Automate Backuping

This is tested on ASUS ROG G55VW, Xubuntu 18.04.

Automate Backuping From Remote Computer via SSH

Automate Disk Imaging on Ubuntu With DD and Cronjob

Note that DD copies byte by byte, that means even space that is not used. There is workaroud by writing zeros on not used disk space, but not included in this article.

First find out what you want to include in your image. You can list all your disks and partitions with command.

Continue reading

YOLOv3 Does Not Suit For Detecting Fast Small Objects

Our Git page:

As part of our school course we are doing a project with Yolov3 and OpenCV. We are a group of 4 and two of us are working with YOLOv3 and rest are working with OpenCV. Our goal is to detect snooker balls from live video and count statistics, as potting percent from overall hits, from it. We started this project with about minimal coding experience with python and zero experience with artificial intelligence. We like to take the deep end from the pool, that is where you learn to swim.

Continue reading

Asking Good Questions

Asking good questions is important when analyzing data. Thats not easy when you have no motivation to find something specific, like statistics from last sales to improve your profit in next one.

Environment: ASUS ROG G55VW, Xubuntu 18.04, Anaconda, Python 3.7. Using Jupyter-notebook.

Our teacher had a CSV file to play with.

It has a lot of information but I’m interested in people who travels for business frequently. How old are they, is it men or females who travels more, marital status, job satisfaction and stuff like that. Continue reading

Track work time with Raspberry Pi & RFID

As a school assignment we did a program which reads information and timestamps from RFID cards and sends them to Excel workbook into our virtual private server (VPS) across the Internet. Then it automatically calculates work time between timestamps. We did set up the VPS for creating a account to each “employee”. With this we accomplished a personal work time Excel workbook, which only the employee and administrator can access with any device which has Internet connection. Continue reading

Project for Information Security Course: Clientless SSL VPN Connection

SSL Clientless VPN works as a secured tunnel from client to company’s LAN.


ciscoasa(config)#username matias password matiasrichterich
ciscoasa(config)#group-policy vpn internal
ciscoasa(config)#group-policy vpn attributes
ciscoasa(config-group-policy)#vpn-tunnel-protocol ssl-clientless
ciscoasa(config-group-webvpn)#url-list value Server4
ciscoasa(config-group-webvpn)#tunnel-group matiasvpn type remote-access
ciscoasa(config)#tunnel-group matiasvpn general-attributes
ciscoasa(config-tunnel-general)#default-group-policy vpn
ciscoasa(config-tunnel-general)#username matias attributes
ciscoasa(config-username)#vpn-group-policy vpn
ciscoasa(config-webvpn)#enable outside

Project for Information Security Course: Simulating Internet In Packet Tracer

Simulating Internet

By simulating Internet I mean creating a cloud which represents the action made by ISPs and other devices along the path to remote network’s target device. Continue reading

Project for Information Security Course: Connecting Devices and Configuring DHCP server


Getting started

I thought that it would be important first step to plan the addressing scheme. I segmented every department in their own VLAN and every VLAN has it’s own host range. For getting known a little better with subnetting math, I didn’t assign easiest /24 bit masks for every subnet. For sake of complexity and training, subnets has /25, /26 or /30 bit long masks. Continue reading