Post tagged: settings

Fitbit reset

How to reset your Fibit Charge 5, 6 or Fitbit Luxe? You can reset your Fitbit Charge 5, Charge 6, or Fitbit Luxe in 2 ways: Soft reset: restart your Fitbit. You keep your data. ...

Locking down SFTP

This is a small recipe to increase the security around a SFTP interface. In the /etc/ssh/sshd_config file include the following settings: Subsystem sftp internal-sftp This configures the sftp subsystem to use the internal sftp implementation. This is because inside the chroot, we usually will not have the normal ...

cisco bridging

This article is here as a reminder. So, for testing, I needed to configure a Cisco CSR1000V virtual router as a bridge. So I used a version 16 Cisco IOS XE image. To make my life easier I used the "wizard" that runs the first time to automatically configure bridgning. Ironically, this created an invalid ...

libnss-db HOWTO

This mini-howto illustrate how to use libnss-db on a Ubuntu Linux system. Other installations should work to after adjusting package names and directory paths. I myself use as a "serverless" lightweight user directory. Essentially, I mount the db directory and the home directory from an NFS server. Package installation ...

Getting the current proxy pac configuration

This is done using tcl for convenience. If you do not have it installed you can download freewrap executable and rename freewrap.exe to wish.exe or freewrapTCLSH.exe to tclsh.exe. Registry Key : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ REG_SZ AutoConfigURL = https://<your url>/proxy.pac ...

Set your google account to automatically delete

Want to share your family photos after your death, but take your search history to the grave? All that and more is possible with Google's Inactive Account Manager. How You Can Control Your Information After Death It's not nice to think about, but one day, you will die, along with the keys to your online kingdom. And these days, those online accounts ...

Writing Safe Shell scripts

Writing shell scripts leaves a lot of room to make mistakes, in ways that will cause your scripts to break on certain input, or (if some input is untrusted) open up security vulnerabilities. Here are some tips on how to make your shell scripts safer. Don't The simplest step is to avoid using shell at all. Many higher-level languages are both easier to write the code in in the first place, and avoid some of the issues that shell ...

Windows administration from the command line

Windows system administration is very mouse driven and to reach all tools you need to browse through Windows explorer. If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names. Here is a list of admin tools with their .msc file names. domain.msc: AD Domains and Trusts ...