mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.5K
active users

#networking

46 posts42 participants6 posts today

jiangcuo/pxvirt: A fork of Proxmox VE for ARM and LoongArch architectures - #PXVIRT is an open-source virtualization platform derived from #Proxmox VE, specifically adapted to support ARM and LoongArch architectures. This project originally began as "Proxmox-Port" and has now evolved into a fully independent fork under the new name PXVIRT.
github.com/jiangcuo/pxvirt
#Proxmox #virtualization #sysadmin #networking #freesoftware #arm
via magicfab.ca/liens

Who keeps Google Cloud's IP ranges updated? 🌐🤔

Mark Adams' GitHub repo automates the fetching and parsing of Google's public IP ranges. It uses a Python script to extract JSON data from Google's authoritative source, making it easier for developers to integrate or analyze network configurations.

#GoogleCloud #Networking #GitHub

🔗 Project link on #GitHub 👉 github.com/mark-adams/gcp-ip-l

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

In one month (2025-09-25), there will be a "Network management with the OpenBSD Packet Filter Toolset" tutorial events.eurobsdcon.org/2025/tal at #eurobsdcon in #zagreb To register: 2025.eurobsdcon.org/registrati #openbsd #freebsd #networking #security #unixlike

events.eurobsdcon.orgNetwork Management with the OpenBSD Packet Filter Toolset (T5) EuroBSDCon 2025The OpenBSD Packet Filter (PF) is at the core of the network management toolset available to professionals working with the OpenBSD and FreeBSD operating systems. Understanding the PF subsystem and the set of networking tools that interact with it is essential to building and maintaining a functional environment. The present session will both teach networking and security principles and provide opportunity for hands-on operation of the extensive network tools available on OpenBSD and FreeBSD in a lab environment. Basic to intermediate understanding of TCP/IP networking is expected and required for this session. Topics covered include The basics of and network design and taking it a bit further Building rulesets Keeping your configurations readable and maintainable Seeing what your traffic is really about with your friend tcpdump(8) Filtering, diversion, redirection, Network Address Translation Handling services that require proxying (ftp-proxy and others) Address tables and daemons that interact with your setup through them The whys and hows of network segmentation, DMZs and other separation techniques Tackling noisy attacks and other pattern recognition and learning tricks Annoying spammers with spamd Basics of and not-so basic traffic shaping Monitoring your traffic Resilience, High Availability with CARP and pfsync Troubleshooting: Discovering and correcting errors and faults (tcpdump is your friend) Your network and its interactions with the Internet at large Common mistakes in internetworking and peering Keeping the old IPv4 world in touch with the new of IPv6 The tutorial is lab centered and fast paced. Time allowing and to the extent necessary, we will cover recent developments in the networking tools and variations between the implementations in the OpenBSD and FreeBSD operating systems. Participants should bring a laptop for the hands on labs part and for note taking. The format of the session will be compact lectures interspersed with hands-on lab excercises based directly on the theory covered in the lecture parts. This session is an evolutionary successor to previous sessions. Slides for the most recent version of the PF tutorial session are up at https://nxdomain.no/~peter/pf_fullday.pdf, to be updated with the present version when the session opens.

Someone casually dropped a URL for a place where some wonderful shell based goodies are discussed

I went to the URL and I got a few beautiful fantastic and sexy programs purely for *sh

So whether you like csh ksh zsh tksh fish sh or any shell which I may or may not have heard of, these programs will run in them

httping horst

These two are making my day

Check their man pages on the internet.

httping looks gorgeous with the -K switch

I will update this toot with an output of the commands. I shall make the screen caps on my Linux machine

horst outputs sensitive data on the first page so I chose another innocent output
tab

In general, I like netcup. The FediMeteo VPS rocks and they're quite reliable but....their IPv6 implementation is such a mess! Hetzner allows you to route, so each vnet jail can have its own IPv6 address. On netcup, I have never been able to achieve such a result.