Links
Add
DeepSeek Local: How to Self-Host DeepSeek (Privacy and Control)
https://linuxblog.io/deepseek-local-self-host/
By following this guide, you will be able to successfully self-host your preferred DeepSeek model on a home lab or home office server, harnessing the
Added 1 month ago
netstat without netstat · Staaldraad
https://staaldraad.github.io/2017/12/20/netstat-without-netstat/
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Added 1 month ago
Meteor burns up over Earth in amazing footage from space station
https://www.youtube.com/watch?v=96owQKfp2Bw
NASA astronaut Matthew Dominick, currently aboard the International Space Station, captured footage of a meteor burning up in Earth atmosphere on Sept. 2, 20...
The Evil-Twin Framework: A tool for improving WiFi security | Opensource.co
https://opensource.com/article/19/1/evil-twin-framework
Pen-testing tool aims to protect network access points against a host of threats.
Broken
CS 193P iPhone Application Development
http://www.stanford.edu/class/cs193p/cgi-bin/drupal/
Added 1 month ago
Proxmox lv pve/data activation failed
https://forum.proxmox.com/threads/task-error-activating-lv-pve-data-failed-activation-of-logical-volume-pve-data-is-prohibited-while-logical-volume-pve-data_tdata-is-active.106225/
TASK ERROR: activating LV 'pve/data' failed: Activation of logical volume pve/data is prohibited while logical volume pve/data_tdata is active. | Proxmox Support Forum
Added 1 month ago
Bloom - A free and open source 'Google' (in Rust) - announcements - The Rus
https://users.rust-lang.org/t/bloom-a-free-and-open-source-google-in-rust/28981
Hi rustaceans!
Today is a great day, the achievement of months of work (and also the start of a great adventure :rocket:).
I'm very excited to announce Bloom: A free and Open source ‘Google’.
Our mission? Empowerin…
Added 1 month ago
How to mitigate OWASP vulnerabilities while staying in the flow | The GitHu
https://github.blog/2022-11-04-how-to-mitigate-owasp-vulnerabilities-while-staying-in-the-flow/
Explore how GitHub Advanced Security can help address several of the OWASP Top 10 vulnerabilities
gauge-sh/tach
https://github.com/gauge-sh/tach
A Python tool to visualize + enforce dependencies, using modular architecture 🌎 Open source 🐍 Installable via pip 🔧 Able to be adopted incrementally - ⚡ Implemented with no runtime impact ♾️ Interoperable with your existing systems 🦀 Written in rust - gauge-sh/tach
Added 1 month ago
prowler-cloud/prowler
https://github.com/prowler-cloud/prowler
Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more - prowler-cloud/prowler
Added 1 month ago
Two Turntables and a Microphone
https://goodfuzzysounds.com/ma/docs/funnyversion.htm
Container security best practices: Ultimate guide - Sysdig
https://sysdig.com/blog/container-security-best-practices/
Sticking to container security best practices is critical for successfully delivering secure software.
Added 1 month ago
The CVE program for tracking security flaws is about to lose federal funding
https://www.theverge.com/news/649314/cve-mitre-funding-vulnerabilities-exposures-funding
The federally funded organization behind the Common Vulnerabilities and Exposures (CVE) program confirmed that its contract to support the system will expire on April 16th.
Tog's paradox
https://www.votito.com/methods/togs-paradox/
Tog’s Paradox (also known as The Complexity Paradox or Tog’s ComplexityParadox) is an observation that products aiming to simplify a task for users tend toinspire new, more complex tasks. It’s one of the key reasons for thesymptom of requirements changing after delivery in enterprise softwareproducts, and for feature creep in consumer products. Tog’s Paradox alsoexplains why it’s futile to try to completely nail down requirements for asoftware product, as the product itself will have an impact on the users,causing them to demand new functions.
Find Training | AWS Training & Certification
https://www.aws.training/training/?sc_channel=sm&sc_campaign=Launch_Campaign&sc_publisher=TWITTER&sc_country=Global&sc_geo=EMEA&sc_outcome=adoption&trk=_TWITTER&sc_content=AWSTrainCert&linkId=46714283
Taika Waititi to take on new Judge Dredd movie | Taika Waititi | The Guardian
https://www.theguardian.com/film/2025/jul/17/taika-waititi-judge-dredd-movie
Oscar-winning writer-director, known for Jojo Rabbit and Thor sequels, attached to new take on comic book character
How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack
https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/
Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.
Added 1 month ago
https://aws.amazon.com/blogs/security/aws-single-sign-on-now-enables-command-line-interface-access-for-aws-accounts-using-corporate-credentials/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_sso&linkId=50708343
https://aws.amazon.com/blogs/security/aws-single-sign-on-now-enables-command-line-interface-access-for-aws-accounts-using-corporate-credentials/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_sso&linkId=50708343
May 23, 2022: This blog post is out of date. Please refer here for current info: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS made it easier to use […]
Added 1 month ago
Massive Satori botnet emerges - Security - CRN Australia
https://www.crn.com.au/news/massive-satori-botnet-emerges-479522
Added 1 month ago
Show HN: Restfox – Open source lightweight alternative to Postman
https://restfox.dev
A REST client for the Web
Added 1 month ago
The Big List of Engineering Management Resources – March 2022
https://practicallyleading.dev/the-big-list-of-engineering-management-resources-march-2022
My Inspirations
Now as a Director of Engineering at Docker, I’ve been doing some type of engineering leadership for the last decade.
I have learned from the best over the years, and many resources have shaped who I am and philosophies for how I lead....
Added 1 month ago