From ad7df0aaeb18ef624e9dc6273ef83542eb0d41ef Mon Sep 17 00:00:00 2001 From: Michael Clemens Date: Tue, 7 Jun 2022 17:01:04 +0200 Subject: [PATCH] formatting changes --- content/links/hamradio.md | 50 ++++++------- content/links/infosec.md | 149 ++++++++++++++++++-------------------- content/links/retro.md | 10 +-- content/links/tech.md | 22 +++--- 4 files changed, 112 insertions(+), 119 deletions(-) diff --git a/content/links/hamradio.md b/content/links/hamradio.md index 9202e42..85a8b7a 100644 --- a/content/links/hamradio.md +++ b/content/links/hamradio.md @@ -6,22 +6,7 @@ showthedate: false --- -# Know-how - * [Funken via analoge Funk-Relais](https://hb9zz.ethz.ch/en/relaisfunk) - * [DC4KU - Werner Schnorrenberg](http://dc4ku.darc.de/) - huge collection of information - -# Transceivers - -## Xiegu G90 - * [Latest G90 firmwares](https://www.sinotel.co.uk/index.php?main_page=page&id=24) - * [G90 user group on groups.io](https://groups.io/g/XieguG90) - -# Tutorials - - * [UV-5R Cheat Sheet](https://w7apk.com/baofeng) - - -# Software +### Software * Logging Software * [YFKlog](http://fkurz.net/ham/yfklog.html) - curses based CLI ham radio logbook @@ -34,7 +19,7 @@ showthedate: false * [Club Log](https://clublog.org/) * [HRDLOG](http://www.hrdlog.net/) -# Operating Modes +### Modes * FT8 * [FT8 Operating Guide](https://www.g4ifb.com/FT8_Hinson_tips_for_HF_DXers.pdf) - Excellent FT8 manual @@ -120,14 +105,14 @@ showthedate: false * [Hamnet Workshop Dormagen](https://www.afu.rwth-aachen.de/images/vortraege/Hamnet_Workshop_Dormagen.pdf) * [Einführung in Hamnet](https://www.darc.de/fileadmin/filemounts/distrikte/p/ortsverbaende/18/Hamnet/Einfuehrung_in_HAMNET_2016-02-05_e.pdf) -# Tech +### Tech * DIY * [PL-Stecker an Koax-Kabel löten](https://dh7lm.wordpress.com/2014/10/05/pl-stecker-an-koax-kabel-loten-so-funktionierts/) * [Carbon Arrow Yagi Antenna](https://tysonpower.de/blog/carbon-arrow-yagi-antenna) * [Homebrew Programming Cable for Retevis RT95](http://iz3zvo.altervista.org/build-program-cable-anytone-at-5888uv-intek-hr-2040/) - * Electronics + * Electronics * [Elektronik Kompendium](https://www.elektronik-kompendium.de/) * [Burkhard Kainka](http://www.b-kainka.de/) * [Wumpus Welt der Radios](http://www.welt-der-alten-radios.de/detektor-bauprojekte--80.html) @@ -135,27 +120,42 @@ showthedate: false * RFI * [Sounds of RFI](http://www.arrl.org/sounds-of-rfi) - Sound samples of different RFI sources -# Community +### Communities * [The ON4KST amateur radio chat](http://www.on4kst.org/chat/start.php) * [/r/amateurradio](https://www.reddit.com/r/amateurradio/) -# Ham Weather / Propagation +### Ham Weather / Propagation * [AirScout - Software for Aircraft Scatter Prediction](http://www.airscout.eu/index.html) * [William Hepburn's Worldwide Tropospheric Ducting Forecast](http://www.dxinfocentre.com/tropo_eur.html) * [VHF Propagation Map](http://aprs.mennolink.org/) -# DXCluster +### DXCluster * [DXHeat](https://dxheat.com/dxc/) - Modern, responsive DXCluster web application * [dx-cluster.de](http://dx-cluster.de/index.php) + * [DXHeat](https://dxheat.com/dxc/) - very nice web bases DX Cluster client -# VHF/UHF +### VHF/UHF * [Die modernen Werzeuge des UKW Amateurs](http://funkperlen.blogspot.com/2018/01/die-modernen-wekzeuge-des-ukw-amateurs.html) * [Beacons](http://dk8jg.de/Baken%202m%2070cm%2023cm%20in%20DL%202013.pdf) -# ADIF Analysis/Mapping +### ADIF Analysis/Mapping * [Adventure Radio Log Analyzer](http://analyzer.adventureradio.de/) -# Exam Preparation +### Know-how + * [Funken via analoge Funk-Relais](https://hb9zz.ethz.ch/en/relaisfunk) + * [DC4KU - Werner Schnorrenberg](http://dc4ku.darc.de/) - huge collection of information + +### Transceivers + + * Xiegu G90 + * [Latest G90 firmwares](https://www.sinotel.co.uk/index.php?main_page=page&id=24) + * [G90 user group on groups.io](https://groups.io/g/XieguG90) + +### Tutorials + + * [UV-5R Cheat Sheet](https://w7apk.com/baofeng) + +### Exam Preparation * [HamRadioTrainer](http://hamradiotrainer.de/) - Die intelligente Lernsoftware für die Amateurfunkprüfung (Windows/Wine) * [afup.a36.de](https://www.afup.a36.de/) - Prüfungstraining für das Amateurfunkzeugnis (Web based) * [DARC Online Lehrgang](https://www.darc.de/der-club/referate/ajw/darc-online-lehrgang/) diff --git a/content/links/infosec.md b/content/links/infosec.md index d9589c8..d19308a 100644 --- a/content/links/infosec.md +++ b/content/links/infosec.md @@ -5,7 +5,7 @@ draft: false showthedate: false --- -# Threat Intelligence Portals/Feeds +### Threat Intelligence Portals/Feeds * [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com) - Cloud platform for sharing threat intel data * [OTX threat intelligence](https://otx.alienvault.com) - AlienVault Open Threat Intelligence Community * [List of Threat Intelligence Feeds](https://intelmq.readthedocs.io/en/latest/Feeds) @@ -14,7 +14,7 @@ showthedate: false * [VirusTotal](https://www.virustotal.com/) - You have to know VirusTotal * [GitHub - sroberts/awesome-iocs: A collection of sources of indicators of compromise](https://github.com/sroberts/awesome-iocs) -# Threat Intelligence Tools +### Threat Intelligence Tools * [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) - Solution for collecting and processing security feeds, pastebins, tweets using a message queue protocol * [harpoon](https://www.randhome.io/blog/2018/02/23/harpoon-an-osint-/-threat-intelligence-tool/) - CLI tool for open source and threat intelligence * [Bearded-Avenger / CIF](https://csirtgadgets.com/collective-intelligence-framework) - CIF allows you to combine known malicious threat information from many sources and use that information for incident response, detection and mitigation. @@ -23,7 +23,7 @@ showthedate: false * [urlQuery](http://urlquery.net/) - Gives you a screenshot of a given site along with all HTTP transactions (request and response) and executed JS * [OSINT Framework](https://osintframework.com/) -# Threat Detection +### Threat Detection * [Blue Team fundamentals Part Two: Windows Processes.](https://securitybytes.io/blue-team-fundamentals-part-two-windows-processes-759fe15965e2) * [Detect Password Spraying With Windows Event Log Correlation – Welcome to the Ziemba.Ninja Infosec Blog!](https://www.ziemba.ninja/?p=66) * [Download Windows security audit events from Official Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=50034) @@ -41,90 +41,83 @@ showthedate: false * [http://blog.rootshell.be/2012/01/17/monitoring-pastebin-com-within-your-siem/](http://blog.rootshell.be/2012/01/17/monitoring-pastebin-com-within-your-siem/) * [FCL - Fileless Command Lines](https://github.com/chenerlich/FCL) -# Data Scraping +### Data Scraping * [pystemon](https://github.com/cvandeplas/pystemon) - Monitoring tool for PasteBin-alike sites written in Python -# Vulnerability Management +### Vulnerability Management * [https://vulners.com](https://vulners.com) - Vulnerability search engine - ("Google for Hackers") -# Honeypots +### Honeypots * [ssh-auth-logger](https://github.com/JustinAzoff/ssh-auth-logger) - works great in combination with CIF and csirtg.io, see [explodingwoodchucks.com](https://www.explodingwoodchucks.com/build-a-ssh-sensor) * [cowrie](https://github.com/cowrie/cowrie) - successor to kippo * [High Interaction Honeypots with Sysdig and Falco](https://labs.mwrinfosecurity.com/blog/high-interaction-honeypots-with-sysdig-and-falco) -# Tools - Packet String Data (PSTR) +### Tools - Packet String Data (PSTR) * [URLsnarf](http://) * [Httpry](https://github.com/jbittel/httpry) - HTTP logging and information retrieval tool * [Justsniffer](https://github.com/onotelli/justniffer) - a network protocol analyzer that captures network traffic -# Incident Response +### Incident Response * [Incident Response](http://www.cst.ucf.edu/about/information-security-office/incident-response/) * [Cyber Probe - Capturing, Analysing and Responding to Cyber Attacks](http://www.kitploit.com/2017/01/cyber-probe-capturing-analysing-and.html) * [Basics of Windows Incident Response – JP](https://jordanpotti.com/2017/01/20/basics-of-windows-incident-response/) * [PENTEST-WIKI](https://github.com/nixawk/pentest-wiki) * [https://github.com/meirwah/awesome-incident-response](https://github.com/meirwah/awesome-incident-response) -# Incident Analysis +### Incident / Malware Analysis -## Malware Analysis + * Detection + * [https://virustotal.github.io/yara/](Yara) - Signature based detection + * [https://ssdeep-project.github.io/ssdeep/usage.html](ssdeep) - Fuzzy Hashing + * [https://github.com/Dynetics/Malfunction](malfunction) - Fuzzy Hasing -### Detection + * String Extraction + * [https://blog.didierstevens.com/programs/xorsearch/](xorstrings) + * [https://github.com/fireeye/flare-floss](floss) - Automatic decoder function detection and usage, Extracts ASCII and UTF-16-le strings + * [https://docs.microsoft.com/en-us/sysinternals/downloads/strings](strings) - * [https://virustotal.github.io/yara/](Yara) - Signature based detection - * [https://ssdeep-project.github.io/ssdeep/usage.html](ssdeep) - Fuzzy Hashing - * [https://github.com/Dynetics/Malfunction](malfunction) - Fuzzy Hasing + * PE + * [PE Wiki](https://code.google.com/p/corkami/wiki/PE101) + * [PE Infographic](https://i.imgur.com/pHjcI.png) + * [pescanner.py](https://code.google.com/p/malwarecookbook/source/browse/trunk/3/8/pescanner.py) + * [pestudio](http://www.winitor.com/) + * [Manalyze](https://github.com/JusticeRage/Manalyze) + * [Dependency Walker](http://dependencywalker.com/) -### String Extraction + * Graphical Analysis - * [https://blog.didierstevens.com/programs/xorsearch/](xorstrings) - * [https://github.com/fireeye/flare-floss](floss) - Automatic decoder function detection and usage, Extracts ASCII and UTF-16-le strings - * [https://docs.microsoft.com/en-us/sysinternals/downloads/strings](strings) + * [Binvis](binvis.io) + * [Cantor Dust](https://sites.google.com/site/xxcantorxdustxx/) -### PE + * Disassembler - * [PE Wiki](https://code.google.com/p/corkami/wiki/PE101) - * [PE Infographic](https://i.imgur.com/pHjcI.png) - * [pescanner.py](https://code.google.com/p/malwarecookbook/source/browse/trunk/3/8/pescanner.py) - * [pestudio](http://www.winitor.com/) - * [Manalyze](https://github.com/JusticeRage/Manalyze) - * [Dependency Walker](http://dependencywalker.com/) + * [IDA]() + * [Radare2](https://www.radare.org) + * [RetDec](https://retdec.com/) -### Graphical Analysis + * PDF Analysis + * [malicious-pdf-analysis-ebook](http://didierstevens.com/files/data/malicious-pdf-analysis-ebook.zip) + * [pdf-parser.py](https://blog.didierstevens.com/2008/10/30/pdf-parserpy/) + * [pdftk](https://www.pdflabs.com/tools/pdftk-the-pdf-toolkit/) + * [peepdf](https://github.com/jesparza/peepdf) - * [Binvis](binvis.io) - * [Cantor Dust](https://sites.google.com/site/xxcantorxdustxx/) + * Office Analysis + * [viper](http://viper.li/) + * [vipermonkey](https://github.com/decalage2/ViperMonkey) + * [oledumpi.py](https://blog.didierstevens.com/programs/oledump-py/) + * [Quicksand lite](https://github.com/tylabs/quicksand_lite) -### Disassembler + * Filesystem Analysis - * [IDA]() - * [Radare2](https://www.radare.org) - * [RetDec](https://retdec.com/) + * [Sleuthkit](http://www.sleuthkit.org/index.php) + * [FireBrick](http://digitalfire.ucd.ie/?page_id=1011) - Software Write Blocker -### PDF Analysis + * Shellcode Analysis + * [Yara rule](https://github.com/Yara-Rules/rules/tree/master/Antidebug_AntiVM) + * [Viper Module](https://github.com/viper-framework/viper/blob/master/viper/modules/shellcode.py) + * [Shellcode Detector](http://blog.didierstevens.com/2014/09/29/update-xorsearch-with-shellcode-detector/) - * [malicious-pdf-analysis-ebook](http://didierstevens.com/files/data/malicious-pdf-analysis-ebook.zip) - * [pdf-parser.py](https://blog.didierstevens.com/2008/10/30/pdf-parserpy/) - * [pdftk](https://www.pdflabs.com/tools/pdftk-the-pdf-toolkit/) - * [peepdf](https://github.com/jesparza/peepdf) - -### Office Analysis - - * [viper](http://viper.li/) - * [vipermonkey](https://github.com/decalage2/ViperMonkey) - * [oledumpi.py](https://blog.didierstevens.com/programs/oledump-py/) - * [Quicksand lite](https://github.com/tylabs/quicksand_lite) - -## Filesystem Analysis - - * [Sleuthkit](http://www.sleuthkit.org/index.php) - * [FireBrick](http://digitalfire.ucd.ie/?page_id=1011) - Software Write Blocker - -## Shellcode Analysis - * [Yara rule](https://github.com/Yara-Rules/rules/tree/master/Antidebug_AntiVM) - * [Viper Module](https://github.com/viper-framework/viper/blob/master/viper/modules/shellcode.py) - * [Shellcode Detector](http://blog.didierstevens.com/2014/09/29/update-xorsearch-with-shellcode-detector/) - -# Reconnaissance +### Reconnaissance * [shodan.io](https://shodan.io) - service banner search engine * [A Shodan Tutorial and Primer](https://danielmiessler.com/study/shodan/) * [AutoNSE - Massive NSE (Nmap Scripting Engine) AutoSploit And AutoScanner - KitPloit - PenTest Tools for your Security Arsenal ☣](http://www.kitploit.com/2018/04/autonse-massive-nse-nmap-scripting.html) @@ -175,7 +168,7 @@ showthedate: false * [Explore Hidden Networks With Double Pivoting – Pentest Blog](https://pentest.blog/explore-hidden-networks-with-double-pivoting/) * [Decrypting Modern McAfee ePolicy Orchestrator Credentials | #!/bin/blog](http://bertman.net/2016/12/decrypting-modern-mcafee-epolicy-orchestrator-credentials/) -# Malware Analysis +### Malware Analysis * [Painless Cuckoo Sandbox Installation | NVISO LABS – blog](https://blog.nviso.be/2018/04/12/painless-cuckoo-sandbox-installation/) * [How to become the best Malware Analyst E-V-E-R](http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/) * [VirusTotal Blog: Meet VirusTotal Droidy, our new Android sandbox](http://blog.virustotal.com/2018/04/meet-virustotal-droidy-our-new-android.html) @@ -189,25 +182,25 @@ showthedate: false * [GitHub - K2/EhTrace: ATrace is a tool for tracing execution of binaries on Windows.](https://github.com/K2/EhTrace) * [https://github.com/DidierStevens/DidierStevensSuite](https://github.com/DidierStevens/DidierStevensSuite) -# Hardening / Configuration Auditing +### Hardening / Configuration Auditing -## OS Hardening - * [CIS Controls V7 Measures & Metrics](https://www.cisecurity.org/white-papers/cis-controls-v7-measures-metrics/) - * [PaulSec/awesome-windows-domain-hardening: A curated list of awesome Security Hardening techniques for Windows.](https://github.com/PaulSec/awesome-windows-domain-hardening) - * [selinux-coloring-book](http://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf) - * [lateralblast/lunar: A UNIX security auditing tool based on several security frameworks](https://github.com/lateralblast/lunar) - * [https://adsecurity.org/?p=2288](https://adsecurity.org/?p=2288) - * [http://www.tenable.com/blog/compliance-auditing-with-microsoft-powershell](http://www.tenable.com/blog/compliance-auditing-with-microsoft-powershell) - * [10 best practices for Windows security - TechRepublic](http://www.techrepublic.com/blog/10-things/-10-best-practices-for-windows-security/) - * [A Look into Linux Hardening in the Wild](https://capsule8.com/blog/millions-of-binaries-later-a-look-into-linux-hardening-in-the-wild/) + * OS Hardening + * [CIS Controls V7 Measures & Metrics](https://www.cisecurity.org/white-papers/cis-controls-v7-measures-metrics/) + * [PaulSec/awesome-windows-domain-hardening: A curated list of awesome Security Hardening techniques for Windows.](https://github.com/PaulSec/awesome-windows-domain-hardening) + * [selinux-coloring-book](http://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf) + * [lateralblast/lunar: A UNIX security auditing tool based on several security frameworks](https://github.com/lateralblast/lunar) + * [https://adsecurity.org/?p=2288](https://adsecurity.org/?p=2288) + * [http://www.tenable.com/blog/compliance-auditing-with-microsoft-powershell](http://www.tenable.com/blog/compliance-auditing-with-microsoft-powershell) + * [10 best practices for Windows security - TechRepublic](http://www.techrepublic.com/blog/10-things/-10-best-practices-for-windows-security/) + * [A Look into Linux Hardening in the Wild](https://capsule8.com/blog/millions-of-binaries-later-a-look-into-linux-hardening-in-the-wild/) -## Web Server Hardening - * [Nginx Quick Reference](https://github.com/trimstray/nginx-quick-reference) - * [GitHub - yandex/gixy: Nginx configuration static analyzer](https://github.com/yandex/gixy) - * [securityheaders.com](https://securityheaders.com/) - Check the configuration of your website's security headers - * [webbkoll.dataskydd.net](https://webbkoll.dataskydd.net) - Checks websites for privacy leaks and security headers + * Web Server Hardening + * [Nginx Quick Reference](https://github.com/trimstray/nginx-quick-reference) + * [GitHub - yandex/gixy: Nginx configuration static analyzer](https://github.com/yandex/gixy) + * [securityheaders.com](https://securityheaders.com/) - Check the configuration of your website's security headers + * [webbkoll.dataskydd.net](https://webbkoll.dataskydd.net) - Checks websites for privacy leaks and security headers -# SIEM Solutions +### SIEM Solutions * [AlienVault](https://www.alienvault.com/products/ossim) - Open Source SIEM solution * [McAfee Enterprise Security Manager](https://www.mcafee.com/enterprise/de-de/products/enterprise-security-manager.html) * [ArcSight](https://software.microfocus.com/en-us/products/siem-security-information-event-management/overview) @@ -218,14 +211,14 @@ showthedate: false * [Logpoint](https://www.logpoint.com) * [Gartner Peer Insights](https://www.gartner.com/reviews/market/security-information-event-management) - Gartner's SIEM rankings -# SOC Related Stuff +### SOC Related Stuff * [SIEM use cases development workflow – Agile all the things! | SPL>Ninja](https://spl.ninja/2017/10/15/siem-use-cases-development-workflow-agile-all-the-things/) * [Lessons learned from the Microsoft SOC—Part 1: Organization](https://www.microsoft.com/security/blog/2019/02/21/lessons-learned-from-the-microsoft-soc-part-1-organization/) -# Awareness +### Awareness * [Our Approach to Employee Security Training | PagerDuty](https://www.pagerduty.com/blog/security-training-at-pagerduty/) -# Other Stuff +### Other Stuff * [GitHub - m4b/bingrep: like grep, but for binaries](https://github.com/m4b/bingrep/) * [GitHub - vulnersCom/getsploit: Command line utility for searching and downloading exploits](https://github.com/vulnersCom/getsploit) * [Microsoft releases new IT tool, Policy Analyzer - MSPoweruser](https://mspoweruser.com/microsoft-releases-new-tool-policy-analyzer/) @@ -234,10 +227,10 @@ showthedate: false * [GitHub - juliocesarfort/public-pentesting-reports: Curated list of public penetration test reports released by several consulting firms and academic security groups](https://github.com/juliocesarfort/public-pentesting-reports) * [CyberChef](https://gchq.github.io/CyberChef/) - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis -# Leaked Password Databases +### Leaked Password Databases * [Random](https://publicdbhost.dmca.gripe/random/) * [databases.today](https://databases.today/search.php) -# Password Lists +### Password Lists * [CrackStation](https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm) - 1,493,677,782 Passwords * [Rockyou.txt](http://scrapmaker.com/download/data/wordlists/dictionaries/rockyou.txt) - the standard diff --git a/content/links/retro.md b/content/links/retro.md index 48740da..e1ef2fc 100644 --- a/content/links/retro.md +++ b/content/links/retro.md @@ -5,25 +5,25 @@ draft: false showthedate: false --- -# General Information +### General Information * [C64 Wiki](https://www.c64-wiki.de) - All the info you need -# Bug hunting/fixing +### Bug hunting/fixing * [The Pictorial C64 Fault Guide](https://derbian.webs.com/c64diag/) - The Pictorial C64 Fault Guide * [Die Platinen des C64](http://www.cbmhardware.de/show.php?r=1&id=25/Die%20Platinen%20des%20C64) - All the mainboards with all the chips explained -# Games +### Games * [C64-Games.de](http://www.c64games.de/) - All the games you want * [CSDb](https://csdb.dk/search/advancedresult.php?form[category]=releases&rrelease_type[]=46&showprpage=1000) - List of Easyflash releases * [Gamebase64](http://www.gamebase64.com) - "An attempt to document ALL Commodore 64 gameware before it's too late!" * [Gamebase64 Games](ftp://8bitfiles.net/gamebase_64/Games/) - FTP archive of all Gamebase64 game files * [C64 game releases in 2019](https://docs.google.com/spreadsheets/d/1uoePmZPU6CAaXeTmu1yt29saKZQzxdzCamcLeCLWff8/edit#gid=0) -# DIY Projects +### DIY Projects * [10$ C64 Wifi Card](https://1200baud.wordpress.com/2017/03/04/build-your-own-9600-baud-c64-wifi-modem-for-20/) * [User port cartridge case](https://www.thingiverse.com/thing:1545605) - Perfect for your DIY C64 wifi modem -# Shops / Publishers +### Shops / Publishers * [Protovision](https://www.protovision.games/shop/) - Sam's Journey, Galencia, Hardware etc. * [Individual Computers](https://icomp.de/shop-icomp/de/shop.html) - Jens Schoenfeld's shop, many unique hardware * [Pixelwizard Shop](https://shop.pixelwizard.eu/commodore-c64/) - Brand new C64C cases diff --git a/content/links/tech.md b/content/links/tech.md index 22b8aa5..355e0cc 100644 --- a/content/links/tech.md +++ b/content/links/tech.md @@ -5,36 +5,36 @@ draft: false showthedate: false --- -# Lists +### Lists / Collections * [The Book of Secret Knowledge](https://github.com/exitnode/the-book-of-secret-knowledge/blob/master/README.md) - A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. -# SSL/TLS/Encryption +### SSL/TLS/Encryption * [Let's Encrypt for internal Servers](https://blog.heckel.xyz/2018/08/05/issuing-lets-encrypt-certificates-for-65000-internal-servers/) * [The Definitive 2019 Guide to Cryptographic Key Sizes and Algorithm Recommendations](https://paragonie.com/blog/2019/03/definitive-2019-guide-cryptographic-key-sizes-and-algorithm-recommendations) * [AES-Performance](https://systemausfall.org/wikis/howto/AES-Performance) - Comparison of AES performance on different systems / SBCs -# PKI +### PKI * [PKI Infrastructure (01) – Introduction & Certificate Lifetimes](https://www.bussink.ch/?p=661) -# Backup +### Backup * [Restic and Backblaze B2](https://harshadsharma.com/2018/04/restic-and-backblaze-b2-for-backups) -# Monitoring +### Monitoring * [PING.GG](http://ping.gg/) - The world's simplest monitoring service -# Logging +### Logging * [GoAccess](https://goaccess.io/) - open source real-time web log analyzer and interactive viewer that runs in a terminal in \*nix systems or through your browser. -# Living in the CLI +### Living in the CLI * [Curseradio](https://github.com/chronitis/curseradio) - Curses CLI web radio client -# ChromeOS +### ChromeOS * [Serial Debugging](https://wiki.postmarketos.org/wiki/Serial_debugging) - e.g. Suzy-Q debug cable diagram * [DIY SuzyQable](https://www.reddit.com/r/PixelBook/comments/ezpnmi/suzyqable_needed_in_hong_kong_for_pixelbook/) -# Networking / Mikrotik +### Networking / Mikrotik * [MikroTik: Zentrales Management von WiFi Access Points mit CAPsMAN](https://clemens.name/blog/mikrotik-capsman-setup/) * [MikroTik: Ausführen von Skripten per SMS](https://clemens.name/blog/mikrotik-exec-scripts-via-sms/) * [Mikrotik Firmware Auto Updater](https://github.com/beeyev/Mikrotik-Firmware-Auto-Updater) - automatically updates router to the latest firmware. @@ -46,11 +46,11 @@ showthedate: false * [Some links for MikroTik tips and scripts](https://wiert.me/2017/04/25/some-links-for-mikrotik-tips-and-scripts/) - Good collection of tips, tricks and scripts * [Traffic capture from a mikrotik device to wireshark](https://www.wizzycom.net/traffic-capture-from-a-mikrotik-device-to-wireshark/) -# Networking / IPv6 +### Networking / IPv6 * [Pretty good YouTube series on IPv6 (german)](https://www.youtube.com/playlist?list=PLCb8EhYsrW_symL1qayFNWN1yXkUjNAFz) * [Hurricane Electric IPv6 Certification](http://ipv6.he.net/certification/) - Free, fun and you get a T-Shirt -# Networking / SSH +### Networking / SSH * [SSH Examples, Tips & Tunnels](https://hackertarget.com/ssh-examples-tunnels/) - Practical SSH examples to take your remote system admin game to the next level. Commands and tips to not only use SSH but master ways to move around the network.