Skip to main content

Posts

Showing posts with the label NetWorks

Meshtastic on the RG35XX Plus: A Mesh Communication for Handheld Retro Devices

I’m excited to share my latest open-source project: Meshtastic_RG35XXPlus — a practical helper application that brings Meshtastic mesh communication tools to the Anbernic RG35XX / RG Cube handheld family. 🎮 Why? Because these devices have great displays, Python support, and network connectivity — ideal for lightweight field tools. ➡️ Source code and details: https://github.com/error0327/Meshtastic_RG35XXPlus ( GitHub ) What Is Meshtastic? Meshtastic is an open-source, decentralized mesh networking platform built on inexpensive LoRa radios. It lets you send messages (text, telemetry, and small data) over long distances without relying on cellular or internet networks. ( GitHub ) At the core, Meshtastic devices form a mesh network — where each node forwards messages to others, extending communication reach far beyond what a single radio could do on its own. ( Wikipedia ) Common use cases include: Outdoor expeditions (hiking, biking, camping) where cellular coverage is poor. ( Mesht...

Configuring mutt to work with GMAIL

Mutt is a mail client , that you can configure easier in Linux , i will start with explaining the installation and the configuration of the tool , and some example to send a simple email : sudo apt-get update         #It's always a good idea to update your sources list before you start with installing any thing new . sudo apt-get install mutt          #This command will install the client for you . cd          #This will take you to your home dir , and there you will find a dir called .mutt cd .mutt vi muttrc          # Edit the file like the below example : Ex : hdr_order Date From To Cc ignore "Authentication-Results:" ignore "DKIM-Signature:" ignore "DomainKey-Signature:" set certificate_file="~/.mutt/certificates" set editor='nano' set folder=imaps://imap.gmail.com:993 set from="YourEmail@gmail.com" set header_cache="~/.mutt/cache/...

How to connect WiFi from Linux command line : WPA/WPA2-PSK

First of all we will have to check that we are working with the wpa configuration file , Be sure that you have this section in /etc/network/interfaces :     sudo su       vi /etc/network/interfaces    And add the following section : , you can figure out what is your interface name with the             command ifconfig , usually it's wlan0 or 1 ..           auto wlan0           iface wlan0 inet dhcp           wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf   To generate the network block use the command : wpa_passphrase essid_name supersecretpassword          and this will create something like the bellow , and then all you have to do is to add this block to      /etc/wpa_supplicant/wpa_supplicant.conf    So vi /etc/wpa_supplicant/wpa_supplicant.conf , and add this : ...

10 Linux methods you should know

This article is a compilation of several interesting, unique command-line tricks that should help you squeeze more juice out of your system, improve your situational awareness of what goes on behind the curtains of the desktop, plus some rather unorthodox solutions that will melt the proverbial socks off your kernel. Follow me for a round of creative administrative hacking. 1. Run top in batch mode top is a handy utility for monitoring the utilization of your system. It is invoked from the command line and it works by displaying lots of useful information, including CPU and memory usage, the number of running processes, load, the top resource hitters, and other useful bits. By default, top refreshes its report every 3 seconds. Most of us use top in this fashion; we run it inside the terminal, look on the statistics for a few seconds and then graciously quit and continue our work. But what if you wanted to monitor the usage of your system resources unattended? In other words,...

List open ports and listening services

netstat To list open network ports and the processes that own them on FreeBSD with netstat, you can use this command:   netstat -a | egrep 'Proto|LISTEN' The output for this on my laptop running FreeBSD is: Proto Recv-Q Send-Q  Local Address      Foreign Address    (state) tcp4       0      0  localhost.ipp      *.*                LISTEN tcp6       0      0  localhost.ipp      *.*                LISTEN tcp4       0      0  *.2200             *.*                LISTEN tcp6       0      0  *.2200             *.*                LISTEN tcp4   ...

Massive OpenSSL Bug 'Heartbleed' Threatens Sensitive Data

For a more detailed analysis of this catastrophic bug, see  this update , which went live about 18 hours after Ars published this initial post. Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data. The warning about the bug in OpenSSL coincided with the  release of version 1.0.1g of the open-source program , which is the default cryptographic library used in the Apache and nginx Web server applications, as well as a wide variety of operating systems and e-mail and instant-messaging clients. The bug, which has resided in production versions of OpenSSL for more than two years, could make it possible for people to recover the private encryption key at the heart of the digital certificates used to authenticate Internet servers and to encrypt data traveling between ...

Snoopy: Distributed Tracking and Profiling Framework

Snoopy  is a distributed tracking and profiling framework to perform some pretty interesting tracking and profiling of mobile users through the use of WiFi. The talk was well received (going on what people said afterwards) by those attending the conference and it was great to see so many others as excited about this as we have been. In addition to the research, we both took a different approach to the presentation itself. A 'no bullet points' approach was decided upon, so the slides themselves won't be that revealing. Using Steve Jobs as our inspiration, we wanted to bring back the fun to technical conferences, and our presentation hopefully represented that. As I type this, I have been reliably informed that the DVD, and subsequent videos of the talk, is being mastered and will be ready shortly. Once we have it, we will update this blog post. In the meantime, below is a description of the project. Background There have been recent initiatives from numerous gover...