We’ve landed at #AWSSummitLondon 🇬🇧

📍 AWS Zone North — booth S25 (between Athena & Apollo Partner Theatres)

We’re also sponsoring the photo booth 📸 and yes, we’ve got swag. Come find us and tell us what you’re working on, we’re all ears. See you there 👀

#AWSSummit #AWS #VPN #SecureNetworking #LondonTech #DevOps

**Библиография:**
Reticulum Network Stack — Официальная документация и техническое описание.
Mark Qvist. *Reticulum: A Resilient Communication Stack for Building Local and Wide-Area Networks*.
GitHub — Репозиторий Reticulum Network Stack и аппаратных интеграций.
LoRa SX127x/SX128x — Документация Semtech по радиомодулям малой мощности.
Raspberry Pi Foundation — Материалы по построению сетей на базе SBC.
AX.25 Specification — Пакетный радиопротокол, используемый в любительских радиосетях.
KISS TNC — Техническое описание протокола для терминальных узлов.
**Хэштеги:**
#Reticulum #RNS #MeshNetwork #LoRa #OffGridComms #DecentralizedNetworking #RadioMesh #AltNet #DistributedComms #CryptoRouting #SecureNetworking #AutonomousNetworks #LoRaWAN #SBC #RaspberryPi #ESP32 #RP2040 #OpenHardware #SurvivalComms #EmergencyComms
**Библиография:**
Reticulum Network Stack — Официальная документация и техническое описание.
Mark Qvist. *Reticulum: A Resilient Communication Stack for Building Local and Wide-Area Networks*.
GitHub — Репозиторий Reticulum Network Stack и аппаратных интеграций.
LoRa SX127x/SX128x — Документация Semtech по радиомодулям малой мощности.
Raspberry Pi Foundation — Материалы по построению сетей на базе SBC.
AX.25 Specification — Пакетный радиопротокол, используемый в любительских радиосетях.
KISS TNC — Техническое описание протокола для терминальных узлов.
**Хэштеги:**
#Reticulum #RNS #MeshNetwork #LoRa #OffGridComms #DecentralizedNetworking #RadioMesh #AltNet #DistributedComms #CryptoRouting #SecureNetworking #AutonomousNetworks #LoRaWAN #SBC #RaspberryPi #ESP32 #RP2040 #OpenHardware #SurvivalComms #EmergencyComms

Secure Networking Explained | Go Incognito 5.4

https://techlore.tv/w/rc9Y9KPCzLmozPGXb51p39

Secure Networking Explained | Go Incognito 5.4

PeerTube
GrapheneOS (@[email protected])

GrapheneOS network location implementation is now available in the Stable channel after several rounds of fixes and improvements for it. https://grapheneos.social/@GrapheneOS/114076777599414646 We had to fix an upstream Android system_server crash bug it uncovered along with improving sandboxed Google Play.

GrapheneOS Mastodon

Understanding Industrial Routers for Reliable Connectivity in Harsh Environments

Industrial routers are networking devices designed specifically for industrial environments that require reliable connectivity even in harsh conditions like temperature extremes, vibration, dirt and dust.

Industrial Routers- https://prachicmi.livepositively.com/understanding-industrial-routers-for-harsh-environments/new=1

#CoherentMarketInsights #IndustrialNetworking #RemoteMonitoring #RobustConnectivity #SecureNetworking

Understanding Industrial Routers for Harsh Environments

Routing Needs for Demanding Industrial Settings Modern industrial environments present unique challenges for networking equipment due to factors like wide temp

https://livepositively.com/
Boost your Librem device's connectivity! Our simple Ethernet adapter adds a wired port for fast, secure networking. Perfect for privacy-focused professionals.
#Purism #LibremDevices #PrivacyFirst #SecureNetworking #EthernetAdapter
https://shop.puri.sm/shop/usb-c-ethernet/
USB-C to Ethernet – Purism

Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.

The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)

Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...

Here are some key points from the article:

1. **Log in with nsroot or another administrative account.**

2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```

3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```

4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```

5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```

6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```

7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```


#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness

Checklist for NetScaler (Citrix ADC) CVE-2023-3519 – Deyda.net

Checklist for NetScaler (Citrix ADC) CVE-2023-3519 ADC Deyda.net

Deyda.net

You have enough to do already- maintaining backups of your #pfSense software shouldn't be one of them.

Let us take this one for you.

Check out how to do it in 3 minutes or less & share to help a friend ⤵️

https://youtu.be/ctpa1AGyFYQ

#securenetworking, #networking, #firewall

Automatic Configuration Backup

YouTube