Posts for: #NetworkChuck

Open Source Deep Research

Clone the project

git clone https://github.com/dzhng/deep-research.git
cd deep-research

.env.local file

FIRECRAWL_KEY="your_firecrawl_key"
OPENAI_KEY="your_openai_key"
# Optionally, for self-hosted Firecrawl:
# FIRECRAWL_BASE_URL="http://localhost:3002"

Dockerfile

FROM node:18-alpine

WORKDIR /app

COPY package*.json ./
RUN npm install

COPY . .

CMD ["npm", "start"]

Docker Compose File

version: '3.8'
services:
  deep-research:
    build: .
    env_file:
      - .env.local
    tty: true
    stdin_open: true

Make a change to the package.json file

Change this:

"start": "tsx --env-file=.env.local src/run.ts"

to this:

"start": "tsx src/run.ts"

Read more

Is DeepSeek Safe To Run (locally)

Monitor Network Connections

Windows

while($true) {
    Get-Process ollama | ForEach-Object { 
        $id = $_.Id
        Write-Host "`nConnections for Ollama process $id" -ForegroundColor Green
        Get-NetTCPConnection | Where-Object OwningProcess -eq $id | Select-Object LocalAddress, LocalPort, RemoteAddress, RemotePort, State 
    }
    Start-Sleep -Seconds 2
    Clear-Host
}

Mac

# One-time check
pid=$(pgrep ollama)
lsof -i -P -n | grep ollama

# For continuous monitoring
while true; do
    echo "$(date): Ollama Connections"
    lsof -i -P -n | grep ollama
    sleep 2
    clear
done

# Alternative using netstat
netstat -p tcp -v | grep ollama

Linux

# One-time check
pid=$(pgrep ollama)
lsof -i -P -n | grep ollama

# Or for continuous monitoring
watch -n 2 "lsof -i -P -n | grep ollama"

# Alternative using netstat
netstat -np | grep ollama

# Or using ss (more modern)
ss -np | grep ollama

Running Ollama Inside Docker

docker run -d \
--gpus all \
-v ollama:/root/.ollama \
-p 11434:11434 \
--security-opt=no-new-privileges \
--cap-drop=ALL \
--cap-add=SYS_NICE \
--memory=8g \
--memory-swap=8g \
--cpus=4 \
--read-only \
--name ollama \
ollama/ollama
Read more

Top InfoTech Creators to Follow in 2025

This is a list of the YouTube creators I love to follow. This list contains creators that I think are genuine, creative and really fun to watch. And most importantly, they provide value. So, here are the Top 10….11.

John Hammond

• Content: Cybersecurity…also now destroying scammers…I think

• Insanely knowledgeable. Also, the nicest guy you’ll ever meet. He is authentically John Hammond on and off camera. He really does care and has a ton of integrity.

Read more

Building a Hacker Dropbox (access any network)

!Image Description

The video: https://youtu.be/1lZ3FQSv-wI?si=-Poh5YhiymhGK5cH

What is a Hacker Dropbox? (and why you need one….even if you aren’t a hacker)

  • Here is a great definition from ChatGPT: a small, discreet, and often portable device designed to be covertly placed in a target network to provide remote access for a hacker or penetration tester. It typically contains hardware and software configured to exploit the network or collect sensitive information.
  • If you’re a hacker…this is a no brainer. Get instant access to a remote network by dropping off a device. But….if you’re not a hacker…why do you need this?

Family HelpDesk Support

  • If you’re like me, you are likely the official technical support for your family and friends. I also inherited the role of helpdesk support for my church…these kinds of things just happen by default when you are in tech and people find out about your technical skills.
  • This isn’t an easy thing to do, especially when it comes to troubleshooting networks for your family. Is the network up? Why is it slow? Sometimes a FaceTime call just isn’t going to cut it.
  • If I’m going to be the support for my church and family, I’m going to take my role seriously. I need FULL control of the remote network……no more playing around!!!
  • With the Hacker Dropbox, I can drop off a small device, in my case it’s going to be a Raspberry Pi 4. (it can be a lot of things, as long as the device is Linux-based and is 64-bit). Instantly I get access to this remote network, enabling me to provide remote support and access any device.

This is NOT VPN

  • This is not a VPN (VIrtual Private Network) solution….it’s much better.
  • This is a ZTNA (Zero-Trust Network Access) solution. It’s called Twingate and I’ve been using them for a long time in my business and personal networks. I talk more about them in the video above but in short, they allow you to get and give remote access to networks in the most secure way. They are used by everyone from large enterprises to homelabbers looking to access their Plex server.
  • This isn’t the first video I’ve made about them but this is the first time I’ve featured a use-case like this.
  • Oh, it’s also FREE for home labbers. (And…cough….businesses that don’t have a ton of employees….like me.)

You don’t need to know ANYTHING about the network

  • I wanted this to be a turnkey solution even if you don’t know anything about the remote network. All you’ll have to do is plug in an ethernet cable (or connect to wifi….but you’ll need to know the SSID and password) and you will know everything you need to know about that network…..but how?
  • Twingate has a powerful API that allows us to do many things…including write python scripts that will automagically tell us the private IP address of our Hacker Dropbox (Raspberry Pi) and the Public IP address of the network, giving us instant access to this Hacker Dropbox AND the network.
  • This guide will contain that script.

What do you need?

  • Any Linux-based 64-bit system will do. You’ll need at least 1 CPU and 2GB RAM (recommended)…but you can go as low as 512MB of RAM.
  • You can also run this as a Docker container, which is my favorite way to deploy this in my home lab.
  • In this example, with the Hacker Dropbox, I’m using a Raspberry Pi 4 running Raspberry Pi OS Lite - 64-bit and installing it directly on the system (no docker container)

What other hardware options do I have?

Again, this can be many things, but here are some ideas to get the juices flowing:

Read more

I Built a Phone System Because No One Answers Me

!Image Description

Yes….I put a phone system in my house

  • In this video…I put a phone system in my house and business.
  • Why?
  • Because no one answers their phones. My wife and daughters all have iphones and apple watches….but seem to never be able to answer their phones. I can NEVER get ahold of someone when I need to!
  • As a complete nerd and former phone system engineer….this solution was obvious…..install a phone system and put a phone in every room.

But….it’s not that simple….

  • My wife is very artsy and particular about the design of our house and what goes in it. She won’t allow just anything to be put on a wall or a side table. These phones had to be old, aesthetic, mid-century….which means I couldn’t use a typical SIP phone like I normally would.
  • Also, my kids are obsessed with the old phones they see on the older tv shows and movies. They had to have them.

So….what phone system? Do we need anything for this?

  • For most people, nothing. We’re using the 3CX phone system and it’s going to be free for up to 10 users, which is more than enough for even a large family like mine. It is also hosted completely free in the cloud forever and you can literally get this setup in minutes.
  • FULL DISCLOSURE, this video is sponsored by 3CX. I have worked with them for a long time and collaborated on a video a while back where we installed a phone system on a Raspberry Pi 4. This is no longer supported so I needed to redeploy a phone system anyway, to solve my domestic issues and I really needed a phone system for my business.

Do we need any hardware? Phones?

  • Physical phones are optional. But they are very fun and I highly recommend them.
  • In the event you do what some physical phones, you’ll need 2 things:
    • A phone….duh
    • A device inside your network that can connect your physical phone to the 3CX cloud instance.
      • This can be either a:

Phones? What phones?

  • Here are the phones that I purchased and can verify work pretty well.

Read more