Are you over 18 and want to see adult content?
More Annotations
A complete backup of memphismusichalloffame.com
Are you over 18 and want to see adult content?
A complete backup of grunwaldzka12.pl
Are you over 18 and want to see adult content?
A complete backup of alwaysbeready.com
Are you over 18 and want to see adult content?
A complete backup of morningpicker.com
Are you over 18 and want to see adult content?
A complete backup of globalminingreview.com
Are you over 18 and want to see adult content?
A complete backup of anti-insects.com
Are you over 18 and want to see adult content?
A complete backup of grapevinelogic.com
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of https://lcdsoundsystem.com
Are you over 18 and want to see adult content?
A complete backup of https://skilletfood.com
Are you over 18 and want to see adult content?
A complete backup of https://fibesushellfesmu.tk
Are you over 18 and want to see adult content?
A complete backup of https://staryolsa.com
Are you over 18 and want to see adult content?
A complete backup of https://oneofakindshow.com
Are you over 18 and want to see adult content?
A complete backup of https://nchousing.org
Are you over 18 and want to see adult content?
A complete backup of https://stephenporges.com
Are you over 18 and want to see adult content?
A complete backup of https://pet.reviews
Are you over 18 and want to see adult content?
A complete backup of https://brasildefatomg.com.br
Are you over 18 and want to see adult content?
A complete backup of https://trueblue-login.com.au
Are you over 18 and want to see adult content?
A complete backup of https://littlevillagemag.com
Are you over 18 and want to see adult content?
A complete backup of https://emrojapan.com
Are you over 18 and want to see adult content?
Text
WXCAFÉ
Security for the savvy leftist, Part Ⅰ: OpSec. Introduction This is the first in a series of post trying to give a few pointers and share a bit of knowledge on securing your online Posted by POCKETBOOK DISSASSEMBLY AND ROOT So uh a few years (! time flies) back I wanted to get an ereader to (e-read?) read books for cheap and not carry a suitcase of paperbacks whenever I traveled (plus a lot of other advantages. I like ebooks, they’re tiny, convenient and disposable. There are lots of books I prefer reading on paper, but I can’t deny ebooks are neat sometimes. POC||GTFO; NOW ON A NEW MIRROR NEAR YOU THANKS …TRANSLATE THIS PAGE Le titre dit a peu près tout : j’ai récemment commencé a lire les PoC||GTFO (Proof of Concept OR Get The Fuck Out), dont j’avais entendu parler depuis quelques années mais pour lesquels je n’avais jamais réussi jusqu’ici à prendre du temps pour les lire. MONTER SON PROPRE SERVEUR, PARTIE 1: LE SERVEUR ET …TRANSLATE THISPAGE
Cela vous permet de rediriger tout le trafic se référant a votre nom de domaine vers votre ip (le fonctionnement exact du DNS est assez compliqué a expliquer, donc on va dire que c’est de la magie pour l’instant, ca sera peut être le sujet d’un autre article), et d’indiquer que les mails @votre-nom-de-domai.ne doivent aussi être redirigés vers votre serveur, ce qui est un bon début. LE CHIFFREMENT DE PARTITIONS AVEC DM-CRYPT ET DEVICE …TRANSLATE THISPAGE
Le chiffrement en tant que concept informatique est traditionnellement associé au chiffrement de fichiers, c’est a dire au fait de passer d’un fichier en clair a un fichier chiffré dit cyphertext.Cependant, il ne se limite pas a ça, et peut aussi servir a garantir l’intégrité d’un système d’exploitation, ou bien la confidentialité d’un support de stockage, par exemple. OPENWRT, L'USBNET, ET L'HISTOIRE DES 4MO Une fois que c’est fait, ça devrait mieux marcher (et ça sauve un peu d’espace) Bon. Le fichier de config est là, l’image finale est là, et j’ai une petite surprise. Bien sûr, le switch situé sur le côté du TL-MR12U ne fonctionne pas sous OpenWRT de base, parce que c’est un truc lié au hardware et que du coup c’est assez compliqué à gérer sur une base de matos aussi OPENSMTPD COMME SERVEUR MAIL SOUS DEBIAN OpenSMTPd comme serveur mail sous debian. J’avais dit il y a un certain temps que j’allais écrire un tutoriel expliquant comment gérer ses mails soi-même. Il se trouve que j’ai récemment décidé de changer le serveur qui héberge (entre autres) ce blog, et que ce dernier héberge aussi mes emails. J’ai donc totalementchangé d
LES NUCS ET LE HDMI-CECTRANSLATE THIS PAGE J’ai récemment récupéré une télé. Ce post ne se centrant pas sur cette télé, passons rapidement sur ce qui y est lié : ne souhaitant pas “profiter” du paysage audiovisuel français (ou PAF), et ayant nombre de films et séries acquis tout a fait légalement (hmm hmm) stockés sur mon serveur local, je souhaitais brancher sur ma télévision un système me permettant de regarder MUTT OU LE CLIENT EMAIL LE MEILLEUR MOINS MAUVAISTRANSLATE THIS PAGE Les clients mails ont une particularité en commun : ils sont tous très mauvais. Cela pour nombre de raisons, mais la principale reste que leurs interfaces/raccourcis claviers ne sont pas efficaces pour une utilisation a la UNIX Cependant, un d’entre eux se démarque par sa moins-mauvais-itude, c’est le relativement bien connu OutlookExpress 2003 Mutt!
PROJET RCPW04
1 Sources Partie Source Type Parution Auteur 1.2, 1.3, 1.4 Réseaux Livre 2010 Tennenbaum, Wetherall 1.3 DHCP Failover on OpenBSD Article2007 Will Backman
WXCAFÉ
Security for the savvy leftist, Part Ⅰ: OpSec. Introduction This is the first in a series of post trying to give a few pointers and share a bit of knowledge on securing your online Posted by POCKETBOOK DISSASSEMBLY AND ROOT So uh a few years (! time flies) back I wanted to get an ereader to (e-read?) read books for cheap and not carry a suitcase of paperbacks whenever I traveled (plus a lot of other advantages. I like ebooks, they’re tiny, convenient and disposable. There are lots of books I prefer reading on paper, but I can’t deny ebooks are neat sometimes. POC||GTFO; NOW ON A NEW MIRROR NEAR YOU THANKS …TRANSLATE THIS PAGE Le titre dit a peu près tout : j’ai récemment commencé a lire les PoC||GTFO (Proof of Concept OR Get The Fuck Out), dont j’avais entendu parler depuis quelques années mais pour lesquels je n’avais jamais réussi jusqu’ici à prendre du temps pour les lire. MONTER SON PROPRE SERVEUR, PARTIE 1: LE SERVEUR ET …TRANSLATE THISPAGE
Cela vous permet de rediriger tout le trafic se référant a votre nom de domaine vers votre ip (le fonctionnement exact du DNS est assez compliqué a expliquer, donc on va dire que c’est de la magie pour l’instant, ca sera peut être le sujet d’un autre article), et d’indiquer que les mails @votre-nom-de-domai.ne doivent aussi être redirigés vers votre serveur, ce qui est un bon début. LE CHIFFREMENT DE PARTITIONS AVEC DM-CRYPT ET DEVICE …TRANSLATE THISPAGE
Le chiffrement en tant que concept informatique est traditionnellement associé au chiffrement de fichiers, c’est a dire au fait de passer d’un fichier en clair a un fichier chiffré dit cyphertext.Cependant, il ne se limite pas a ça, et peut aussi servir a garantir l’intégrité d’un système d’exploitation, ou bien la confidentialité d’un support de stockage, par exemple. OPENWRT, L'USBNET, ET L'HISTOIRE DES 4MO Une fois que c’est fait, ça devrait mieux marcher (et ça sauve un peu d’espace) Bon. Le fichier de config est là, l’image finale est là, et j’ai une petite surprise. Bien sûr, le switch situé sur le côté du TL-MR12U ne fonctionne pas sous OpenWRT de base, parce que c’est un truc lié au hardware et que du coup c’est assez compliqué à gérer sur une base de matos aussi OPENSMTPD COMME SERVEUR MAIL SOUS DEBIAN OpenSMTPd comme serveur mail sous debian. J’avais dit il y a un certain temps que j’allais écrire un tutoriel expliquant comment gérer ses mails soi-même. Il se trouve que j’ai récemment décidé de changer le serveur qui héberge (entre autres) ce blog, et que ce dernier héberge aussi mes emails. J’ai donc totalementchangé d
LES NUCS ET LE HDMI-CECTRANSLATE THIS PAGE J’ai récemment récupéré une télé. Ce post ne se centrant pas sur cette télé, passons rapidement sur ce qui y est lié : ne souhaitant pas “profiter” du paysage audiovisuel français (ou PAF), et ayant nombre de films et séries acquis tout a fait légalement (hmm hmm) stockés sur mon serveur local, je souhaitais brancher sur ma télévision un système me permettant de regarder MUTT OU LE CLIENT EMAIL LE MEILLEUR MOINS MAUVAISTRANSLATE THIS PAGE Les clients mails ont une particularité en commun : ils sont tous très mauvais. Cela pour nombre de raisons, mais la principale reste que leurs interfaces/raccourcis claviers ne sont pas efficaces pour une utilisation a la UNIX Cependant, un d’entre eux se démarque par sa moins-mauvais-itude, c’est le relativement bien connu OutlookExpress 2003 Mutt!
PROJET RCPW04
1 Sources Partie Source Type Parution Auteur 1.2, 1.3, 1.4 Réseaux Livre 2010 Tennenbaum, Wetherall 1.3 DHCP Failover on OpenBSD Article2007 Will Backman
YUBIKEY FOR EVERYTHING The default PINs are 123456 for the user PIN and 12345678 for the admin PIN.. Do take caution to export the private keys for safekeeping BEFORE moving them to the yubikey (the gpg keytocard command MOVES the keys, after you’ve run it you don’t have the private keys available anymore to backup) (backups are easily done with gpg --armor --export-secret-keys > out.asc and gpg - 2FA SSH ON LINUX, AND DEPLOYING IT VIA PUPPET Yeah, I know, this is pretty generic. It was a bit harder for me because I use a git repo for my dotfiles, and as such I have a git block and an exec block to chmod 600 the .google_authenticator file, and I had a bit of trouble trying to use a file block inside another file block (setting the mode of the file inside dotfiles git repo) (if you’re wondering, puppet simply ignores the least JUNE 1998 VOLUME 1, NUMBER 1 The Internet Protocol Journal 2 What Is a VPN? — Part I by Paul Ferguson, Cisco Systems and Geoff Huston, Telstra he term “VPN,” or Virtual Private NetworkSDN ARCHITECTURE
The Internet Protocol Journal 3 Another factor leading to the need for rapid response in allocat-ing network resources is the increasing use by employees of mobile JUNE 2001 VOLUME 4, NUMBER 2 The Internet Protocol Journal 2 Mobile IP by William Stallings n response to the increasing popularity of palm-top and other mo-bile computers, Mobile IP was developed to enable computers to MARCH 2011 VOLUME 14, NUMBER 1 The Internet Protocol Journal 2 A Rough Guide to Address Exhaustion by Geoff Huston, APNIC T he level of interest in IPv4 address exhaustionseems to be
SEPTEMBER 2005 VOLUME 8, NUMBER 3 IPv4 Address Space Consumption: continued The Internet Protocol Journal 4 Figure 3: IANA Allocations to RIRs — Sliding-Window 24-Month Average Taken by MARCH 2001 VOLUME 4, NUMBER 1 The BGP Routing Table: continued The Internet Protocol Journal 4 Figure 2: BGP Table Growth 1988–1994 CIDR Deployment The response from the engineering community was the introduction of JUNE 2002 VOLUME 5, NUMBER 2 BEEP: continued The Internet Protocol Journal 4 First, you decide that your protocol needs ordered, reliable delivery. This is a common requirement for most application protocols, includ- IN THIS ISSUE NETWORK ADDRESS TRANSLATORS The Internet Protocol Journal 2 Anatomy: A Look Inside Network Address Translators by Geoff Huston, APNIC ver the past decade numerous IP-related technologies haveWXCAFÉ
Security for the savvy leftist, Part Ⅰ: OpSec Introduction This is the first in a series of post trying to give a few pointers and share a bit of knowledge on securing your online USING TRACEROUTE/MTR, OR: DIAGNOSING NETWORK PROBLEMS 101 I was a in a twitter discussion recently about Traceroute, and how it was not necessarily as simple as it seemed, and that it caused a lot of confusion on the user side and a lot of frustration on the network admin side.So I decided to write this little guide on how traceroute and mtr work, how to use it, and how to read the tea leaves interpretthe output.
36C3 TALKS - WXCAFÉ 36c3 Infrastructure Review ⭐⭐⭐⭐. Like each year, the infrastructure review talks about how congress works and the people who make it work. I love watching these, I loved being an Angel when I was there, and I really like learning about the parts of organizing I didn’t know about. YUBIKEY FOR EVERYTHING The default PINs are 123456 for the user PIN and 12345678 for the admin PIN.. Do take caution to export the private keys for safekeeping BEFORE moving them to the yubikey (the gpg keytocard command MOVES the keys, after you’ve run it you don’t have the private keys available anymore to backup) (backups are easily done with gpg --armor --export-secret-keys > out.asc and gpg - POCKETBOOK DISSASSEMBLY AND ROOT So uh a few years (! time flies) back I wanted to get an ereader to (e-read?) read books for cheap and not carry a suitcase of paperbacks whenever I traveled (plus a lot of other advantages. I like ebooks, they’re tiny, convenient and disposable. There are lots of books I prefer reading on paper, but I can’t deny ebooks are neat sometimes.MY KEYBOARD.IO
My Keyboard.io. Over a year ago now I bought a keyboard, and I wanted to write about it then, but I figured I’d wait until I could type on it correctly and actually tell if it was a good keyboard.. Turns out, it took me about three weeks to learn how to type correctly, and it’s a really, really good keyboard but I forgot about writing this🤦 So here we go.
WHEN A TOY ISN'T A TOY ANYMORE Let’s say, for the sake of argument, that there’s this guy named Nick. Nick is a nice person. He’s friends with a lot of queer people. Maybe he doesn’t always get everything about Socialism or Communism but he agrees that the world is unfair, and that aSDN ARCHITECTURE
The Internet Protocol Journal 3 Another factor leading to the need for rapid response in allocat-ing network resources is the increasing use by employees of mobile DECEMBER 1998 VOLUME 1, NUMBER 3 The New SNMPv3 Proposed Internet Standards: continued The Internet Protocol Journal 6 The topmost layer is the PDU processing layer. Atthis layer, manage-
WXCAFÉ
Every git commit has an id like 3f29abcd233fa, also called 82#*+ DEFD #(!#7& +,5,+& $2 $", ),.26, G)2&*&A()2 H)),$ 6,7 + #*& 3!0' %5) $!5 8#0 I/&$ 5+&)2&.(*+) C AAJWXCAFÉ
Security for the savvy leftist, Part Ⅰ: OpSec Introduction This is the first in a series of post trying to give a few pointers and share a bit of knowledge on securing your online USING TRACEROUTE/MTR, OR: DIAGNOSING NETWORK PROBLEMS 101 I was a in a twitter discussion recently about Traceroute, and how it was not necessarily as simple as it seemed, and that it caused a lot of confusion on the user side and a lot of frustration on the network admin side.So I decided to write this little guide on how traceroute and mtr work, how to use it, and how to read the tea leaves interpretthe output.
36C3 TALKS - WXCAFÉ 36c3 Infrastructure Review ⭐⭐⭐⭐. Like each year, the infrastructure review talks about how congress works and the people who make it work. I love watching these, I loved being an Angel when I was there, and I really like learning about the parts of organizing I didn’t know about. YUBIKEY FOR EVERYTHING The default PINs are 123456 for the user PIN and 12345678 for the admin PIN.. Do take caution to export the private keys for safekeeping BEFORE moving them to the yubikey (the gpg keytocard command MOVES the keys, after you’ve run it you don’t have the private keys available anymore to backup) (backups are easily done with gpg --armor --export-secret-keys > out.asc and gpg - POCKETBOOK DISSASSEMBLY AND ROOT So uh a few years (! time flies) back I wanted to get an ereader to (e-read?) read books for cheap and not carry a suitcase of paperbacks whenever I traveled (plus a lot of other advantages. I like ebooks, they’re tiny, convenient and disposable. There are lots of books I prefer reading on paper, but I can’t deny ebooks are neat sometimes.MY KEYBOARD.IO
My Keyboard.io. Over a year ago now I bought a keyboard, and I wanted to write about it then, but I figured I’d wait until I could type on it correctly and actually tell if it was a good keyboard.. Turns out, it took me about three weeks to learn how to type correctly, and it’s a really, really good keyboard but I forgot about writing this🤦 So here we go.
WHEN A TOY ISN'T A TOY ANYMORE Let’s say, for the sake of argument, that there’s this guy named Nick. Nick is a nice person. He’s friends with a lot of queer people. Maybe he doesn’t always get everything about Socialism or Communism but he agrees that the world is unfair, and that aSDN ARCHITECTURE
The Internet Protocol Journal 3 Another factor leading to the need for rapid response in allocat-ing network resources is the increasing use by employees of mobile DECEMBER 1998 VOLUME 1, NUMBER 3 The New SNMPv3 Proposed Internet Standards: continued The Internet Protocol Journal 6 The topmost layer is the PDU processing layer. Atthis layer, manage-
WXCAFÉ
Every git commit has an id like 3f29abcd233fa, also called 82#*+ DEFD #(!#7& +,5,+& $2 $", ),.26, G)2&*&A()2 H)),$ 6,7 + #*& 3!0' %5) $!5 8#0 I/&$ 5+&)2&.(*+) C AAJMY KEYBOARD.IO
My Keyboard.io. Over a year ago now I bought a keyboard, and I wanted to write about it then, but I figured I’d wait until I could type on it correctly and actually tell if it was a good keyboard.. Turns out, it took me about three weeks to learn how to type correctly, and it’s a really, really good keyboard but I forgot about writing this🤦 So here we go.
BUILD - WXCAFE.NET
“Embrace diversity. Unite— or be divided, robbed, ruled, killed by those who see you as prey. Embrace diversity or be destroyed. There isno end
WHEN A TOY ISN'T A TOY ANYMORE Let’s say, for the sake of argument, that there’s this guy named Nick. Nick is a nice person. He’s friends with a lot of queer people. Maybe he doesn’t always get everything about Socialism or Communism but he agrees that the world is unfair, and that a THE ATTORNEY GENERAL'S G URN ELINES ON FEDERAL BUREAU … vi. monitoring and control ~-~- of -- undercover ---operations 17preparation of undercover employees, informants, and cooperating witnesses .17 a. b. review of conduct. ..17IN THIS ISSUE
The Internet Protocol Journal 3 What Is an Autonomous System? One of the best definitions of an Autonomous System can be found in an IETF document, RFC 4271 that describes BGPv4: “The classic definition of an Autonomous System is a set of routers un- IP MULTI-ADRESSING AND MULTIPATH TCP The Internet Protocol Journal 2 IP Multi-Adressing and Multipath TCP by Geoff Huston, APNIC T he Transmission Control Protocol (TCP) is a core protocol of theFROM THE EDITOR
The Internet Protocol Journal 4 • Mail Delivery Agent (MDA): The MDA is responsible for transfer - ring the message from the MHS to the Message Store (MS). • Message Store (MS): An MUA can employ a long-term MS. An MS can be located on a remote server or on the samemachine as the
IN THIS ISSUE
The Internet Protocol Journal 2 Network Processors: Programmable Technology for Building Network Systems by Douglas Comer, Cisco Systems (on leave from Purdue University) IN THIS ISSUE NETWORK ADDRESS TRANSLATORS The Internet Protocol Journal 2 Anatomy: A Look Inside Network Address Translators by Geoff Huston, APNIC ver the past decade numerous IP-related technologies have JUNE 2002 VOLUME 5, NUMBER 2 BEEP: continued The Internet Protocol Journal 4 First, you decide that your protocol needs ordered, reliable delivery. This is a common requirement for most application protocols, includ- Toggle navigation WxcaféWXCAFÉ
SECURITY FOR THE SAVVY LEFTIST, PART Ⅰ: OPSEC Introduction This is the first in a series of post trying to give a few pointers and share a bit of knowledge on securing your online... Posted by Wxcafé on Thu 14 May 202036C3 TALKS
So a bit over a month ago, like every year, hackers gathered in Leipzig, Germany for the Chaos Communication Congress. This year,like...
Posted by Wxcafé on Sun 02 February2020
USING TRACEROUTE/MTR, OR: DIAGNOSING NETWORK PROBLEMS 101 I was a in a twitter discussion recently about Traceroute, and how it was not necessarily as simple as it seemed, and that it caused a... Posted by Wxcafé on Fri 13 December2019
MY KEYBOARD.IO
My Keyboard.io Over a year ago now I bought a keyboard, and I wanted to write about it then, but I figured I’d wait until I could type... Posted by Wxcafe on Fri 19 July 2019‼️CON
So, this past weekend I was at ‼️con (pronounced bang bang con), a conference in NYC about “The joy, excitement, and surprise of... Posted by Wxcafé on Mon 13 May 2019 WHEN A TOY ISN'T A TOY ANYMORE Let’s say, for the sake of argument, that there’s this guy named Nick. Nick is a nice person. He’s friends with a lot of queerpeople....
Posted by Wxcafé on Sun 28 April2019
MOVING TO TH̶E̶ ̶U̶S̶ ̶NEW YORK So, uh, yeah. Even though it might not have been evident if you extrapolated my sleep cycle from my twitter activity, I’ve alwayslived...
Posted by Wxcafé on Mon 04 February2019
YUBIKEY FOR EVERYTHING EDIT: Update 07/07/2018, added SSH_AUTH_SOCK information, a few pointers about key generation and backup, and info about gpg-agent’sbad...
Posted by Wxcafé on Sat 07 July2018
(NEO)MUTT FUCKERY WITH MULTIPART MESSAGES I’ve been using Mutt, and then Neomutt, as an email client on my laptops for a while (I generally use Evolution on my desktop,because...
Posted by Wxcafé on Tue 03 July2018
POC||GTFO 0X18
So PoC||GTFO 0x18 was released in PDF today. Contrary to issue 0x17, and like all previous issues, I wasn’t able to get it in paper... Posted by Wxcafé on Mon 25 June2018
-------------------------* Older Posts →
Page 1 / 5
------------------------- -------------------------* __ __
* __ __
* __ __
* __ __
* __ __
* __ __
* __ __
Blog powered by Pelican , which takes great advantage of Python . Theme is based on Pelican Clean Blog Fonts by Velvetyne Type FoundryDetails
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0