CO Detector Hack – Part 1

CO Detector Hack – Part 1

I’ll be covering a tear down of an off the shelf CO detector in this post. Next I’ll cover some advanced features that I discovered while testing the CO detector. This unexpected discovery is the reasoning behind a slight delay in the publishing of this post. The CO detector I’ll be using in this example will be a First Alert Carbon Monoxide Alarm, model number CO400. It should be noted that tampering with the alarm can result in the unit…

Read More Read More

DD-WRT and network control

DD-WRT and network control

In my last post I talked about RetroPie and the build it is based off of. I would like to continue with the discussion about unknown devices on a network. This situation isn’t unique to just the RetroPie, as we see the mass proliferation of IoT devices. Aside from all of the mobile devices, such as phones and tables, there is an increase number of “smart” devices that connect to the network wirelessly. Google, Amazon, and Apple are just a…

Read More Read More

RetroPie, Emulation Station, and Webmin

RetroPie, Emulation Station, and Webmin

Peter Carcione made a youtube clip last year about Game Wizard’s adaptation of RetroPie, a game console emulator that plays video games from the early days of gaming. It runs on a Raspberry Pi and provides an all inclusive interface to run the various console platforms. He provides a step by step that still works as of this writing, you can find it here One of the things that I noticed was that the distro that RetroPie ran on was…

Read More Read More

Managed Network Switches

Managed Network Switches

This post is a continuation from my last post that covered network management. I’ll be showing how to use a managed network switch to identify and control the devices that connect on a network. These devices need a way to connect to each other and it is the switch that provides that physical connection. Wireless devices may seem like they are outside this realm, but they too connect to a switch through their access point. Network managed switches offer a…

Read More Read More

Network Monitoring with NMAP, DNS, and DHCP

Network Monitoring with NMAP, DNS, and DHCP

Keeping track of devices on a network might not be an item that ordinary users will concern themselves with. Most users will simply be satisfied that their device has an internet connection. With the recent rise of IoT, mobile, and home automation devices it would be wise to take a closer look at those devices that occupy your network space. In this post I’ll cover how users can monitor their networks using DNS, DHCP, and NMAP. By default, most devices…

Read More Read More

Desktop Capture – Images and Video

Desktop Capture – Images and Video

A screen capture, as either an image or video, is a useful way to gather details about a computer program or behavior. These details can be used later as a reference. One common example are videos that provide “how to” instruction with step by step details being replaced with a follow along method. In this post I’ll be covering how to capture the desktop screen of a computer and creating image or video files. I’ll be using built in functions,…

Read More Read More

VM Sandboxing Data

VM Sandboxing Data

In previous posts, VirtualBox sandbox creation was covered. VM exporting and importing were also covered as a way to migrate to new hosts. In this post I’ll be covering how to work with sandbox data. The data on a sandbox more often than not needs to remain isolated from other systems. This is a challenge when data needs to be placed on or retrieved from the sandbox. There are a few ways to do this, which we will cover here….

Read More Read More

VM Sandboxing with VirtualBox

VM Sandboxing with VirtualBox

Sandboxing is a term used to describe a computer environment that uses 1 or more computer systems that are logically separated from a production computer environment. The sandbox environment allows administrators to test conditions that will not influence the production environment. Unlike a lab environment that will replicate exactly what exists in a production one, sandboxing is primarily used to test behaviors. This post will cover how to use VirtualBox to create and operate a sandbox environment. It will not…

Read More Read More

Moving VMs in VirtualBox

Moving VMs in VirtualBox

In this post, I’ll be covering how to export and import virtual machines in VirtualBox. This will allow you to move VMs from one system to another. As a consequence, it also provides a method of backup and recovery. VirtualBox is a virtual machine hosting app that can be installed on Linux, Mac, or Windows computers. VirtualBox provides these hosting computers a way to run virtual computers that mimic traditional computers. The VMs consist of similar components that make up…

Read More Read More

SoX Background Audio Monitoring – Triggered Recordings

SoX Background Audio Monitoring – Triggered Recordings

SoX offers quite a few ways to record audio. In this post, I’ll be covering how to record audio for the purposes of security. Home invasions are a sad fact of modern life for any number of reasons. I’ll show how to use SoX to capture audio so it can be added to the tools available to secure your personal belongings. One of the most simplest ways to get a recording from a microphone is to use the following commands….

Read More Read More