VirtualTam's bookmarks
13 bookmarks found
Page 1 of 1
-
- Lakland Bass Setup
- Elixir - Setting Up Your Bass Guitar:
- Gary Willis - Setup Manual (retrieved 2016-03-03)
-
Diffie-Hellman Key Exchange
2019-06-24 - https://security.stackexchange.com/questions/35471/is-there-any-particular-reason-to-use-diffie-hellman-over-rsa-for-key-exchange
- https://security.stackexchange.com/questions/45963/diffie-hellman-key-exchange-in-plain-english
- https://en.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman
- https://en.wikipedia.org/wiki/Forward_secrecy
-
iptables
2018-07-04 Documentation:
- https://www.netfilter.org/documentation/index.html
- https://www.netfilter.org/documentation/HOWTO//netfilter-hacking-HOWTO.html
- https://www.netfilter.org/documentation/HOWTO//networking-concepts-HOWTO.html
- https://www.netfilter.org/documentation/HOWTO//NAT-HOWTO.html
- https://www.netfilter.org/documentation/HOWTO//packet-filtering-HOWTO.html
Articles:
- https://www.digitalocean.com/community/tutorials/how-the-iptables-firewall-works
- https://www.digitalocean.com/community/tutorials/how-to-list-and-delete-iptables-firewall-rules
- https://www.digitalocean.com/community/tutorials/iptables-essentials-common-firewall-rules-and-commands
- https://www.digitalocean.com/community/tutorials/a-deep-dive-into-iptables-and-netfilter-architecture
- https://www.digitalocean.com/community/tutorials/how-to-choose-an-effective-firewall-policy-to-secure-your-servers
How-tos:
- https://wiki.centos.org/HowTos/Network/IPTables
- https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-using-iptables-on-ubuntu-14-04
Routing:
- https://www.frozentux.net/iptables-tutorial/iptables-tutorial.html
- https://www.frozentux.net/iptables-tutorial/images/tables_traverse.jpg
- https://www.frozentux.net/iptables-tutorial/images/table_subtraverse.jpg
- https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
RHEL Documentation:
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-firewalls-common_iptables_filtering
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-firewalls-forward_and_nat_rules
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-firewalls-malicious_software_and_spoofed_ip_addresses
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-firewalls-iptables_and_connection_tracking
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-iptables
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-setting_and_controlling_ip_sets_using_iptables
-
SSH tunnelling for fun and profit: Autossh
2017-08-18 - https://apple.stackexchange.com/questions/132223/autossh-not-forwarding-regular-ssh-tunnel-does
- https://unix.stackexchange.com/questions/190026/persistent-ssh-port-forward-without-public-keys
- https://serverfault.com/questions/414008/how-to-create-a-persistent-port-forwarding-using-ssh
- https://help.ubuntu.com/community/SSH/OpenSSH/PortForwarding
-
- Forwards over ssh
- Doesn't require admin
- Works with Linux and MacOS
- Supports DNS tunneling
-
Ivan Ristić: Deploying Forward Secrecy
2017-06-16 -
Python unit testing frameworks: Nose, Pytest
2015-02-13 Python's built-in unittest module is quite cool, but a bit limited and way too verbose (read: it's quite not easy to incite developers to write unit tests)
I'm currently looking for more dev-friendly solutions, the key points being:
- writing test code should be easy and straight-forward -keep the focus on "what to test" instead of "how to transcribe a process to a test"
- parallelization! -we, spoiled developers, should make good use of our way-too-many-cores build machines...
- complete feature set!
- we don't want to just run tests...
- coverage reports (find dead/weak/untested code sections)
- output formatting (JUnit-XML seems to be quite a common format out there)
There seem to be 3 solutions in Python:
- stock unittest + project-dependent customizations / test helpers
- nosetests
- py.test
And 2 ways of gettings things done:
- keeping things stock: no external dependency, project-specific implementation...
- using a test framework: one more module in your (test) virtualenv, more concise tests, more features (// run, code coverage, etc.)
Some links:
-
ZEN PENCILS - 44. BUDDHA: Pay it forward
2013-11-19
Page 1 of 1