Categories
Uncategorized

Rebirth of the Raspberry Pi again…

This time I am exploring the use of a Raspberry Pi as an Intrusion Detection System (IDS) and/or security monitoring/tracking system for your LAN. Travis F Smith who wrote here, http://www.tripwire.com/state-of-security/security-data-protection/sweet-security-part-2-creating-a-defensible-raspberry-pi/ says in part 1 of his postings on his blog that the Raspberry Pi 2 B is http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/sweet-security-deploying-a-defensive-raspberry-pi/  from the article: As a proof-of-concept, […]

Categories
Uncategorized

Explorations of the Cyberspace Kind

So you want to roll out a Linux installation on AWS for example. There’s one here. on Amazon’s site and I have included a short exerpt from their web page below: Getting Started with Amazon EC2 Linux Instances Let’s get started with Amazon Elastic Compute Cloud (Amazon EC2) by launching, connecting to, and using a […]