Header Image -

Category Archives

20 Articles

How to Backup FreeNAS to Google Drive Using Duplicati

by Jamey 3 Comments
How to Backup FreeNAS to Google Drive Using Duplicati

We all have our own backup solutions, some better than others, but the standard is the 3-2-1 Backup Strategy, which suggests having at least (3) copies of your data (not including the production data itself, with (2) of those copies being stored locally on different hard drives, and (1) copy stored somewhere offsite. Most of us datahoarders and homelabbers have some implementation of this rule in one form or another.

If you are just looking for the tutorial and want to skip through all of my personal backstory bullshit, just scroll on to the end, and don’t complain about it. This is a personal blog, not some Medium article. At the end, I will discuss how to set up incremental, versioned, block-level, encrypted backups to Google Drive on FreeNAS.

Note: the single caveat is that the unlimited storage is only free and unlimited for GSuites for Business accounts that have 5 or more users (otherwise, you will be paying normal Google Drive storage fees).

171 views

How to Restore Your Entire Windows OS and Still Keep Everything Intact When All Else Fails

by Jamey 0 Comments
How to Restore Your Entire Windows OS and Still Keep Everything Intact When All Else Fails

In this tutorial, I will detail the most unorthodox way to restore your entire Windows OS (including installed programs and settings) when you have exhausted all other options.


You can skip ahead if you want to get straight to the instructions, but basically, I had an old Windows 10 Enterprise installation on a laptop that worked perfectly fine, but Shannon‘s laptop’s trackpad had completely stopped working, so I switched out the hard drives with one of my laptops to give her a “new” one, but now I was stuck with a laptop with a broken trackpad. So I had really nice unused laptop running Ubuntu on an M.2 with room for a 2.5″ SSD, but my Windows install was on mSATA. So I started looking into my options.

8 views

This Vicious Cure by Emily Suvada

by Jamey 0 Comments
This Vicious Cure by Emily Suvada

There has absolutely never been a better time to start reading This Mortal Coil trilogy by Emily Suvada. With COVID-19 threatening the world as we speak, you can really get into this series and hopefully see, with brand new eyes, the very real potential threat that a pandemic such as the fictional Hydra virus could pose against the population of the world.

I have waited a while to review this book, because I didn’t really know where to start. I almost didn’t review it, because it could almost be seen simply as a continuation of This Cruel Design, however, I absolutely understand the need to make it a separate book, which is obvious when you read it.

13 views

Setting Up Distributed Computing on BSD Systems in Order to Aid COVID-19 Research

by Jamey 7 Comments
Setting Up Distributed Computing on BSD Systems in Order to Aid COVID-19 Research

This will be a tutorial on setting up BOINC on FreeBSD (specifically, FreeNAS), in order to devote your extra computing power to aid The National Upcycled Computing Collective (NUCC, Inc.), a 501c non-profit organization, who is working on distributed computing projects with Rosetta@Home, which is focused solely on COVID-19 research at the time of this writing. Click here to read more about NUCC, and be sure to check out (and follow) @nucc_inc and @NUCC_STATS on Twitter. If you are fresh out of CPU cycles and would much rather prefer directly feeding cash to the cause, please feel free to do so here.

To get instructions for other operating systems that will have you processing workloads in less than 10 minutes, view the GitHub repo featuring quick super-quick setups scripts at https://github.com/phx/nucc.

759 views

How to Host a Hidden Service .onion Site on the Dark Web

by Jamey 1 Comment
How to Host a Hidden Service .onion Site on the Dark Web

Warning: the recommendations made here are in reference to hosting your own personal content, not to become a web hosting provider on the dark web. You are responsible for the content that you host (maybe depending on region — I’m not a lawyer), but you don’t want to find yourself anywhere in the distribution pipeline related to the nefarious goods and services of others.

This guide is tuned toward hosting on Amazon Web Services (AWS) on Ubuntu 18.04. The same things can be achieved using RPM-based distros by substituting the packaging commands and tweaking the instructions as necessary.

546 views

How to SSH to a Jailbroken iOS Device over USB

by Jamey 0 Comments
How to SSH to a Jailbroken iOS Device over USB

I recently had to set up testing against our Akamai Staging environment which uses a different IP address than production. This required me to get a new MacBookPro that would support the latest version of MacOS, as well as the latest version of Xcode, just so that I could have sudo access to change add an entry in /etc/hosts in order to build the application from source and run it in the iOS simulator (since the Simulator doesn’t come packaged with the iOS AppStore). Then I had to carry around another computer in my backpack simply because I refuse to separate from Arch Linux and i3-gaps (which can perfectly emulate the Android version without issues), but I digress…

431 views

Optimizing Python Code Using Cython: A Beginner’s Introduction

by Jamey 0 Comments
Optimizing Python Code Using Cython: A Beginner’s Introduction

There are much better resources than this blog that will lead you down the rabbit hole of Cythonizing your Python code, but this is just a very easy introduction, outlining my own personal experiments as a Cython beginner, myself. In this tutorial, we will use my dictionary creation tool, brutalist, as a really bad example of how to Cythonize some Python code.

7 views

Generating Large Password Dictionaries Using Brutalist

by Jamey 0 Comments
Generating Large Password Dictionaries Using Brutalist

Brutalist is a cross-platform Python3+ based command line tool that can be used to generate very large word dictionaries based on minimal input. It can take a single word like “password” and generate up to 13,198,680 combinations using common special character substitutions and suffixes, and up to all possible 3-digit numerical suffixes with all variations of special characters appended. It is a highly-specialized tool, which should be a regular go-to in the tool belt of all red teamers and pentesters.

5 views

Enabling Full Disk Encryption on Legacy MBR BIOS with LVM on LUKS and GRUB Bootloader

by Jamey 0 Comments
Enabling Full Disk Encryption on Legacy MBR BIOS with LVM on LUKS and GRUB Bootloader

This was obviously somewhat of an edge case, but I’m sure it will apply to many other users out there, and I hope it finds them well. This was one particular case where the Arch Wiki was a little shady and left me figuring out a lot of stuff on my own — as is the case for any Arch user — which is one of the reasons we punish ourselves by using it in the first place. That being said, this method should work with minimal tweaks for just about any OS, because the main things being modified here are the underlying disk formats, partitions, kernel, and bootloader. Everything else is left untouched.

48 views

A High Level Overview of IT and Security Industry Standards

by Jamey 0 Comments
A High Level Overview of IT and Security Industry Standards

This may sound like a boring article to many, but it is a basic overview of some very important information that is crucial to include in the repertoire of knowledge for all IT and security professionals.

In this article, we will be going over the high points for the following industry standards: PCI DSS, ISO 27001/27002, HIPAA, and the NIST/DoD frameworks, and adding some comments along the way on the relationships and effects that these policies and frameworks have on network architecture, as well as what possible implications they could have on architectural solutions. Most of the architectural solutions provided come from an Amazon Web Services perspective, but the same basic principles apply, regardless of which cloud service provider (CSP) you use, or even if your infrastructure is hosted on-premises.

68 views