard_truths_hard_random_numbers.html )<br>
|
||||
[Matthew Green on December 2014 Snowden Dump](http://blog.cryptographyengineering.com/2014/12/on-new-snowden-documents.html )<br>
|
||||
[Blog for the cryptography group of the University of Bristol](http://bristolcrypto.blogspot.co.uk/ )<br>
|
||||
[Performance analysis of different cryptographic algorithms implemented in an FPGA](http://publications.jrc.ec.europa.eu/repository/bitstream/JRC91528/lbna26833enn.pdf )<br>
|
||||
[How Code Breakers Work](http://science.howstuffworks.com/code-breaker.htm )<br>
|
||||
[Jacobian coordinates for short Weierstrass curves (algs to use)](http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html )<br>
|
||||
[Apple Crypto Libraries](https://developer.apple.com/cryptography/ )<br>
|
||||
[Awesome Cryptogtaphy](https://github.com/sobolevn/awesome-cryptography )<br>
|
||||
[An introductory course on cryptography](https://www.crypto101.io/ )<br>
|
||||
[A Stick Figure Guide to the Advanced Encryption Standard (AES)](http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html )<br>
|
||||
|
||||
## General Security
|
||||
|
||||
[https://code.google.com/p/capirca/ Capirca, utilizes common definitions of networks and services and high-level policy files to facilitate the development and manipulation of network access control filters (ACLs) for various platforms. Use with ldpush]<br>
|
||||
[http://cryptosense.com/real-hsm-breaches/ Real HSM Breaches]<br>
|
||||
[https://github.com/OpenTechFund/secure-chat/blob/master/roadmap.md OpenTechFund/secure-chat roadmap. More like a planet survey.]<br>
|
||||
[http://www.cs.dartmouth.edu/~sergey/langsec/papers/langsec-tr.pdf Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina]<br>
|
||||
[https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ Hardening Your Web Server]<br>
|
||||
[https://wiki.cacert.org/Risks/SecretCells/ThreatsAndAssumptions Secret Cells, Threats and Assumptions]<br>
|
||||
[https://wiki.mozilla.org/Security/Server_Side_TLS Mozilla Recommendations for Security/Server Side TLS]<br>
|
||||
[https://cc.dcsec.uni-hannover.de/ SSL Cipher Suite Details of Your Browser]<br>
|
||||
[https://www.howsmyssl.com/ Check out Your Browser's SSL Support]<br>
|
||||
[https://github.com/amq/firefox-debloat Stop Firefox leaking data about you]<br>
|
||||
[http://www.net-security.org/secworld.php?id=18776 Mobile Carrier Super-Cookie Use]<br>
|
||||
[https://github.com/lfit/itpol/blob/master/linux-workstation-security.md Linux workstation security checklist]<br>
|
||||
[https://web.archive.org/web/20110724024707/http://sion.quickie.net/keysigning.txt Efficient Group Key Signing Method]<br>
|
||||
[https://gist.github.com/Superbil caff, proof of posession of the passphrase of a key sent by the email address associated with that key]<br>
|
||||
[https://github.com/micahflee/onionshare/blob/master/README.md OnionShare]<br>
|
||||
[http://cybersecurity.oxfordjournals.org/ Journal of Cybersecurity]<br>
|
||||
[http://www.thoughtcrime.org/blog/we-should-all-have-something-to-hide/ We Should All Have Something To Hide, Moxie]<br>
|
||||
[http://www.alexirpan.com/2016/02/11/secure-computation.html A Gentle Introduction to Secure Computation]<br>
|
||||
[https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes FTC - Time to rethink mandatory password changes]<br>
|
||||
[https://cvdazzle.com/ Camouflage from face detection]<br>
|
||||
[https://vez.mrsk.me/freebsd-defaults.txt FreeBSD - a lesson in poor defaults]<br>
|
||||
[Capirca, utilizes common definitions of networks and services and high-level policy files to facilitate the development and manipulation of network access control filters (ACLs) for various platforms. Use with ldpush](https://code.google.com/p/capirca/ )<br>
|
||||
[Real HSM Breaches](http://cryptosense.com/real-hsm-breaches/ )<br>
|
||||
[OpenTechFund/secure-chat roadmap. More like a planet survey.](https://github.com/OpenTechFund/secure-chat/blob/master/roadmap.md )<br>
|
||||
[Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina](http://www.cs.dartmouth.edu/~sergey/langsec/papers/langsec-tr.pdf )<br>
|
||||
[Hardening Your Web Server](https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ )<br>
|
||||
[Secret Cells, Threats and Assumptions](https://wiki.cacert.org/Risks/SecretCells/ThreatsAndAssumptions )<br>
|
||||
[Mozilla Recommendations for Security/Server Side TLS](https://wiki.mozilla.org/Security/Server_Side_TLS )<br>
|
||||
[SSL Cipher Suite Details of Your Browser](https://cc.dcsec.uni-hannover.de/ )<br>
|
||||
[Check out Your Browser's SSL Support](https://www.howsmyssl.com/ )<br>
|
||||
[Stop Firefox leaking data about you](https://github.com/amq/firefox-debloat )<br>
|
||||
[Mobile Carrier Super-Cookie Use](http://www.net-security.org/secworld.php?id=18776 )<br>
|
||||
[Linux workstation security checklist](https://github.com/lfit/itpol/blob/master/linux-workstation-security.md )<br>
|
||||
[Efficient Group Key Signing Method](https://web.archive.org/web/20110724024707/http://sion.quickie.net/keysigning.txt )<br>
|
||||
[caff, proof of posession of the passphrase of a key sent by the email address associated with that key](https://gist.github.com/Superbil )<br>
|
||||
[OnionShare](https://github.com/micahflee/onionshare/blob/master/README.md )<br>
|
||||
[Journal of Cybersecurity](http://cybersecurity.oxfordjournals.org/ )<br>
|
||||
[We Should All Have Something To Hide, Moxie](http://www.thoughtcrime.org/blog/we-should-all-have-something-to-hide/ )<br>
|
||||
[A Gentle Introduction to Secure Computation](http://www.alexirpan.com/2016/02/11/secure-computation.html )<br>
|
||||
[FTC - Time to rethink mandatory password changes](https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes )<br>
|
||||
[Camouflage from face detection](https://cvdazzle.com/ )<br>
|
||||
[FreeBSD - a lesson in poor defaults](https://vez.mrsk.me/freebsd-defaults.txt )<br>
|
||||
!FireFox about:config set `dom.webnotifications.enabled` and `dom.push.enabled`
|
||||
to false to prevent push notifications]<br>
|
||||
[https://www.eecs.umich.edu/courses/eecs588/readings.html Cyber Security Reading List]<br>
|
||||
[https://techsolidarity.org/resources/journalist_checkup.html Tech Solidarity Personal Security CheckList Review]<br>
|
||||
[https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492 Shared thoughts after 6+ years in Pentesting]<br>
|
||||
[https://www.it-sec-catalog.info/analysis_and_exploitation_unprivileged.html A Catalog of Exploits]<br>
|
||||
[https://magoo.github.io/Blockchain-Graveyard/ Blockchain Graveyard, Crypto-Currency Disasters]<br>
|
||||
[https://github.com/veorq/ipcrypt ipcrypt: IP-format-preserving encryption]<br>
|
||||
[http://images.secure.f-secure.com/Web/FSecure/%7B319382b2-a040-4c88-bd94-20eed01bf22f%7D_F-Secure-Evil-Maid-Guide.pdf F-Secure’s Guide to Evil Maid Attacks]<br>
|
||||
[https://secapps.com/blog/2018/03/fuzzing-json-web-services Fuzzing JSON Web Services]<br>
|
||||
[https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt PEN Tester's Tool List]<br>
|
||||
[https://github.com/qazbnm456/awesome-web-security Awesome Web Security]<br>
|
||||
[https://www.hrw.org/everyday-encryption Gamified lessons in using encryption in everyday life. Good for you and good for friends and family.\]<br>
|
||||
[http://addxorrol.blogspot.com/2019/08/rashomon-of-disclosure.html Excellent piece on vulnerability disclosure]<br>
|
||||
[Cyber Security Reading List](https://www.eecs.umich.edu/courses/eecs588/readings.html )<br>
|
||||
[Tech Solidarity Personal Security CheckList Review](https://techsolidarity.org/resources/journalist_checkup.html )<br>
|
||||
[Shared thoughts after 6+ years in Pentesting](https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492 )<br>
|
||||
[A Catalog of Exploits](https://www.it-sec-catalog.info/analysis_and_exploitation_unprivileged.html )<br>
|
||||
[Blockchain Graveyard, Crypto-Currency Disasters](https://magoo.github.io/Blockchain-Graveyard/ )<br>
|
||||
[ipcrypt: IP-format-preserving encryption](https://github.com/veorq/ipcrypt )<br>
|
||||
[F-Secure’s Guide to Evil Maid Attacks](http://images.secure.f-secure.com/Web/FSecure/%7B319382b2-a040-4c88-bd94-20eed01bf22f%7D_F-Secure-Evil-Maid-Guide.pdf )<br>
|
||||
[Fuzzing JSON Web Services](https://secapps.com/blog/2018/03/fuzzing-json-web-services )<br>
|
||||
[PEN Tester's Tool List](https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt )<br>
|
||||
[Awesome Web Security](https://github.com/qazbnm456/awesome-web-security )<br>
|
||||
[Gamified lessons in using encryption in everyday life. Good for you and good for friends and family.\](https://www.hrw.org/everyday-encryption )<br>
|
||||
[Excellent piece on vulnerability disclosure](http://addxorrol.blogspot.com/2019/08/rashomon-of-disclosure.html )<br>
|
||||
|
||||
## Privacy Projects
|
||||
|
||||
[https://wiki.techinc.nl/index.php/Privacy_Software_Workshop_Series Privacy Software Workshop Series]<br>
|
||||
[http://wiki.techinc.nl/index.php/P2pbgpsec Peer 2 Peer BGP Security]<br>
|
||||
[https://wiki.techinc.nl/index.php/MeshNet Setting Up I2P and Tor Darknets]<br>
|
||||
[Privacy Software Workshop Series](https://wiki.techinc.nl/index.php/Privacy_Software_Workshop_Series )<br>
|
||||
[Peer 2 Peer BGP Security](http://wiki.techinc.nl/index.php/P2pbgpsec )<br>
|
||||
[Setting Up I2P and Tor Darknets](https://wiki.techinc.nl/index.php/MeshNet )<br>
|
||||
|
||||
## Securing Open Source
|
||||
|
||||
[https://github.com/OpenTechFund/secure-chat/blob/master/roadmap.md Secure Messaging roadmap from the LEAP project]<br>
|
||||
[Secure Messaging roadmap from the LEAP project](https://github.com/OpenTechFund/secure-chat/blob/master/roadmap.md )<br>
|
||||
|
||||
## Tools
|
||||
|
||||
[https://github.com/rntz/rotten/blob/master/README.md ROTTEN, small self-hosting Lisp, designed as a vehicle for exploring Ken Thompson's Reflections on Trusting Trust]
|
||||
[http://canarytokens.org/generate Canary Token Generator]<br>
|
||||
[https://research.kudelskisecurity.com/2017/04/28/configuring-yubikey-for-gpg-and-u2f/ YubiKey Configuration for GPG, SSH, and U2F]<br>
|
||||
[https://github.com/trimstray/awesome-ninja-admins collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins]<br>
|
||||
[https://github.com/toniblyx/my-arsenal-of-aws-security-tools List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.]<br>
|
||||
[https://www.safetydetective.com/blog/free-security-tools-that-you-need-to-start-using-now/ Free Security Tools an End User Should Start Using NOW]<br>
|
||||
[https://gist.github.com/lizthegrey/9c21673f33186a9cc775464afbdce820 Securing how folk use ssh]<br>
|
||||
[https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ Clean Poisoned Keys on your GPG Keyring]<br>
|
||||
[https://medium.com/@micallst/osint-resources-for-2019-b15d55187c3f OSINT Resources for 2019]<br>
|
||||
[ROTTEN, small self-hosting Lisp, designed as a vehicle for exploring Ken Thompson's Reflections on Trusting Trust](https://github.com/rntz/rotten/blob/master/README.md )
|
||||
[Canary Token Generator](http://canarytokens.org/generate )<br>
|
||||
[YubiKey Configuration for GPG, SSH, and U2F](https://research.kudelskisecurity.com/2017/04/28/configuring-yubikey-for-gpg-and-u2f/ )<br>
|
||||
[collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins](https://github.com/trimstray/awesome-ninja-admins )<br>
|
||||
[List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.](https://github.com/toniblyx/my-arsenal-of-aws-security-tools )<br>
|
||||
[Free Security Tools an End User Should Start Using NOW](https://www.safetydetective.com/blog/free-security-tools-that-you-need-to-start-using-now/ )<br>
|
||||
[Securing how folk use ssh](https://gist.github.com/lizthegrey/9c21673f33186a9cc775464afbdce820 )<br>
|
||||
[Clean Poisoned Keys on your GPG Keyring](https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ )<br>
|
||||
[OSINT Resources for 2019](https://medium.com/@micallst/osint-resources-for-2019-b15d55187c3f )<br>
|
||||
|
||||
# System Administration
|
||||
|
||||
|
|
@ -433,123 +433,123 @@ to false to prevent push notifications]<br>
|
|||
|
||||
### Ansible
|
||||
|
||||
[http://www.ansibleworks.com/docs/]<br>
|
||||
[http://www.ansibleworks.com/docs/faq.html]<br>
|
||||
[http://jinja.pocoo.org/docs/templates/]<br>
|
||||
[https://nsrc.org/workshops/2013/nsrc-ubuntunet-trainers/raw-attachment/wiki/Agenda/intro-ansible.pdf NSRC Intro (pdf)]<br>
|
||||
[https://gist.github.com/raags/0f2089ec1208617b86d8 append an existing list using set_fact]<br>
|
||||
[http://docs.ansible.com/developing_modules.html#module-provided-facts Module Provided Facts]<br>
|
||||
[https://github.com/Juniper/ansible-junos-stdlib for JunOS]<br>
|
||||
[https://github.com/jedelman8/nxos-ansible for NX-OS]<br>
|
||||
[https://github.com/spotify/napalm for IOSxr]<br>
|
||||
[https://github.com/bronwynlewis/ansible101-network-automation-tutorial Bronwyn Tutorial]<br>
|
||||
[https://wiki.postgresql.org/wiki/Disk_Usage Finding the size of various object in your postgres database]<br>
|
||||
[http://pythonsweetness.tumblr.com/post/171589071872/quadrupling-ansible-performance-with-mitogen Quadrupling Ansible performance with Mitogen]<br>
|
||||
[[http://www.ansibleworks.com/docs/faq.html](http://www.ansibleworks.com/docs/]<br>
|
||||
)<br>
|
||||
[[https://nsrc.org/workshops/2013/nsrc-ubuntunet-trainers/raw-attachment/wiki/Agenda/intro-ansible.pdf NSRC Intro (pdf)](http://jinja.pocoo.org/docs/templates/]<br>
|
||||
)<br>
|
||||
[append an existing list using set_fact](https://gist.github.com/raags/0f2089ec1208617b86d8 )<br>
|
||||
[Module Provided Facts](http://docs.ansible.com/developing_modules.html#module-provided-facts )<br>
|
||||
[for JunOS](https://github.com/Juniper/ansible-junos-stdlib )<br>
|
||||
[for NX-OS](https://github.com/jedelman8/nxos-ansible )<br>
|
||||
[for IOSxr](https://github.com/spotify/napalm )<br>
|
||||
[Bronwyn Tutorial](https://github.com/bronwynlewis/ansible101-network-automation-tutorial )<br>
|
||||
[Finding the size of various object in your postgres database](https://wiki.postgresql.org/wiki/Disk_Usage )<br>
|
||||
[Quadrupling Ansible performance with Mitogen](http://pythonsweetness.tumblr.com/post/171589071872/quadrupling-ansible-performance-with-mitogen )<br>
|
||||
|
||||
### Configuration Tools
|
||||
|
||||
[https://code.google.com/p/ldpush/ LDPush, A cross-vendor network configuration distribution tool]<br>
|
||||
[https://github.com/facebook/fbpush CLI tool to push junoscript configs to Juniper network devices]<br>
|
||||
[https://github.com/ypconfig/ypconfig Python tool to configure networking interfaces on a Linux machine]<br>
|
||||
[LDPush, A cross-vendor network configuration distribution tool](https://code.google.com/p/ldpush/ )<br>
|
||||
[CLI tool to push junoscript configs to Juniper network devices](https://github.com/facebook/fbpush )<br>
|
||||
[Python tool to configure networking interfaces on a Linux machine](https://github.com/ypconfig/ypconfig )<br>
|
||||
|
||||
## Miscellaneous SysAdmin
|
||||
|
||||
[https://github.com/simondeziel/check-deleted-libs Check if Upgrade has Dynmic Lib Dependencies which Need Restart]<br>
|
||||
[Check if Upgrade has Dynmic Lib Dependencies which Need Restart](https://github.com/simondeziel/check-deleted-libs )<br>
|
||||
|
||||
# Telcos & Lesser Forms of Humor
|
||||
|
||||
[http://prepaid-data-sim-card.wikia.com/wiki/Prepaid_SIM_with_data Prepaid SIMs Global Wiki]<br>
|
||||
[Prepaid SIMs Global Wiki](http://prepaid-data-sim-card.wikia.com/wiki/Prepaid_SIM_with_data )<br>
|
||||
|
||||
# Virtualization
|
||||
|
||||
## Ganeti
|
||||
|
||||
[https://github.com/ffzg/ganeti-extstorage-zfs Experimental Ganeti extstorage provider for ZFS volumes]<br>
|
||||
[https://groups.google.com/forum/#!topic/ganeti/chZ99mAHuuc Ganeti using LVM over ZFS (zfsonlinux) ]<br>
|
||||
[https://doc.pfsense.org/index.php/VirtIO_Driver_Support Installing pfSense as VirtIO on Ganeti]<br>
|
||||
[http://docs.ganeti.org/ganeti/master/man/gnt-node.html#modify Make a Node Multi-Homed]<br>
|
||||
[http://docs.ganeti.org/ganeti/master/html/admin.html#replication-network-changes Also how to Make a Node Multi-Homed]<br>
|
||||
[http://docs.ganeti.org/ganeti/2.12/html/upgrade.html Upgrading to 2.12 and Onward]<br>
|
||||
[http://ganeti-webmgr.readthedocs.org/en/latest/index.html Ganeti Web Manager]<br>
|
||||
[https://nsrc.org/workshops/2014/sanog23-virtualization/raw-attachment/wiki/Agenda/ex-ganeti-webmgr.htm NSRC Instructions for Ganeti Web Manager Installation]<br>
|
||||
[https://www.synnefo.org/docs/snf-image/latest/index.html snf-image - allows Ganeti to launch instances from predefined or untrusted custom Images]<br>
|
||||
[https://code.google.com/p/ganeti/wiki/EditingTheConfiguration Editing Cluster Configuration (/var/lib/ganeti/config.data)]<br>
|
||||
[http://docs.ganeti.org/ganeti/2.12/html/cluster-keys-replacement.html Cluster Key Replacement]<br>
|
||||
[https://code.google.com/p/ganeti/wiki/GanetiAndSSL Generate/Replace SSL Certificates]<br>
|
||||
{{{lvextend -L+50G -r /dev/mapper/ganeti-var}}}<br>
|
||||
[https://github.com/ganeti/ganeti/wiki/Performance-Tuning Ganeti Performance Tuning]<br>
|
||||
[http://docs.openvswitch.org/en/latest/howto/tunneling/ Using Open vSwitch to allow VMs on two different hosts to communicate over port-based GRE tunnels]<br>
|
||||
[Experimental Ganeti extstorage provider for ZFS volumes](https://github.com/ffzg/ganeti-extstorage-zfs )<br>
|
||||
[Ganeti using LVM over ZFS (zfsonlinux) ](https://groups.google.com/forum/#!topic/ganeti/chZ99mAHuuc )<br>
|
||||
[Installing pfSense as VirtIO on Ganeti](https://doc.pfsense.org/index.php/VirtIO_Driver_Support )<br>
|
||||
[Make a Node Multi-Homed](http://docs.ganeti.org/ganeti/master/man/gnt-node.html#modify )<br>
|
||||
[Also how to Make a Node Multi-Homed](http://docs.ganeti.org/ganeti/master/html/admin.html#replication-network-changes )<br>
|
||||
[Upgrading to 2.12 and Onward](http://docs.ganeti.org/ganeti/2.12/html/upgrade.html )<br>
|
||||
[Ganeti Web Manager](http://ganeti-webmgr.readthedocs.org/en/latest/index.html )<br>
|
||||
[NSRC Instructions for Ganeti Web Manager Installation](https://nsrc.org/workshops/2014/sanog23-virtualization/raw-attachment/wiki/Agenda/ex-ganeti-webmgr.htm )<br>
|
||||
[snf-image - allows Ganeti to launch instances from predefined or untrusted custom Images](https://www.synnefo.org/docs/snf-image/latest/index.html )<br>
|
||||
[Editing Cluster Configuration (/var/lib/ganeti/config.data)](https://code.google.com/p/ganeti/wiki/EditingTheConfiguration )<br>
|
||||
[Cluster Key Replacement](http://docs.ganeti.org/ganeti/2.12/html/cluster-keys-replacement.html )<br>
|
||||
[Generate/Replace SSL Certificates](https://code.google.com/p/ganeti/wiki/GanetiAndSSL )<br>
|
||||
```lvextend -L+50G -r /dev/mapper/ganeti-var```<br>
|
||||
[Ganeti Performance Tuning](https://github.com/ganeti/ganeti/wiki/Performance-Tuning )<br>
|
||||
[Using Open vSwitch to allow VMs on two different hosts to communicate over port-based GRE tunnels](http://docs.openvswitch.org/en/latest/howto/tunneling/ )<br>
|
||||
|
||||
## Misc Cloudware
|
||||
[http://owncloud.org/ OwnCloud]<br>
|
||||
[OwnCloud](http://owncloud.org/ )<br>
|
||||
|
||||
# Windows
|
||||
|
||||
## Ops Tools
|
||||
|
||||
[http://www.metzdowd.com/pipermail/cryptography/2015-July/026136.html Win10 is Horrible SpyWare]<br>
|
||||
[Win10 is Horrible SpyWare](http://www.metzdowd.com/pipermail/cryptography/2015-July/026136.html )<br>
|
||||
|
||||
## Security
|
||||
|
||||
[https://resistsurveillance.org/ Detekt, a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS]<br>
|
||||
[Detekt, a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS](https://resistsurveillance.org/ )<br>
|
||||
|
||||
## Misc Windows Stuff
|
||||
|
||||
[https://superuser.com/questions/602209/create-a-pdf-from-powerpoint-with-animations Split PowerPoint Animations into PDFs]<br>
|
||||
[Split PowerPoint Animations into PDFs](https://superuser.com/questions/602209/create-a-pdf-from-powerpoint-with-animations )<br>
|
||||
|
||||
# Misceleanous
|
||||
|
||||
[https://framadate.org/8ouws6sxigi2gjdz Framadate, an open doodle replacement]<br>
|
||||
[https://www.youtube.com/watch?v=0NvsUXBCeVA Snowden at IETF, plugs CrypTech at 0:38:00]<br>
|
||||
[https://archive.psg.com:Abstract-Guide-Nature.pdf How to construct a Nature summary paragrah (aka abstract)]<br>
|
||||
[http://idlewords.com/talks/web_design_first_100_years.htm Web Design: The First 100 Years ]<br>
|
||||
[https://www.whiterabbitexpress.com/ White Rabbit Express - Buy anything from Japan]<br>
|
||||
[http://netflixcodes.me/ NetFlix Secret Category Codes]<br>
|
||||
[https://en.wikipedia.org/wiki/Template:Supranational_European_Bodies Supranational European Bodies]<br>
|
||||
[https://appear.in/ Free Open WebRTC Site]<br>
|
||||
[http://web2.uvcs.uvic.ca/elc/studyzone/330/reading/smell1.htm The Small of the Soup]<br>
|
||||
[http://dev.to/rly O RLY Cover Generator]<br>
|
||||
[https://cf.iij-group.jp/pages/viewpage.action?title=Conference+schedule&spaceKey=LAB IIJ Lab Conference Calendar]<br>
|
||||
[http://www.read.seas.harvard.edu/~kohler/latex.html LaTeX hints]<br>
|
||||
[http://www.network-science.de/ascii/ Big Font Generator]<br>
|
||||
[http://hackingdistributed.com/2017/05/04/stages-of-enlightenment/ Levels of Techie Enlightenment]<br>
|
||||
[http://www.newyorker.com/humor/daily-shouts/freelance-achievement-stickers Freelance Achievement Stickers]<br>
|
||||
[https://thepointsguy.com/2015/07/fast-track-arrival-options-around-the-world/ Fast-Track Arrival Options Around the World]<br>
|
||||
[http://www.teenvogue.com/story/know-your-rights-if-you-get-arrested Teen Vogue on Know Your Rights If You Get Arrested]<br>
|
||||
[https://github.com/data-ppf/data-ppf.github.io/wiki/Syllabus Data, Past, Present, and Future]<br>
|
||||
[https://meowni.ca/knit-a-stitch/ Create a Knitting Pattern]<br>
|
||||
[https://cs.stanford.edu/people/widom/paper-writing.html Tips for Writing Technical Papers by Jennifer Widom]<br>
|
||||
[http://www.scmp.com/news/hong-kong/community/article/2138495/rats-were-something-else-25-years-hong-kongs-kowloon-walled Hong Kong Walled City]<br>
|
||||
[https://azeria-labs.com/the-importance-of-deep-work-the-30-hour-method-for-learning-a-new-skill/ The Importance of Deep Work]<br>
|
||||
[https://wiki.voip.ms/article/Virtual_Fax Cheap Internet Fax Service]<br>
|
||||
[https://powerman.name/doc/asciidoc ASCIIdoc Cheat Sheet]<br>
|
||||
[https://n0where.net/bash-open-tcpudp-sockets Sockets in bash]<br>
|
||||
[https://www.itu.int/itu-d/tnd-map-public/ ITU World Fiber Map]<br>
|
||||
[https://atadistance.net/apple-pay-suica/ Using Apple Pay for Suica]<br>
|
||||
[https://support.apple.com/en-us/HT207155 More using Apple Pay for Suica]<br>
|
||||
[https://www.remove.bg/ Remove Background from an Image]<br>
|
||||
[https://www.wired.com/story/corning-pure-glass-fiber-optic-cable/ How Corning Makes Super-Pure Glass for Fiber-Optic Cable]<br>
|
||||
[https://www.wired.com/1996/12/ffglass/ Stephenson on Undersea Cables]<br>
|
||||
[http://www.circleid.com/posts/20200210_deep_sea_diving_the_state_of_submarine_cable_technology/ Deep Sea Diving: The State of Submarine Cable Technology -- Geoff Huston]<br>
|
||||
[https://jex.im/regulex Regular Expression Visualizer]<br>
|
||||
[https://www.youtube.com/playlist?list=PL94E35692EB9D36F3 Donald Knuth Lectures Online]<br>
|
||||
[https://www.arl.wustl.edu/~kenw/courses/cse573s/sp04/pdffiles/tcptrace.pdf TCPtrace and xplot Cheat Sheet]<br>
|
||||
[https://www.deepsig.io/news/2019/2/5/candidate-first-hiring Candidate First Hiring]<br>
|
||||
[https://accuracyandprivacy.substack.com/p/differential-privacy-an-easy-case Differential Privacy Made Simpler]<br>
|
||||
[https://ericchiang.github.io/post/containers-from-scratch/ Containers from Scratch]<br>
|
||||
[http://lmgtfy.com/?q=create+pkcs+%2310 Let Me Google This For You]<br>
|
||||
[https://jonasblade.com/ Custom Knives Jonas]<br>
|
||||
[http://gunkies.org/wiki/Vonada%27s_Engineering_Maxims Vonada's Engineering Maxms]<br>
|
||||
[https://www.animatedknots.com/bowline-knot Animated Knots]<br>
|
||||
[https://thriveglobal.com/stories/why-smart-individuals-make-dumb-group-decisions/ Why Smart Individuals Make Dumb Group Decisions]<br>
|
||||
[https://www.hactrn.net/blog/2018/06/11/32-bit-pgp-keyid-delenda-est/ PGP 32-bit PGP KeyID Delenda Est!]<br>
|
||||
[http://justhungry.com/announcing-japanese-cooking-101-fundamentals-washoku Japanese Cooking 101 by Maki Itoh]<br>
|
||||
[https://hbswk.hbs.edu/item/when-silence-spells-trouble-at-work When Silence Spells Trouble at Work]<br>
|
||||
[https://emeryblogger.com/2016/06/08/a-guide-for-session-chairs/ A Guide for Session Chairs]<br>
|
||||
[https://medium.com/@kevin.txt/why-usb-type-c-is-bad-design-ffcd77254c1f USB-C Explained, or Why USB Type C is Bad Design]<br>
|
||||
[https://docs.google.com/document/d/13W_d3L1jStPExxnH1nWMlJ1RG0RG_4hLfU7hPNXL6aU/edit Singapore Recommendations]<br>
|
||||
[https://vaneyckt.io/posts/safer_bash_scripts_with_set_euxo_pipefail/ Safer BASH Scripts]<br>
|
||||
[https://www.netmeister.org/blog/ops-lessons.html (A few) Ops Lessons We All Learn The Hard Way]
|
||||
[Framadate, an open doodle replacement](https://framadate.org/8ouws6sxigi2gjdz )<br>
|
||||
[Snowden at IETF, plugs CrypTech at 0:38:00](https://www.youtube.com/watch?v=0NvsUXBCeVA )<br>
|
||||
[How to construct a Nature summary paragrah (aka abstract)](https://archive.psg.com:Abstract-Guide-Nature.pdf )<br>
|
||||
[Web Design: The First 100 Years ](http://idlewords.com/talks/web_design_first_100_years.htm )<br>
|
||||
[White Rabbit Express - Buy anything from Japan](https://www.whiterabbitexpress.com/ )<br>
|
||||
[NetFlix Secret Category Codes](http://netflixcodes.me/ )<br>
|
||||
[Supranational European Bodies](https://en.wikipedia.org/wiki/Template:Supranational_European_Bodies )<br>
|
||||
[Free Open WebRTC Site](https://appear.in/ )<br>
|
||||
[The Small of the Soup](http://web2.uvcs.uvic.ca/elc/studyzone/330/reading/smell1.htm )<br>
|
||||
[O RLY Cover Generator](http://dev.to/rly )<br>
|
||||
[IIJ Lab Conference Calendar](https://cf.iij-group.jp/pages/viewpage.action?title=Conference+schedule&spaceKey=LAB )<br>
|
||||
[LaTeX hints](http://www.read.seas.harvard.edu/~kohler/latex.html )<br>
|
||||
[Big Font Generator](http://www.network-science.de/ascii/ )<br>
|
||||
[Levels of Techie Enlightenment](http://hackingdistributed.com/2017/05/04/stages-of-enlightenment/ )<br>
|
||||
[Freelance Achievement Stickers](http://www.newyorker.com/humor/daily-shouts/freelance-achievement-stickers )<br>
|
||||
[Fast-Track Arrival Options Around the World](https://thepointsguy.com/2015/07/fast-track-arrival-options-around-the-world/ )<br>
|
||||
[Teen Vogue on Know Your Rights If You Get Arrested](http://www.teenvogue.com/story/know-your-rights-if-you-get-arrested )<br>
|
||||
[Data, Past, Present, and Future](https://github.com/data-ppf/data-ppf.github.io/wiki/Syllabus )<br>
|
||||
[Create a Knitting Pattern](https://meowni.ca/knit-a-stitch/ )<br>
|
||||
[Tips for Writing Technical Papers by Jennifer Widom](https://cs.stanford.edu/people/widom/paper-writing.html )<br>
|
||||
[Hong Kong Walled City](http://www.scmp.com/news/hong-kong/community/article/2138495/rats-were-something-else-25-years-hong-kongs-kowloon-walled )<br>
|
||||
[The Importance of Deep Work](https://azeria-labs.com/the-importance-of-deep-work-the-30-hour-method-for-learning-a-new-skill/ )<br>
|
||||
[Cheap Internet Fax Service](https://wiki.voip.ms/article/Virtual_Fax )<br>
|
||||
[ASCIIdoc Cheat Sheet](https://powerman.name/doc/asciidoc )<br>
|
||||
[Sockets in bash](https://n0where.net/bash-open-tcpudp-sockets )<br>
|
||||
[ITU World Fiber Map](https://www.itu.int/itu-d/tnd-map-public/ )<br>
|
||||
[Using Apple Pay for Suica](https://atadistance.net/apple-pay-suica/ )<br>
|
||||
[More using Apple Pay for Suica](https://support.apple.com/en-us/HT207155 )<br>
|
||||
[Remove Background from an Image](https://www.remove.bg/ )<br>
|
||||
[How Corning Makes Super-Pure Glass for Fiber-Optic Cable](https://www.wired.com/story/corning-pure-glass-fiber-optic-cable/ )<br>
|
||||
[Stephenson on Undersea Cables](https://www.wired.com/1996/12/ffglass/ )<br>
|
||||
[Deep Sea Diving: The State of Submarine Cable Technology -- Geoff Huston](http://www.circleid.com/posts/20200210_deep_sea_diving_the_state_of_submarine_cable_technology/ )<br>
|
||||
[Regular Expression Visualizer](https://jex.im/regulex )<br>
|
||||
[Donald Knuth Lectures Online](https://www.youtube.com/playlist?list=PL94E35692EB9D36F3 )<br>
|
||||
[TCPtrace and xplot Cheat Sheet](https://www.arl.wustl.edu/~kenw/courses/cse573s/sp04/pdffiles/tcptrace.pdf )<br>
|
||||
[Candidate First Hiring](https://www.deepsig.io/news/2019/2/5/candidate-first-hiring )<br>
|
||||
[Differential Privacy Made Simpler](https://accuracyandprivacy.substack.com/p/differential-privacy-an-easy-case )<br>
|
||||
[Containers from Scratch](https://ericchiang.github.io/post/containers-from-scratch/ )<br>
|
||||
[Let Me Google This For You](http://lmgtfy.com/?q=create+pkcs+%2310 )<br>
|
||||
[Custom Knives Jonas](https://jonasblade.com/ )<br>
|
||||
[Vonada's Engineering Maxms](http://gunkies.org/wiki/Vonada%27s_Engineering_Maxims )<br>
|
||||
[Animated Knots](https://www.animatedknots.com/bowline-knot )<br>
|
||||
[Why Smart Individuals Make Dumb Group Decisions](https://thriveglobal.com/stories/why-smart-individuals-make-dumb-group-decisions/ )<br>
|
||||
[PGP 32-bit PGP KeyID Delenda Est!](https://www.hactrn.net/blog/2018/06/11/32-bit-pgp-keyid-delenda-est/ )<br>
|
||||
[Japanese Cooking 101 by Maki Itoh](http://justhungry.com/announcing-japanese-cooking-101-fundamentals-washoku )<br>
|
||||
[When Silence Spells Trouble at Work](https://hbswk.hbs.edu/item/when-silence-spells-trouble-at-work )<br>
|
||||
[A Guide for Session Chairs](https://emeryblogger.com/2016/06/08/a-guide-for-session-chairs/ )<br>
|
||||
[USB-C Explained, or Why USB Type C is Bad Design](https://medium.com/@kevin.txt/why-usb-type-c-is-bad-design-ffcd77254c1f )<br>
|
||||
[Singapore Recommendations](https://docs.google.com/document/d/13W_d3L1jStPExxnH1nWMlJ1RG0RG_4hLfU7hPNXL6aU/edit )<br>
|
||||
[Safer BASH Scripts](https://vaneyckt.io/posts/safer_bash_scripts_with_set_euxo_pipefail/ )<br>
|
||||
[(A few) Ops Lessons We All Learn The Hard Way](https://www.netmeister.org/blog/ops-lessons.html )
|
||||
|
||||
---
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue