Telekom Cloud CI/CD demo
Pre-requisites Preparation Base infrastructure Notes ...
Pre-requisites Preparation Base infrastructure Notes ...
Intro Hardware Null modem Cisco style ports ...
This article is here as a reminder. So, for testing, I needed to configure a Cisco CSR1000V virtual router as a bridge. So I used a version 16 Cisco IOS XE image. To make my life easier I used the "wizard" that runs the first time to automatically configure bridgning. Ironically, this created an invalid ...
This recipe is for tunneling NFS traffic over SSH. This adds encryption and Public Key authentication to otherwise insecure NFS traffic. For this recipe to work, requires NFSv4. Earlier versions were not tested, but I expect not all the functionality to work. server configuration ...
This is a sequel to my article IPv6 blues. Layout Enabling forwarding Configure networking ...
There are several ways to do this documented in the alpine linux wiki. My preferred way is to configure it in /etc/network/interfaces. For example: auto eth0 iface eth0 inet static ...
Small recipes to tweak munin configurations. Overriding critical and warning levels In the node configuration enter: plugin.field_name.critical value plugin.field_name.warning value The plugin name can be found by clicking in the graph with the value ...
To set-up a reverse proxy I took the following steps: configure DNS get Letsencrypt certificates Configure NGINX Configure Home Assistant to trust the proxy ...
I am busy moving away from my VeraEdge installation to a Home Assistant running on a Raspberry Pi 4. This is because it looks like the maker of the VeraEdge was bought and it is slowly being phased out. For this I am using the following parts: ...
As part of my small project of movng my Z-Wave Hub to a Raspberry PI, I got an X728 kit. This has: UPS controller board RTC circuit ...
My ISP provider is KPN. They recently enabled IPv6 in my street. I was using before a IPv6 Tunnel Broker, starting with SixXS and after they went out, with Hurricane Electric. So naturally, I decided to switch to KPN's native IPv6 service. They provide a /64 prefix, which is reasonable. Would be better ...
This article is about erasing disc drives securely. Specially for SSD drives, writing zeros or random data to discs is not good enough and counterproductive. One way to do secure erase (for disposal) is to begin with an encrypted disc. However, after the fact the following options are possible: ATA Secure Erase ...
A seedbox is a dedicated server at a high speed datacenter with a public IP address for the downloading and seeding of bittorrent files. Persons who have access to a seedbox can download these files to their personal computers at any time and from any place that has an internet connection. References: ...
Former United States President Dwight Eisenhower was responsible for putting together one of the most important yet fundamentally simple to understand concepts in time management. Eisenhower's Urgent/Important Principle is a tool to help decipher what tasks need to be addressed more immediately than others. Anyone who uses the principle will be better able to organize and orchestrate their ...
We use it for receiving junk e-mails (i.e. for those times where we need an e-mail address for sign-up to a service). E-mails are of the form: [email protected] TODO: Extend postie: ...
Windows system administration is very mouse driven and to reach all tools you need to browse through Windows explorer. If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names. Here is a list of admin tools with their .msc file names. domain.msc: AD Domains and Trusts ...
Divide into Work : Only visible to company and clients Personal: Public/Private areas ...
Here a few web-links to interesting web apps. It covers stuff about password security and checking if web sites are down, etc etc. Down For Everyone or Just Me: If you're getting an error when visiting a certain site, it could be down or something could be wrong on your end. To see which ...
A quick and dirty mini-howto to setup a proxy on Ubuntu. This is meant mostly for doing quick setup of a proxy on a cloud environment. Install Squid with the following command at the Linux command prompt: ...
Recently I found this Open Source project. Apparently it recently gained support to unpack Exchange Offline Address Book files. What I don't know is after you unpack it, how would you use such a file. Intriguing but apparently falls a little bit short. Probably would need to try it out for myself to see how it works. libmspack. ...