Voice Controlled Christmas Tree Lights

What we're building: https://youtu.be/Lgtpi0k7FD8 It's a great project to get started with learning about IoT, and Alexa. Hardware Particle Photon micro-controllerAdafruit Featherwing mini-relay (https://learn.adafruit.com/mini-relay-featherwings/overview)Amazon Alexa (Dot in my case...)Optional for some extra holiday cheer: Adafruit NeoPixel Stick (https://www.adafruit.com/product/1426) Circuit Diagram Fritzing file can be found here: https://github.com/dvas0004/SmartMote/blob/master/SmartMote_v1.fzz Notes, tips and tricks about the Hardware The … Continue reading Voice Controlled Christmas Tree Lights

Advertisements

Z-Wave : Lessons Learned – Python OpenZwave

This article explains a few missing pieces of the puzzle I had when setting up a home automation network using ZWave. Most of this information is available publicly but it took a while to find or to actually make the connection between what I wanted and what I needed to look for in the documentation.   … Continue reading Z-Wave : Lessons Learned – Python OpenZwave

Scraping real estate prices using python and visualization using maps

TL;DR An interactive map, accurate as of 13/08/2018 showing property prices per square meter in various areas of Tallin: https://dvas0004.github.io/TallinnRealEstate/ Data shown is for 3-bedroom apartments (resource limitations). Green is less expensive, red is more expensive. Clicking on a data point will show a popup containing the actual price per square meter for that data … Continue reading Scraping real estate prices using python and visualization using maps

How we built the CyberSift Attack Map

Recently we launched a small site called the "CyberSift Attack Map" hosted at http://attack-map.cybersift.io. Any one involved in the InfoSec industry will be instantly familiar with the site:   It's basically a map of attacks which either trip some rule in a signature based IPS such as SNORT, or land in a honeypot. In this article we'll list … Continue reading How we built the CyberSift Attack Map

Nugget Post: Insert an alert / rule name in emails sent from ElastAlert

ElastAlert is a fantastic python module that makes it easy to setup near - realtime alerts and responses to entries of interest. A quick piece of information  which I didnt find clearly documented was how to insert an alert name into a custom subject line sending email alerts.  A typical custom email alert rule file would include … Continue reading Nugget Post: Insert an alert / rule name in emails sent from ElastAlert

Proxy re-encryption

What is proxy re-encryption? Proxy re-encryption lets Alice send Bob a message (M) via a semi-trusted proxy, without revealing Alice's private key to either the proxy or Bob, and without revealing the secret message to the proxy. As Wikipedia puts it: "Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext … Continue reading Proxy re-encryption

Bringing reliability to OSSEC

As we saw in a previous blog post, OSSEC is UDP based. This is great for performance, and can scale to 1000s of nodes. However, it means there is an inherent problem of reliability. UDP is a connection-less protocol, hence the OSSEC agent has no guaranteed way of knowing that a particular event has been … Continue reading Bringing reliability to OSSEC