Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

28 total results found

Se2

The spiritual successor to 2002's SendTo 1.6 (Trogsoft)

Plotwise Writer

Network Fandango

Plotwise Platform

Se2 Design

Plotwise Writer Design

Design

Plotwise Platform Design Docs

05 Components

Plotwise Writer Design

The nf command

Design

01 Vision

Plotwise Writer Design

Product Vision Problem Statement Goals & Non‑Goals Success Metrics Stakeholders & Personas

02 Requirements

Plotwise Writer Design

Requirements Functional Requirements Non‑Functional Constraints & Assumptions

03 Solution Overview

Plotwise Writer Design

Solution Overview System‑context Diagram Key User Journeys High‑level Risks

04 Architecture

Plotwise Writer Design

Architecture Container Diagram Tech Stack & Rationale Cross‑cutting Concerns Open Questions

06 Data Model

Plotwise Writer Design

Data Model Plotwise Writer Projects are self-contained SQLite3 databases. ER Diagram / Schemas Here's the schema definition which is stored as a resource in the Plotwise Writer executable. CREATE TABLE metadata ( id INTEGER PRIMARY KEY AUTOINCREMENT, ...

07 User Interface

Plotwise Writer Design

Main Window

01 Overview

Se2 Design

Se2 is intended to be the spiritual successor to SendTo 1.6, which was originally a Trogsoft product from 2002. The scope has been extended so that the tool can be used as a file explorer replacement for a good portion of functions, but there is still a large ...

02 Project Scope

Se2 Design

What it is What it is not

04 User Interface

Se2 Design

03 User Stories

Se2 Design

Overview

Design

Network Fandango (NF) is a combination of traditional network management suite and Infrastructure-as-Code system. The main components are: nfsvc - the main service. nf - command line tool which connects to the main service. nfweb - web front end. nfagent - a ...

Network Discovery

Design

Network discovery occurs in a number of different ways. For administrators with control over their own DNS infrastructure, we recommend using either of the following records. For these examples, we are using example.com as your domain. _nfsvc.example.com IN ...

Authentication

Design

The authentication flow is modeled on that of SSH, specifically using keyfiles. The steps involved in authentication are as follows: Install Network Fandango Set up your Network Discovery The first time the Network Fandango service (nfsvc) is started, it will...

01 The Basics

Design The nf command

Common Parameters All Commands These parameters work with all commands. --json Outputs the result in JSON. Item Lists For commands which return lists of items (users, computers, etc), you can use the following parameters: -p <int> Retrieve the specified page...

02 Authentication

Design The nf command

Logging in as the first user on a new installation To log in under these circumstances, all you have to do is run nf auth. It will create a key file which the server will automatically accept as there are no configured users. Logging in as a previously created...

03 User Management

Design The nf command

Create a user nf user add <username> Creates a user with a randomised initial login token. The token will be provided in the command output, and you can pass this on to the user for use on their first login. nf user add <username> --initial-token <token> Cre...

Database Schema

Design

Computers

Certificates and their Uses

Design

Network Fandango Service The following certificates are generated by the Network Fandango Service: Root CA X509 Certificate Trust anchor for all service issued TLS certs and JWT tokens. You can optionally use your own organisation's certificate infrastructure...