|
You are here |
www.kensodev.com | ||
| | | | |
www.micahwalter.com
|
|
| | | | | There are now several ways to read the short story I wrote earlier this year. You can of course always re-read the serialized "blog style" story on Substack. But, if you want a more traditional book style format, I have a couple options for you. Why all the formats? Well, I guess I just believe [...] | |
| | | | |
www.jamieweb.net
|
|
| | | | | Using Tor to aid various system administration tasks, including checking firewall rules, bypassing internal network restrictions and connecting to remote systems that are behind NAT/CGNAT. | |
| | | | |
samy.pl
|
|
| | | | | exploit NAT/firewalls to access TCP/UDP services bound to any system behind victim's NAT | |
| | | | |
www.chiark.greenend.org.uk
|
|
| | | |||