wizardishungry + network   87

OpenChirp
OpenChirp is currently powering a LoRaWAN Network at Carnegie Mellon University that also spans large portions of the City of Pittsburgh
lorawan  lora  open  community  network 
10 weeks ago by WIZARDISHUNGRY
‎WiFi Map - Get Free Internet on the App Store
There's an app called "WiFi Map". The largest database of WiFi networks and passwords I know. And it can work offline, if you pre-load specific area you're interested in. Never disappointed me in my trips. Oh, and it has not only airports, but every possible WiFi network. Some people even give access to their home WiFi.
wifi  network  password  ios 
11 weeks ago by WIZARDISHUNGRY
Hping - Active Network Security Tool
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
tools  security  networking  network  linux 
march 2018 by WIZARDISHUNGRY
Transparent Access to Tor Hidden Services
The idea is that if you want an application to connect to a service through Tor (including hidden services), then you should configure it to connect via that SOCKS proxy (if the application has such a setting). I have a Debian GNU/Linux (Jessie) machine at the edge of my network, which sits between the Internet and my LAN. It handles DHCP, DNS and NAT amongst other things. I have configured that machine to intercept connections to .onion hostnames and then redirect them through Tor.
tor  network  tools 
march 2016 by WIZARDISHUNGRY
ssldump home page
ssldump is an SSLv3/TLS network protocol analyzer. It identifies TCP connections on the chosen network interface and attempts to interpret them as SSLv3/TLS traffic. When it identifies SSLv3/TLS traffic, it decodes the records and displays them in a textual form to stdout. If provided with the appropriate keying material, it will also decrypt the connections and display the application data traffic.
ssl  security  network  networking  crypto 
march 2014 by WIZARDISHUNGRY
socat
socat can be used, e.g., as TCP port forwarder (one-shot or daemon), as an
external socksifier, for attacking weak firewalls, as a shell interface to UNIX
sockets, IP6 relay, for redirecting TCP oriented programs to a serial line, to
logically connect serial lines on different computers, or to establish a
relatively secure environment (su and chroot) for running client or server
shell scripts with network connections.
unix  tools  networking  network  linux 
june 2013 by WIZARDISHUNGRY
Sidestep | Chetan Surpur
When Sidestep detects you connecting to an unprotected wireless network, it automatically encrypts all of your Internet traffic and reroutes it through a secure connection to a server of your choosing, which acts as your Internet proxy. And it does all this in the background so that you don’t even notice it.
osx  menubar  network  wifi  ssh  secure  free  firesheep  encryption  proxy  public 
november 2010 by WIZARDISHUNGRY
Lifehacker - How to Crack a Wi-Fi Network's WEP Password with BackTrack - wep
A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.
wep  wardriving  lifehacker  linux  security  computers  network  tutorial  tech  wifi  wireless 
july 2009 by WIZARDISHUNGRY
The Dan Kaminskybox.
Soundboard of Dan Kaminsky, DNS researcher o_O
soundboard  dns  wtf  network  humor 
august 2008 by WIZARDISHUNGRY
prrt Merit Software Repository
Prtt is a program to passively monitor network latency in real time.
pcap  network  utility  merit  software  unix  linux  latency  tool 
august 2008 by WIZARDISHUNGRY
macosxhints.com - 10.4: Change the default sshd port
seems to be an issue reading the host keys with the approach in the comments section
ssh  osx  sysadmin  port  network  leopard  config  howto 
june 2008 by WIZARDISHUNGRY
prevent ds store creation on networked volumes
defaults write com.apple.desktopservices DSDontWriteNetworkStores true
ds_store  osx  network  smb  cifs  sysadmin  optimize  finder  macosx 
january 2008 by WIZARDISHUNGRY
Flame: cast light on your network
Just start Flame to see all the computers on the network that are advertising services. (If it can, it'll identify the user of each computer instead of giving you the machine's name.) Disclose the services available from each. You can even delve right int
mac  osx  rendezvous  tools  bonjour  network  software  zeroconf 
october 2007 by WIZARDISHUNGRY
jerith.za.net: Socket programming in Erlang
do_echo(Socket) -> case gen_tcp:recv(Socket, 0) of {ok, Data} -> gen_tcp:send(Socket, Data), do_echo(Socket); {error, closed} -> ok end.
article  chat  code  dev  development  erlang  example  framework  network  server  networking  sockets  socket  programming  tutorial 
september 2007 by WIZARDISHUNGRY
56K Modem Emulator
I am going to do this next time I am talking to some tech support drone
internet  funny  audio  modem  fun  humor  network  history 
july 2007 by WIZARDISHUNGRY
Reminder: Update Your Home Network Diagrams at Amy Stephen
New year means new diagrams of stuff; if only I was cool enough to have more than one computer again... :(
visualization  diagram  networking  home  visio  network 
january 2007 by WIZARDISHUNGRY
SSH Proxy Command -- connect.c
allows relaying ssh connections through all kinds of proxies; includes proxy auto detect script
ssh  network  tool  unix  useful  cygwin  openssh  firewall  socks  networking  security  connect 
january 2007 by WIZARDISHUNGRY
Dunbar's number - Wikipedia, the free encyclopedia
Dunbar's number is a value significant in sociology and anthropology. Proposed by British anthropologist Robin Dunbar, it measures the "cognitive limit to the number of individuals with whom any one person can maintain stable relationships". Dunbar theori
anthropology  cognition  evolution  network  people  psychology  social  sociology  wikipedia  wiki 
september 2006 by WIZARDISHUNGRY
Dunbar's number - Wikipedia, the free encyclopedia
Dunbar's number is a value significant in sociology and anthropology. Proposed by British anthropologist Robin Dunbar, it measures the "cognitive limit to the number of individuals with whom any one person can maintain stable relationships". Dunbar theori
anthropology  cognition  evolution  network  people  psychology  social  sociology  wikipedia  wiki 
september 2006 by WIZARDISHUNGRY
Scapy
interactive packet manipulation program. It is able to forge or decode packets of many protocols, send them, capture them, match requests and replies, and handle most tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery
analysis  computer  crack  debugging  dev  development  firewall  freeware  geek  hack  hacking  howto  internet  ip  network  networking  opensource  programming  python  read_later  research  security  software  sysadmin  technology  tips  tool  tools  tutorial  unix  visualization  wireless  packet 
september 2006 by WIZARDISHUNGRY
Hamachi : Stay Connected
Hamachi is a zero-configuration virtual private networking application with an open security architecture and NAT-to-NAT traversal capabilities.
api  apple  applescript  applications  apps  blogs  business  code  computer  control  cool  crypto  css  del.icio.us  design  desktop  firewall  free  freeware  game  games  gaming  hacking  hardware  home  howto  internet  irc  itunes  linux  music  neat  network  networking  news  osx  p2p  privacy  programming  proxy  reference  security  service  social  software  storage  sysadmin  technology  tool  tools  unix  useful  utility  vpn  web  webdesign  webdev  win32  windows  work  zeroconf  zip 
june 2006 by WIZARDISHUNGRY
UW NetIDs
Windows 2000 or later supports kerberos authentication. It even supports interoperability between non-Microsoft key distribution centers (KDCs). Your standalone Windows workstation can authenticate to an existing non-Microsoft kerberos realm, or you can m
kerberos  windows  authentication  network  interesting  howto  interoperability 
march 2006 by WIZARDISHUNGRY
« earlier      
per page:    204080120160

related tags

activism  admin  aim  airport  ajax  amazing  analysis  analytics  animation  anonymity  anonymous  anthropology  antispam  aol  api  apple  applescript  applications  apps  architecture  archive  art  article  artists  as  asn  audio  authentication  automation  backup  backups  bandwidth  benchmark  bgp  blog  blogs  blue  bluetooth  bonjour  book  broadcasting  browser  bug  business  cellphone  change  chart  charts  chat  china  chinese  cidr  cifs  clone  cocoa  code  cognition  commerical  community  computer  computers  conference  config  connect  console  control  cooking  cool  cpan  cpu  crack  creative  creepy  crush  crypto  css  culture  curl  cygwin  data  database  debian  debugging  del.icio.us  delicious  design  desktop  dev  development  diagram  diagrams  distributed  dns  documentation  domain  domains  drawing  ds_store  earthlink  encryption  english  erlang  events  evolution  example  excel  experimental  finder  firesheep  firewall  flash  flickr  folklore  food  formyjob  framework  free  freeware  friends  fun  funny  game  games  gaming  geek  generator  geography  geospoofing  gif  glibc  google  graph  graphic  graphics  gratis  growl  hack  hacker  hacking  hacks  hardware  hijack  history  home  homebrew  hosting  howto  http  humor  ichat  illustration  IM  image  imported  information  inspiration  install  interesting  internet  interoperability  ios  ip  ipv4  ipv6  irc  itunes  java  javascript  kerberos  language  latency  leopard  lifehacker  lifehacks  links  linkstation  linksys  linux  list  lists  logging  lookup  lora  lorawan  love  mac  macos  macosx  management  map  mapping  maps  mashup  menubar  merit  mesh  microsoft  mobile  modem  module  monitor  monitoring  mrtg  multicast  music  nanog  nas  nastynets  neat  net.art  netart  network  networking  networksecurity  neural  news  numbers  numerology  nyc  object  office  office2.0  open  openbsd  opensource  openssh  optimize  osc  osx  p2p  packet  password  pcap  people  performance  perl  pf  photos  physics  pi  pickaproxy  pki  podcast  port  powerpoint  presentation  privacy  productivity  programming  prototype  proxies  proxy  proxyseguridad  psp  psychology  public  python  read_later  recipe  recipes  reference  rendezvous  replacement  report  research  reverse  reverseip  romance  router  routing  scanner  scripting  search  secure  security  seo  server  servers  service  sharing  smb  sniff  snmp  social  SocialSoftware  sociology  socket  sockets  socks  software  soundboard  spam  ssh  ssh.fi  ssl  stalking  statistics  stats  status  storage  support  sysadmin  syslog  system  tagging  tcp  tcpdump  tech  technology  test  text  timemachine  tips  tld  todo  tool  tools  tor  toread  traffic  tunnel  tutorial  twitter  typosquatting  ubuntu  ui  unicode  unix  upnp  useful  utilities  utility  vector  via:britta  visio  visualization  vnc  vpn  wardriving  web  web2.0  webdesign  webdev  webhosting  webservice  website  wep  whois  wifi  wiki  wikipedia  win32  windows  wireless  work  writing  wrt54g  wtf  yslow  yui  zeroconf  zip 

Copy this bookmark:



description:


tags: