Posts

Automating Aruba Instant On 1930 Switch Backups (So Joe Can Have a Life)

Image
👥 The Team In my team of three—composed of two senior engineers (myself included) and one junior— Joe Biden is the most junior member. No, not the President. Our Joe Biden is fresh out of college, eager to learn, and unfortunately for him, he got assigned one of the most painfully manual tasks in our Preventive Maintenance Program: Backing up switch configurations. Quarterly. For over 100 switches. Manually. Through a browser. Let me paint you a picture. 🌐 The Network Environment We manage a Layer 3 network where the edge layer consists of over 100+ Aruba Instant On 1930 switches . These are solid entry-level switches, but their management interface leaves much to be desired when it comes to automation: ❌ No SSH ❌ No real API ✅ Just a Web GUI So, every quarter, Joe would spend days logging into each switch's web interface, navigating to the config page, and downloading the current config manually. Multiply that by 100+ switches and… yeah. Pain. 🧠 The Programme...

Tor is Not Darkweb: A Love Story in Layers (of Encryption)

Image
Let’s get one thing straight: Tor is not the dark web . If you just gasped and clutched your pearls — good. You’ve been lied to. Repeatedly. Possibly by bad movies, worse TV shows, or that one guy at a party who says, “I downloaded Tor and now I can see everything .” (No, Mr. H.Kuru-C. You’re just on a very slow Reddit.) In this blog post, we’re going to: Explain what Tor is (and what it’s not) : We start with a simple explanation to clear up the most common misconceptions. Break down how Tor works, technically but accessibly : We’ll dive into how Tor functions using its unique onion routing and relay system. Share a brief history of the Tor Project : A quick look at Tor’s roots and how it’s evolved over time. Show why everyday people (not just hoodie-wearing hackers) use it : Tor isn’t just for the “dark web”; here’s why ordinary folks turn to it for privacy and security. Help you decide when Tor makes sense in daily life — and when it might be overkill : Practical ad...

Zapping Through Multicast Madness: A Fun Python Script to Keep Your IPTV Streams Rocking!

Image
Hey there, stream wranglers! If you’re in the wild world of IPTV —think hotels, cruise ships, or sports bars blasting live channels to a gazillion screens—you know multicast UDP streams are the unsung heroes of efficient video delivery. But UDP is like that carefree friend who doesn’t check in, leaving you wondering, "Is this stream even alive?"   In this post, we’re looking at a Python script I built to help a friend whose streams randomly drop. It checks both multicast and unicast UDP streams, and if one goes down, it can (optionally) send a heads-up via Telegram. It’s got retries, scheduling, and just enough socket magic to keep things running smooth. Let’s take a look under the hood!  Table of Contents What’s the Deal with Multicast UDP Streams? What’s This Script All About? The Code: A Party of Sockets and Streams Breaking Down the Dance Moves Real-World Applications Improvements to Spice It Up Watch Out for These Gotchas Final Curtain Call 🧙‍♂️ What’s t...

Taming the IoT Zoo: Locking Down Your Smart Devices Before They Stage a Coup

Image
Introduction Picture this: It’s 3 a.m., and your smart toaster is whispering sweet nothings to your Wi-Fi kettle about taking down Netflix across the eastern seaboard. Sci-fi horror flick? Nope—just another Friday in 2025 with your Internet of Things (IoT) gremlins. I'm Eyaadh, a developer, sysadmin, and network wrangler—basically, I've seen enough to know IoT devices are plotting something. And today, we're slapping some digital leashes on these chaos agents. We've got Python scripts, real-world IoT horror stories, and enough techy goodness to make your firewall blush. Let’s wrangle this mess before my fridge starts demanding a VPN. The IoT Horror Show: Dumb Devices, Dumber Security IoT devices—cameras, bulbs, fridges that guilt-trip you over milk—are multiplying faster than rabbits on an energy drink binge. But security? Barely an afterthought. Default passwords like admin123 ? Check. Firmware so old it’s got a MySpace page? Oh yeah. A smart plug that once tr...

Why Restarting Your Computer Fixes (Almost) Everything: The Hilarious Truth

Image
I thought I’d kick off this year’s blog posts on a slightly different note—stepping away from pure programming for a moment. You see, over the past few weeks, I’ve been busy studying for the Google IT Specialist certification. And by “studying,” I mostly mean skimming through videos and diving straight into assignments. Having worked in IT for over a decade, the course was more of a leisurely stroll down memory lane than a challenging uphill hike. By day, I wear many hats: System Administrator, Network Administrator, IT Manager, and Director of IT. By night (and sometimes at lunch, if we’re being honest), I’m a passionate programmer. It’s my second gig and a never-ending source of joy. But enough about me—let’s get back to today’s topic: "Have you tried turning it off and on again?" It’s not just a tech support cliché—it’s practically the holy grail of IT troubleshooting. This magical mantra fixes an alarming number of issues, but why? Are computers secretly as cranky as ...

Ransomware: A Programmer's Perspective on Prevention and AI Defense

Image
Ransomware—the very mention of the word can send shivers down the spines of IT professionals. It's more than just malware; it’s a modern-day hostage crisis for data. In minutes, it locks critical files behind unbreakable encryption, demanding payment for their release. Entire organizations have been brought to their knees, with billions in damages caused worldwide. But here’s the good news: we’re not powerless in the face of ransomware. I’ve experienced it firsthand. During a live attack, our team, with the support of our MSSP partner Oxiqa , managed to restore critical services within an hour, ensuring business continuity. Through a combination of advanced defenses, thorough system scans, and precise remediation, we eradicated the threat and secured our systems within 24 hours. This experience drove home a crucial lesson: prevention is the key. By combining proactive measures, cutting-edge technologies like EDR and XDR, and AI-powered solutions like SentinelOne, we can detect—an...

Popular posts from this blog

Turning a Joke into Innovation: AI Integration in our Daily Task Manager

Zapping Through Multicast Madness: A Fun Python Script to Keep Your IPTV Streams Rocking!