Adding static routes in alpine linux
There are several ways to do this documented in the alpine linux wiki. My preferred way is to configure it in /etc/network/interfaces. For example: auto eth0 iface eth0 inet static ...
There are several ways to do this documented in the alpine linux wiki. My preferred way is to configure it in /etc/network/interfaces. For example: auto eth0 iface eth0 inet static ...
Small recipes to tweak munin configurations. Overriding critical and warning levels In the node configuration enter: plugin.field_name.critical value plugin.field_name.warning value The plugin name can be found by clicking in the graph with the value ...
To set-up a reverse proxy I took the following steps: configure DNS get Letsencrypt certificates Configure NGINX Configure Home Assistant to trust the proxy ...
I am busy moving away from my VeraEdge installation to a Home Assistant running on a Raspberry Pi 4. This is because it looks like the maker of the VeraEdge was bought and it is slowly being phased out. For this I am using the following parts: ...
As part of my small project of movng my Z-Wave Hub to a Raspberry PI, I got an X728 kit. This has: UPS controller board RTC circuit ...
My ISP provider is KPN. They recently enabled IPv6 in my street. I was using before a IPv6 Tunnel Broker, starting with SixXS and after they went out, with Hurricane Electric. So naturally, I decided to switch to KPN's native IPv6 service. They provide a /64 prefix, which is reasonable. Would be better ...
This article is about erasing disc drives securely. Specially for SSD drives, writing zeros or random data to discs is not good enough and counterproductive. One way to do secure erase (for disposal) is to begin with an encrypted disc. However, after the fact the following options are possible: ATA Secure Erase ...
A seedbox is a dedicated server at a high speed datacenter with a public IP address for the downloading and seeding of bittorrent files. Persons who have access to a seedbox can download these files to their personal computers at any time and from any place that has an internet connection. References: ...
Former United States President Dwight Eisenhower was responsible for putting together one of the most important yet fundamentally simple to understand concepts in time management. Eisenhower's Urgent/Important Principle is a tool to help decipher what tasks need to be addressed more immediately than others. Anyone who uses the principle will be better able to organize and orchestrate their ...
We use it for receiving junk e-mails (i.e. for those times where we need an e-mail address for sign-up to a service). E-mails are of the form: [email protected] TODO: Extend postie: ...
Windows system administration is very mouse driven and to reach all tools you need to browse through Windows explorer. If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names. Here is a list of admin tools with their .msc file names. domain.msc: AD Domains and Trusts ...
Divide into Work : Only visible to company and clients Personal: Public/Private areas ...
Here a few web-links to interesting web apps. It covers stuff about password security and checking if web sites are down, etc etc. Down For Everyone or Just Me: If you're getting an error when visiting a certain site, it could be down or something could be wrong on your end. To see which ...
A quick and dirty mini-howto to setup a proxy on Ubuntu. This is meant mostly for doing quick setup of a proxy on a cloud environment. Install Squid with the following command at the Linux command prompt: ...
Recently I found this Open Source project. Apparently it recently gained support to unpack Exchange Offline Address Book files. What I don't know is after you unpack it, how would you use such a file. Intriguing but apparently falls a little bit short. Probably would need to try it out for myself to see how it works. libmspack. ...
I am still to test this recipe Server Configuration First of all, we must install the following components: A DHCP server to assign IP addresses to our diskless nodes. A TFTP server to transfer the boot image (a requirement of all PXE option roms). ...
So these are my ideas on how to document projects. There are three types of documentation types: User guides Targetted and end-users of the software and people who want a brief overview. Man pages Again targetted at end-users but also sysadmins. Usually to address a specific feature. ...
Sometimes we need to connect two or more geographically distrubuted ethernet networks to one broadcast domain. There can be two different office networks of some company which uses smb protocol partially based on broadcast network messages. Another example of such situation is computer cafes: a couple of computer cafes can provide to users more convinient environment forr playing multiplayer computer games without dedicated servers. Both sample networks in this article need to have one *nix server for bridging. Our networks can be connected by any possible hardware that provides IP connection between them. Connecting Two Remote Local Networks With Transparent Bridging Technique Short description In described configuration we are connecting two remote LANs to make them appearing as one network with 192.168.1.0/24 address space (however physically, presense of bridges in network configuration is not affecting IP protocol and is fully transparent for it, so you can freely select any address space). Both of the bridging servers has two network interfaces: one (as eth0 in our example) connested to the LAN, and second (eth1) is being used as transport to connect networks. When ethernet tunnel between gateways in both networks will be bringed up we will connect tunnel interfaces with appropriate LAN interfaces with bridge interfaces. Schematically this configuration can be following: +-------+ +-------+ | br0 | | br0 | ...
When using virtualisation it is very common to create template VMs that can be cloned from. This makes deployment much easier than having to install a new VM from scratch. Unfortunately, the cloned VMs lack any Active Directory memberships and the VMs have to be manually added to the AD domain. For automated deployment scenarios this is less than desirable. This recipe intends to solve that issue in a ...
This is a handy tip. If you don't want to give out your real email address to register for a site and don't want to go through the hassle of creating a spam email address, just point your browser to Guerrilla Mail upon loading the page you'll have an automatically assigned email ...