Memoires of the Commonly Uncommon Tech Solutions

assembly

IPv6 on Cisco Routers

Back in 2003, aside from messing with wireless networks, I starting really working with IPv6 in its full form (Watch for NS in the IPv6 server list here soon). At the same time, I was studying for my CCNA, and decided that every piece of hardware in my house needed to be running IPv6. In …

assembly

More Fun With Wireless Hacking (2600 03/04)

I decided to start posting the various articles from my old site, which have yet to become obsolete. One was More Fun With Wireless Hacking, which was published in the Winter 2003 issue of 2600 Hacker’s Quarterly. Since the practice of wireless hacking, security has yet to change. So, I present you with the original …

assembly

Azureus CLI: The Dark Side of Azureus

While torrent sharing grows more and more each day, it has started to become a great way to host large archives without sacrificing your bandwidth. Such a case is a remote server, that has a limit on the bandwidth, but you don’t want to cripple your user base because of it. So, how do you …

freebsd

TrustedBSD – MAC BIBA Policy

For our 3rd part of the tutorial, we are going to cover one of the MAC BIBA policy. This policy controls the upward flow of information. In other words, we can restrict access based on a user or process. We will look at how to add our policy, and how to alter it to our …

freebsd

TrustedBSD – MAC Processes

As we continue on looking at the MAC modules, we will cover two more minor modules that will allow us to add MAC Processes. This will prove crucial to learning some of the more advanced modules that deal with policies. These two modules are mac_seeotheruids, and mac_partition. While they are simple, they are still good …

freebsd

TrustedBSD – Mandatory Access Control

The BSD Extended module helps us protect every aspect of FreeBSD’s environment. With Mandatory Access Control, we are able to set explicit permissions on what a user can do, see, and control. What separates this from the usual permissions, is that we can set limit a user or group based on the resource being accessed. …

linux

RedHat Fedora Core 6 PowerPC Version

After treading through many OS’es on my Powerbook G4, not one of them suited my needs completely. Even though OS X seems to fit a lot of my needs, there are Linux/UNIX applications and such that I’d much rather have. Many people have told me to try DarwinPorts and fink. Fink was just more of …

openbsd

OpenVPN Client Management Script

One thing that always bothered me about OpenVPN was the work you had to do to get one client setup. It wasn’t a hard process, but when configuring multiple clients it was always a very monotonous job and quite annoying. So, to resolve this issue, I wrote a script to create the keys, certificates, package …

freebsd

FreeBSD Jails (Tested on 6.3)

It seems that almost every year I need to update this tutorial. Some things change, and some things don’t. This version is being done on FreeBSD 6.1, 6.2, and now tested with 6.3. If you are using FreeBSD 5.x, feel free to look at my 5.x tutorial on Screaming Electron. To start out, make sure …

assembly

Beginning Assembly

Assembly has always been a weak-point of mine, and felt I needed to pursue it more. Most tutorials were vague, leaving me with more questions than answers. They would cover syntax, and what was done on the machine level, but never really giving an idea of what you were trying to accomplish. After going through …