Posts
linux
android
rtos
atari
osdev
gamemods
robotics
networks
electronics
3d
smarthome
sdr
All
Technology
An overview of technologies in the field and how they work together

Distributed computing is becoming more and more relevant in various fields. The following is an overview of technologies and algorithms that have stood out to me.

Read More >>

Security
Improving the Honeypot by patching the source code of the OpenSSH server

With the honeypot set up we can see the successful login attempts, but not much is happening appart from strange SSH-Keys being added. This is likely due to the honeypot being detected as such by the malware. The honeypot is not covert enough and is lacking features to log the passwords and commands that were attemped. In the following we'll enhance it.

Read More >>

Security
Analysing the results from the Honeypot

Let's see what the cat dragged in. With the Honeypot Qemu machine working we can analyse the logs.

Read More >>

Security
Setting up a Qemu honeypot machine

After detecting failed login attempts at my SSH server let's setup a fake SSH server (a honeypot) and see what these bot are upto.

Read More >>

Security
There have been a number of failed login attempts at my SSH server

My SSH-Server has been receiving a lot of failed login attempts. Let's see where they come from and what traces the log files contain.

Read More >>

Computers
Rooting an Android Device and using it as a low-cost low-power Linux home server

With an Android device running an aftermarket operating system and root capabilities we can configure it as a low-cost low-power Linux home server.

Read More >>

Computers
Rooting an Android Device and using it as a low-cost low-power Linux home server

Using a rooted Android device is an option for a small home server that is low-cost, low-power and low-maintainance. For this we need to replace the stock operating system with a new one and gain root access.

Read More >>

Technology
How encrypted media with DRM is handled in the Chromium web browser

On-demand streaming services use methods to protect their content. These methods are intended to allow subscribers to view, but not download and distribute the content. For this the transfer of media data is encrypted and elaborate key exchange mechanisms are used to transfer the required information for decryption to the player software.

Read More >>

Electronics
Building a Wireless WiFi speaker that can receive sound from your Linux Desktop with a single board computer, WiFi dongle and USB sound card

A small speaker and a small single board computer with some Linux software is all that is required to build a WiFi speaker. With it you will be able to listen to music within WiFi range and optionally control music with your smartphone.

Read More >>

Skipped 46 posts due to filter networks Click here to view all.