Difference between revisions of "A-Quick links"

From Ever changing code
Jump to navigation Jump to search
 
(42 intermediate revisions by the same user not shown)
Line 1: Line 1:
[http://www.tecmint.com/cheat-command-line-cheat-sheet-for-linux-users/ Cheat – An Ultimate Command Line ‘Cheat-Sheet’ for Linux Beginners and Administrators]
__TOC__


[http://23rdworld.com/2007/03/30/how-to-make-your-mediawiki-private/ How To Make Your MediaWiki Private]
= Quick links =
* [https://docs.github.com/en/github/writing-on-github/basic-writing-and-formatting-syntax Markdown] GitHub


[http://www.ninja.pt/wiki/Main_Page Antonio's wiki]
= Blogs =
*[http://www.catonmat.net http://www.catonmat.net] Peter Krumis blog
*[http://www.catonmat.net/download/bash-redirections-cheat-sheet.pdf bash-redirections-cheat-sheet.pdf] Peter Krumis blog
*[http://www.ninja.pt/wiki/Main_Page Antonio's wiki]
*[https://dev.to dev.to]
**[https://dev.to/tomerbendavid/my-security-notes-37fh Basic Auth, SAML, Keys, OAuth, JWT and Tokens Quicky]
**[https://dev.to/adnanrahic/getting-started-with-aws-lambda-and-nodejs-1kcf Getting Started with AWS Lambda and Node.js]
**[https://dev.to/thiht/shell-scripts-matter Shell Scripts Matter ] Bash good practices


[http://www.cyberciti.biz/networking/nload-linux-command-to-monitor-network-traffic-bandwidth-usage/ Linux and Unix nload App: Monitor Network Traffic and Bandwidth Usage In Real Time]
= Learning =
*[https://learnxinyminutes.com learnxinyminutes]
*[http://programming-motherfucker.com/become.html programming-motherfucker.com]


[http://www.catonmat.net http://www.catonmat.net] Peter Krumis blog
= Vim =
*[http://www.openvim.com/ Open VIM]
*[http://www.rayninfo.co.uk/vimtips.html Vim Tricks] in simple txt format


[http://www.catonmat.net/download/bash-redirections-cheat-sheet.pdf bash-redirections-cheat-sheet.pdf] Peter Krumis blog
= Git projects =
 
*[https://gitlab.com/pio2pio/ansible-training.git My GitLab repository] Linux Academy - Ansible training examples
[http://www.shellhacks.com/ http://www.shellhacks.com/] Linux SysAdmin Notes, FIGlet - ASCII art
*[https://github.com/jmespath/jmespath.terminal jmespath.terminal] JMESPath is a query language for JSON, and here is a text based tool
 
[http://binarynature.blogspot.co.uk/2013/03/measure-internet-connection-speed-from-linux-command-line.html Measure Internet Connection Speed from the Linux Command Line]
 
[http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/257-cisco-router-dns-server.html How to configure DNS on Cisco device]
 
[http://www.firewall.cx/cisco-technical-knowledgebase/cisco-switches/818-cisco-switches-vlan-security.html VLAN Security Tips - Best Practices] Control Inter-VLAN Routing Using IP Access Lists
 
[http://packetlife.net/library/cheat-sheets/ packetlife.net] Most clear blog about networking
 
[http://bwachter.lart.info/linux/bridges.html Building bridges with Linux]
 
[http://linux-ip.net/html/basic-changing.html Changing IP Addresses and Routes]
 
[http://www.cyberciti.biz/faq/linux-configure-a-static-ip-address-tutorial/ continue Linux Static IP Address Configuration]
 
[http://www.mkyong.com/linux/copy-file-to-from-server-via-scp-command/ scp copy]
 
[http://www.cyberciti.biz/tips/ssh-public-key-based-authentication-how-to.html SSH Public Key Based Authentication]
 
[http://www.mmnt.net/db/0/2/213.141.145.240/pub/Soft/Cisco/IOS/18xx/1841/ Cisco IOS ftp] ftp://213.141.145.240/ u: anonymous, no pass
 
[http://www.rayninfo.co.uk/vimtips.html Vim Tricks] in simple txt format
 
[http://applicationpackagingbasics.blogspot.co.uk/ Windows packaging, deployment and distribution] FAQ


= Linux directories =
= Linux directories =
Line 58: Line 46:
*[http://sourceforge.net/projects/putty-nd/ putty-nd] sourceforge
*[http://sourceforge.net/projects/putty-nd/ putty-nd] sourceforge
*[http://ttyplus.com/multi-tabbed-putty/  MTPuTTY] TTY+, multi tabbed PuTTY, Native Win32 code - no need to have any libraries (like .NET, VB etc).
*[http://ttyplus.com/multi-tabbed-putty/  MTPuTTY] TTY+, multi tabbed PuTTY, Native Win32 code - no need to have any libraries (like .NET, VB etc).
= Linux resources =
*[http://www.brendangregg.com/perf.html perf Examples] Blog about measuring Linux performance from App layer to system calls events
= DevOps =
*[https://www.devopsguys.com/2013/02/06/maturing-the-continuous-delivery-pipeline/ Maturing the continuous delivery pipeline]
*[https://dev.to/brpaz/my-linux-development-environment-of-2018-ch7 Linux Development Environment of 2018] dev.to
= Kubernetes and docker =
*[https://github.com/telepresenceio/telepresence telepresence] local development for Kubernetes microservices
*[https://github.com/aacebedo/dnsdock dnsdock] DNS server for automatic docker container discovery
*[https://github.com/kelseyhightower/kubernetes-the-hard-way Kubernetes The Hard Way] Linuxacademy course is basing on
= Performance testing =
*[https://artillery.io/ artillery] load testing and functional testing toolkit
* Apache <code>ab</code> has been replaced now by <code>hey</code>
* [https://locust.io/ locust] opensource, Python tool
= SAML =
* [https://chrome.google.com/webstore/detail/saml-tracer/mpdajninpobndbfcldcmbpnnbhibjmch?hl=en Saml-tracer] Chrome extension
* [https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/ Saml-tracer] Firefox extension
= Security CWE, CVE =
* '''[https://cwe.mitre.org/ CWE™ Common Weakness Enumeration]''' is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts. A list of common software security weaknesses and vulnerabilities maintained by the security community. Easily find a specific software weakness by searching the CWE list.
* '''[https://cve.mitre.org/cve/ CVE®]''' is a dictionary of publicly disclosed cybersecurity vulnerabilities and exposures that is free to search, use, and incorporate into products and services. The CVE focuses on vulnerabilities in software that is widely available. A CVE refers to a security weakness that allows an attacker to compromise the system through techniques such as arbitrary code execution and buffer overflows.
* '''Common Vulnerability Scoreing System (CVSS)''' scoring system for security vulnerabilities. It assigns a score from 0 to 10 to give you a sense of the severity of the vulnerability. Vulnerabilities with higher scores are more severe than ones with lower scores.
= Syntax formatting =
*[https://tohtml.com/shell/ Online syntax highlighting] to use with Google Docs
= Useful software =
*[https://github.com/bricelam/ImageResizer ImageResizer] Windows
* VirtualVM - replacement to Jconsole
*[https://asciinema.org/ asciinema] Tool to record your terminal, can later allow to select/copy and paste
*[https://github.com/hluk/CopyQ CopyQ] advanced clipboard manager with editing and scripting features
*[https://github.com/santinic/how2 how2] stackoverflow from the terminal
= Online tooling =
*[https://securityheaders.com Scan for a website available HEADERS] securityheaders.com
= Uncategorised - keep adding on... =
*[http://www.tecmint.com/cheat-command-line-cheat-sheet-for-linux-users/ Cheat – An Ultimate Command Line ‘Cheat-Sheet’ for Linux Beginners and Administrators]
*[http://cfenollosa.com/misc/bash.pdf Bash keybindings cheat sheet]
*[http://23rdworld.com/2007/03/30/how-to-make-your-mediawiki-private/ How To Make Your MediaWiki Private]
*[http://www.cyberciti.biz/networking/nload-linux-command-to-monitor-network-traffic-bandwidth-usage/ Linux and Unix nload App: Monitor Network Traffic and Bandwidth Usage In Real Time]
*[http://www.shellhacks.com/ http://www.shellhacks.com/] Linux SysAdmin Notes, FIGlet - ASCII art
*[http://binarynature.blogspot.co.uk/2013/03/measure-internet-connection-speed-from-linux-command-line.html Measure Internet Connection Speed from the Linux Command Line]
*[http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/257-cisco-router-dns-server.html How to configure DNS on Cisco device]
*[http://www.firewall.cx/cisco-technical-knowledgebase/cisco-switches/818-cisco-switches-vlan-security.html VLAN Security Tips - Best Practices] Control Inter-VLAN Routing Using IP Access Lists
*[http://packetlife.net/library/cheat-sheets/ packetlife.net] Most clear blog about networking
*[http://bwachter.lart.info/linux/bridges.html Building bridges with Linux]
*[http://linux-ip.net/html/basic-changing.html Changing IP Addresses and Routes]
*[https://design.google.com/ Google Open Design materials]
*[http://www.cyberciti.biz/faq/linux-configure-a-static-ip-address-tutorial/ continue Linux Static IP Address Configuration]
*[http://www.cyberciti.biz/tips/ssh-public-key-based-authentication-how-to.html SSH Public Key Based Authentication]
*[http://www.mmnt.net/db/0/2/213.141.145.240/pub/Soft/Cisco/IOS/18xx/1841/ Cisco IOS ftp] ftp://213.141.145.240/ u: anonymous, no pass
*[http://applicationpackagingbasics.blogspot.co.uk/ Windows packaging, deployment and distribution] FAQ
*[http://www2.warwick.ac.uk/fac/sci/moac/people/students/peter_cock/cygwin/part2 Compiling C++] using Cygwin
*[http://geekswing.com/geek/quickie-tutorial-ulimit-soft-limits-hard-limits-soft-stack-hard-stack/ Ulimit] Ulimits tutorial

Latest revision as of 14:25, 23 August 2020

Quick links

Blogs

Learning

Vim

Git projects

Linux directories

Citrix

ADSL

Reverse engineering

Virtualization

Remote Terminals

  • PuTTY Windows Godfather of TTYs
  • superPuTTY code.google.com, multitabbed Putty
  • putty-nd sourceforge
  • MTPuTTY TTY+, multi tabbed PuTTY, Native Win32 code - no need to have any libraries (like .NET, VB etc).

Linux resources

  • perf Examples Blog about measuring Linux performance from App layer to system calls events

DevOps

Kubernetes and docker

Performance testing

  • artillery load testing and functional testing toolkit
  • Apache ab has been replaced now by hey
  • locust opensource, Python tool

SAML

Security CWE, CVE

  • CWE™ Common Weakness Enumeration is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts. A list of common software security weaknesses and vulnerabilities maintained by the security community. Easily find a specific software weakness by searching the CWE list.
  • CVE® is a dictionary of publicly disclosed cybersecurity vulnerabilities and exposures that is free to search, use, and incorporate into products and services. The CVE focuses on vulnerabilities in software that is widely available. A CVE refers to a security weakness that allows an attacker to compromise the system through techniques such as arbitrary code execution and buffer overflows.
  • Common Vulnerability Scoreing System (CVSS) scoring system for security vulnerabilities. It assigns a score from 0 to 10 to give you a sense of the severity of the vulnerability. Vulnerabilities with higher scores are more severe than ones with lower scores.

Syntax formatting

Useful software

  • ImageResizer Windows
  • VirtualVM - replacement to Jconsole
  • asciinema Tool to record your terminal, can later allow to select/copy and paste
  • CopyQ advanced clipboard manager with editing and scripting features
  • how2 stackoverflow from the terminal

Online tooling

Uncategorised - keep adding on...