NetworkChuck — Channel Summaries — Page 2
AI-powered summaries of 209 videos about NetworkChuck.
209 summaries
I forced EVERYONE to use Linux
A single, high-powered Linux machine can replace a whole fleet of individual PCs by acting as a terminal server—letting multiple employees work at...
18 Weird and Wonderful ways I use Docker
Docker is being used as a lightweight “app sandbox” for everything from full GUI browsers to office suites, GPU-accelerated scientific workloads, and...
the UniFi Dream Machine Pro....the nerdiest home router
Ubiquiti’s UniFi Dream Machine Pro lands as a business-grade, rack-ready all-in-one gateway that also brings UniFi Protect surveillance and serious...
the TOP 10 hottest IT Jobs in 2023
IT job demand in 2023 is clustering around roles that combine customer-facing skills with technical depth—especially early-career help desk work and...
WI-FI 6, Why it's the BIGGEST update to Wi-Fi EVER! - 802.11ax
Wi‑Fi 6 (802.11ax) is positioned as the biggest fix for wireless congestion in crowded places—not just a speed bump. The core change is how an access...
how the OSI model works on YouTube (Application and Transport Layers) // FREE CCNA // EP 5
Watching a YouTube video pulls in the OSI model’s upper layers: the browser formats and secures requests (Application/Presentation), keeps a logical...
I’m changing how I use AI (Open WebUI + LiteLLM)
A single self-hosted dashboard can unify access to many major AI models—cloud-hosted chat systems like GPT and Claude, plus local models—while...
Your Cable Management SUCKS!! (Fixing My Server Room)
A chaotic server room isn’t just ugly—it turns routine troubleshooting into a multi-day scavenger hunt. After years of “patch this, rewire that”...
this BASH script will make you a MILLIONAIRE
A Bash script can predict—purely for practice—an arbitrary “millionaire age” by combining a built-in random number with a user’s current age. The...
I almost quit YouTube....
AI has triggered a wave of anxiety among tech workers—so intense that one longtime Linux-and-networking educator briefly considered quitting...
60 Hacking Commands You NEED to Know
The core takeaway is that practical “hacking commands” aren’t just about exploitation—they’re a toolkit for reconnaissance, traffic shaping, evasion,...
you need to learn tmux RIGHT NOW!!
tmux turns one terminal into a workspace where long-running commands can keep running even after disconnecting—and then be picked up later from...
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
The Ubiquiti UniFi Dream Machine stands out less for brand-new technology and more for packing a full home/small-business networking stack into one...
What is DNS? (and how it makes the Internet work)
Typing a domain name into a browser works because DNS (Domain Name System) translates human-friendly names into the IP addresses computers actually...
the most SECURE browser!! (testing it with malware)
A cloud “disposable browser” pitch claims the safest way to handle sketchy links and malware is to isolate browsing inside a temporary container in a...
If I had to start over...which IT path would I take?
Starting over in IT today, NetworkChuck’s core recommendation is to build a broad foundation fast, land a first help-desk job quickly, then pivot...
fiber optic cables (what you NEED to know) // FREE CCNA // EP 13
Fiber optic cables move internet traffic using pulses of light instead of electrical signals, enabling much higher speeds over much longer distances...
Ethernet is DEAD?? Mac Studio is 100x FASTER!!
Local AI clustering is back on the table—because Apple’s latest software update slashes the latency bottleneck that previously made multi-Mac setups...
Google is forcing you to use their proxy (build your own instead)
Google is rolling out an “IP protection” feature in Chrome that routes users through Google-run proxies, aiming to hide their IP address from the...
do you need to be good at MATH to learn Python? // Python RIGHT NOW!! // EP 3
Learning Python doesn’t require being “good at math”—it requires understanding how Python treats numbers and how to move between number types and...
you NEED to learn Port Security…….RIGHT NOW!! // FREE CCNA // EP 14
Exposed Ethernet ports are an easy entry point for attackers because a plug-in device can often obtain network settings via DHCP and then scan or...
You've been using AI Wrong
Fabric is an open-source CLI framework built to reduce the friction of using AI by turning raw text (like YouTube transcripts or API data) into...
I built a phone system because no one answers me
A DIY phone system built around 3CX is turning “nobody answers” into instant, reliable communication—inside the house, across the business, and even...
VMware on a Raspberry Pi!?!?! (ESXi Install)
Running VMware ESXi on a Raspberry Pi turns a credit-card-sized computer into a small, server-style virtualization host—complete with vSphere...
create the ULTIMATE hacking lab in 5min!! (Docker Containers STREAMING Kali Linux to your browser)
A new browser-isolation setup lets users open risky links, run Kali Linux, and even launch full desktop apps inside Docker containers—then instantly...
forcing my kids to make Ethernet cables // FREE CCNA // EP 11
Making an Ethernet cable is framed as both a practical skill and a CCNA rite of passage: the core takeaway is that most home and business networking...
we’re out of IP Addresses….but this saved us (Private IP Addresses)
The internet didn’t run out of addresses because it “fixed” IPv4—it survived by carving out private IP ranges (RFC 1918) and then using Network...
ChatGPT Operator is expensive....use this instead (FREE + Open Source)
AI agents that can drive a real browser are moving from “cool demo” to practical automation—and the tradeoff is shifting from price to control....
What is a Subnet Mask??? (you NEED to know it!!)
A subnet mask isn’t just a label on an IP address—it encodes, in binary, which parts of an address identify the network and which parts identify...
build a meme Python website (Flask Tutorial for Beginners)
A beginner-friendly Flask walkthrough turns Python into a working web app that fetches fresh memes from Reddit on a schedule—then renders them into a...
I ditched my Raspberry Pi for this
A compact x86 mini-computer (the Zema board) replaced a Raspberry Pi travel setup, enabling a single “travel NAS + travel router” approach that kept...
You SUCK at Prompting AI (Here's the secret)
Prompting fails most often because people treat AI like a conversational partner instead of a probability engine that needs a clear “program” made of...
WAN....it's not the internet!! (sometimes) // FREE CCNA // EP 8
WAN connectivity is the practical problem of how geographically separated offices—corporate headquarters, branch locations, and even “coffee shop”...
block ADULT sites and other BAD STUFF on your home network (EASY)
Home networks can be tightened quickly by taking control of DNS—then using that control to block categories of “bad stuff” and specific distracting...
3 Hacking Skills EVERYONE has // FREE Security+ // EP 1
Social engineering attacks often start with skills “everyone already has,” and the most effective defenses begin by treating everyday behavior—what...
you NEED to use VS Code RIGHT NOW!!
VS Code is positioned as an all-in-one workspace for writing code, running it, and managing remote systems—so much so that it can be used locally, in...
subnetting my coffee shop
Subnetting flips from “how many networks do we need?” to “how many usable IPs does each network need?”—and that change drives the entire math. In the...
you STILL need a website RIGHT NOW!! (yes, even in 2025)
A website is still the fastest, most durable way to publish your work online in 2025—and the barrier to entry is lower than most people think. After...
How YouTubers Get Hacked
YouTube creators are being targeted with a phishing scheme that looks like an official Google Drive notification and a “YouTube copyright report,”...
stop trusting cloud cameras!! (here's what I use instead)
Self-hosted Frigate is positioned as a privacy-first alternative to cloud-connected security cameras—because it keeps video processing local and...
installing my “FREE” cloud phone system (AWS and 3CX)
A cloud-based business phone system can be assembled with three building blocks—AWS for hosting, 3CX for the PBX software, and Amazon Chime for a...
i bet you can't do this (because you still suck at subnetting)
An IP address is just 32 bits of on/off data, and mastering how to convert between that binary “matrix code” and the familiar decimal form is the...
Access ANY Network (remotely)
A small “connector” device can be plugged into any local network—home, church, or someone else’s office—and then accessed remotely with granular...
let’s play with a ZERO-DAY vulnerability “follina”
A newly discovered “Follina” (CVE-2022-3019) zero-day vulnerability in Microsoft Word can enable remote code execution with no official patch...
you NEED to learn Windows RIGHT NOW!!
Windows skills are positioned as a fast track to IT jobs, practical security learning, and hands-on hacking—because Microsoft’s desktop dominance...
the FrankeNAS - (Raspberry Pi, Zima Board, Dell Server, Ugreen) // a CEPH Tutorial
A DIY “FrankenNAS” built from mismatched hardware—Raspberry Pi boards, laptops, a Zima board, and an old Dell server—can act like one unified network...
you need to monitor your stuff RIGHT NOW!! (free)
Uptime Kuma is a free, self-hostable monitoring dashboard that can watch websites, DNS records, game servers, Raspberry Pi–style devices, and...
start, stop, restart Linux services (daemon HUNTING!!) // Linux for Hackers // EP 6
Linux runs on background services—often called daemons—that start automatically, keep systems functioning, and handle tasks like networking, time...
why Power over Ethernet (PoE) is amazing!! // FREE CCNA // EP 12
Power over Ethernet (PoE) turns one Ethernet cable into a combined “power + data” link, eliminating the need to run separate electrical wiring for...
The Dark Web NEEDS You!
Running an onion relay—specifically a Tor relay—lets volunteers strengthen the privacy network that millions rely on to stay anonymous online. The...
OpenClaw......RIGHT NOW??? (it's not what you think)
OpenClaw is a “gateway” that turns existing AI models into practical, tool-using agents across channels like Telegram, Discord, and Slack—while...
you need to learn Hybrid-Cloud RIGHT NOW!! // FREE CCNA // EP 10
Hybrid cloud is less about “moving everything to the cloud” and more about placing workloads where they fit—cloud for elasticity and modern app...
CompTIA or Cisco? - Should I get the CompTIA A+/Network+ OR the Cisco CCNA/CCENT - Microsoft MCSA?
Vendor-specific certifications tend to beat broad, vendor-neutral credentials for people aiming to move beyond help desk work—especially when the...
Hackers infected the wrong girlfriend....
Cybercrime investigators at Bitdefender’s Romania-based “Draco” team say the fight is far from won—but they’ve repeatedly disrupted ransomware...
The Most Dangerous Linux Commands
A single, correctly targeted Linux command can wipe an entire system—so thoroughly that recovery may be impossible without backups. NetworkChuck...
he hacked my websites
A fast, automated-and-manual pen test of 24 newly built websites turned up a pattern: many “low priority” misconfigurations and exposed details can...
FREE Kali Linux in the Cloud (AWS)
Running Kali Linux in the cloud on AWS can be done for free-tier cost—if the setup stays within limits—and it’s accessible both through a command...
monitor all your stuff RIGHT NOW!!
A home-lab and small-enterprise IT monitoring setup can replace the “guess-and-worry” routine by continuously checking whether devices are alive,...
the WORST hack of 2026
A high-profile supply-chain attack targeted Axios, one of the most widely used JavaScript HTTP libraries, by hijacking the lead maintainer’s account...
i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3
A pair of phone calls—one to a wife and one to a grandmother—demonstrated how pretexting can harvest personal data with little technical...
so...I put a Time Server in my HomeLab
A home lab time server built around GPS-disciplined atomic timing is the centerpiece of this build: a Raspberry Pi Compute Module 4–based “open time...
37 INSANE Linux Commands you NEED to Know in 2025
A fast, practical lineup of Linux commands is framed around one goal: make day-to-day troubleshooting, navigation, monitoring, and automation feel...
build your own browser (crazy SECURE)
A secure browsing setup built on disposable browser containers is the centerpiece: run a full web browser inside a Chasm (container) workspace,...
i hacked this photo
Steganography can hide data inside ordinary-looking files—like a photo—so the file appears harmless while secret contents are embedded at the byte...
Deep Research.....but Open Source
OpenAI’s “Deep research” promises slower, more verifiable answers—often taking 5 to 30 minutes—by doing multi-step web dives with citations, rather...
AI Networking is CRAZY!! (but is it fast enough?)
AI training is bottlenecked less by raw GPU power and more by the network’s ability to move huge data volumes with near-zero tolerance for delay....
host your own HelpDesk
A simple rule—“Do you have a ticket?”—is the starting point for building a self-hosted help desk for family, friends, or a small team. The core idea...
KILL Linux processes!! (also manage them) // Linux for Hackers // EP 7
Linux process management boils down to three practical moves: find the right process, choose whether to stop it or kill it, and control whether it...
DEFCON is Not What I Expected...
DEF CON’s biggest surprise isn’t the hacking—it’s the welcome. Despite a long-standing reputation for being intimidating, the event’s atmosphere...
Do you STILL suck at subnetting?? (THE FINAL TEST) // EP 9
A single /24 network—172.21.42.0/24—can be carved into multiple smaller subnets of different sizes to meet varying host needs, as long as Variable...
this BASH script will KILL you.
A Bash script can be turned into a playable “Elden Ring”-style mini game by combining user input, randomness, and conditional logic—then layering in...
Cloning my Voice Into an AI Assistant
Cloning a voice locally is possible with open-source tools—if the data is clean and the training pipeline is handled carefully. The core takeaway is...
Put your website on the Dark Web
A practical, step-by-step setup shows how to host a website, run an anonymous chat, and share files on Tor using Onion Share—then escalates to a more...
I started a blog.....in 2024 (why you should too)
Starting a blog in 2024 doesn’t have to mean picking a template and hoping for the best. The core pitch is that a blog becomes far easier—and far...
Python Logical Operators (the fun stuff!!)
Python’s logical operators give a simple way to control who gets into the “coffee shop” based on multiple conditions—either letting someone in when...
become an AI HACKER (it's easier than you think)
AI hacking is moving beyond “Baby Gandalf” password tricks into realistic attacks on LLM-powered applications—where small prompt changes can leak...
who is this even for?? (Raspberry Pi 500)
Raspberry Pi 500 packages a Raspberry Pi 5-class computer inside a built-in keyboard, aiming squarely at people who want a Linux desktop without the...
i automated my home lab (and CLOUD) with Ansible
A home-lab builder turned Ansible into a full “VM delivery pipeline,” automating not just cloud and on-prem provisioning but also Slack notifications...
Hide your files like a hacker (5 Ways)
Hiding files on a computer ranges from simple “invisible” settings to techniques that bury data inside other files or inside encrypted, nested...
Subnetting…..but in reverse
A host losing all network access can come down to a simple but non-obvious subnetting mistake: the IP address might be “valid” for its subnet, yet...
find HIDDEN urls!! (subdomain enumeration hacking) // ft. HakLuke
Hidden URLs aren’t just a curiosity—they’re often the difference between a secure website and one with exposed endpoints. Subdomain enumeration and...
why are TUPLES even a thing?
Python tuples exist largely because they’re a faster, safer alternative to lists when the data shouldn’t change. The core difference is simple: lists...
what is a List in Python?
Python lists are an ordered, changeable collection that lets programmers store multiple pieces of data—often of different types—inside one variable....
Adding stuff to a Python List
Python lists become genuinely useful once code can modify them on the fly—like adding forgotten camping supplies without manually editing the data....
IPv6 keeps getting hacked on Windows
A newly identified IPv6 flaw in Windows could let attackers remotely take control of a machine by sending specially crafted IPv6 packets—no...
i KILLED my Linux computer!! (to teach you something)
A single Linux command can be used to create an absurd number of directories—over 1.1 million—and that scale is enough to destabilize a system. The...
Claude Code on your phone in 10 minutes
A practical path to “Claude Code anywhere” is built by running Claude Code on a remote Linux VPS and then reaching that terminal from a phone through...
Using AI to become a Hacker
A 43-day, over-1,000-hour CPTS certification plan pushed one hacker-student to lean on AI—not for shortcuts, but to compress study time and increase...
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity career advice boils down to a simple, repeatable path: build real hands-on skill through Linux and Python, grind through CTFs and...
create your own Solana Token...in the terminal (2025 edition)
A command-line walkthrough shows how to create a Solana token end-to-end—first on Solana DevNet for free practice, then on mainnet for real—then...
FREE Phone Calls with Claude Code
A hobby VoIP setup can be wired into Claude Code so phone calls—down to an analog payphone—can trigger AI workflows, keep conversational context, and...
I'm done with the AI hype
AI is being pasted onto networking products at a breakneck pace, but the real question for IT teams is whether it reduces outages and troubleshooting...
a BASH script PUSH-UP counter (for #gains )
A bash push-up counter built with loops turns basic scripting into something immediately useful: it repeatedly prompts, counts, and stops based on...
I use this everyday
Copying and pasting through the terminal becomes dramatically more useful when the clipboard is wired into command-line workflows—especially for...
got AI anxiety? Do this RIGHT NOW!
AI anxiety about the job market can be met with a practical counter-move: build a “Telos file,” a single markdown document that captures who someone...
Why LLMs get dumb (Context Windows Explained)
LLMs start “getting dumb” in long chats because their context window—the maximum amount of text (measured in tokens) the model can actively pay...
deleting stuff from Python Lists // Python RIGHT NOW!! // EP 9
Python lists can be “obliterated” in three common ways—either wipe everything with `clear()`, delete a specific value with `remove()`, or delete by...
Hacking the world’s most popular database
Oracle Database 23c is presented as both a practical platform to build and a realistic target for ethical penetration testing—using Docker to stand...
intro to cloud hacking (leaky buckets)
Cloud security failures are often simple misconfigurations—especially in Amazon S3—and they can be exploited with basic, publicly available...
i hired my replacement….kind of (the FUTURE of NetworkChuck)
NetworkChuck is adding a second “version” of himself to fix a bottleneck that’s left major course series unfinished—and he’s framing that staffing...