Author Archives: DEC

Xen Server

http://xenserver.org/

Beginning with a virtualized foundation with your operating system software. On top of this base, one can run any of the modem day Operating Systems like Windows 10, Mac OS X, Linux and other experimental platforms.

This might seem like overkill or extreme until you understand the stability that you are introducing beyond what commercial corporations like Microsoft which are intrinsically limited because they are Closed Source. Closed Systems are unable to counter entropy of their performance over time.  Use your computer for a while and don’t perform any maintenance and see how much your computer slows down.

My systems do not. This is one of many principles that I bring to my business NetworkIron Solutions Inc. and here to The Source Lab blog.

Regards,

David

Rebirth of the Raspberry Pi again…

This time I am exploring the use of a Raspberry Pi as an Intrusion Detection System (IDS) and/or security monitoring/tracking system for your LAN.

Travis F Smith who wrote here, http://www.tripwire.com/state-of-security/security-data-protection/sweet-security-part-2-creating-a-defensible-raspberry-pi/ says in part 1 of his postings on his blog that the Raspberry Pi 2 B is http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/sweet-security-deploying-a-defensive-raspberry-pi/  from the article:

As a proof-of-concept, I built a Raspberry 2 Model B running Bro, Critica-Stack, Losgstash, Elastic Search and Kibana and placed it in-line on my own home network between the router and the rest of my internal network. This setup has been running for more than a month without any issues, using less than half of the available CPU and memory resources on the Raspberry Pi.

My older Raspberry Pi 1 may work just as well. More to come…

 

Source code for Travis’s project:  https://github.com/TravisFSmith/SweetSecurity

The “Bro” IDS open source project:  https://www.bro.org/

 

Explorations of the Cyberspace Kind

So you want to roll out a Linux installation on AWS for example. There’s one here. on Amazon’s site and I have included a short exerpt from their web page below:

Getting Started with Amazon EC2 Linux Instances

Let’s get started with Amazon Elastic Compute Cloud (Amazon EC2) by launching, connecting to, and using a Linux instance. An instance is a virtual server in the AWS cloud. With Amazon EC2, you can set up and configure the operating system and applications that run on your instance.

When you sign up for AWS, you can get started with Amazon EC2 for free using the AWS Free Tier. If you created your AWS account less than 12 months ago, and have not already exceeded the free tier benefits for Amazon EC2, it will not cost you anything to complete this tutorial, because we help you select options that are within the free tier benefits. Otherwise, you’ll incur the standard Amazon EC2 usage fees from the time that you launch the instance until you terminate the instance (which is the final task of this tutorial), even if it remains idle.

So after you give their documentation and walk-thru a go.

Notes from the Lab

Well, one of the machines here in the lab is updating itself from Microsoft.

Disconnected from the Internet for now, let’s see how long this takes. So far, we’re HOURS into an update. Maybe the machine is too old, since it is a 32 bit computer.

Using a Raspberry Pi 1 for a while as a desktop, was an experience. Low graphic and cpu load jobs. Can be used as a remote terminal for systems that I administer.

Now I am going to repurpose it.

 

Translate »