Header Image -

Jamey

Setting Up Distributed Computing on BSD Systems in Order to Aid COVID-19 Research

by Jamey 5 Comments
Setting Up Distributed Computing on BSD Systems in Order to Aid COVID-19 Research

This will be a tutorial on setting up BOINC on FreeBSD (specifically, FreeNAS), in order to devote your extra computing power to aid The National Upcycled Computing Collective (NUCC, Inc.), a 501c non-profit organization, who is working on distributed computing projects with Rosetta@Home, which is focused solely on COVID-19 research at the time of this writing. Click here to read more about NUCC, and be sure to check out (and follow) @nucc_inc and @NUCC_STATS on Twitter. If you are fresh out of CPU cycles and would much rather prefer directly feeding cash to the cause, please feel free to do so here.

To get instructions for other operating systems that will have you processing workloads in less than 10 minutes, view the GitHub repo featuring quick super-quick setups scripts at https://github.com/phx/nucc.

587 views

The Toll by Neal Shusterman

by Jamey 0 Comments
The Toll by Neal Shusterman

Personally, I feel like Neal Shusterman really created a masterpiece with The Toll. I really enjoyed Scythe and its follow up, Thunderhead, but The Toll was the grand finale that tied up all of the loose ends and ultimately brought the series to its full and glorious completion.


There appear to be two distinctly separate camps when it comes to readers of this book. There are those who loved Scythe and Thunderhead who happened to be very bored and underwhelmed by The Toll, and this camp seems to actually hold the majority. On the other hand, there are readers who believe The Toll completely stands apart from the first two books in the series and truly deserves more credit than people are giving it. I happen to be a member of this second camp, as this book “resonated” with me pretty deeply.

3 views

How to Host a Hidden Service .onion Site on the Dark Web

by Jamey 1 Comment
How to Host a Hidden Service .onion Site on the Dark Web

Warning: the recommendations made here are in reference to hosting your own personal content, not to become a web hosting provider on the dark web. You are responsible for the content that you host (maybe depending on region — I’m not a lawyer), but you don’t want to find yourself anywhere in the distribution pipeline related to the nefarious goods and services of others.

This guide is tuned toward hosting on Amazon Web Services (AWS) on Ubuntu 18.04. The same things can be achieved using RPM-based distros by substituting the packaging commands and tweaking the instructions as necessary.

287 views

John Dee and the Empire of Angels: Enochian Magick and the Occult Roots of The Modern World by Jason Louv

by Jamey
John Dee and the Empire of Angels: Enochian Magick and the Occult Roots of The Modern World by Jason Louv

Just to be clear from the start — John Dee and the Empire of Angels is not a book for everyone. It provides an excellent and remarkably granular history of John Dee and Edward Kelly, and for that reason alone I would recommend it. However, this book (unlike any other historical record of John Dee), goes balls deep into Dee’s angelic scrying sessions with Kelly, and then goes even further to relate how those scrying sessions went on to influence the realms of science, as well as the Western Esoteric Tradition in its entirety. If you are interested in occult studies, it is extremely interesting to follow the thread of Dr. John Dee and see how his impact inspired countless esoteric teachings and philosophies of the modern era.

2 views

Ages of Entanglement by R.L. Jackson

by Jamey 0 Comments
Ages of Entanglement by R.L. Jackson

This was an ARC that was offered to Shannon, which she offered to me to read since it seemed to appeal more to my general interests than to hers. I can honestly say that this book is one of a kind, and unlike any other book that I have read. It will be very hard to describe this book to give a sense of its true essence, therefore I do urge the reader to read it for themselves if any of this piques your interest. That being said, I will do my best to offer my thoughts on this work.

7 views

The Cruel Prince by Holly Black

by Jamey 0 Comments
The Cruel Prince by Holly Black

I’m not going to lie, I was skeptical about starting The Folk of the Air series. Shannon had made a really big deal about it and was adamant that I read it. I know she loves faeries, and I love magic, and we both really enjoyed Holly Black’s previous book, The Darkest Part of the Forest, so I decided to give it a go.

I was not disappointed. This book was full of very detailed descriptions of magic and how things worked, which is something that I appreciate in a magical book — how they don’t just say something magic happened and then don’t describe how it happened. This book gives all of the hows in epic detail, which I really loved. This is one of those books that has the ability to really transport the reader to an altogether different place from mortal reality, and you really get sucked in.

3 views

How to SSH to a Jailbroken iOS Device over USB

by Jamey 0 Comments
How to SSH to a Jailbroken iOS Device over USB

I recently had to set up testing against our Akamai Staging environment which uses a different IP address than production. This required me to get a new MacBookPro that would support the latest version of MacOS, as well as the latest version of Xcode, just so that I could have sudo access to change add an entry in /etc/hosts in order to build the application from source and run it in the iOS simulator (since the Simulator doesn’t come packaged with the iOS AppStore). Then I had to carry around another computer in my backpack simply because I refuse to separate from Arch Linux and i3-gaps (which can perfectly emulate the Android version without issues), but I digress…

60 views

Optimizing Python Code Using Cython: A Beginner’s Introduction

by Jamey 0 Comments
Optimizing Python Code Using Cython: A Beginner’s Introduction

There are much better resources than this blog that will lead you down the rabbit hole of Cythonizing your Python code, but this is just a very easy introduction, outlining my own personal experiments as a Cython beginner, myself. In this tutorial, we will use my dictionary creation tool, brutalist, as a really bad example of how to Cythonize some Python code.

5 views

Generating Large Password Dictionaries Using Brutalist

by Jamey 0 Comments
Generating Large Password Dictionaries Using Brutalist

Brutalist is a cross-platform Python3+ based command line tool that can be used to generate very large word dictionaries based on minimal input. It can take a single word like “password” and generate up to 13,198,680 combinations using common special character substitutions and suffixes, and up to all possible 3-digit numerical suffixes with all variations of special characters appended. It is a highly-specialized tool, which should be a regular go-to in the tool belt of all red teamers and pentesters.

4 views

Enabling Full Disk Encryption on Legacy MBR BIOS with LVM on LUKS and GRUB Bootloader

by Jamey 0 Comments
Enabling Full Disk Encryption on Legacy MBR BIOS with LVM on LUKS and GRUB Bootloader

This was obviously somewhat of an edge case, but I’m sure it will apply to many other users out there, and I hope it finds them well. This was one particular case where the Arch Wiki was a little shady and left me figuring out a lot of stuff on my own — as is the case for any Arch user — which is one of the reasons we punish ourselves by using it in the first place. That being said, this method should work with minimal tweaks for just about any OS, because the main things being modified here are the underlying disk formats, partitions, kernel, and bootloader. Everything else is left untouched.

20 views