A Network Card For The Trash-80

Around these parts, [Peter] is well-known for abusing the TRS-80 to do things it should never do. You can read Wikipedia on the TRS-80, you can look at Google Images, and you can browse the web. As with any retrocomputer, there are limitations for what you can do. To browse Wikipedia, [Peter] had to set up an AWS instance which translated everything and used serial to IP converters. It can be done, but it’s hard.

Now, after seeing a few interesting projects built around the ESP32, [Peter] built a network card for the TRS-80. It’s called the trsnic, and it’s …read more

Continue reading A Network Card For The Trash-80

35C3: Safe And Secure Drivers In High-Level Languages

Writing device drivers is always a good start for a journey into the Linux kernel code. Of course, the kernel is a highly complex piece of software, and if you mess up your code properly, you might take down the entire system with you. User-space drivers on the other hand might not look as good on your CV, but they can help to work around some of the dangers and complexity of the kernel space. Plus, you don’t necessarily have to limit yourself to C to write them, especially if you are concerned about the usual C pitfalls and the …read more

Continue reading 35C3: Safe And Secure Drivers In High-Level Languages

Associating Azure Network Security Groups

OWA Undo Send in action

Aidan Finn explains how the two options for associating a network security group (NSG) work, virtual machine NIC or subnet, and I’ll recommend a method to use.

The post Associating Azure Network Security Groups appeared first on Petri.

Continue reading Associating Azure Network Security Groups

34C3: Roll Your Own Network Driver In Four Simple Steps

Writing your own drivers is a special discipline. Drivers on the one hand work closely with external hardware and at the same time are deeply ingrained into the operating system. That’s two kinds of specialization in one problem. In recent years a lot of dedicated networking hardware is being replaced by software. [Paul Emmerich] is a researcher who works on improving the performance of these systems.

Making software act like network hardware requires drivers that can swiftly handle a lot of small packets, something that the standard APIs where not designed for. In his talk at this year’s Chaos Commnication …read more

Continue reading 34C3: Roll Your Own Network Driver In Four Simple Steps

Check Communications Between Virtual Machines in Azure

Aidan Finn demonstrates how you can use Azure’s Network Watcher to check if one Azure virtual machine can talk to another.

The post Check Communications Between Virtual Machines in Azure appeared first on Petri.

Continue reading Check Communications Between Virtual Machines in Azure

Deploying and Configuring Network Security Groups in Azure ARM

Azure Cloud Hero Server Devices

This post will show you how to use Azure Resource Manager (ARM) or a CSP subscription to deploy network security and policy enforcement in the form of network security groups (NSGs).

The post Deploying and Configuring Network Security Groups in Azure ARM appeared first on Petri.

Continue reading Deploying and Configuring Network Security Groups in Azure ARM