Arch Linux Install - 2018-12-30 14:13:25

Boot your computer to a USB drive with the latest Arch Linux iso, then follow these steps: Ping a public DNS or IP address to make sure you’re connected to the internet. ping Turn NTP on timedatectl set-ntp true Prepare your disk Use lsblk to determine which disk to prepare. This example will use disk sda. fdisk to set partitions fdisk /dev/sda Create new partitions. # Delete existing partitions, if needed d -- delete partition [Enter] -- default partition number # Repeat until no partitions exist # Boot partition n -- new partition p -- primary [Enter] -- default partition number [Enter] -- default first sector +200M -- last sector # Swap partition (change +8G to match 100% or 150% of your RAM size) n -- new partition p -- primary [Enter] -- default partition number [Enter] -- default first sector +8G -- last sector # Root partition n -- new partition p -- primary [Enter] -- default partition number [Enter] -- default first sector +50G -- last sector # Home partition n -- new partition p -- primary [Enter] -- default partition number [Enter] -- default first sector [Enter] -- uses the rest of the drive space # Write the changes to finish fdisk w Create filesystems mkfs.

OpenSSH Config Examples - 2018-11-20 21:25:07

How do I create and setup an OpenSSH config file to create shortcuts for servers I frequently access under Linux or Unix desktop operating systems? A global or local configuration file for SSH client can create shortcuts for sshd server including advanced ssh client options. You can configure your OpenSSH ssh client using various files as follows to save time and typing frequently used ssh client command line options such as port, user, hostname, identity-file and much more.

Useful Cron Examples - 2018-11-15 20:29:22

Syntax Linux crontab has six fields. 1-5 fields defines the date and time of execution. The 6’th fields are used for command or script to be executed.The Linux crontab syntax are as following: [Minute] [hour] [Day_of_the_Month] [Month_of_the_Year] [Day_of_the_Week] [command] Astrics (*) – Matches anything Define range – You can define range using the hypen like: 1-10 or 20-30 or sun-fri or feb-apr Define multiple range – You can define multiple ranges with command seprated like: jan-mar,jul-sep How to Add/Edit Crontab To add or update job in crontab, use below command.

Useful DD Commands - 2018-11-15 20:29:22

Duplicate several drives concurrently dd if=/dev/sda | tee >(dd of=/dev/sdb) | dd of=/dev/sdc If you have some drive imaging to do, you can boot into any liveCD and use a commodity machine. The drives will be written in parallel. To improve efficiency, specify a larger block size in dd: dd if=/dev/sda bs=64k | tee >(dd of=/dev/sdb bs=64k) | dd of=/dev/sdc bs=64k To image more drives, insert them as additional arguments to tee:

How to Test SMTP via Telnet - 2018-09-15 20:29:22

Telnet to your mailserver telnet 25 EHLO MAIL FROM:<[email protected]> RCPT TO:<[email protected]> DATA Subject: This is a subject line Press Enter twice; a blank line is needed between the Subject field and the message body. Type the rest of your message, then press Enter. To finish the message, type a period ( . ) and press Enter QUIT

Pi-Hole Setup - 2018-09-15 20:29:22

Install curl -sSL | bash Fix static IP assignment Edit the file /etc/network/interfaces Make sure you have lines that look something like: # The primary network interface allow-hotplug eth0 iface eth0 inet static address netmask gateway Fixing HTTPS Issues That Cause Slow-Loading Pages Pi-hole is only handling the DNS queries and doesn’t know about the other protocols that are taking place. But we can use iptables to manage these protocols to prevent time-outs allowing Pi-hole to work it’s magic.

How To Set Up SSH Keys - 2018-01-11 00:27:03

By Etel Sverdlov About SSH Keys Secure Shell (better known as SSH) is a cryptographic network protocol which allows users to securely perform a number of network services over an unsecured network. SSH keys provide a more secure way of logging into a server with SSH than using a password alone. While a password can eventually be cracked with a brute force attack, SSH keys are nearly impossible to decipher by brute force alone.

How To Use SFTP to Securely Transfer Files with a Remote Server - 2018-01-11 00:27:03

By Justin Ellingwood How to Connect with SFTP By default, SFTP uses the SSH protocol to authenticate and establish a secure connection. Because of this, the same authentication methods are available that are present in SSH. Although passwords are easy to use and set up by default, we recommend you create SSH keys and transfer your public key to any system that you need to access. This is much more secure and can save you time in the long run.

How to Rescue a Non-booting GRUB 2 on Linux - 2018-01-11 00:27:03

By Carla Schroder Once upon a time we had legacy GRUB, the Grand Unified Linux Bootloader version 0.97. Legacy GRUB had many virtues, but it became old and its developers did yearn for more functionality, and thus did GRUB 2 come into the world. GRUB 2 is a major rewrite with several significant differences. It boots removable media, and can be configured with an option to enter your system BIOS.

PPTP VPN - 2017-09-15 20:29:22

Install pptp-linux package sudo apt-get install pptp-linux Create a PPTP connection profile sudo pptpsetup --create <nameofvpn> --server <> --username vpnuser When you hit ENTER you should be asked for the VPN password. The profile will be saved in /etc/ppp/peers/ To enable the VPN connection sudo pon <profilename> You can see your PPTP connection using ifconfig -s. It should be listed under ppp0. To kill the VPN connection

Mount SMB Network Drives in Linux - 2017-08-26 20:11:38

In order to mount the drive, you need to have cifs-utils installed on your system. sudo pacman -S cifs-utils sudo apt-get install cifs-utils Mounting network folders You might have public folders on your network drive that can be accessed by anyone without having to provide any credentials. These are mounted in the same way as password-protected folders (we will mount these in the next section), but with a few different options.

VNC Setup is Easy - 2017-08-26 20:03:33

Install x11vnc sudo pacman -S --noconfirm x11vnc Store VNC password to a file x11vnc -storepasswd By default this will store your password at ~/.vnc/passwd Add this command to your startup script x11vnc -forever -rfbauth /home/[username]/.vnc/passwd For Raspberry Pi If the Raspberry Pi is headless, you may want to add the following lines to /boot/config.txt hdmi_force_hotplug=1 hdmi_group=1 hdmi_mode=16

Hide Your Processes From Other Users in Linux - 2017-08-26 14:52:20

All modern multi-tasking operating systems, including Linux, run a series of processes for each of the tasks being executed. A notepad application is a process, a terminal window is a process, the SSH server is a process, each SSH connection is a process and so on. Linux schedules the various system resources (CPU time, memory, I/O) so that each process get an opportunity to run. To see the list of current processes running, you can use the ps command.

How To Encrypt Directories/Partitions With eCryptfs - 2017-08-26 14:37:49

This example provides steps for encrypting an existing home directory Install eCryptfs apt-get install ecryptfs-utils Backup existing Home directory cp -pfr /home/[username]/ /tmp/ Mount /home/[username] with the file system type ecryptfs mount -t ecryptfs /home/[username] /home/[username] Select cipher: aes Select key bytes: 16 Enable plaintext passthrough (y/n) [n]: <-- ENTER Enable filename encryption (y/n) [n]: <-- ENTER Would you like to proceed with the mount (yes/no)? : <-- yes Would you like to append sig.

Forceful Removal of a Domain Controller - 2017-08-26 00:31:47

Know Your FSMO Locations Make sure that the DC you are removing is not holding any of the FSMO Roles On any health domain controller, click Start, click Run, type Ntdsutil in the Open box, and then click OK Type roles, and then press ENTER Type connections, and then press ENTER Type connect to server , where is the name of the server you want to use, and then press ENTER Type quit, and then press ENTER Type select operation target, and then press ENTER Type list roles for connected server, and then press ENTER Review the listed roles and their host, if the DC that wish to remove is not listed proceed to step 4 Seizing FSMO Roles (The Last Resort) If for what ever reason you can not do a clean transfer you will need to seize it

How to Easily Recognize Web Colors from RGB Codes - 2017-08-25 03:52:02

If you’ve ever customized the design of your HTML website, or tried changing the background color of your social profiles, you’ve probably encountered Hexadecimal color codes. These are a string of 6 characters - like “0066FF” - that you know represent colors but we rarely make the effort to understand them. Here is a simple guide to help you recognize web colors more quickly from their RGB codes. No more guessing or consulting the color palettes.

ASA IPSec with Shrewsoft - 2017-08-25 02:56:24

This guide provides information that can be used to configure a Cisco PIX/ASA device running firmware version 7.x to support IPsec VPN client connectivity. If you have a PIX device running firmware version 6.x, please consult the HowtoCiscoPix. The Shrew Soft VPN Client has been tested with Cisco products to ensure interoperability. Overview The configuration example described below will allow an IPsec VPN client to communicate with a single remote private network.

How To Lock Down Remote Desktop Services - 2017-07-24 10:11:42

Preparation Create OU for RDS Server in Active Directory. Create security group for users who will use Remote Desktop Host (i.e. RDS Users). Create GPO (i.e. RDS Server Lock Down). In Security Filtering delete Authenticated Users, add RDS Server Computer Account, and the security group created in previous step. Configure users who can connect to the server remotely: Log in to RDS Server >>> Run >>> control system >>> Remote Settings >>> Remote tab >>> Select users >>> Delete any groups/users >>> Add security group for RDS users

Disk Cloning in Linux - 2017-03-03 11:17:41

The dd command utility is a simple yet powerful and useful command available in Unix and Linux systems which is used to convert and copy files. Unix like systems treat all devices as files and these device files are located in the /dev directory in your system. So typically your hard disk drive is a file in the /dev directory with the prefix of hd or sd (depending on IDE or SCSI driver).

Windows 10 Product Key Activation Methods - 2017-02-27 21:01:12

Change Windows 10’s product key using Settings Open Settings Click on Update & security Click on Activation Click the Change product key link Type the 25-digit product key for the version of Windows 10 you want Click Next to complete the process If the activation process completes successfully, you’ll get the “Windows is activated” message. Change Windows 10’s product key using Control Panel Use the Windows key + X keyboard shortcut to open the Power User menu and select System Click the Change product key link under the Windows activation section Type the 25-digit product key for the version of Windows 10 you want Click Next to complete the process Similar to the Settings app, if the activation process completes successfully, you’ll get the “Windows is activated” message.