I’m sitting in the Leader Development Course from Air University - distance learning. One of the stories I heard this morning has the crux - the commander needs to walk a line between being too involved and not being involved. The story involved the former commander trying to show he cared by being there when new members arrived, by sitting with folks as they did work, and by visiting them when they were out in the field.…
We got Google Fiber installed a couple weeks ago, shortly after it became available in the neighborhood. It has been great. There’s still some construction going on at the mouth of my neighborhood and it has caused one overnight outage… But that’s understandable.
What’s not understandable is why my sprinkler system stopped working at about the same time they installed the fiber…
Ok - so I can guess what happened. The fiber trench was run, then a few days later the sprinkler system was scheduled to run, but it did not.…
AWS Lambdas are some of the original “serverless computing” implementations. These little bits of code run when you hit an API endpoint, taking whatever inputs you provide and returning the output. They can be written in many programming languages, including my favorite: Python 3.
So I wondered - could I use this to build a simple little proxy at a URL? Why not, right? They can run any Python code… If I wanted to, I could use the result to evade perimeter firewalls that might be blocking many arbitrary destination hosts, but not AWS assets.…
I’ve been a Roku user for years. They were one of the original streaming boxes you could plug into your TV. Before I became one I debated over Mac Mini vs dedicated device… As a programmer - I love the ability to have complete (-ish) control over a device that’s outputting to a device so central to the home as a TV. As a person who pays an energy bill - I love something that sips less electricity in-general, like a more-dedicated device.…
Highly educated on the science of information assurance
Doctrinally trained on the art of cyber warfare
Adequately resourced in talent, time, and treasure
Thoroughly briefed on target missions and systems
Mathematically specialized in architectural properties
Superiorly skilled in byzantine failure analysis
Intricately involved in protocol specification and analysis
Critically embedded in the supply chain
Strategically postured in command and control
Conveniently situated for access and persistence
The paper uses these points to demonstrate how an adversary thinks about attacking our systems. However, I see a lot of ways in which these should coerce the DoD to make serious changes in how we build and maintain our cyber professional workforce.
Google Music is disappearing - it’s time to find a new way to host music in the cloud. Google wants folks to move to YouTube Music as their music locker, but I’m tired of being jerked around.
To get away from Google Music I needed the following capabilities:
Cloud-based method of storing music
Browser-based method for listening to that music
Android app for listening to music, with method for downloading some music to device storage
Nextcloud hosted on Dreamhost with Dreamobjects is the solution I chose. This post will talk about how I settled on this, and how I made it work well.
Over the last semester I had the pleasure of teaching programming as an adjunct professor at a local major university. I sought out this opportunity because I genuinely enjoy teaching, I knew I’d have a little extra time on my hands, and I think it’s valuable to my current assignment to be in the community putting a face to the Air Force. I cold-called the computer science department and asked around just prior to the fall semester, and they were interested in bringing me on for the spring semester. More than that - they wanted someone to turn their existing Intro to Programming (in Python) course into an Internet-based course. Python is my jam, so this sounded good.
I learned a lot while teaching this class: about teaching, about students, about learning Python, and about learning programming in-general. I wanted to put my thoughts down because they’ve been bubbling around in my head. I think this would be a great talk topic for some nerd conference too, so it makes sense to take the notes while they’re fresh.
I recently built a new desktop computer, and wanted a WiFi adapter that worked well for all kinds of Linux-y things… I’m not normally able to plug the desktop in over Ethernet, so WiFi is a simple choice. After my first purchase on Amazon got delayed and screwed up, I went with the USB Alfa Network AC1200 - full model number AWUS036ACH. This is reviewed pretty well, and folks say the drivers are capable of all kinds of things.…
I’m listening to a webinar Air University is putting on called “Managing Traumatic Transitions” with Dr. Allen. She is actually talking about managing any type of transition, because all kinds of transition are traumatic to people.
She asked:
How many of us consider how individuals will grieve when we introduce change?
It’s clear that some people do better with change than other people. Any type of change. But grieving?
Many of us use computers that are locked-down by some corporate policy. The restrictions prevent you from downloading software, or running anything that’s not pre-approved. Most of us have used workarounds of some type - Excel spreadsheets created by that one guy in the office, Word documents with macros, Sharepoint sites, maybe even the occasional Powershell script…
One-File Tools are open-source self-contained one-file utilities implemented as a webpage. These are easily shared, easily used, their saved versions may contain your user data. They don’t require an Internet connection.