Are you over 18 and want to see adult content?
More Annotations
![A complete backup of julianoliver.com](https://www.archivebay.com/archive2/1be2ab25-00bd-478e-b8a1-7fe4bf6a959c.png)
A complete backup of julianoliver.com
Are you over 18 and want to see adult content?
![A complete backup of alliesofhumanity.org](https://www.archivebay.com/archive2/709abf61-fa3e-464a-8105-2ef08e6fb5d5.png)
A complete backup of alliesofhumanity.org
Are you over 18 and want to see adult content?
![A complete backup of ukraine-women.info](https://www.archivebay.com/archive2/30c4f413-2dc1-40e7-8d92-d5563fbb7e2e.png)
A complete backup of ukraine-women.info
Are you over 18 and want to see adult content?
![A complete backup of callcredit.co.uk](https://www.archivebay.com/archive2/c87ec122-83a7-42cd-9ac9-df610c79dbda.png)
A complete backup of callcredit.co.uk
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of minorleagueball.com](https://www.archivebay.com/archive2/e2da1397-da81-4812-b235-2736a81b61cb.png)
A complete backup of minorleagueball.com
Are you over 18 and want to see adult content?
![A complete backup of locuraviajes.com](https://www.archivebay.com/archive2/c7a6a889-380b-49a4-8234-81356e598319.png)
A complete backup of locuraviajes.com
Are you over 18 and want to see adult content?
![A complete backup of shoreditchhouse.com](https://www.archivebay.com/archive2/98cd6083-11c5-4fd9-9dd9-cf0a7e10d02a.png)
A complete backup of shoreditchhouse.com
Are you over 18 and want to see adult content?
Text
LINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP Theorem LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing BOOTING ARCH LINUX FROM PXE (RASPBERRY PI) Booting Arch Linux from PXE (Raspberry Pi) So over the weekend I had the great idea of reinstalling my Linux setup, mainly to incorporate LVM and LUKS to the installation from the get-go.. And as if installing and configuring a new *NIX environment is not time consuming enough, I decided to boot the installation image from PXE.. PXE utilizes TFTP and DHCP to serve the installation media over PAPER STORAGE AND RECOVERY OF GPG KEYS OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. CUSTOMIZE DWM ON FEDORA So at work I'm using a Macbook, but OS X has increasingly interfered with my development routine. The last drop that tipped the glass was no native support for Docker in OS X, obviously. Hence I'm moving to using a Linux VM in VMware. I chose Fedora, because that's what Linus uses. Just kidding. I wanted to learn a Red Hat based distro this time, since Debian and Arch are already familiar to me. ESTABLISH YOUR ONLINE IDENTITY USING GNUPG Establish your online identity using GnuPG. I have a confession to make. I do not have an online identity. I have Twitter, Facebook (yeah I know) and this homepage, but still, my online presence is undermined by the fact that I or others cannot verify my identity. SAMINIIR'S HACKER BLOGABOUTLINKSPGPTCP BASICS & HANDSHAKEBOOTING ARCH LINUX FROM PXEIPV4 & ICMPV4 Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement.LINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP Theorem LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing BOOTING ARCH LINUX FROM PXE (RASPBERRY PI) Booting Arch Linux from PXE (Raspberry Pi) So over the weekend I had the great idea of reinstalling my Linux setup, mainly to incorporate LVM and LUKS to the installation from the get-go.. And as if installing and configuring a new *NIX environment is not time consuming enough, I decided to boot the installation image from PXE.. PXE utilizes TFTP and DHCP to serve the installation media over PAPER STORAGE AND RECOVERY OF GPG KEYS OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. CUSTOMIZE DWM ON FEDORA So at work I'm using a Macbook, but OS X has increasingly interfered with my development routine. The last drop that tipped the glass was no native support for Docker in OS X, obviously. Hence I'm moving to using a Linux VM in VMware. I chose Fedora, because that's what Linus uses. Just kidding. I wanted to learn a Red Hat based distro this time, since Debian and Arch are already familiar to me. ESTABLISH YOUR ONLINE IDENTITY USING GNUPG Establish your online identity using GnuPG. I have a confession to make. I do not have an online identity. I have Twitter, Facebook (yeah I know) and this homepage, but still, my online presence is undermined by the fact that I or others cannot verify my identity.LINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP TheoremHEY, YOU THERE!
Welcome to my blog. My name is Sami and I work as a software developer. I'm starting a blog about computers and programming (sheesh, like there are not enough of them!). I believe, however, that documenting the things I learn and expressing them concisely as possible is beneficial for overall understanding of topics. Hopefully, you'll get something out of the (future) posts. And I'm always DEBUGGING PXE BOOT WITH QEMU You might run into configuration problems and booting an actual machine is time-consuming for testing. My situation, for example, was that I could not get the Raspberry serving the PXE-protocol to respond to legitimate requests. I needed a better environment to debug the problem than booting my desktop for every iteration. And here steps in QEMU. It's a fine piece of computer sciencePGP - SAMINIIR.COM
PGP. Fingerprint: 150C AAE8 480E EA83 A21F 6C92 6AA1 A5E8 70FD 06D2. Download PGP public key. AUTOMATE ALL THE CAMERA PHOTO UPLOADS, PART I So this fall I've been getting into photography and with my super small new camera (Lumix GM1) I'm looking forward to taking horrendous photos of unexpecting people. As the nerd I am, however, I deem that no tasks should be done repeatedly and manually. This is also true for transferring photos from camera to safety. Ideally, you would only power on the camera and the photos would just sync to CONFIGURING ARCH LINUX ON DELL XPS 15 Configuring Arch Linux on Dell XPS 15. In the previous post, we’ve successfully booted into Arch Linux from our encrypted root partition.. Let’s now configure it to our (my) liking. Contents. User management; Arch User Repository; X11 and Window Manager: dwm GEMS FROM THE MAN PAGE TRENCHES Gems from the man page trenches. I’m a big fan of UNIX man pages 1.They are almost without exception well-written and concise, and the intuition you gain for particular topics as you browse through the man pages is well worth the effort. LET'S CODE A TCP/IP STACK, 4: TCP DATA FLOW & SOCKET API In this post, we will look into TCP data communication and how it is managed. Additionally, we will provide an interface from the networking stack that applications can use for network communication. This Socket API is then utilized by our example application to send a simple HTTP request to a website. THE BOOK THAT LEFT ME EMPTY INSIDE My roommate has long been suggesting me to read Ishmael by Daniel Quinn, a sort of philosophical book on human nature and how we, as a society, got here. It's probably not the first one of such books. The story is not a conventional one. The book starts by introducing the protagonist, a writer whose identity is left mostly unknown. He is seeking a 'teacher' and stumbles on an advert in a SAMINIIR'S HACKER BLOG After computing rto, if it is less than 1 second, round it up to 1 second.A maximum amount can be provided but it has to be at least 60 seconds; The clock granularity of TCP implementations has traditionally been estimated to be fairly high, ranging from 500ms to1 second.
SAMINIIR'S HACKER BLOGABOUTLINKSPGPTCP BASICS & HANDSHAKEBOOTING ARCH LINUX FROM PXEIPV4 & ICMPV4 Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement. LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing BOOTING ARCH LINUX FROM PXE (RASPBERRY PI) Booting Arch Linux from PXE (Raspberry Pi) So over the weekend I had the great idea of reinstalling my Linux setup, mainly to incorporate LVM and LUKS to the installation from the get-go.. And as if installing and configuring a new *NIX environment is not time consuming enough, I decided to boot the installation image from PXE.. PXE utilizes TFTP and DHCP to serve the installation media over LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. LET'S CODE A TCP/IP STACK, 1: ETHERNET & ARP Writing your own TCP/IP stack may seem like a daunting task. Indeed, TCP has accumulated many specifications over its lifetime of more than thirty years. The core specification, however, is seemingly compact - the important parts being TCP header parsing, the state machine, congestion control and retransmission timeoutcomputation.
INSTALLING ARCH LINUX ON DELL XPS 15 Installing Arch Linux on Dell XPS 15. So after using a Fedora/Macbook for a while, I got a new work laptop. This time I opted for the Dell XPS 15 with all the bells and whistles 1.It has received great reviews and has been compared to the quality of the Macbook Pro’s. LET'S CODE A TCP/IP STACK, 4: TCP DATA FLOW & SOCKET API In this post, we will look into TCP data communication and how it is managed. Additionally, we will provide an interface from the networking stack that applications can use for network communication. This Socket API is then utilized by our example application to send a simple HTTP request to a website. CUSTOMIZE DWM ON FEDORA So at work I'm using a Macbook, but OS X has increasingly interfered with my development routine. The last drop that tipped the glass was no native support for Docker in OS X, obviously. Hence I'm moving to using a Linux VM in VMware. I chose Fedora, because that's what Linus uses. Just kidding. I wanted to learn a Red Hat based distro this time, since Debian and Arch are already familiar to me. SAMINIIR'S HACKER BLOGABOUTLINKSPGPTCP BASICS & HANDSHAKEBOOTING ARCH LINUX FROM PXEIPV4 & ICMPV4 Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement. LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing BOOTING ARCH LINUX FROM PXE (RASPBERRY PI) Booting Arch Linux from PXE (Raspberry Pi) So over the weekend I had the great idea of reinstalling my Linux setup, mainly to incorporate LVM and LUKS to the installation from the get-go.. And as if installing and configuring a new *NIX environment is not time consuming enough, I decided to boot the installation image from PXE.. PXE utilizes TFTP and DHCP to serve the installation media over LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. LET'S CODE A TCP/IP STACK, 1: ETHERNET & ARP Writing your own TCP/IP stack may seem like a daunting task. Indeed, TCP has accumulated many specifications over its lifetime of more than thirty years. The core specification, however, is seemingly compact - the important parts being TCP header parsing, the state machine, congestion control and retransmission timeoutcomputation.
INSTALLING ARCH LINUX ON DELL XPS 15 Installing Arch Linux on Dell XPS 15. So after using a Fedora/Macbook for a while, I got a new work laptop. This time I opted for the Dell XPS 15 with all the bells and whistles 1.It has received great reviews and has been compared to the quality of the Macbook Pro’s. LET'S CODE A TCP/IP STACK, 4: TCP DATA FLOW & SOCKET API In this post, we will look into TCP data communication and how it is managed. Additionally, we will provide an interface from the networking stack that applications can use for network communication. This Socket API is then utilized by our example application to send a simple HTTP request to a website. CUSTOMIZE DWM ON FEDORA So at work I'm using a Macbook, but OS X has increasingly interfered with my development routine. The last drop that tipped the glass was no native support for Docker in OS X, obviously. Hence I'm moving to using a Linux VM in VMware. I chose Fedora, because that's what Linus uses. Just kidding. I wanted to learn a Red Hat based distro this time, since Debian and Arch are already familiar to me.LINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP Theorem OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this?HEY, YOU THERE!
Welcome to my blog. My name is Sami and I work as a software developer. I'm starting a blog about computers and programming (sheesh, like there are not enough of them!). I believe, however, that documenting the things I learn and expressing them concisely as possible is beneficial for overall understanding of topics. Hopefully, you'll get something out of the (future) posts. And I'm always PAPER STORAGE AND RECOVERY OF GPG KEYS Paper storage and recovery of GPG keys. To avoid disastrously losing your private keys, they should be redundantly backed up in a robust manner in a safe location. As one possible approach, we will store the GPG keyring as QR codes, print them on paper, and demonstrate recovering the keyring. AUTOMATE ALL THE CAMERA PHOTO UPLOADS, PART I So this fall I've been getting into photography and with my super small new camera (Lumix GM1) I'm looking forward to taking horrendous photos of unexpecting people. As the nerd I am, however, I deem that no tasks should be done repeatedly and manually. This is also true for transferring photos from camera to safety. Ideally, you would only power on the camera and the photos would just sync to ESTABLISH YOUR ONLINE IDENTITY USING GNUPG Establish your online identity using GnuPG. I have a confession to make. I do not have an online identity. I have Twitter, Facebook (yeah I know) and this homepage, but still, my online presence is undermined by the fact that I or others cannot verify my identity.PGP - SAMINIIR.COM
PGP. Fingerprint: 150C AAE8 480E EA83 A21F 6C92 6AA1 A5E8 70FD 06D2. Download PGP public key. CONFIGURING ARCH LINUX ON DELL XPS 15 Configuring Arch Linux on Dell XPS 15. In the previous post, we’ve successfully booted into Arch Linux from our encrypted root partition.. Let’s now configure it to our (my) liking. Contents. User management; Arch User Repository; X11 and Window Manager: dwm GEMS FROM THE MAN PAGE TRENCHES Gems from the man page trenches. I’m a big fan of UNIX man pages 1.They are almost without exception well-written and concise, and the intuition you gain for particular topics as you browse through the man pages is well worth the effort.PRIVACY NOTICE
Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement. SAMINIIR'S HACKER BLOGABOUTLINKSPGPTCP BASICS & HANDSHAKEBOOTING ARCH LINUX FROM PXEIPV4 & ICMPV4 Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement. LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing BOOTING ARCH LINUX FROM PXE (RASPBERRY PI) Booting Arch Linux from PXE (Raspberry Pi) So over the weekend I had the great idea of reinstalling my Linux setup, mainly to incorporate LVM and LUKS to the installation from the get-go.. And as if installing and configuring a new *NIX environment is not time consuming enough, I decided to boot the installation image from PXE.. PXE utilizes TFTP and DHCP to serve the installation media over LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. LET'S CODE A TCP/IP STACK, 1: ETHERNET & ARP Writing your own TCP/IP stack may seem like a daunting task. Indeed, TCP has accumulated many specifications over its lifetime of more than thirty years. The core specification, however, is seemingly compact - the important parts being TCP header parsing, the state machine, congestion control and retransmission timeoutcomputation.
INSTALLING ARCH LINUX ON DELL XPS 15 Installing Arch Linux on Dell XPS 15. So after using a Fedora/Macbook for a while, I got a new work laptop. This time I opted for the Dell XPS 15 with all the bells and whistles 1.It has received great reviews and has been compared to the quality of the Macbook Pro’s. LET'S CODE A TCP/IP STACK, 4: TCP DATA FLOW & SOCKET API In this post, we will look into TCP data communication and how it is managed. Additionally, we will provide an interface from the networking stack that applications can use for network communication. This Socket API is then utilized by our example application to send a simple HTTP request to a website. CUSTOMIZE DWM ON FEDORA So at work I'm using a Macbook, but OS X has increasingly interfered with my development routine. The last drop that tipped the glass was no native support for Docker in OS X, obviously. Hence I'm moving to using a Linux VM in VMware. I chose Fedora, because that's what Linus uses. Just kidding. I wanted to learn a Red Hat based distro this time, since Debian and Arch are already familiar to me. SAMINIIR'S HACKER BLOGABOUTLINKSPGPTCP BASICS & HANDSHAKEBOOTING ARCH LINUX FROM PXEIPV4 & ICMPV4 Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement. LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing BOOTING ARCH LINUX FROM PXE (RASPBERRY PI) Booting Arch Linux from PXE (Raspberry Pi) So over the weekend I had the great idea of reinstalling my Linux setup, mainly to incorporate LVM and LUKS to the installation from the get-go.. And as if installing and configuring a new *NIX environment is not time consuming enough, I decided to boot the installation image from PXE.. PXE utilizes TFTP and DHCP to serve the installation media over LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. LET'S CODE A TCP/IP STACK, 1: ETHERNET & ARP Writing your own TCP/IP stack may seem like a daunting task. Indeed, TCP has accumulated many specifications over its lifetime of more than thirty years. The core specification, however, is seemingly compact - the important parts being TCP header parsing, the state machine, congestion control and retransmission timeoutcomputation.
INSTALLING ARCH LINUX ON DELL XPS 15 Installing Arch Linux on Dell XPS 15. So after using a Fedora/Macbook for a while, I got a new work laptop. This time I opted for the Dell XPS 15 with all the bells and whistles 1.It has received great reviews and has been compared to the quality of the Macbook Pro’s. LET'S CODE A TCP/IP STACK, 4: TCP DATA FLOW & SOCKET API In this post, we will look into TCP data communication and how it is managed. Additionally, we will provide an interface from the networking stack that applications can use for network communication. This Socket API is then utilized by our example application to send a simple HTTP request to a website. CUSTOMIZE DWM ON FEDORA So at work I'm using a Macbook, but OS X has increasingly interfered with my development routine. The last drop that tipped the glass was no native support for Docker in OS X, obviously. Hence I'm moving to using a Linux VM in VMware. I chose Fedora, because that's what Linus uses. Just kidding. I wanted to learn a Red Hat based distro this time, since Debian and Arch are already familiar to me.LINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP Theorem OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this?HEY, YOU THERE!
Welcome to my blog. My name is Sami and I work as a software developer. I'm starting a blog about computers and programming (sheesh, like there are not enough of them!). I believe, however, that documenting the things I learn and expressing them concisely as possible is beneficial for overall understanding of topics. Hopefully, you'll get something out of the (future) posts. And I'm always PAPER STORAGE AND RECOVERY OF GPG KEYS Paper storage and recovery of GPG keys. To avoid disastrously losing your private keys, they should be redundantly backed up in a robust manner in a safe location. As one possible approach, we will store the GPG keyring as QR codes, print them on paper, and demonstrate recovering the keyring. AUTOMATE ALL THE CAMERA PHOTO UPLOADS, PART I So this fall I've been getting into photography and with my super small new camera (Lumix GM1) I'm looking forward to taking horrendous photos of unexpecting people. As the nerd I am, however, I deem that no tasks should be done repeatedly and manually. This is also true for transferring photos from camera to safety. Ideally, you would only power on the camera and the photos would just sync to ESTABLISH YOUR ONLINE IDENTITY USING GNUPG Establish your online identity using GnuPG. I have a confession to make. I do not have an online identity. I have Twitter, Facebook (yeah I know) and this homepage, but still, my online presence is undermined by the fact that I or others cannot verify my identity.PGP - SAMINIIR.COM
PGP. Fingerprint: 150C AAE8 480E EA83 A21F 6C92 6AA1 A5E8 70FD 06D2. Download PGP public key. CONFIGURING ARCH LINUX ON DELL XPS 15 Configuring Arch Linux on Dell XPS 15. In the previous post, we’ve successfully booted into Arch Linux from our encrypted root partition.. Let’s now configure it to our (my) liking. Contents. User management; Arch User Repository; X11 and Window Manager: dwm GEMS FROM THE MAN PAGE TRENCHES Gems from the man page trenches. I’m a big fan of UNIX man pages 1.They are almost without exception well-written and concise, and the intuition you gain for particular topics as you browse through the man pages is well worth the effort.PRIVACY NOTICE
Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement. SAMINIIR'S HACKER BLOGABOUTLINKSPGPTCP BASICS & HANDSHAKEBOOTING ARCH LINUX FROM PXEIPV4 & ICMPV4 Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement.LINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP Theorem OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
PAPER STORAGE AND RECOVERY OF GPG KEYS LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. INSTALLING ARCH LINUX ON DELL XPS 15 Installing Arch Linux on Dell XPS 15. So after using a Fedora/Macbook for a while, I got a new work laptop. This time I opted for the Dell XPS 15 with all the bells and whistles 1.It has received great reviews and has been compared to the quality of the Macbook Pro’s. ESTABLISH YOUR ONLINE IDENTITY USING GNUPG Establish your online identity using GnuPG. I have a confession to make. I do not have an online identity. I have Twitter, Facebook (yeah I know) and this homepage, but still, my online presence is undermined by the fact that I or others cannot verify my identity.PGP - SAMINIIR.COM
PGP. Fingerprint: 150C AAE8 480E EA83 A21F 6C92 6AA1 A5E8 70FD 06D2. Download PGP public key. SAMINIIR'S HACKER BLOGABOUTLINKSPGPTCP BASICS & HANDSHAKEBOOTING ARCH LINUX FROM PXEIPV4 & ICMPV4 Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement.LINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP Theorem OPENVPN PUTS PACKETS INSIDE YOUR PACKETS OpenVPN puts packets inside your packets. I realized I do not know exactly how OpenVPN does its magic in Linux.. I mean, sure, it encrypts and tunnels the packets to another endpoint, but can you describe the exact steps to achieve this? LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION At this point we have a TCP/IP stack that is able to communicate to other hosts in the Internet. The implementation so far has been fairly straight-forward, but missing a major feature: Reliability. Namely, our TCP does not guarantee the integrity of the data stream it presents to applications. Even establishing the connection can fail if the handshake packets are lost in transit. Introducing LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4 Let's code a TCP/IP stack, 2: IPv4 & ICMPv4. This time in our userspace TCP/IP stack we will implement a minimum viable IP layer and test it with ICMP echo requests (also known as pings).. We will take a look at the formats of IPv4 and ICMPv4 and describe how to check themfor integrity.
PAPER STORAGE AND RECOVERY OF GPG KEYS LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE Now that our userspace TCP/IP stack has minimal implementations for Ethernet and IPv4, it is time to look into the dreaded Transmission Control Protocol (TCP). Operating on the fourth OSI networking layer, transport, TCP is responsible for repairing erroneous connections and faults in packet delivery. INSTALLING ARCH LINUX ON DELL XPS 15 Installing Arch Linux on Dell XPS 15. So after using a Fedora/Macbook for a while, I got a new work laptop. This time I opted for the Dell XPS 15 with all the bells and whistles 1.It has received great reviews and has been compared to the quality of the Macbook Pro’s. ESTABLISH YOUR ONLINE IDENTITY USING GNUPG Establish your online identity using GnuPG. I have a confession to make. I do not have an online identity. I have Twitter, Facebook (yeah I know) and this homepage, but still, my online presence is undermined by the fact that I or others cannot verify my identity.PGP - SAMINIIR.COM
PGP. Fingerprint: 150C AAE8 480E EA83 A21F 6C92 6AA1 A5E8 70FD 06D2. Download PGP public key.HEY, YOU THERE!
Welcome to my blog. My name is Sami and I work as a software developer. I'm starting a blog about computers and programming (sheesh, like there are not enough of them!). I believe, however, that documenting the things I learn and expressing them concisely as possible is beneficial for overall understanding of topics. Hopefully, you'll get something out of the (future) posts. And I'm alwaysLINKS
Links. This page contains links to articles, papers and blog posts I’ve found insightful, in no particular order. Distributed Systems. Spanner, TrueTime and the CAP Theorem BOOTING ARCH LINUX FROM PXE (RASPBERRY PI) Booting Arch Linux from PXE (Raspberry Pi) So over the weekend I had the great idea of reinstalling my Linux setup, mainly to incorporate LVM and LUKS to the installation from the get-go.. And as if installing and configuring a new *NIX environment is not time consuming enough, I decided to boot the installation image from PXE.. PXE utilizes TFTP and DHCP to serve the installation media over DEBUGGING PXE BOOT WITH QEMU You might run into configuration problems and booting an actual machine is time-consuming for testing. My situation, for example, was that I could not get the Raspberry serving the PXE-protocol to respond to legitimate requests. I needed a better environment to debug the problem than booting my desktop for every iteration. And here steps in QEMU. It's a fine piece of computer science AUTOMATE ALL THE CAMERA PHOTO UPLOADS, PART I So this fall I've been getting into photography and with my super small new camera (Lumix GM1) I'm looking forward to taking horrendous photos of unexpecting people. As the nerd I am, however, I deem that no tasks should be done repeatedly and manually. This is also true for transferring photos from camera to safety. Ideally, you would only power on the camera and the photos would just sync to LET'S CODE A TCP/IP STACK, 4: TCP DATA FLOW & SOCKET API In this post, we will look into TCP data communication and how it is managed. Additionally, we will provide an interface from the networking stack that applications can use for network communication. This Socket API is then utilized by our example application to send a simple HTTP request to a website. CUSTOMIZE DWM ON FEDORA So at work I'm using a Macbook, but OS X has increasingly interfered with my development routine. The last drop that tipped the glass was no native support for Docker in OS X, obviously. Hence I'm moving to using a Linux VM in VMware. I chose Fedora, because that's what Linus uses. Just kidding. I wanted to learn a Red Hat based distro this time, since Debian and Arch are already familiar to me. GEMS FROM THE MAN PAGE TRENCHES Gems from the man page trenches. I’m a big fan of UNIX man pages 1.They are almost without exception well-written and concise, and the intuition you gain for particular topics as you browse through the man pages is well worth the effort. THE BOOK THAT LEFT ME EMPTY INSIDE My roommate has long been suggesting me to read Ishmael by Daniel Quinn, a sort of philosophical book on human nature and how we, as a society, got here. It's probably not the first one of such books. The story is not a conventional one. The book starts by introducing the protagonist, a writer whose identity is left mostly unknown. He is seeking a 'teacher' and stumbles on an advert in aPRIVACY NOTICE
Yet Another Hacker Blog (YAHB). UNIX, Networking, Self-Improvement. /home /about /links /pgpPOSTS
*
Oct 16, 2018
PAPER STORAGE AND RECOVERY OF GPG KEYS*
Jul 5, 2017
LET'S CODE A TCP/IP STACK, 5: TCP RETRANSMISSION*
Dec 6, 2016
LET'S CODE A TCP/IP STACK, 4: TCP DATA FLOW & SOCKET API*
Jun 26, 2016
CONFIGURING ARCH LINUX ON DELL XPS 15*
Jun 24, 2016
INSTALLING ARCH LINUX ON DELL XPS 15*
May 15, 2016
LET'S CODE A TCP/IP STACK, 3: TCP BASICS & HANDSHAKE*
Apr 24, 2016
LET'S CODE A TCP/IP STACK, 2: IPV4 & ICMPV4*
Mar 6, 2016
LET'S CODE A TCP/IP STACK, 1: ETHERNET & ARP*
Feb 20, 2016
OPENVPN PUTS PACKETS INSIDE YOUR PACKETS*
Jan 24, 2016
ESTABLISH YOUR ONLINE IDENTITY USING GNUPG*
Jan 17, 2016
GEMS FROM THE MAN PAGE TRENCHES*
Dec 25, 2015
CUSTOMIZE DWM ON FEDORA*
Dec 7, 2015
AUTOMATE ALL THE CAMERA PHOTO UPLOADS, PART I*
Aug 13, 2015
THE BOOK THAT LEFT ME EMPTY INSIDE*
Apr 3, 2015
DEBUGGING PXE BOOT WITH QEMU*
Apr 3, 2015
BOOTING ARCH LINUX FROM PXE (RASPBERRY PI)*
Jan 15, 2015
HEY, YOU THERE!
* saminiir's hacker blog * saminiir@gmail.com* Privacy Notice
* GitHub
* RSS
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0