This README provides a step-by-step guide on how to create VLANs on OpenWRT-based routers (such as GL.iNet Mango) using the command-line interface via SSH. VLANs (Virtual LANs) enable network segmentation for enhanced security and management.
- OpenWRT-compatible router (e.g., GL.iNet Mango)
- SSH access to the router
This README demonstrates how to communicate with a Videojet printer using the Zipher Text Communications Protocol, as detailed in the official documentation:
π Protocol PDF: Zipher Text Coms Protocol v1.21
Database normalization is a fundamental methodology in relational database design. Its main objectives are:
- Reduce redundancy
- Prevent anomalies
- Maintain data integrity
This document provides an overview of the six normal forms, including BCNF, with practical examples.
Hash functions are ubiquitous in information security: they are used for integrity checks, content-addressed storage, digital signatures, password verification, and more. This document treats three families of constructions that have received the most attention in practice and in the literature: MD5 (an historical design of the MD family), SHA-2 (notably SHA-256, standardized in FIPS 180), and SHA-3 (the Keccak-based family standardized in FIPS 202). Where necessary we contrast the design principles (MerkleDamgrd vs. sponge) and explain the consequences for security. Key primary sources are cited: the MD5 specification (RFC 1321), the SHA standards (FIPS 180-4), the SHA-3 standard (FIPS 202), and major cryptanalytic work on MD5 and related constructions. citeturn0search0turn0search7turn3search2
Let (H:{0,1}^* o{0,1}^n) be a deterministic function mapping binary strings of arbitrary length to fixed-length (n)-bit o
In multi-user environments, providing controlled access to file transfer services is a recurring requirement. This document describes a structured procedure for configuring a non-privileged user account on Ubuntu 22.04.5 with access restricted exclusively to SFTP. Additionally, it outlines the optional configuration of reverse TCP tunneling over SSH, intended for controlled administrative or connectivity use cases. The configuration ensures compliance with security best practices by removing administrative privileges,
| <# | |
| RustDesk Portable (x64) Auto Downloader & Configurator | |
| ----------------------------------------------------- | |
| β’ Downloads the latest available RustDesk Windows x64 portable client from GitHub | |
| β’ No installation (single .exe) | |
| β’ Automatically sets: | |
| - ID server | |
| - Key | |
| (Relay e API non impostati) | |
| β’ Creates and updates a download log |
This repository provides a PowerShell script that automatically downloads, configures, and launches the RustDesk Windows x64 portable client, using only your self-hosted ID server and public key.
It is ideal for:
- π§ Mass deployment (RMM, GPO, Intune, etc.)
- π§° Technicians who need a ready-to-use portable RustDesk client
- πΌ Environments where software installation is restricted
Note

