Name: Chris Carey
Type: User
Company: Netflix
Bio: UI & computer networking engineer. Real-time data, logs, metrics, dashboards, and playback alarm systems at Netflix
Twitter: chriscareycode
Location: California, USA
Blog: https://chriscarey.com
Chris Carey's Projects
Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
Automatically exported from code.google.com/p/asterisk-voicemail-for-iphone
Open-source KVM software
A collection of projects for Pimoroni Cosmic Unicorn
Digital Race Dash designed for use on Raspberry Pi in a Honda S2000
Doomguy from the video game Doom (1993) as a CSS sprite for your project
Composable graphing component library for EmberJS.
React Emoji Picker
Streaming radio iPhone application
A platform that makes it easy for developers to build realtime, cost-effective, operations-focused applications
Automatically exported from code.google.com/p/mediastream-for-iphone
A web interface for motion files
Automatically exported from code.google.com/p/mythtv-for-iphone
Nagios Core
Watch one or more Nagios 4 servers on a wall mounted TV (or your desktop)
NagiosTV with EmberJS and MK Livestatus
Watch one or more Nagios servers on a wall mounted TV (or your desktop)
Monitor your Nagios server on a wall mounted TV (or a phone or desktop). Installation instructions are below in the README.md
NagiosTV status-json edition
RSS reader for macOS and iOS.
Libraries and examples to support Pimoroni Pico add-ons in C++ and MicroPython.
Display PurpleAir color on a Raspberry Pi with Unicorn Hat and blink(1) light
A simple and reusable datepicker component for React
React component that is magnifiable like the Mac OS X dock.
Experiments with RxJS and Node.js
Repro for Web Audio API bug in Safari 17 on iOS
A tiny, experimental library to allow you to execute arbitrary JavaScript functions safely in a sandbox
Some scripts I use with SecuritySpy for OSX
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website