Plurrrr

Sat 16 Jan 2021

Running a fake power plant on the internet for a month

One of the systems often used to get more information about digital attackers are called honeypots. These mechanisms detect attempts at unauthorised use of computer systems. You could think of these as a digital version of bait cars used by the police to catch thieves. For this particular project I wrote a small HoneyTrap listener (an open-source project by DTACT) that can interact with systems scanning for devices on the s7comm protocol.

Source: Running a fake power plant on the internet for a month, an article by Stefan Grimminck.

Snow in the Netherlands

Late in the afternoon, after my brother had helped me with providing a wired internet connection in my home office, I went outside with Adam and Esme to have some fun in the snow. Alice didn't want to come, she had been outside earlier with Esme and Adam, but Adam couldn't get enough of the snow; he had been asking "When is it going to snow" ever since he arrived in the Netherlands. Well, today his dream came true.

Esme and Adam having a snowball fight
Esme and Adam having a snowball fight.
Snow on grass near the waterside
Snow on grass near the waterside.

After a snowball fight in and near a small playground close to our house we walked to another, larger playground. Esme and Adam worked together creating a small snowman.

Adam placing the head on the snowman
Adam placing the head on the snowman.
Adam posing with the snowman
Adam posing with the snowman.