This article is here as a reminder.
So, for testing, I needed to configure a
Cisco CSR1000V virtual router as a bridge. So I used a version 16 Cisco
IOS XE image. To make my life easier I used the "wizard" that runs the first
time to automatically configure bridgning. Ironically, this created an invalid
...
This recipe is for tunneling NFS traffic over SSH. This adds encryption
and Public Key authentication to otherwise insecure NFS traffic.
For this recipe to work, requires NFSv4. Earlier versions were
not tested, but I expect not all the functionality to work.
server configuration
...
This is similar to my previous article
Encrypting Filesystem in Void Linux
but for Alpine Linux
The point of this recipe is to create a encrypted file sytem
so that when the disc is disposed, it does not need to be
securely erased. This is particularly important for SSD devices
...
Writing shell scripts leaves a lot of room to make mistakes, in ways that will cause
your scripts to break on certain input, or (if some input is untrusted) open up security
vulnerabilities. Here are some tips on how to make your shell scripts safer.
Don't
The simplest step is to avoid using shell at all. Many higher-level languages are both
easier to write the code in in the first place, and avoid some of the issues that shell
...
Sometimes we need to connect two or more geographically distributed ethernet networks to one broadcast domain. There can be two different office networks of some company which uses smb protocol partially based on broadcast network messages. Another example of such situation is computer cafes: a couple of computer cafes can provide to users more convinient environment forr playing multiplayer computer games without dedicated servers. Both sample networks in this article need to have one *nix server for bridging. Our networks can be connected by any possible hardware that provides IP connection between them.
Connecting Two Remote Local Networks With Transparent Bridging Technique
Short description
In described configuration we are connecting two remote LANs to make them appearing as one network with 192.168.1.0/24 address space (however physically, presense of bridges in network configuration is not affecting IP protocol and is fully transparent for it, so you can freely select any address space). Both of the bridging servers has two network interfaces: one (as eth0 in our example) connested to the LAN, and second (eth1) is being used as transport to connect networks. When ethernet tunnel between gateways in both networks will be bringed up we will connect tunnel interfaces with appropriate LAN interfaces with bridge interfaces. Schematically this configuration can be following:
...
So finally took the time to re-launch the 0ink web site. This time used more off-the shelf
software. So this site is just a another plain wordpress powered site.
Actually I have to thank my son for introducing me to wordpress.
What happened is that my son, who is only seven wanted to have his own web site. (Due to peer
pressure, kids these days...)
He has an Android tablet that he uses quite often. Since I knew that wordpress can be
...