rgnet-wiki/pages/LotsOfLinks.md
2020-07-04 16:04:45 -07:00

556 lines
38 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Lots of Miscellaneous Links
# Apple
## iFoo
[https://blog.filippo.io/securing-a-travel-iphone/ Securing your iPhone for Travel to a Hostile Environment]<br>
[https://www.pubpub.org/pub/direct-radio-introspection Hwang & Snowden Protecting a Phone]<br>
### Applications
[https://boingboing.net/2019/06/20/working-as-intended-3.html How Find My iPhone Works]<br>
## MacOS
[https://medium.com/@svinkle/how-to-make-the-touch-bar-slightly-more-tolerable-857d29041f6a How to make the Touch Bar slightly more tolerable]<br>
### Hacks & Tricks MacOS
{{{diskutil coreStorage unlockVolume E35BB45E-585C-4CF7-8A1B-329A45F03ED6}}} to mount an encrypted volume<br>
[http://osxdaily.com/2013/01/18/add-dashboard-widgets-desktop-mac-os-x/ Add Dashboard Widgets to the Desktop]<br>
[https://www.apple.com/support/security/guides/ Apple Security Guides]<br>
[http://formalfriday.club/2015/01/05/creating-your-own-homebrew-tap-and-formula.html Creating your own Homebrew Tap and Formula]<br>
[http://apple.stackexchange.com/questions/151821/disable-iphoto-auto-launch-when-connecting-an-iphone-in-yosemite Disable iPhoto Auto_launch in Yosemite]<br>
[https://github.com/ernw/hardening/blob/master/operating_system/osx/10.11/ERNW_Hardening_OS_X_EL_Captain.md El Capitan Hardening Guide]<br>
[https://github.com/ernw/hardening/blob/master/operating_system/osx/10.14/ERNW_Hardening_OS_X_Mojave.md macOS Mojave Hardening Guide]//
[https://firstlook.org/theintercept/2015/04/27/encrypting-laptop-like-mean/ Encrypting Your Laptop Like You Mean It]
[https://support.apple.com/kb/PH18897?locale=en_US Fast User Switching on Yosemite]<br>
[wiki:MacSearchList Fix DNS Resolver Search List (obsolete)]<br>
{{{/Applications/VMware\ Fusion.app/Contents/Library/vmrun VMware Fusion Tool}}}<br>
[https://fix-macosx.com/ How to restore privacy]<br>
[http://www.dctrwatson.com/2013/07/how-to-update-openssh-on-mac-os-x/ How to Update OpenSSH on Mac OS X]<br>
[https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections How to stop Firefox from making automatic connections]<br>
[https://www.hypershop.com/products/usb-c-5-in-1-hub-with-pass-though-usb-c-charging HyperDrive USB Type-C 5-in-1 Hub with Pass Through Charging]<br>
[http://sud0man.blogspot.fr/2015/05/artefacts-for-mac-os-x.html Internal Files about User (maybe Mountain Lion)]<br>
[https://github.com/herrbischoff/awesome-osx-command-line Mac Config Hacks from Command Line]<br>
[https://github.com/drduh/OS-X-Yosemite-Security-and-Privacy-Guide OS X Yosemite Security and Privacy Guide]<br>
[https://github.com/jipegit/OSXAuditor OSX Auditor]<br>
[https://github.com/kirei/fruitpunch Safety hacks for Yosemite]<br>
[http://apple.stackexchange.com/questions/34443/remote-management-vs-screen-sharing Screen Sharing over SSH]<br>
[https://github.com/nicolashery/mac-dev-setup/blob/master/README.md Setting up a Macintosh as a Development Environment]<br>
[http://pondini.org/OSX/Home.html Time Machine and Other Info]<br>
[http://arstechnica.com/apple/2016/10/life-after-death-for-apples-xserve/ XServe from Ebay running VMware]<br>
[http://www.tuaw.com/2014/11/25/heres-the-root-cause-and-a-workaround-for-ios-8-and-yosemite-wi/?ncid=rss_truncated Yosemite WiFi hacks]<br>
Cmd-Ctrl-Shift-4, then space (cursor turns from cross hairs to a camera), click once on what I want, and paste wherever I want it is the way to go.<br>
[https://elijahcarrel.com/2016/03/31/remote-mac-access-screen-sharing-via-ssh-and-vnc/ Remote Mac Access: Screen Sharing via SSH and VNC without iClouds Back to my Mac feature]<br>
[https://bombich.com/kb/ccc4/what-makes-volume-bootable What Makes a Mac Volume Bootable]<br>
`sudo scutil --set HostName <new host name>` to change Mac hostname<br>
[https://apple.stackexchange.com/questions/304124/recovery-key-set-by-my-company-school-or-institution-on-private-laptop Allow MacOS FileVault Recovery Key]<br>
[https://github.com/foxlet/macOS-Simple-KVM/ Tools to set up a quick macOS VM in QEMU, accelerated by KVM]<br>
### Applications
[http://www.tildesoft.com/ Bonjour Browser]<br>
[https://www.emacswiki.org/emacs/EmacsForMacOS Emacs for MacOS guide]<br>
[https://objective-see.com/products.html Free OS X Security Tools]<br>
[https://pqrs.org/osx/karabiner/ Karabiner - A powerful and stable keyboard customizer for OS X]<br>
[https://osxfuse.github.io OSXFUSE is a successor to MacFUSE]<br>
[https://github.com/knowuh/SnailMail Snail Mail - envelope printer]<br>
## Security
[https://github.com/github/SoftU2F Soft U2F]
[https://github.com/sekey/sekey Secure Enclave for SSH Authentication]
[https://keepassxc.org/ Multi-Platform KeyPass Fork]
# Conferences
[http://conferences.sigcomm.org/co-next/2013/program.html CoNEXT 2014]<br>
[http://conferences.sigcomm.org/imc/2013/index.html IMC 2013]<br>
[http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=13322 Dagstuhl Critical Infrastructure]<br>
[http://www.chesworkshop.org/ches2014/program.php CHES 2014]<br>
[http://www.dagstuhl.de/no_cache/en/program/calendar/semhp/?semnr=15102 Dagstuhl 2104 Secure Routing]<br>
[https://wiki.rg.net/wiki/Btnog2Sec BGNOG2 Security Sep 2015]<br>
[https://indico.dns-oarc.net/event/24/timetable/#all.detailed OARC Oct 2015]<br>
[https://www.nanog.org/meetings/nanog65/agenda NANOG Oct 2015]<br>
[http://conferences2.sigcomm.org/imc/2015/program.html IMC October 2015]<br>
[https://irtf.org/raim-2015 IRTF & ISOC Workshop on Research and Applications of Internet Measurements (RAIM) October 2015]<br>
[http://www.caida.org/workshops/bgp-hackathon/1602/ CAIDA BGP Hackathon Jan 2016]<br>
# Food
[http://www.kossarsbialys.com/ Kossar's Bialys]<br>
[http://www.zabars.com/on/demandware.store/Sites-Zabars-Site/default/Link-Product?pid=211001P&cgid=Smoked_Fish_Counter Zabar's Smoked Fish]<br>
[http://shop.russanddaughters.com/store/department/69/Specialty-Smoked-Fish/ Russ and Daughters Smoked Fish (needs more lead time)]<br>
[http://www.japantimes.co.jp/life/2014/11/18/food/warm-shared-hot-pot/ Nabe Mono Basics]<br>
[http://bastiaansen-bio.com/index.php?lang=en Artisan Dutch Cheese shop in Amsterdam]<br>
[http://www.laederach.com/ch-en.html Swiss Chocolate Shop]<br>
# Hardware
## FPGA Tools
[http://www.clifford.at/yosys/ YoSys Open Synthesis Suite - Verilogish]<br>
[https://github.com/m-labs/migen MiGen - Python Toolbox for Building Hardware (produces VHDL)]<br>
[http://www.myhdl.org/ MyHDL - a python syntax for Verilog - Design Hardware with Python, good docs]<br>
[https://chisel.eecs.berkeley.edu/ Chisel - Hardware Development Embedded in Scala]<br>
## General Hardware
[http://www.supermicro.com/products/system/2U/2027/SYS-2027TR-HTRF_.cfm Four hot-pluggable systems (nodes) in a 2U form factor]<br>
[http://www.newegg.com/Product/Product.aspx?Item=N82E16820147362 SAMSUNG 850 Pro Series MZ-7KE1T0BW 2.5" 1TB SATA III 3-D Vertical SSD]<br>
[http://www.supermicro.com/products/system/2U/2027/SYS-2027TR-HTRF_.cfm SuperServer 2027TR-HTRF+ - Four servers and lotso 2.5" drives in a box]<br>
[http://www.seagate.com/files/www-content/product-content/hdd-fam/seagate-archive-hdd/en-us/docs/archive-hdd-dS1834-3-1411us.pdf Seagate 8TB drives]<br>
[https://www.crowdsupply.com/inverse-path/usb-armory Open source USB stick computer for security applications]<br>
[http://dirtypcbs.com/ Dirty PCBs]<br>
[http://www.maths.cam.ac.uk/computing/docs/public/megacli_raid_lsi.html Cheat Sheed for MegaRaid Controllers `megacli`]<br>
[http://www.fs.com/16-channels-1ru-rack-mount-duplex-cwdm-mux-demux-p-30414.html CWDM Mux/DeMux]<br>
[http://solid-optics.com/multiplexers/cwdm-mux/solid-optics-cwdm-mux-8chupgmon-multiplexer-id1665.html Solid Optics CWDM-MUX-8CH+UPG+MON Multiplexer]<br>
[http://www.mcelog.org/ Logs and accounts machine checks (in particular memory, IO, and CPU hardware errors) on modern x86 Linux systems]<br>
[https://www.epiphan.com/products/kvm2usb KVM to USB dongle]<br>
[https://www.youtube.com/watch?t=5&v=aV_a5KIogCc Bunnie Huang on Good Documntation for Manufacturing]<br>
[https://www.youtube.com/watch?v=QFDsYUuU-mY Bunnie Huang on Design for Manufacturing]<br>
## Novena
[http://www.kosagi.com/w/index.php?title=Novena_Main_Page Novena Mail Page]<br>
[http://www.red-lang.org/2012/03/setting-up-arm-virtual-machine.html Setting up an ARM virtual machine so you can build an SD image]<br>
## Raspberry PI
[http://www.satsignal.eu/ntp/Raspberry-Pi-quickstart.html NTP on a Raspberry Pi]<br>
## Toys
[https://github.com/Nephiel/sdlocker-tiny Attiny85-based device to enable and disable write-protection on any SD card]<br>
[http://www.seanet.com/~karllunt/sdlocker.html Build the SD Locker and Make Your SD Cards More Secure]<br>
# Linux / Unix
[http://without-systemd.org/wiki/index.php/Main_Pagex Wiki of non-systemd Unix/Linux systems]<br>
[https://blog.nelhage.com/2011/01/reptyr-attach-a-running-process-to-a-new-terminal/ reptyr: Attach a running process to a new terminal]<br>
[https://linode.com/docs/applications/containers/deploying-microservices-with-docker/#using-containers-in-production-best-practices Using Containers in Production: Best Practices]<br>
[https://vincent.bernat.im/en/blog/2017-vxlan-linux VXLAN with plain Linux bridges]<br>
[https://github.com/yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking Linux Kernel Hacking]<br>
[https://www.linuxatemyram.com/ Linux Ate My RAM]<br>
[http://dumbnetworkautomation.blogspot.com/2017/09/linux-unnumbered-interface-source-ip.html Linux unnumbered interface source IP behavior]<br>
[http://www.brendangregg.com/linuxperf.html Linux Performance Tools]<br>
[https://major.io/2015/08/21/understanding-systemds-predictable-network-device-names/ Understanding systemds predictable network device names]<br>\
## Basics
[http://www.faqs.org/docs/artu/ch01s06.html Basics of the Unix Philosophy]<br>
[https://github.com/dave2/ntpstick ntpstick - NTP on a Stick]<br>
[https://stribika.github.io/2015/01/04/secure-secure-shell.html SSH Hardening]<br>
[https://wiki.apache.org/httpd/OCSPStapling OSCP Stapling in Apache]<br>
[https://blog.process-one.net/securing-ejabberd-with-tls-encryption/ ejabberd TLS Security]<br>
[https://www.linux.com/learn/understanding-and-using-systemd Understanding and Using Systemd]<br>
## Emacs
[http://magit.vc Magit, A Git Porcelain inside Emacs]<br>
## Tools
[https://linux.die.net/man/5/dhcp-options Linux dhcpd Options]<br>
[https://stackoverflow.com/questions/359424/detach-move-subdirectory-into-separate-git-repository/17864475#17864475 git move subdirectory of a repo]<br>
## FreeBSD
[https://www.ateamsystems.com/tech-blog/installing-freebsd-9-gmirror-gpt-partitions-raid-1/ FreeBSD install with gmirror]<br>
[https://forums.freebsd.org/threads/convert-from-ports-to-packages.65362/ portmaster to pkg]<br>
[https://www.hactrn.net/blog/2018/11/12/dont-panic-upgrading-freebsd-to-112-on-ganeti/ Don't Panic! Upgrading FreeBSD to 11.2 on Ganeti]<br>
## Applications / Linux / Unix
[http://www.creativebloq.com/web-design/wordpress-tutorials-designers-1012990 WordPress Tutorials]<br>
[http://racksburg.com/choosing-an-http-status-code/ Choosing an HTTP Status Code]<br>
[https://github.com/danielquinn/paperless Scan, index, and archive all of your paper]<br>
[https://github.com/patrikhson/photo-export paf's Export photos from Apple Photo.App]<br>
[http://www.fatcatsoftware.com/iplm/ iPhoto Library Manager]<br>
[https://objective-see.com/products/blockblock.html BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS]<br>
[https://github.com/visit1985/mdp/ Command-line based presentation tool]<br>
[https://github.com/warner/magic-wormhole Magic Wormhole - get things from one computer to another, safely]<br>
[https://github.com/upspin/upspin Upspin: A framework for naming everyone's everything. https://upspin.io]<br>
## Hacks / Linux
[https://help.ubuntu.com/community/Grub2/Upgrading Upgrading grub from 0.97 to grub2]<br>
{{{iptables -F sshguard}}} Get sshguard to stop blocking me after I have screwed up.<br>
[https://www.kumari.net/index.php/system-adminstration/49-mounting-a-qemu-image Mounting a qcow image as a file system]
[https://www.debian.org/releases/ Debian Releases]<br>
[https://www.debian.org/doc/manuals/debian-faq/ch-ftparchives Debian Archives Explained]<br>
[https://www.rootusers.com/how-to-upgrade-debian-7-wheezy-to-debian-8-jessie/ Upgrade Debian wheezy to jessie]<br>
[http://soucy.org/tmp/v6firewall/ip6tables.txt Firewall IPTables for IPv6]<br>
[http://blog.scottlowe.org/2013/05/29/a-quick-introduction-to-linux-policy-routing/ A Quick Introduction to Linux Policy Routing]<br>
[http://codex.wordpress.org/Resetting_Your_Password Reset WordPress Password from My SQL]<br>
[http://www.itzgeek.com/how-tos/mini-howtos/change-default-network-name-ens33-to-old-eth0-on-ubuntu-16-04.html Change default network name (ens33) to old “eth0” on Ubuntu 16.04]<br>
[http://www.tcm.phy.cam.ac.uk/~mr349/backup_restore_linux.html Great dump/restore recipies]<br>
[https://github.com/ANSSI-FR/pycrate Python library to ease the development of encoders and decoders for various protocols and file formats; contains ASN.1 and CSN.1 compilers]<br>
[https://help.ubuntu.com/lts/serverguide/apparmor.html How AppArmor works]<br>
## Tools
[http://2014.hackitoergosum.org/bittorrentsync-security-privacy-analysis-hackito-session-results/ BitTorrentsync security & privacy analysis - Hackito Session results]<br>
[http://www.techrepublic.com/blog/five-apps/five-portable-antivirus-and-antimalware-tools-to-carry-with-you-at-all-times/ Windows - Five portable antivirus and antimalware tools to carry with you at all times]<br>
[https://medium.com/@shazow/ssh-how-does-it-even-9e43586e4ffc SSH Based Chat]<br>
[https://www.digitalocean.com/community/tutorials/how-to-create-an-ssh-ca-to-validate-hosts-and-clients-with-ubuntu How To Create an SSH CA to Validate Hosts and Clients]<br>
[https://github.com/delvelabs/vane VANE - A Free Fork of WPScan]<br>
[https://github.com/rshipp/awesome-malware-analysis curated list of awesome malware analysis tools and resources]<br>
[https://www.rstudio.com/resources/cheatsheets/ R Cheat Sheets]<br>
[https://github.com/ahf/teneo Regenerable ed25519 keys for OpenSSH ]<br>
[http://securityblog.gr/3004/guymager-a-free-forensic-imager/ GUYMAGER a Free Forensic Imager]<br>
[https://julianoliver.com/output/log_2015-12-18_14-39 DropKick Detect and disconnect WiFi cameras]<br>
[https://alexcabal.com/creating-the-perfect-gpg-keypair/ Adding a Signing GPG Key and Hiding the Master]<br>
[https://theconversation.com/six-easy-ways-to-tell-if-that-viral-story-is-a-hoax-47673 How to Tell if an Image, YouTube, etc. are faked]<br>
[http://www.tedunangst.com/flak/post/new-openssh-key-format-and-bcrypt-pbkdf new openssh key format and bcrypt pbkdf]<br>
[https://alice.sni.velox.ch/ TLS SNI Test Site: alice.sni.velox.ch]<br>
[http://sectools.org/ Top 125 Security Tools]<br>
ssh keylength `cat .ssh/id_rsa.pub | cut -c 9-60 | openssl base64 -d | hd`<br>
[https://marc.info/?l=openbsd-misc&m=146333151523455&w=2 LetsEncrypt client which drops privs]<br>
[https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ Penetration Testing Cheat Sheet]<br>
[https://gogs.io/ GOGS - git server in go]<br>
[http://www.fluentd.org/ Unified Logging Layer]<br>
[https://certsimple.com/blog/ssl-wireshark-mac-osx Use Wireshark to inspect SSL]<br>
[https://github.com/gcla/termshark A terminal user-interface for tshark, inspired by Wireshark.]<br>
[https://en.wikibooks.org/wiki/LaTeX/Floats,_Figures_and_Captions#Wrapping_text_around_figures LaTeX, Wrapping text around figures]<br>
[https://github.com/dspinellis/latex-advice Advice for writing LaTeX documents]<br>
[http://aurelio.net/projects/sedsed/ SED Debugger]<br>
[https://github.com/dspinellis/unix-history-make Unix History Repository]<br>
[https://www.digitalocean.com/community/tutorials/how-to-create-a-pull-request-on-github How To Create a Git Pull Request on GitHub]<br>
[http://www.sentex.net/~mwandel/jhead/ JHead - Exif Jpeg header manipulation tool]<br>
[https://github.com/firehol/netdata/wiki/Installation NetData, the Linux internal measurement graphing tool from hell]<br>
[https://ioparaskev.github.io/git/ A git Tutorial]<br>
[http://packeth.sourceforge.net/packeth GUI and CLI packet generator tool for ethernet]<br>
[https://github.com/draios/sysdig/wiki Sysdig is a universal system visibility tool with native support for containers]<br>
### Certificate Authority Tools
[http://sourceforge.net/projects/xca/ XCA, a Small CA for Macintosh]<br>
[https://techlib.barracuda.com/display/cp/how+to+create+certificates+with+xca XCA Tutorial]<br>
[http://www.ejbca.org/ EJBCA, a Large Enterprise Scale CA Toolset - LGPL but in java]<br>
[https://packages.debian.org/wheezy/tinyca TinyCA, debian package, may not be maintained]<br>
[https://docs.puppetlabs.com/puppet/3.7/reference/ssl_regenerate_certificates.html Regenerate Puppet Certificates]<br>
[http://www.zdnet.com//article/five-security-settings-in-ios-10-you-should-change/ Safety Tips for iPhone iOS 10]<br>
[https://crt.sh/?q=dom.ain Certificate Transparency Collector]<br>
[https://github.com/FiloSottile/mkcert A simple zero-config tool to make locally trusted development certificates with any names you'd like.]<br>
## VPNs
{{{ssh randy@xmpp.rg.net -R 4430:127.0.0.1:443}}} from pfSense terminal console shell to backdoor when firewall locks you out.<br>
[https://www.softether.org/ SoftEther VPN Project]<br>
[https://www.wireguard.com/ WireGuard VPN]<br>
# Languages
[http://www.snobol4.org/ SNOBOL4]<br>
[https://github.com/vinta/awesome-python Awesome Python frameworks, libraries, software and resources]<br>
# Networking
## DNS
## DNS Tools
[http://www.zonemaster.net/ ZoneMaster DNS Zone Checker]<br>
[https://www.had-pilot.com/dane/danelaw.html NIST DANE Tester]<br>
!YanDex DNS Servers {{{77.88.8.1 and 77.88.8.8}}}<br>
[https://zonemaster.net/ AfNIC ZoneMaster Zone checker]<br>
[https://dane.sys4.de/ DANE SMTP Validatoe]<br>
[https://github.com/PennockTech/smtpdane Phil Pennock's SMTP DANE TLS Checker]<br>
[http://www.redsome.com/flush-clear-dns-cache-google-chrome-browser/ Flushing Chrome's DNS Cache]<br>
[https://artemix.org/blog/dns-blocking.html Dnsmasq-based DNS blocking]<br>
## RIRs
[https://www.nro.net/wp-content/uploads/apnic-uploads/delegated-extended RIR Stats Files Catenated] & [wiki:NROstatsDecode Decode for the above NRO Stats]<br>
[https://www.nic.ad.jp/timeline/en/ Internet Timeline from JPNIC]<br>
[https://net.t-labs.tu-berlin.de/~prichter/transfer_report/ IPv4 Address Space Transfer Report]<br>
## Routing
[http://baturin.org/docs/iproute2/ Linux iproute2 Cheat Sheet]<br>
[http://bird.network.cz/?get_doc&f=bird-4.html BIRD Cheat Sheet]<br>
[https://vincent.bernat.im/en/blog/2017-ipv6-route-lookup-linux IPv6 route lookup on Linux]<br>
[https://lwn.net/Articles/632522/ Linux VRF]<br>
[https://netverify.fun/models-of-distributed-protocols/ Models for Distributed Routing Protocols]<br>
### Routers
[http://www.juniper.net/documentation/en_US/release-independent/junos/topics/reference/specifications/routing-engine-m-mx-t-series-specifications-by-model.html Juniper Routing Engines]
[http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-e/sec-usr-ssh-15-e-book/sec-secure-shell-v2.html#GUID-B23486F2-8B65-4E01-8FE5-5F80D307348F Cisco IOS ssh key regeneration]<br>
### Routing Security / RPKI
[http://www.jpnap.net/rpki/en/roa_cache/technical_info.html Tomo's Cache Server and Router Configuration Instructions.]<br>
[http://certification-stats.ripe.net/ Certificates per RIR]<br>
[http://rpki.surfnet.nl/perrir.html RIR Statistics from SurfNet]<br>
[http://rpki-monitor.antd.nist.gov/ NIST Global Prefix/Origin Validation using RPKI]<br>
[http://www.bgpmon.net/securing-bgp-routing-with-rpki-and-roas/ Securing BGP Routing with RPKI and ROAs]<br>
[http://rpki.me/quality.html Daniele's ROA quality Page]<br>
[http://rpki.me/dns.html Daniele's Page of Root Nameserver ROA State]<br>
[http://rpki-browser.realmv6.org/ RPKI Repository Browser]<br>
[http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_14-2/142_bgp.html Internet Protocol Journal on Securing BGP, Huston and Bush]<br>
[https://trac.rpki.net/ticket/763 Renew Child Certs]<br>
[https://github.com/google/rpki-mgmt/ Google RPKI Puppet Deployment]<br>
[https://www.caida.org/workshops/bgp-traceroute/1108/slides/bgp-traceroute1108_rpki_deployment_study.pdf Effects of RPKI Deployment on BGP Security]<br>
### Routing Tools
[https://github.com/irrtoolset/irrtoolset IRR Toolset]<br>
[https://github.com/job/bgpq3 bgpq3 - bgp filtering automation for Cisco and Juniper routers]<br>
[https://github.com/job/aggregate6 IPv4 and IPv6 prefix aggregation tool]<br>
[https://basimaly-wordpress-com.cdn.ampproject.org/c/s/basimaly.wordpress.com/2017/07/03/bgp-visualization-using-python/amp/ BGP Visualize with Python]<br>
## Tools
[https://www.lede-project.org/ OpenWRT Replacement]<br>
[https://wiki.openwrt.org/doc/recipes/guest-wlan-webinterface Lede Guest LAN Set-up]<br>
[http://baturin.org/tools/encapcalc/ Encapsulation overhead calculator]<br>
[http://www.luismg.com/protocol/ Protocol Header Diagram Generator]<br>
# Outreach
## Thailand
[https://www.flickr.com/photos/127194098@N06/sets/72157648793146330/ BKNIX 2014.11.06]<br>
## Workshops
[https://sec-wkshp.rg.net/ AIT Bangkok 2012.11.19-22]<br>
[https://nsrc.org/workshops/2014/sanog23-security/ SANOG/Thimphu 2014.01.13-21]<br>
[https://web.nsrc.org/workshops/2015/apricot2015/wiki/Track5Agenda APRICOT 2015]<br>
[https://wiki.rg.net/wiki/Btnog2Sec BTNOG2 Thimphu 2015.09.14-17]<br>
[https://wiki.rg.net/wiki/Apricot2016Sec APRICOT 2016 Security Workshop]<br>
[https://wiki.rg.net/wiki/Apricot2017Sec APRICOT 2017 Security Workshop 2017.02.20-24]<br>
[https://github.com/randyqx/bhutannog-sec2017 Bhutan NOG 2017 Security Workshop]<br>
# Research / Computer Science
## Measurement
[http://graphite.wikidot.com/ Graphite - Scalable Realtime Graphing]<br>
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006 Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization]<br>
[http://www.cs.unc.edu/~fabian/Traffic.html Traffic Analysis - Anonymization]<br>
[http://net.t-labs.tu-berlin.de/~prichter/transfer_report/ IPv4 Address Transfer Report BETA]<br>
[http://sg-pub.ripe.net/emile/ixp-country-jedi/latest/ Emile Country Jedi]<br>
[https://python-graph-gallery.com The Python Graph Gallery]<br>
## Miscellaneous Research
[https://mailman.caida.org/mailman/private/bgp-hackathon-participants/ CAIDA BGP Hackathon List Archive]<br>
[http://blog.caida.org/best_available_data/2016/01/13/caida-bgp-hackathon-2016-participants/ CAIDA BGP Hackathon BLOG]<br>
[https://github.com/CAIDA/bgp-hackathon/wiki CAIDA BGP Hackathon wiki]<br>
[https://github.com/improbable-public/internet-simulation A full-scale simulation of the Internet based on the Border Gateway Protocol (BGP), built on SpatialOS]<br>
[https://www.semanticscholar.org/ Semantic Scholar Paper Cites and Refs]<br>
[https://workshape.github.io/visual-graph-algorithms/ Graph Traversal Algorith Visualizations]<br>
[https://github.com/veorq/misc/blob/students/STUDENTS.md Guide for students working with JP Aumasson]<br>
[https://www.youtube.com/watch?v=g3dkRsTqdDA How to Write a Great Research Paper]<br>
# Security
## Cryptography
[https://cryptocoding.net/index.php/Coding_rules Crypto Coding Rules]<br>
[https://www.cs.auckland.ac.nz/~pgut001/cryptlib/ CryptLib Toolkit]<br>
[https://github.com/libtom Free, Open Source, Crypto Libraries/Toolkits]<br>
[https://cr.yp.to/highspeed/naclcrypto-20090310.pdf NaCl Crypto Primitives]<br>
[http://iang.org/ssl/hard_truths_hard_random_numbers.html Hard Truths about the Hard Business of finding Hard Random Numbers]<br>
[http://blog.cryptographyengineering.com/2014/12/on-new-snowden-documents.html Matthew Green on December 2014 Snowden Dump]<br>
[http://bristolcrypto.blogspot.co.uk/ Blog for the cryptography group of the University of Bristol]<br>
[http://publications.jrc.ec.europa.eu/repository/bitstream/JRC91528/lbna26833enn.pdf Performance analysis of different cryptographic algorithms implemented in an FPGA]<br>
[http://science.howstuffworks.com/code-breaker.htm How Code Breakers Work]<br>
[http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html Jacobian coordinates for short Weierstrass curves (algs to use)]<br>
[https://developer.apple.com/cryptography/ Apple Crypto Libraries]<br>
[https://github.com/sobolevn/awesome-cryptography Awesome Cryptogtaphy]<br>
[https://www.crypto101.io/ An introductory course on cryptography]<br>
[http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html A Stick Figure Guide to the Advanced Encryption Standard (AES)]<br>
## General Security
[https://code.google.com/p/capirca/ Capirca, utilizes common definitions of networks and services and high-level policy files to facilitate the development and manipulation of network access control filters (ACLs) for various platforms. Use with ldpush]<br>
[http://cryptosense.com/real-hsm-breaches/ Real HSM Breaches]<br>
[https://github.com/OpenTechFund/secure-chat/blob/master/roadmap.md OpenTechFund/secure-chat roadmap. More like a planet survey.]<br>
[http://www.cs.dartmouth.edu/~sergey/langsec/papers/langsec-tr.pdf Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina]<br>
[https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ Hardening Your Web Server]<br>
[https://wiki.cacert.org/Risks/SecretCells/ThreatsAndAssumptions Secret Cells, Threats and Assumptions]<br>
[https://wiki.mozilla.org/Security/Server_Side_TLS Mozilla Recommendations for Security/Server Side TLS]<br>
[https://cc.dcsec.uni-hannover.de/ SSL Cipher Suite Details of Your Browser]<br>
[https://www.howsmyssl.com/ Check out Your Browser's SSL Support]<br>
[https://github.com/amq/firefox-debloat Stop Firefox leaking data about you]<br>
[http://www.net-security.org/secworld.php?id=18776 Mobile Carrier Super-Cookie Use]<br>
[https://github.com/lfit/itpol/blob/master/linux-workstation-security.md Linux workstation security checklist]<br>
[https://web.archive.org/web/20110724024707/http://sion.quickie.net/keysigning.txt Efficient Group Key Signing Method]<br>
[https://gist.github.com/Superbil caff, proof of posession of the passphrase of a key sent by the email address associated with that key]<br>
[https://github.com/micahflee/onionshare/blob/master/README.md OnionShare]<br>
[http://cybersecurity.oxfordjournals.org/ Journal of Cybersecurity]<br>
[http://www.thoughtcrime.org/blog/we-should-all-have-something-to-hide/ We Should All Have Something To Hide, Moxie]<br>
[http://www.alexirpan.com/2016/02/11/secure-computation.html A Gentle Introduction to Secure Computation]<br>
[https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes FTC - Time to rethink mandatory password changes]<br>
[https://cvdazzle.com/ Camouflage from face detection]<br>
[https://vez.mrsk.me/freebsd-defaults.txt FreeBSD - a lesson in poor defaults]<br>
!FireFox about:config set `dom.webnotifications.enabled` and `dom.push.enabled`
to false to prevent push notifications]<br>
[https://www.eecs.umich.edu/courses/eecs588/readings.html Cyber Security Reading List]<br>
[https://techsolidarity.org/resources/journalist_checkup.html Tech Solidarity Personal Security CheckList Review]<br>
[https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492 Shared thoughts after 6+ years in Pentesting]<br>
[https://www.it-sec-catalog.info/analysis_and_exploitation_unprivileged.html A Catalog of Exploits]<br>
[https://magoo.github.io/Blockchain-Graveyard/ Blockchain Graveyard, Crypto-Currency Disasters]<br>
[https://github.com/veorq/ipcrypt ipcrypt: IP-format-preserving encryption]<br>
[http://images.secure.f-secure.com/Web/FSecure/%7B319382b2-a040-4c88-bd94-20eed01bf22f%7D_F-Secure-Evil-Maid-Guide.pdf F-Secures Guide to Evil Maid Attacks]<br>
[https://secapps.com/blog/2018/03/fuzzing-json-web-services Fuzzing JSON Web Services]<br>
[https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt PEN Tester's Tool List]<br>
[https://github.com/qazbnm456/awesome-web-security Awesome Web Security]<br>
[https://www.hrw.org/everyday-encryption Gamified lessons in using encryption in everyday life. Good for you and good for friends and family.\]<br>
[http://addxorrol.blogspot.com/2019/08/rashomon-of-disclosure.html Excellent piece on vulnerability disclosure]<br>
## Privacy Projects
[https://wiki.techinc.nl/index.php/Privacy_Software_Workshop_Series Privacy Software Workshop Series]<br>
[http://wiki.techinc.nl/index.php/P2pbgpsec Peer 2 Peer BGP Security]<br>
[https://wiki.techinc.nl/index.php/MeshNet Setting Up I2P and Tor Darknets]<br>
## Securing Open Source
[https://github.com/OpenTechFund/secure-chat/blob/master/roadmap.md Secure Messaging roadmap from the LEAP project]<br>
## Tools
[https://github.com/rntz/rotten/blob/master/README.md ROTTEN, small self-hosting Lisp, designed as a vehicle for exploring Ken Thompson's Reflections on Trusting Trust]
[http://canarytokens.org/generate Canary Token Generator]<br>
[https://research.kudelskisecurity.com/2017/04/28/configuring-yubikey-for-gpg-and-u2f/ YubiKey Configuration for GPG, SSH, and U2F]<br>
[https://github.com/trimstray/awesome-ninja-admins collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins]<br>
[https://github.com/toniblyx/my-arsenal-of-aws-security-tools List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.]<br>
[https://www.safetydetective.com/blog/free-security-tools-that-you-need-to-start-using-now/ Free Security Tools an End User Should Start Using NOW]<br>
[https://gist.github.com/lizthegrey/9c21673f33186a9cc775464afbdce820 Securing how folk use ssh]<br>
[https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ Clean Poisoned Keys on your GPG Keyring]<br>
[https://medium.com/@micallst/osint-resources-for-2019-b15d55187c3f OSINT Resources for 2019]<br>
# System Administration
## Automation
### Ansible
[http://www.ansibleworks.com/docs/]<br>
[http://www.ansibleworks.com/docs/faq.html]<br>
[http://jinja.pocoo.org/docs/templates/]<br>
[https://nsrc.org/workshops/2013/nsrc-ubuntunet-trainers/raw-attachment/wiki/Agenda/intro-ansible.pdf NSRC Intro (pdf)]<br>
[https://gist.github.com/raags/0f2089ec1208617b86d8 append an existing list using set_fact]<br>
[http://docs.ansible.com/developing_modules.html#module-provided-facts Module Provided Facts]<br>
[https://github.com/Juniper/ansible-junos-stdlib for JunOS]<br>
[https://github.com/jedelman8/nxos-ansible for NX-OS]<br>
[https://github.com/spotify/napalm for IOSxr]<br>
[https://github.com/bronwynlewis/ansible101-network-automation-tutorial Bronwyn Tutorial]<br>
[https://wiki.postgresql.org/wiki/Disk_Usage Finding the size of various object in your postgres database]<br>
[http://pythonsweetness.tumblr.com/post/171589071872/quadrupling-ansible-performance-with-mitogen Quadrupling Ansible performance with Mitogen]<br>
### Configuration Tools
[https://code.google.com/p/ldpush/ LDPush, A cross-vendor network configuration distribution tool]<br>
[https://github.com/facebook/fbpush CLI tool to push junoscript configs to Juniper network devices]<br>
[https://github.com/ypconfig/ypconfig Python tool to configure networking interfaces on a Linux machine]<br>
## Miscellaneous SysAdmin
[https://github.com/simondeziel/check-deleted-libs Check if Upgrade has Dynmic Lib Dependencies which Need Restart]<br>
# Telcos & Lesser Forms of Humor
[http://prepaid-data-sim-card.wikia.com/wiki/Prepaid_SIM_with_data Prepaid SIMs Global Wiki]<br>
# Virtualization
## Ganeti
[https://github.com/ffzg/ganeti-extstorage-zfs Experimental Ganeti extstorage provider for ZFS volumes]<br>
[https://groups.google.com/forum/#!topic/ganeti/chZ99mAHuuc Ganeti using LVM over ZFS (zfsonlinux) ]<br>
[https://doc.pfsense.org/index.php/VirtIO_Driver_Support Installing pfSense as VirtIO on Ganeti]<br>
[http://docs.ganeti.org/ganeti/master/man/gnt-node.html#modify Make a Node Multi-Homed]<br>
[http://docs.ganeti.org/ganeti/master/html/admin.html#replication-network-changes Also how to Make a Node Multi-Homed]<br>
[http://docs.ganeti.org/ganeti/2.12/html/upgrade.html Upgrading to 2.12 and Onward]<br>
[http://ganeti-webmgr.readthedocs.org/en/latest/index.html Ganeti Web Manager]<br>
[https://nsrc.org/workshops/2014/sanog23-virtualization/raw-attachment/wiki/Agenda/ex-ganeti-webmgr.htm NSRC Instructions for Ganeti Web Manager Installation]<br>
[https://www.synnefo.org/docs/snf-image/latest/index.html snf-image - allows Ganeti to launch instances from predefined or untrusted custom Images]<br>
[https://code.google.com/p/ganeti/wiki/EditingTheConfiguration Editing Cluster Configuration (/var/lib/ganeti/config.data)]<br>
[http://docs.ganeti.org/ganeti/2.12/html/cluster-keys-replacement.html Cluster Key Replacement]<br>
[https://code.google.com/p/ganeti/wiki/GanetiAndSSL Generate/Replace SSL Certificates]<br>
{{{lvextend -L+50G -r /dev/mapper/ganeti-var}}}<br>
[https://github.com/ganeti/ganeti/wiki/Performance-Tuning Ganeti Performance Tuning]<br>
[http://docs.openvswitch.org/en/latest/howto/tunneling/ Using Open vSwitch to allow VMs on two different hosts to communicate over port-based GRE tunnels]<br>
## Misc Cloudware
[http://owncloud.org/ OwnCloud]<br>
# Windows
## Ops Tools
[http://www.metzdowd.com/pipermail/cryptography/2015-July/026136.html Win10 is Horrible SpyWare]<br>
## Security
[https://resistsurveillance.org/ Detekt, a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS]<br>
## Misc Windows Stuff
[https://superuser.com/questions/602209/create-a-pdf-from-powerpoint-with-animations Split PowerPoint Animations into PDFs]<br>
# Misceleanous
[https://framadate.org/8ouws6sxigi2gjdz Framadate, an open doodle replacement]<br>
[https://www.youtube.com/watch?v=0NvsUXBCeVA Snowden at IETF, plugs CrypTech at 0:38:00]<br>
[https://archive.psg.com:Abstract-Guide-Nature.pdf How to construct a Nature summary paragrah (aka abstract)]<br>
[http://idlewords.com/talks/web_design_first_100_years.htm Web Design: The First 100 Years ]<br>
[https://www.whiterabbitexpress.com/ White Rabbit Express - Buy anything from Japan]<br>
[http://netflixcodes.me/ NetFlix Secret Category Codes]<br>
[https://en.wikipedia.org/wiki/Template:Supranational_European_Bodies Supranational European Bodies]<br>
[https://appear.in/ Free Open WebRTC Site]<br>
[http://web2.uvcs.uvic.ca/elc/studyzone/330/reading/smell1.htm The Small of the Soup]<br>
[http://dev.to/rly O RLY Cover Generator]<br>
[https://cf.iij-group.jp/pages/viewpage.action?title=Conference+schedule&spaceKey=LAB IIJ Lab Conference Calendar]<br>
[http://www.read.seas.harvard.edu/~kohler/latex.html LaTeX hints]<br>
[http://www.network-science.de/ascii/ Big Font Generator]<br>
[http://hackingdistributed.com/2017/05/04/stages-of-enlightenment/ Levels of Techie Enlightenment]<br>
[http://www.newyorker.com/humor/daily-shouts/freelance-achievement-stickers Freelance Achievement Stickers]<br>
[https://thepointsguy.com/2015/07/fast-track-arrival-options-around-the-world/ Fast-Track Arrival Options Around the World]<br>
[http://www.teenvogue.com/story/know-your-rights-if-you-get-arrested Teen Vogue on Know Your Rights If You Get Arrested]<br>
[https://github.com/data-ppf/data-ppf.github.io/wiki/Syllabus Data, Past, Present, and Future]<br>
[https://meowni.ca/knit-a-stitch/ Create a Knitting Pattern]<br>
[https://cs.stanford.edu/people/widom/paper-writing.html Tips for Writing Technical Papers by Jennifer Widom]<br>
[http://www.scmp.com/news/hong-kong/community/article/2138495/rats-were-something-else-25-years-hong-kongs-kowloon-walled Hong Kong Walled City]<br>
[https://azeria-labs.com/the-importance-of-deep-work-the-30-hour-method-for-learning-a-new-skill/ The Importance of Deep Work]<br>
[https://wiki.voip.ms/article/Virtual_Fax Cheap Internet Fax Service]<br>
[https://powerman.name/doc/asciidoc ASCIIdoc Cheat Sheet]<br>
[https://n0where.net/bash-open-tcpudp-sockets Sockets in bash]<br>
[https://www.itu.int/itu-d/tnd-map-public/ ITU World Fiber Map]<br>
[https://atadistance.net/apple-pay-suica/ Using Apple Pay for Suica]<br>
[https://support.apple.com/en-us/HT207155 More using Apple Pay for Suica]<br>
[https://www.remove.bg/ Remove Background from an Image]<br>
[https://www.wired.com/story/corning-pure-glass-fiber-optic-cable/ How Corning Makes Super-Pure Glass for Fiber-Optic Cable]<br>
[https://www.wired.com/1996/12/ffglass/ Stephenson on Undersea Cables]<br>
[http://www.circleid.com/posts/20200210_deep_sea_diving_the_state_of_submarine_cable_technology/ Deep Sea Diving: The State of Submarine Cable Technology -- Geoff Huston]<br>
[https://jex.im/regulex Regular Expression Visualizer]<br>
[https://www.youtube.com/playlist?list=PL94E35692EB9D36F3 Donald Knuth Lectures Online]<br>
[https://www.arl.wustl.edu/~kenw/courses/cse573s/sp04/pdffiles/tcptrace.pdf TCPtrace and xplot Cheat Sheet]<br>
[https://www.deepsig.io/news/2019/2/5/candidate-first-hiring Candidate First Hiring]<br>
[https://accuracyandprivacy.substack.com/p/differential-privacy-an-easy-case Differential Privacy Made Simpler]<br>
[https://ericchiang.github.io/post/containers-from-scratch/ Containers from Scratch]<br>
[http://lmgtfy.com/?q=create+pkcs+%2310 Let Me Google This For You]<br>
[https://jonasblade.com/ Custom Knives Jonas]<br>
[http://gunkies.org/wiki/Vonada%27s_Engineering_Maxims Vonada's Engineering Maxms]<br>
[https://www.animatedknots.com/bowline-knot Animated Knots]<br>
[https://thriveglobal.com/stories/why-smart-individuals-make-dumb-group-decisions/ Why Smart Individuals Make Dumb Group Decisions]<br>
[https://www.hactrn.net/blog/2018/06/11/32-bit-pgp-keyid-delenda-est/ PGP 32-bit PGP KeyID Delenda Est!]<br>
[http://justhungry.com/announcing-japanese-cooking-101-fundamentals-washoku Japanese Cooking 101 by Maki Itoh]<br>
[https://hbswk.hbs.edu/item/when-silence-spells-trouble-at-work When Silence Spells Trouble at Work]<br>
[https://emeryblogger.com/2016/06/08/a-guide-for-session-chairs/ A Guide for Session Chairs]<br>
[https://medium.com/@kevin.txt/why-usb-type-c-is-bad-design-ffcd77254c1f USB-C Explained, or Why USB Type C is Bad Design]<br>
[https://docs.google.com/document/d/13W_d3L1jStPExxnH1nWMlJ1RG0RG_4hLfU7hPNXL6aU/edit Singapore Recommendations]<br>
[https://vaneyckt.io/posts/safer_bash_scripts_with_set_euxo_pipefail/ Safer BASH Scripts]<br>
[https://www.netmeister.org/blog/ops-lessons.html (A few) Ops Lessons We All Learn The Hard Way]
---
2020.07.04