Individual IPv6 Address Regex Generator

Given a valid IPv6 address, this generator returns a regular expression which will match all valid forms of that IPv6 address. This includes compact forms, canonical forms and all other ways of writing the Ipv6 address. An IPv6 address regex is a regular expression pattern used to validate and match IPv6 addresses in text strings….

Read More

An Introduction To BGP Traffic Shaping

Border Gateway Protocol (BGP) is the protocol of the Internet. It is the main external gateway protocol used to connect separate networks to one another. This article provides an easy to understand introduction to BGP and how it is used to shape traffic. It describes how BGP is used to ensure that the Internet is…

Read More

OHosti Review

OHosti is the first result I found when I put “free VPS” into google. I checked out their website, and man, it looks slick. The site looks professional and well put together. It also looks like they offer a ton of stuff, all for free. If something sounds too good to be true, then it…

Read More

XPath Selecting Text() And Link Text()

Websites are made up of HTML, which is a form of XML. XPath is a syntax for selecting sections of XML. It is useful for scraping websites. One of the most popular uses for XPath can be found within the lxml library of Python. There are other libraries and programs that allow you to scrape…

Read More

How To Compile TypeScript On The Command Line

TypeScript is a programing language that is a superset of JavaScript. It allows setting types and allows ES6 functionality. It is the preferred language of Angular2 and is maintained by Microsoft. To compile TypeScript into JavaScript you need to have TypeScript installed. To install TypeScript using the Node Package Manager (npm) type the command: npm…

Read More

Connecting Apple Laptop To Cisco Console Port

If you have physical access to a switch or router you can use a console cable to log into that router or switch. Doing so will allow you to make changes to the device’s configuration, such as setting the telnet password. Setting a telnet password will then allow you to log into the switch or…

Read More

Digital Ocean DDOS attack

Distributed denial of service (DOS) attack happen to all service providers on the Internet. Almost every large Internet company is a victim of DDOS attacks. This is because the attacks are relatively easy to perform and they are effective. Digital Ocean (DO) is no exception. In fact, they are more likely to be the targets of…

Read More

Make Bulma Burger Menu Interactive

Bulma is a popular css framework based on flexbox. It is becoming one of the more widely used css frameworks, but the documentation is still lacking at times. One of the less obvious examples is Bulma’s navbar example. In Bulma’s example, when you look at the page in a narrowed browser you see that the menus change…

Read More

Redirecting Using a CNAME is a Mistake

The CNAME ( Canonical Name record) is a DNS record which points one domain name to another. When using a CNAME you are basically telling the Internet that one domain name is simply an alias for another domain name. All traffic sent to the first domain name will go directly to the second domain name….

Read More