This recipe is for tunneling NFS traffic over SSH. This adds encryption
and Public Key authentication to otherwise insecure NFS traffic.
For this recipe to work, requires NFSv4. Earlier versions were
not tested, but I expect not all the functionality to work.
server configuration
...
I am busy moving away from my VeraEdge
installation to a Home Assistant running on a Raspberry Pi 4. This is
because it looks like the maker of the VeraEdge was bought and it is slowly being
phased out.
For this I am using the following parts:
...
My ISP provider is KPN. They recently enabled
IPv6 in my street. I was using before a IPv6 Tunnel Broker,
starting with SixXS and after they went out,
with Hurricane Electric. So naturally,
I decided to switch to KPN's native IPv6 service.
They provide a /64 prefix, which is reasonable. Would be better
...
This article is about erasing disc drives securely. Specially for SSD
drives, writing zeros or random data to discs is not good enough and
counterproductive.
One way to do secure erase (for disposal) is to begin with an encrypted
disc. However, after the fact the following options are possible:
ATA Secure Erase
...
Windows system administration is very mouse driven and to reach
all tools you need to browse through Windows explorer.
If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names.
Here is a list of admin tools with their .msc file names.
domain.msc: AD Domains and Trusts
...
Here a few web-links to interesting web apps.
It covers stuff about password security and checking if web sites
are down, etc etc.
Down For Everyone or Just Me:
If you're getting an error when visiting a certain site, it could be down or something could be wrong on your end. To see which
...
I am still to test this recipe
Server Configuration
First of all, we must install the following components:
A DHCP server to assign IP addresses to our diskless nodes.
A TFTP server to transfer the boot image (a requirement of all PXE option roms).
...
Sometimes we need to connect two or more geographically distrubuted ethernet networks to one broadcast domain. There can be two different office networks of some company which uses smb protocol partially based on broadcast network messages. Another example of such situation is computer cafes: a couple of computer cafes can provide to users more convinient environment forr playing multiplayer computer games without dedicated servers. Both sample networks in this article need to have one *nix server for bridging. Our networks can be connected by any possible hardware that provides IP connection between them.
Connecting Two Remote Local Networks With Transparent Bridging Technique
Short description
In described configuration we are connecting two remote LANs to make them appearing as one network with 192.168.1.0/24 address space (however physically, presense of bridges in network configuration is not affecting IP protocol and is fully transparent for it, so you can freely select any address space). Both of the bridging servers has two network interfaces: one (as eth0 in our example) connested to the LAN, and second (eth1) is being used as transport to connect networks. When ethernet tunnel between gateways in both networks will be bringed up we will connect tunnel interfaces with appropriate LAN interfaces with bridge interfaces. Schematically this configuration can be following:
+-------+ +-------+
| br0 | | br0 |
...