TrafficWatch

TrafficWatch is a simple node.js app I wrote after trying to get Ian Harmon’s traffic time-lapse-helper project working in Python for 30min or so on MacOS, I gave up and wrote TrafficWatch in about an hour. There are some arguments that you can specity as well if you want look at somethign other than Chicago traffic:

  • –name / -n Name for the GIF in the upper-left corner
  • –url / -u URL String for that we will be time-lapsing
  • –interval / -i The time interval (in minutes)
  • –duration / -d The number of minutes to run
  • –gifout / -g The output filename for the GIF
  • –xoffset X Offset for the crop (0 means centered)
  • –yoffset Y Offset for the crop (0 means centered)
  • –font Font for the name and time display in the upper-left corner (default is Arial)
  • –fontsize Size of the text (default is 32)
  • –fontcolor Color of the text (default is #000000b0)
  • –directory Path for the individual screencaps (default is screenshots)
  • –gifdelay The ms delay timer for the GIF animation (default 500)

An example output would look something like this:

example-gif

Comment and share

So I got a couple of these fantastic little embedded systems from Next Thing, and started to try to set one of them up how I would like to see it setup. Basically I was looking for a web browser, SSH installed, and a few aliases to make things easy to work with.

NOTE: All of the operations below assume a basic understanding of terminal commands!

Updating the PocketCHIP and installing the software

To start off, the PocketCHIP OS is slightly out of date as it’s currently being flashed, so the first thing we need to do is update the OS to current:

1
sudo apt-get update

Now lets go ahead and install the needed packages (Note: “\” and lines are used here for page cleanliness).

Continue reading

Aside from a few hiccups that delayed getting Dofler installed and fully functional until mid-day Saturday, Dofler was a fantastical success at CircleCityCon! We discovered that the new codebase Dofler sits on was catching more entertainment than ever, including some MJPEG-based webcams:

In the evening, Dofler made it’s way to the party and fun was had at a much larger scale ;).

Thanks to everyone who connected up and was purposefully trolling the board for everyone else’s amusement! See ya’ll at BSidesLV!

Comment and share

I have started working through all of the various fabric files I have and started centralizing them and cleaning them up for general consumption. These fabric scripts cover a variety of tasks from deployment and maintenance of various products to deploying some of my code. I will be updating the repository as needs arise, and as always am welcome to any input.

Using my fabric files is actually pretty simple, however you need to have fabric installed on your workstation before anything will work.

1
2
cd deploy

Now as long as your in the deploy directory, the fab command should work for deployment and management. To get a list of the available commands, run fab -l

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
(fabric)tnsmbp:deployment smcgrath$ fab -l
Available commands:
nessus.install Installs/Updates Nessus.
nessus.plugin_push Pushes plugin tarball to the remote scanner.
nessus.prep Prepares a vanilla system for use as a Nessus scanner.
prep.prep Generic preparation script for CentOS/RHEL boxen.
prep.rmate Installs the rmate shell script into /usr/local/bin
prep.sshkeys Pushes the management keys to remote server.
prep.template Performs the needed actions to make the host templatable.
prep.update Updates the OS to current
pvs.install Installs/Updates PVS.
pvs.prep Prepares a vanilla system for use as a PVS sensor.
sc.getfeed Pulls the plugin feeds from SecurityCenter to the local box.
(fabric)tnsmbp:deployment smcgrath$
`
Continue reading

After running CUGNet for a dozen or so years and having yet to break even, last week I made the hard decision to close down CUGNet’s VPS services. It was a hard choice to make, as its something that I have done for many years, however with the propensity of cloud services and VPS providers out there, What I can offer is simply not competitive and the I need to start cutting down on the number of side projects that I have been running in order to keep my own sanity. I will be keeping the VPS services up and running at least past DefCon, however after that point the servers will eventually be shut down and the hardware de-racked. It’s been a long run for CUGNet, however as with anything else, all good things must eventually come to an end.

Comment and share

I’m proud to announce the general availability for pySecurityCenter version 2.1.x accessible from PyPI immediately. pySC 2.1 supports connectivity to SecurityCenter 5, which leverages a completely new RESTful API. Because of this, the pySC SecurityCenter 5 support will be an evolving process. Whats implemented today will not be changing, however many of the convenience functions that pySecurityCenter has for SecurityCenter 4.x have not been coded into the SC5 module, as enumeration for the API is still active. Further I don’t want to paint myself into a corner with SC5 support, as I expect the API to evolve a bit over time, and don’t want pySC to need a lot of work to support multiple revisions of the SC5 API.

We shall see what happens over the long haul, however there is already a couple of examples on how to leverage the 5.x module in the examples section within the GutHub repository.

To upgrade:

1
pip install -U pysecuritycenter

or download the tagged version and install manually.

Continue reading
  • page 1 of 1
Author's picture

Steve McGrath

echo stuff > /dev/random


Sales Engineer


Chicago, IL