Deep Research on Preterism

!Image Description

This is some deep research on a hot topic that is always being debated at my small group.

I’ll conduct a deep research study comparing Preterism and Futurism/Dispensationalism, focusing on biblical evidence, historical development, theological arguments, and scholarly perspectives. I’ll analyze key scriptural passages (e.g., Revelation, Daniel, Matthew 24) and how they are interpreted by each view. Additionally, I’ll explore how historical events are used to support or challenge these perspectives and highlight relevant theological debates. I’ll get back to you with a comprehensive analysis soon.

Read more

Open Source Deep Research

Clone the project

git clone https://github.com/dzhng/deep-research.git
cd deep-research

.env.local file

FIRECRAWL_KEY="your_firecrawl_key"
OPENAI_KEY="your_openai_key"
# Optionally, for self-hosted Firecrawl:
# FIRECRAWL_BASE_URL="http://localhost:3002"

Dockerfile

FROM node:18-alpine

WORKDIR /app

COPY package*.json ./
RUN npm install

COPY . .

CMD ["npm", "start"]

Docker Compose File

version: '3.8'
services:
  deep-research:
    build: .
    env_file:
      - .env.local
    tty: true
    stdin_open: true

Make a change to the package.json file

Change this:

"start": "tsx --env-file=.env.local src/run.ts"

to this:

"start": "tsx src/run.ts"

Read more

Is DeepSeek Safe To Run (locally)

Monitor Network Connections

Windows

while($true) {
    Get-Process ollama | ForEach-Object { 
        $id = $_.Id
        Write-Host "`nConnections for Ollama process $id" -ForegroundColor Green
        Get-NetTCPConnection | Where-Object OwningProcess -eq $id | Select-Object LocalAddress, LocalPort, RemoteAddress, RemotePort, State 
    }
    Start-Sleep -Seconds 2
    Clear-Host
}

Mac

# One-time check
pid=$(pgrep ollama)
lsof -i -P -n | grep ollama

# For continuous monitoring
while true; do
    echo "$(date): Ollama Connections"
    lsof -i -P -n | grep ollama
    sleep 2
    clear
done

# Alternative using netstat
netstat -p tcp -v | grep ollama

Linux

# One-time check
pid=$(pgrep ollama)
lsof -i -P -n | grep ollama

# Or for continuous monitoring
watch -n 2 "lsof -i -P -n | grep ollama"

# Alternative using netstat
netstat -np | grep ollama

# Or using ss (more modern)
ss -np | grep ollama

Running Ollama Inside Docker

docker run -d \
--gpus all \
-v ollama:/root/.ollama \
-p 11434:11434 \
--security-opt=no-new-privileges \
--cap-drop=ALL \
--cap-add=SYS_NICE \
--memory=8g \
--memory-swap=8g \
--cpus=4 \
--read-only \
--name ollama \
ollama/ollama
Read more

Top InfoTech Creators to Follow in 2025

This is a list of the YouTube creators I love to follow. This list contains creators that I think are genuine, creative and really fun to watch. And most importantly, they provide value. So, here are the Top 10….11.

John Hammond

• Content: Cybersecurity…also now destroying scammers…I think

• Insanely knowledgeable. Also, the nicest guy you’ll ever meet. He is authentically John Hammond on and off camera. He really does care and has a ton of integrity.

Read more

Building a Hacker Dropbox (access any network)

!Image Description

The video: https://youtu.be/1lZ3FQSv-wI?si=-Poh5YhiymhGK5cH

What is a Hacker Dropbox? (and why you need one….even if you aren’t a hacker)

  • Here is a great definition from ChatGPT: a small, discreet, and often portable device designed to be covertly placed in a target network to provide remote access for a hacker or penetration tester. It typically contains hardware and software configured to exploit the network or collect sensitive information.
  • If you’re a hacker…this is a no brainer. Get instant access to a remote network by dropping off a device. But….if you’re not a hacker…why do you need this?

Family HelpDesk Support

  • If you’re like me, you are likely the official technical support for your family and friends. I also inherited the role of helpdesk support for my church…these kinds of things just happen by default when you are in tech and people find out about your technical skills.
  • This isn’t an easy thing to do, especially when it comes to troubleshooting networks for your family. Is the network up? Why is it slow? Sometimes a FaceTime call just isn’t going to cut it.
  • If I’m going to be the support for my church and family, I’m going to take my role seriously. I need FULL control of the remote network……no more playing around!!!
  • With the Hacker Dropbox, I can drop off a small device, in my case it’s going to be a Raspberry Pi 4. (it can be a lot of things, as long as the device is Linux-based and is 64-bit). Instantly I get access to this remote network, enabling me to provide remote support and access any device.

This is NOT VPN

  • This is not a VPN (VIrtual Private Network) solution….it’s much better.
  • This is a ZTNA (Zero-Trust Network Access) solution. It’s called Twingate and I’ve been using them for a long time in my business and personal networks. I talk more about them in the video above but in short, they allow you to get and give remote access to networks in the most secure way. They are used by everyone from large enterprises to homelabbers looking to access their Plex server.
  • This isn’t the first video I’ve made about them but this is the first time I’ve featured a use-case like this.
  • Oh, it’s also FREE for home labbers. (And…cough….businesses that don’t have a ton of employees….like me.)

You don’t need to know ANYTHING about the network

  • I wanted this to be a turnkey solution even if you don’t know anything about the remote network. All you’ll have to do is plug in an ethernet cable (or connect to wifi….but you’ll need to know the SSID and password) and you will know everything you need to know about that network…..but how?
  • Twingate has a powerful API that allows us to do many things…including write python scripts that will automagically tell us the private IP address of our Hacker Dropbox (Raspberry Pi) and the Public IP address of the network, giving us instant access to this Hacker Dropbox AND the network.
  • This guide will contain that script.

What do you need?

  • Any Linux-based 64-bit system will do. You’ll need at least 1 CPU and 2GB RAM (recommended)…but you can go as low as 512MB of RAM.
  • You can also run this as a Docker container, which is my favorite way to deploy this in my home lab.
  • In this example, with the Hacker Dropbox, I’m using a Raspberry Pi 4 running Raspberry Pi OS Lite - 64-bit and installing it directly on the system (no docker container)

What other hardware options do I have?

Again, this can be many things, but here are some ideas to get the juices flowing:

Read more