Karl

519 Added | 13 Magazines | 99 Likes | 4 Following | 7 Followers | @Karlgb | Information Overload

PowerShell Hardware Inventory Script

Scenario:<p>PowerShell hardware Inventory Script.<p>Have you ever wanted to have an inventory without the hassle of going to each finding the information …

Linux

Please Stop Using Local Storage

Seriously. Just stop it already.<p>I don't know what it is, exactly, that drives so many developers to store session information in local storage, but …

JavaScript

How To: Use Kismet to Watch Wi-Fi User Activity Through Walls

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a …

Wi-Fi

Doh!!! The 10 Most Overlooked Security Tasks

Here's a list of gotchas that often slip past overburdened security pros.<p>1 of 11<p><i>Image Source: Shutterstock via VGStockstudio</i><p>Security pros are under …

Analyzing the Linux boot process

The oldest joke in open source software is the statement that "the code is self-documenting." Experience shows that reading the source is akin to …

Linux

My Visual Studio Code Setup

Also available on my blog at https://vscode.iamdeveloper.com.<p>This originally was just a gist, but I thought it made sense to just convert it to a …

How to Take Your Own Self and Family Portraits

“We receive so many comments that say something along the lines of, ‘I take great portraits of my friends, but they never take any great portraits of …

How To: Log into Your Raspberry Pi Using a USB-to-TTL Serial Cable

Connecting to your headless Raspberry Pi on the go typically requires a network connection or carrying around bulky peripheral hardware like a screen …

How to View Colored Man Pages in Linux

In Unix-like operating systems, a man page (in full manual page) is a documentation for a terminal-based program/too/utility (commonly known as a …

How to get started with Wireshark plugins, tools, and scripts

Wireshark is the best network packet analyzer, in my opinion. What’s really cool is that it’s FOSS. I wrote a couple of guides for newbies here:<p>This …

12 MySQL/MariaDB Security Best Practices for Linux

<b>MySQL</b> is the world’s most popular open source database system and <b>MariaDB</b> (a fork of MySQL) is the world’s fastest growing open source database …

The Grand Tor: How to Go Anonymous Online

Fifteen years have passed since a couple of MIT grads and a Navy-funded researcher first built The Onion Router, or Tor, a wild experiment in …

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port …

Hands-on: RAW Power for iOS

If you’re a Mac-owning photographer, you probably used—or toyed with, or still stubbornly refuse to give up—Apple’s long-abandoned Aperture …

Data Structures: Python Tutorial

Data structures are a way of organizing and storing data so that they can be accessed and worked with efficiently. Data structures define the …

Docker Swarm: An overview

Docker adoption, especially in large-scale companies is on the rise (up 40% apparently, by one estimation).<p>Since v1.12 onwards, Docker added "Swarm …

Top 15 resources for learning JavaScript

HTML, cascading stylesheets (CSS), and JavaScript have experienced massive growth and evolution over the past two decades, which should come as no …

JavaScript

Sysinternals Sysmon suspicious activity guide

Sysmon tool from Sysinternals provides a comprehensive monitoring about activities in the operating system level. Sysmon is running in the background …

Aperture Priority & Shutter Priority VS. Manual Exposure | Which do Pros Use?

It is a pretty strong stereotype among experienced photographers to always, <i>always, ALWAYS,</i> shoot in manual exposure, and justifiably so! However, …

Aperture

Using sudo to delegate permissions in Linux

I recently wrote a short Bash program to copy MP3 files from a USB thumb drive on one network host to another network host. The files are copied to a …

How to Run Multiple Commands on Multiple Linux Servers

If you are managing multiple Linux servers, and you want to run multiple commands on all the Linux servers, but you have no idea about how to do it. …

450 Free Online Programming & Computer Science Courses You Can Start in December

Six years ago, universities like MIT and Stanford first opened up free online courses to the public. Today, more than 700 schools around the world …

Online Education

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how …

Complete Penetration Testing Tool List for Security Professionals

Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose …

A Shell Script to Send Email Alert When Memory Gets Low

A powerful aspect of Unix/Linux shell programs such as <b>bash</b>, is their amazing support for common programming constructs that enable you to make …

How to Check Integrity of File and Directory Using "AIDE" in Linux

In our mega guide to hardening and securing CentOS 7, under the section “<b>protect system internally</b>”, one of the useful security tools we listed for …

Linux antivirus and anti malware: 8 top tools

Keeping Linux systems safeImage by Linux/ThinkstockBy most estimates, more than 50 percent of web servers on the internet are running some version of …

Linux

Using Docker Machine with KVM and Libvirt

Docker Machine is, in my opinion, a useful and underrated tool. I’ve written before about using Docker Machine with various services/providers; for …

Linux

The One Thing You Definitely Shouldn't Say in a Technical Interview

This holds true even if your software engineering interview is at Google.<p><i>Is it okay to explain to the interviewer how you'd use Google to find an answer? originally appeared on Quora:</i> <i>the place to gain and share knowledge, empowering people to learn from others and better understand the world</i>.<p><b>Answer</b> …

Employment

Error Reporting from your Systemd Automation

Error Reporting from your Systemd Automation<br>Having stuff magically happen in the background is fantastic, but what about when it goes wrong?<p>I’ve been …

Linux