All MikroTik newsletters in one place:
NEWSLETTER, ISSUE #67 - SEPTEMBER 2015
NEWSLETTER, ISSUE #66 - JULY 2015
NEWSLETTER, ISSUE #66 - JULY 2015
NEWSLETTER, ISSUE #64 - FEBRUARY 2015
NEWSLETTER, ISSUE #63 - JANUARY 2015
NEWSLETTER, ISSUE #62 - OCTOBER 2014
NEWSLETTER, ISSUE #61 - AUGUST 2014
NEWSLETTER, ISSUE #60 - JULY 2014
Republic of IoT 2018 - ESPectro32 and NB-IoT WorkshopAlwin Arrasyid
Getting started with ESPectro32 v2 boards and NB-IoT Backpack, brand new NB-IoT enabler product powered with U-blox's SARA R410M 02B LTE-M and NB-IoT powered module that supports TCP/IP and UDP/IP protocols. This workshop introduces the participant to ESPectro32 as "things" in IoT, and the concept of LPWA network and NB-IoT as one of the LPWA network technology.
"Costruiamo un Rover in 60 minuti" by Marco Dal Pino, Marco Minerva.
Si fa presto a dire IoT! In una sessione tutta codice, cacciavite e componenti vediamo come costruire un rover che possa muoversi in uno spazio sconosciuto evitando gli ostacoli e permettendo di rilevare parametri ambientali. Utilizzeremo tutte le principali tecnologie di prototipazione rapida ed interfacciamento dei sensori per costruire il nostro piccolo robot.
All MikroTik newsletters in one place:
NEWSLETTER, ISSUE #67 - SEPTEMBER 2015
NEWSLETTER, ISSUE #66 - JULY 2015
NEWSLETTER, ISSUE #66 - JULY 2015
NEWSLETTER, ISSUE #64 - FEBRUARY 2015
NEWSLETTER, ISSUE #63 - JANUARY 2015
NEWSLETTER, ISSUE #62 - OCTOBER 2014
NEWSLETTER, ISSUE #61 - AUGUST 2014
NEWSLETTER, ISSUE #60 - JULY 2014
Republic of IoT 2018 - ESPectro32 and NB-IoT WorkshopAlwin Arrasyid
Getting started with ESPectro32 v2 boards and NB-IoT Backpack, brand new NB-IoT enabler product powered with U-blox's SARA R410M 02B LTE-M and NB-IoT powered module that supports TCP/IP and UDP/IP protocols. This workshop introduces the participant to ESPectro32 as "things" in IoT, and the concept of LPWA network and NB-IoT as one of the LPWA network technology.
"Costruiamo un Rover in 60 minuti" by Marco Dal Pino, Marco Minerva.
Si fa presto a dire IoT! In una sessione tutta codice, cacciavite e componenti vediamo come costruire un rover che possa muoversi in uno spazio sconosciuto evitando gli ostacoli e permettendo di rilevare parametri ambientali. Utilizzeremo tutte le principali tecnologie di prototipazione rapida ed interfacciamento dei sensori per costruire il nostro piccolo robot.
Arduino Meetup with Sonar and 433Mhz Radiosroadster43
These are slides from our meetup. We give a quick intro to Arduino and then work thru a series of tasks. First we integrate the HC-SR04 sonar then transmit JSON with the cheap 433MHz radios. And finally we add a receiver to hear what others are transmitting.
The example code is on github here:
https://github.com/fwin-dev/arduino_sonar_web_api
Global Azure Bootcamp 2019 - Bandung - Microsoft Azure as Complete Solutions ...Alwin Arrasyid
The talk explains about what is Internet of Things from the back-end developers perspective and how Microsoft Azure can solve the problem that developers face in building a full-blown Internet of Things products especially on the cloud side of the products.
Making wearables with NodeMCU - FOSDEM 2017Etiene Dalcol
NodeMCU is an open hardware IoT platform based on eLua for the ESP8266 microcontroller. It allows creating low-cost projects using Wi-Fi and easy scripting in Lua, which makes it great for making wearables, for example. In this talk I'll give an introduction to the platform, show how I built an audio reactive graduation dress and share the materials to get you started on your own wearable project. This talk is ideal for beginners to hardware hacking or Lua enthusiasts looking for project inspiration.
Lightning talk from the 24 March 2016 FW Dev meetup.
http://www.meetup.com/FW-Dev/
This talk will give a brief overview of the ESP8266, show how easy they are to get started with and discuss interest in holding a Saturday workshop
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Jiunn-Jer Sun
Agenda
• IEC 62443 IACS standard
• Scope and why
• DHCP protocol and how it works
• DHCP’s Vulnerabilities
• Types of Cyber Attacks to DHCP
• Defense by network security DHCP Snooping
• Korenix products with advanced security features
DrayTek's EuP ( energy using products ) compliant solutions will assist residential / business users to reduce environmental burden and strengthen environmental performance.
With the objective of the EuP Directives :
Improve energy efficiency throughout the product’s life-cycle from mining of the raw materials to its end-of-life recycling, DrayTek will endeavor continuously by improving eco-friendly
communications system, material supply, production, transportation and decommission of DrayTek series products.
In the following slides we will show you how to create a #DMZ using the #FortiGate
#Firewall. See next chapters on #FortiGate configuration. Stay with us!
Arduino Meetup with Sonar and 433Mhz Radiosroadster43
These are slides from our meetup. We give a quick intro to Arduino and then work thru a series of tasks. First we integrate the HC-SR04 sonar then transmit JSON with the cheap 433MHz radios. And finally we add a receiver to hear what others are transmitting.
The example code is on github here:
https://github.com/fwin-dev/arduino_sonar_web_api
Global Azure Bootcamp 2019 - Bandung - Microsoft Azure as Complete Solutions ...Alwin Arrasyid
The talk explains about what is Internet of Things from the back-end developers perspective and how Microsoft Azure can solve the problem that developers face in building a full-blown Internet of Things products especially on the cloud side of the products.
Making wearables with NodeMCU - FOSDEM 2017Etiene Dalcol
NodeMCU is an open hardware IoT platform based on eLua for the ESP8266 microcontroller. It allows creating low-cost projects using Wi-Fi and easy scripting in Lua, which makes it great for making wearables, for example. In this talk I'll give an introduction to the platform, show how I built an audio reactive graduation dress and share the materials to get you started on your own wearable project. This talk is ideal for beginners to hardware hacking or Lua enthusiasts looking for project inspiration.
Lightning talk from the 24 March 2016 FW Dev meetup.
http://www.meetup.com/FW-Dev/
This talk will give a brief overview of the ESP8266, show how easy they are to get started with and discuss interest in holding a Saturday workshop
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Jiunn-Jer Sun
Agenda
• IEC 62443 IACS standard
• Scope and why
• DHCP protocol and how it works
• DHCP’s Vulnerabilities
• Types of Cyber Attacks to DHCP
• Defense by network security DHCP Snooping
• Korenix products with advanced security features
DrayTek's EuP ( energy using products ) compliant solutions will assist residential / business users to reduce environmental burden and strengthen environmental performance.
With the objective of the EuP Directives :
Improve energy efficiency throughout the product’s life-cycle from mining of the raw materials to its end-of-life recycling, DrayTek will endeavor continuously by improving eco-friendly
communications system, material supply, production, transportation and decommission of DrayTek series products.
In the following slides we will show you how to create a #DMZ using the #FortiGate
#Firewall. See next chapters on #FortiGate configuration. Stay with us!
Refer to RTP Programmability and Automation Meetup Group:
https://www.meetup.com/Cisco-Programmability-and-Automation-Meetup-Group/events/278002529/
As engineers embrace infrastructure-as-code, building in testing and sanity checks of the proposed changes becomes critical. Batfish is an open-source tool that does network configuration analysis. Some of the project’s capabilities include analysis of system information, routing and forwarding tables, and ACLs. Batfish is written in python and is consumable in python, but also has Ansible modules available.
Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)Jakub Botwicz
Presentation about 3rd release of Cotopaxi toolkit from Black Hat Europe 2019 Arsenal session. Author: Jakub Botwicz
https://www.blackhat.com/eu-19/arsenal/schedule/index.html#cotopaxi-iot-protocols-security-testing-toolkit-18201
"This workshop is for pentesters, security researchers or someone looking to get into IoT security but is reluctant due to the wide range of technologies involved and plethora of different tools. While it does require a considerable amount of knowledge in the domain, it is not as difficult as you may think. In this workshop we will introduce you to some of the important concepts and EXPLIoT framework in a very simple way that can be used for the various IoT attack vectors. The primary focus of this workshop is to introduce the attendees to the open source IoT Security Testing and Exploitation Framework - EXPLIoT (https://gitlab.com/expliot_framework/expliot) and enable them to use as well as extend it by writing plugins for new IoT based exploits and analysis test cases. It’s a flexible and extendable framework that would help the security community in writing quick IoT test cases and exploits. The objectives of the framework are:
1. Easy to use
2. Extendable
3. Support for hardware, radio and IoT protocol analysis
EXPLIoT currently supports the following protocols which can be utilized for writing new plugins/exploits:
1. Radio – BLE , Zigbee
2. Network – MQTT, CoAP, DICOM, MODBUS, MDNS, NMAP, TCP, UDP
3. Hardware – CAN, SPI, I2C, UART, JTAG
This talk would give attendees a first-hand view of the functionality, how to use it and how to write plugins to extend the framework."
Gustavo Zastrow - Introduction to AWS IoT Core and MQTTGustavoRuizZastrow
Introduction to IoT Core and MQTT concepts. Demo using a Raspberry Pi and temperature and humidity sensors publishing to AWS IoT Core. Rules to plot values in Cloudwatch and alert using SNS.
Presented on 05-15-2019 at Arlington AWS Meetup
Radio Frequencies are all around us. Our organizations use them, and our traditional security measures don't often account for them. What sort of tools and programs do you need to help you find them so that you can begin to have conversations about the information on them and how to secure it.
WiFiSlax es una distribución GNU/Linux diseñada y estructurada para la auditoría de seguridad, especializada en evaluaciones de seguridad inalámbrica.
Contiene una amplia lista de herramientas de seguridad y auditoría donde se incluyen escáneres de puertos, de servicios y de vulnerabilidades, herramientas para creación y diseño de exploits, ‘sniffers’, herramientas de análisis forense y herramientas para la evaluación de la seguridad de dispositivos wíreless.
En esta presentación oficial de la versión 4.0 se mostrarán una serie de importantes cambios estructurales que han permitido al grupo de desarrolladores continuar innovando en cuanto al soporte hardware tal y como han hecho en sus anteriores versiones anticipándose al resto de distribuciones. Estos cambios les han permitido mantenerse en la vanguardia en las tecnologías inalámbricas.
Anaren Integrated Radio (AIR) module introductionAnaren, Inc.
Developed in concert with Texas Instruments as part of TI's Design Network, Anaren Integrated Radio (AIR) modules are the industry's easiest, most elegant, and most cost-effective way to implement low-power RF capability... Whether your goal is designing a "wireless" version of a currently "wired" product -- or developing a wireless product from the ground up. Each AIR module (think of it as a tiny, wireless data transmitter and receiver) incorporates a proven Texas Instruments low-power RF transceiver chip and is compatible with all TI-approved software stacks. As such, AIR modules offer you excellent performance, tiny footprints, ease-of-use, and pre-established compliance with applicable regulatory standards (including FCC, IC, and ETSI). And because AIR is a self-contained, SMT module -- you save the time and costs associated with developing your own radio solution. Download our AIR product line brochure, for a more detailed AIR product line overview.
> Starting at under $10 per module, for orders of 10K or more
> Easy implementation on existing, two-layer PCB
> Minimal RF engineering experience necessary
> Tiny common footprints across the product line, based on functionality
> Pre-certified to applicable FCC/IC standards or compliant with ETSI -- saving you certification time and financial resources
> Choice of embedded PCB antenna or connectorized antenna (accepts a standard U.FL monopole antenna)
> 100% RF-tested in production
> Low power consumption based on TI's low-power RF/transceiver chips
> Quick and easy wireless solution for many MSP430 applications
> Choice of frequencies to match your application, including: 433MHz (go to modules and development tools in this frequency range); 868MHz for use in Europe (go to modules and development tools in this frequency range); 915MHz (go to modules and development tools in this frequency range); 2.4GHz (go to modules and development tools in this frequency range) or learn more about our wireless audio module, AIR modules for ZigBee Standard applications, and AIR modules featuring Bluetooth SMART -- all of which also operates in the 2.4GHz range
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
4. Bluetooth
• Bluetooth is a wireless technology standard for
exchanging data over short distances (using
short-wavelength UHF radio waves in the ISM
band from 2.4 to 2.485 GHz) from fixed and
mobile devices, and building personal area
networks (PANs). (wiki)
5. History
• Named on 10th century king Herald Bluetooth
• Proposed by Jim Kardach
• In 1997
• A system which communicate b/w phone and comp
• BSIG
6. Capability
• Wireless
• Short Range
• Less energy
• Cheap
• Personal
• Easy
• Multipoint
• Frequency hopping
• [in]secure
7. Where is being used
• Phone/Computer/Camera/Speaker
• Watch/Fitness Band/Car/door locks
• Cooker/coffee machine/trimer/dryer
• Medical devices : ventilator/blood glucose
monitor
• Payment solution
• 7 Million Devices
22. Key Exchange Protocol
• Three stage process
• 3 pairing methods
• Just Works
• 6-digit PIN
• OOB
• “None of the pairing methods provide protection
against a passive eavesdropper” -Bluetooth Core
Spec
54. Ubertooth Spectrum Analyzing
(before Kismet)
• Connect the ubertooth one to your USB port
• If you are using a virtual machine, enable it
on the Devices/Usb Ports and seek the ubertooth
one
• Two green LEDs (RST and 1.8V) and the red LED
(USB LED) that indicates Ubertooth can
communicate via USB port.
109. Handle pcap file to crackle
isaias@ubuntu:~/crackle-sample# crackle -i ltk_exchange.pcap -o
decrypted.pcap
TK found: 000000
ding ding ding, using a TK of 0! Just Cracks(tm)
Warning: packet is too short to be encrypted (1), skipping
LTK found: 7f62c053f104a5bbe68b1d896a2ed49c
Done, processed 712 total packets, decrypted 3
110. To listen in on future
communications between the two
devices : using LTK captured
isaias@ubuntu:~/crackle-sample# crackle -i encrypted_known_ltk.pcap
-o decrypted2.pcap -l 7f62c053f104a5bbe68b1d896a2ed49c
Warning: packet is too short to be encrypted (1), skipping
Warning: packet is too short to be encrypted (2), skipping
Warning: could not decrypt packet! Copying as is..
Warning: could not decrypt packet! Copying as is..
Warning: could not decrypt packet! Copying as is..
Warning: invalid packet (length to long), skipping
Done, processed 297 total packets, decrypted 7
113. Thank you all, and Special
thanks to…
• Philips and team
• Minatee Mishra
• Anirudh Duggal
• Sanjog Panda
• Pardhiv Reddy
• Ajay Pratap Singh
• Geethu Arvind