Archive for the ‘Security’ Category
Posted by jpluimers on 2025/09/30
Posted in *nix, *nix-tools, Blue team, Bluetooth, Development, Encryption, ESP32, Hardware, Hardware Development, Hardware Interfacing, Home Audio/Video, HTTPS/TLS security, Infosec (Information Security), Network-and-equipment, Power User, Red team, Software Development, WiFi, Wireshark | Tagged: USBArmyKnife | Leave a Comment »
Posted by jpluimers on 2025/09/09
I thought I had been living under a stone for decades when I bumped into vx-underground (@vxunderground) / Twitter
The largest collection of malware source code, samples, and papers on the internet.
Password: infected
That appeared to be untrue as vx-underground, ran by a team of volunteers, started in 2019 ([Archive] web.archive.org/web//vx-underground.org) right when a few crisis in my life came together at the same time.
So here are the links for my archive as they are great content for both Red Teams and Blue Teams on many things cyber security related:
Read the rest of this entry »
Posted in Blue team, Pen Testing, Power User, Red team, Security | Leave a Comment »
Posted by jpluimers on 2025/08/13
[Wayback/Archive] GS305E | Easy Smart Managed Essentials Switch | NETGEAR Support which can do many-to-one port mirroring.
This is a newer and cheaper hardware revision than the:
- GS105Ev2 (which is managed and can do port-mirroring, and is confusingly sold as GS105E-200) which in Germany already is end-of-life
- GS105Ev1 (which is unmanaged and cannot do port-mirroring and is confusingly sold as GS105E-100) which is end-of-life but still sold
Via [Wayback/Archive] Everyone Should Have One of These – EASY Packet Capture! – YouTube who explains very well why you need a switch that can do port-mirroring, then recommends the GS105E but forgets to mention:
- there are different revisions of the GS105E with the above drawbacks
- there is GS305E
Related:
Read the rest of this entry »
Posted in Blue team, Communications Development, Development, Ethernet, Hardware, Internet protocol suite, Network-and-equipment, Power User, Red team, Security, Software Development, TCP, UDP | Leave a Comment »
Posted by jpluimers on 2025/08/07
On my research list [Wayback/Archive] html – What can cause Chrome to give an net::ERR_FAILED on cached content against a server on localhost? – Stack Overflow
The reason what that back then this would fail (but worked in Firefox and Safari, and because I was in a hurry I didn’t research further): [Wayback/Archive] https://www.office.com/
This site can’t be reached
The webpage at https://www.office.com/ might be temporarily down or it may have moved permanently to a new web address.
ERR_FAILED
Thanks [Wayback/Archive] Mason Wheeler and [Wayback/Archive] Joel Davey.
Details:
Read the rest of this entry »
Posted in Chrome, Communications Development, Development, Encryption, HTTP, https, HTTPS/TLS security, Power User, Security, TCP, TLS, Web Browsers, Web Development | Leave a Comment »
Posted by jpluimers on 2025/07/04
While paying with VISA card for some services, I had to explicitly enable JavaScript for the https://secure5.arcot.com/ domain which looks suspicious and is titled [Wayback/Archive] location.hostname

Before I enabled JavaScript for it, I did some querying around as at first it looked like a man-in-the-middle-attack. I wasn’t the only one, as this was going on since 2013 (but I didn’t notice it earlier as I only disabled JavaScript for most sites in 2022): [Wayback/Archive] Verified by Visa and arcot.com function like a man-in-the middle attack – Jason Pearce (found via [Wayback/Archive] arcot obo – Google Search)
JavaScript there is needed so VISA card can use Arcot to be the intermediate between VISA and the web-site:
Read the rest of this entry »
Posted in Power User, Security | Leave a Comment »