From 200abbd8eea10f952d64436e0d2c7ad33fc55c9f Mon Sep 17 00:00:00 2001 From: Ken Fallon Date: Fri, 29 Aug 2025 12:32:31 +0200 Subject: [PATCH] Move Requested topics #13, created new pages --- requested_topics/README.md | 92 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 92 insertions(+) create mode 100644 requested_topics/README.md diff --git a/requested_topics/README.md b/requested_topics/README.md new file mode 100644 index 0000000..1ccb1a8 --- /dev/null +++ b/requested_topics/README.md @@ -0,0 +1,92 @@ +# Requested topics + +This is a list of topics that have been requested by the community. + +## General + +- How did you get into podcasting/linux/geekdom? +- What podcasts you listen to and can recommend +- What's in your bag? Tell us what tools/gear/stuff you keep close at hand. +- What got you into Linux? +- Your favorite Android applications. +- Your favorite desktop applications. +- Your favorite browser extensions. +- A introduction to Wireshark. +- How to set up your own blog. +- Choosing a artistic design for website, business cards etc. +- Music Theory +- Installing a VPN to your home network +- Init and System.d +- Episodes for the LPI, or the Networking series. +- Beginning Audio Series for HPR and OSMP Release +- Hackintosh computers - what are they, why would you want one. +- Grub 2.0 introduction and customization. +- FM Transmitter hack to listen into internet streams +- How I Got Into Accessible Computing +- How to do knitting +- How to build a house +- How to solder hpr1037, + hpr1047 +- How to weld +- How to fix a car +- Reviews of stream playing software, (for linuxheads who don't want to keep a browser tab open all the time) +- Reviews of stream ripping software on linux +- Beginners guide to gnuplot +- Nagios series, intro, setup, advanced ... +- How to set up GPG/openPGP +- What I do with my Raspberry Pi +- It broke, I fixed it +- How does coreboot work +- Introduction to HAM Radio +- I've moved and they do it like this here +- How to record a tag team tutorial on a topic +- Open Street Map new editor +- etymology +- functional versus procedural programming +- sed, awk and grep +- Setting up imap/smtp (gmail) in a cli mail program +- Irssi - a sane setup +- Your view of the future +- Alternative uses for Bayesian email classifiers (more info) +- How to use a multimeter, and other basic electronic components like a 555 timer +- How does Hubble remain fixed on a spot in space while in orbit of the earth +- Gnu automake system. +- Any experiences integrating Dell/Wyse thin- and zero- clients into linux networks. +- What Are the Answers I Need, To the Questions I Don't Know Enough to Ask? + +## Networking + +### IPv6 + +- What is an IP address, and what is IPv6 - basic settings. Why can't we just NAT at the ISP level, are there privacy issues in having your MAC address as part of your IP? +- How to setup IPv6 on Linux, BSD, Windows, Mac, Spark, Android etc +- IPv6 Addressing terminology , format, shortcuts, address structure, (link local, unique and global), reservations, subnetting, allocation +- IPv6 Firewall, what to block what to allow +- Packet structure +- Troubleshooting IPv6 network issue, using common tools with IPv6, ping icmp, telnet, curl, tcpdump, wireshark,etc +- How discovery is handled, what is used for dhcp +- DNS server setup +- Routing server setup +- Setting up common services like ssh, apache, nginx +- Setting up VPN like wireguard +- Explanation of the new Anycast and why you would use it. +- Transition plans tips and tricks. + + +## Security + +What do we need for a firewall and what are the detection/prevention technologies that we could be implementing? +Beyond Firewall and an IDS/IPS, what do I need? +If you were to treat your home network like a corporate server farm, what tools and hardware would it entail to treat your home network like a security professional? +Should one use a secondary IDS, behind the firewall, to record what the primary defenses missed. +Where and how do I set that up? +Beyond firewall and IDS, what other tools should we be running ? +Where should they be in my network, and how many physical boxes are we talking about ? +Emphasis should be on low power devices and free as in beer tools. + +How to Read Logs and Formulate a Response to an Intrusion. +What I've learned from SW, is that you can't prevent an intrusion, it's how to respond when you are compromised. +Again, according to SW, the security manager's job is to detect intrusions, inside 48 hours rather than 48 months. +How can you protect your proprietary data and customer database? +Better uses for IPFS and IPNS to get a better understanding of practical use of this. +