Main public logs
From IT-Arts.net
Combined display of all available logs of IT-Arts.net. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 17:03, 16 December 2025 Admin talk contribs deleted page SNORT - crtl-snort2c-fail2ban.sh (content was: "Category:Wiki == crtl-snort2c-fail2ban.sh == <nowiki> #!/bin/bash # Define the IP addresses at the top for easy customization IP_PFSENSE_SOURCE_01="1.2.3.4" IP_PFSENSE_SOURCE_02="1.2.3.5" IP_FAIL2BAN="1.2.3.6" IP_PFSENSE_DEST="1.2.3.7" SSH_KEY="/path/to/your/ssh/key" # Specify your SSH private key location SNORT_TABLE="snort2c" # Define the pfSense Snort table na...", and the only contributor was "Admin" (talk))
- 17:02, 16 December 2025 Admin talk contribs created page BASH - crtl-snort2c-fail2ban.sh (Created page with "Category:Wiki == crtl-snort2c-fail2ban.sh == <nowiki> #!/bin/bash # Define the IP addresses at the top for easy customization IP_PFSENSE_SOURCE_01="1.2.3.4" IP_PFSENSE_SOURCE_02="1.2.3.5" IP_FAIL2BAN="1.2.3.6" IP_PFSENSE_DEST="1.2.3.7" SSH_KEY="/path/to/your/ssh/key" # Specify your SSH private key location SNORT_TABLE="snort2c" # Define the pfSense Snort table name # Function to fetch banned IPs from the remote pfSense Snort2c table via SSH fetch_pfs...")
- 16:45, 16 December 2025 Admin talk contribs created page SPLUNK - Filters Documentation (Created page with "Category:Wiki == Understanding Splunk Log Filtering == Splunk log filtering works primarily through the following features: * **Search Processing Language (SPL)**: This is the language used to filter, analyze, and transform data in Splunk. * **Event Types**: Classifying logs into different event types helps in simplifying complex log data into easy-to-analyze categories. * **Field Extraction**: Fields are used to create searchable and filterable data from the raw l...")
- 16:31, 16 December 2025 Admin talk contribs created page VIRSH - Documentation (Created page with "Category:Wiki == Basic Usage == === Connect to a Hypervisor === You can connect to a local or remote hypervisor with the following command: <nowiki> virsh connect qemu:///system</nowiki> This connects to the local system's hypervisor. For remote systems, replace `qemu:///system` with a URI of the remote host, such as `qemu+ssh://user@hostname/system`. === List Virtual Machines === To list all virtual machines on the system, including running, paused, and shut o...")
- 16:28, 16 December 2025 Admin talk contribs created page QEMU - Documentation (Created page with "Category:Wiki == QEMU Basics == === Architecture Emulation === QEMU can emulate different hardware architectures. For example, if you want to run a PowerPC-based system on an x86 host, you can use QEMU to emulate PowerPC hardware. <nowiki> qemu-system-ppc -cdrom install.iso -m 1024</nowiki> This command starts a virtual machine emulating a PowerPC architecture with 1024 MB of RAM and an installation ISO image mounted as a CD-ROM. === Virtualization vs. Emulatio...")
- 16:23, 16 December 2025 Admin talk contribs created page PWGEN - Manpage (Created page with "Category:Wiki == pwgen Manpage == <nowiki> PWGEN(1) General Commands Manual PWGEN(1) NAME pwgen - generate pronounceable passwords SYNOPSIS pwgen [ OPTION ] [ pw_length ] [ num_pw ] DESCRIPTION The pwgen program generates passwords which are designed to be easily memorized by hum...")
- 14:56, 16 December 2025 Admin talk contribs deleted page FAIL2BAN - Filter.d - Nextcloud (content was: "Category:Wiki = Definition = <nowiki> [Definition] # /etc/fail2ban/filter.d/http-nextcloud.conf # Nextcloud-specific abuse patterns failregex = ^<HOST>.*( # Login related attacks (brute-forcing, password guessing, and login attempts) /index.php.*action=login.*| # Login attempts /index.php.*user.*| # User login page /index.php.*password.*| # Password reset or login-related parameters /index.php.*auth.*|...")
- 14:55, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-nextcloud (Created page with "Category:Wiki = Definition = <nowiki> [Definition] # /etc/fail2ban/filter.d/http-nextcloud.conf # Nextcloud-specific abuse patterns failregex = ^<HOST>.*( # Login related attacks (brute-forcing, password guessing, and login attempts) /index.php.*action=login.*| # Login attempts /index.php.*user.*| # User login page /index.php.*password.*| # Password reset or login-related parameters /index.php.*a...")
- 14:54, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-dolibarr (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # Dolibarr specific attack patterns failregex = ^<HOST>.*( # Login-related attacks (Brute-forcing, password guessing) /index.php.*action=login.*| # Login page (login attempt) /index.php.*login.*| # Generic login attempt /index.php.*password.*| # Password reset or login with parameter /index.php.*user.*| # User login attempt...")
- 14:43, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-wordpress (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # /etc/fail2ban/filter.d/http-wordpress.conf # WordPress specific attack patterns failregex = ^<HOST>.*( # WordPress Core and Admin /wp-admin/install.php.*| # WordPress install script /wp-admin/.*/| # Wildcard to catch all wp-admin paths /wp-login.php.*| # Login page /wp-activate.php.*| # Account activation /wp-config.php...")
- 14:34, 16 December 2025 Admin talk contribs deleted page FAIL2BAN - Common-Web-Vulnerabilities (content was: "Category:Wiki == Jail.conf == <nowiki> [web-vulnerabilities] enabled = true action = iptables-multiport[name=web_vulns, port="http,https"] logpath = /var/log/nginx/access.log # Or adjust based on your web server log path maxretry = 3 bantime = 3600 # 1 hour ban findtime = 600 # 10 minutes to check for repeated offenses</nowiki> == web-vulnerabilities.conf == <nowik...", and the only contributor was "Admin" (talk))
- 14:34, 16 December 2025 Admin talk contribs deleted page FAIL2BAN - Unban IP (content was: "Category:Wiki <nowiki> fail2ban-client set <JAILNAME> unbanip <IP></nowiki>", and the only contributor was "Admin" (talk))
- 14:30, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-kevins (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # Script-kiddies and Kevins patterns failregex = ^<HOST>.*/wp-content/plugins/hellopress/wp_filemanager.php.* ^<HOST>.*/wp-includes/rest-api/alfa-rex.php7.* ^<HOST>.*/widgets.php.* ^<HOST>.*/b.php.* ^<HOST>.*/admin.php.* ^<HOST>.*/autoload_classmap.php.* ^<HOST>.*/wp-activate.php.* ^<HOST>.*/db.php.* ^<HOST>.*/bless.php.* ^<HOST>.*/blurbs.php.* ^<HOST>.*/cord.php.* ^<HOST>.*/axx.php...")
- 14:28, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-xss (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-xss.conf # Cross-Site Scripting (XSS) # Matches typical XSS attack vectors where input is reflected on the web page failregex = ^<HOST>.*(<script.*>.*</script>|<.*javascript:.*|<.*onerror=.*|<.*onload=.*|<.*alert\(.*\)).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-xss] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -...")
- 14:27, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-suspicious (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-suspicious.conf # General Suspicious URL Patterns (including bad characters like `\`, `;`, `&`, etc.) failregex = ^<HOST>.*(\/\.\.\/|\.\.\/|\.\.\\|\\|%%3b|%%26|%%2f|%%2e%%2e).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-suspicious] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</now...")
- 14:26, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-sql-like (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-sql-like.conf # SQL-like SELECT Statements that could indicate SQL Injection Attempts # This also tries to capture long SELECT/INSERT/UPDATE queries with SQL injection techniques failregex = ^<HOST>.*(select.*from.*|insert.*into.*|update.*set.*|delete.*from.*).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-sql-like] enabled = true banaction = %(banaction_allports)s logpath = /var/lo...")
- 14:25, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-sql-inj (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-sql-inj.conf # SQL Injection Attempts # Matches common SQL injection patterns such as ' or 1=1 --, ; DROP TABLE, etc. failregex = ^<HOST>.*(select.*from.*where.*union.*select.*from.*information_schema.tables|insert.*into.*values.*select.*from.*information_schema.tables|union.*select.*null.*from.*information_schema.tables|or.*1=1).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-sql-inj] enabled =...")
- 14:23, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-shell-command (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-shell-command.conf # Attempted Shell Command Execution in URLs (e.g., using ?cmd=) # This could indicate an attempt to execute system commands via web apps. failregex = ^<HOST>.*(\?cmd=|system\(|exec\().*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-shell-command] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findt...")
- 14:22, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-rfi (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-rfi.conf # Remote File Inclusion (RFI) # Matches attempts to include remote files (e.g. http://example.com/malicious_file.php) failregex = ^<HOST>.*(?:https?|ftp):\/\/(?:[a-zA-Z0-9-]+\.)+[a-zA-Z]{2,6}\/.*\.(?:php|jsp|asp|cgi|pl|txt|xml|json|html?).*$` ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-rfi] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access....")
- 14:21, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-php-code-inj (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-php-code-inj.conf # PHP Code Injection # Matches PHP-based code injection attempts such as `<?php eval($_POST[cmd]); ?>` failregex = ^<HOST>.*(\<\?php.*eval.*\$_POST.*\;\?\>).* ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-php-code-inj] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</no...")
- 14:20, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-path-t (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-path-t.conf # Path Traversal Attacks # Matches attempts to traverse the directory structure (e.g., ../../etc/passwd or .\..\etc\passwd) failregex = ^<HOST>.*(\.\./|\.\.\\|%%2e%%2e%%2f|%%2e%%2e%%5c).*\/etc\/passwd.*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-path-t] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 fi...")
- 14:19, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-non-exist (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-non-exist.conf # Requesting non-existent files like backup, .git, or config files # These are often targeted by attackers to find hidden sensitive files. # THIS FILE NEED TO BE CUSTOMIZED REGARDING YOUR NEEDS # failregex = ^<HOST>.*(\.git\/|\.env|\.bak|\.tar.gz|\.sql|\.sh|config\.php).*$ failregex = ^<HOST>.*(\.git\/|\.env|\.bak|\.tar.gz|\.sql|config\.php).*$ ignoreregex =</nowiki> =...")
- 14:16, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-malicious (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-malicious.conf # Malicious HTTP Methods # Matches attempts to use HTTP methods that are often abused (e.g., TRACE, DELETE, PATCH) failregex = ^<HOST>.*(TRACE|DELETE|PATCH).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-malicious] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
- 14:15, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-lfi (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-lfi.conf # Local File Inclusion (LFI) # Matches patterns that indicate an attempt to include local files (e.g. ../../etc/passwd) failregex = ^<HOST>.*(\.\./|\.\.\\).*\/etc\/passwd.*$</nowiki> = Jail.conf = <nowiki> [http-lfi] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
- 14:14, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-dir-trav (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-dir-trav.conf # Directory Traversal Attempts # Matches the occurrence of '../' which is often used for directory traversal failregex = ^<HOST>.*\.\.\/.*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-dir-trav] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
- 14:13, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-crlf (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-crlf.conf # HTTP Response Splitting (CRLF Injection) # Matches attempts to inject headers or CRLF sequences into the response failregex = ^<HOST>.*(\r\n|\n\r|\r|\n).*Host:.*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-crlf] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
- 14:07, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-command-inj (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-command-inj.conf # Command Injection # Matches typical command injection patterns like 'cat /etc/passwd', or 'ls; rm -rf' failregex = ^<HOST>.*(cat.*\/etc\/passwd|ls;.*rm.*-rf|\/bin\/bash).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-command-inj] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend...")
- 13:44, 16 December 2025 Admin talk contribs created page FAIL2BAN - Filter.d - http-502-503 (Created page with "Category:Wiki = Filter.d = <nowiki> # /etc/fail2ban/filter.d/http-502-503.conf [Definition] failregex = ^<HOST> -.*"(GET|POST|HEAD).*HTTP.*" 502 = ^<HOST> -.*"(GET|POST|HEAD).*HTTP.*" 503 ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-502-503] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*error*.log /var/log/nginx/*access*.log maxretry = 20 findtime = 20 backend = polling</nowiki>")
- 07:54, 16 December 2025 Admin talk contribs created page PROXMOX - Troubleshoot Cluster (Created page with "Category:Wiki When managing a Proxmox cluster, various issues may arise that can affect cluster functionality, node communication, virtual machine performance, or storage. This guide outlines common troubleshooting steps and tools for resolving issues in a Proxmox cluster. == Cluster Communication Issues == Cluster communication issues often occur when nodes are unable to properly sync with each other. These issues can prevent quorum, affect high availability, or...")
- 07:43, 16 December 2025 Admin talk contribs created page PROXMOX - Clustering (Created page with "Category:Wiki == Proxmox Cluster Configuration with 4 Nodes == Before starting, ensure that: * All nodes have Proxmox installed and updated. * The nodes are on the same network. * SSH key-based authentication is set up between the nodes. * You have a consistent hostname and DNS setup across all nodes. * Ensure NTP (Network Time Protocol) is configured and synchronized across all nodes. === Cluster Configuration Overview === A Proxmox cluster uses the Corosync and...")
- 06:41, 16 December 2025 Admin talk contribs deleted page ARISTA - BGP (content was: "Category:Wiki ==Introduction== BGP (Border Gateway Protocol) is a standardized exterior gateway protocol designed to exchange routing information between different autonomous systems (ASes) on the internet. Below is a complete guide to BGP commands on Arista EOS, covering configuration, monitoring, and troubleshooting. ==Basic BGP Configuration== * '''router bgp <AS-number>'''...", and the only contributor was "Admin" (talk))
- 06:39, 16 December 2025 Admin talk contribs created page ARISTA - BGP Commands (Created page with "Category:Wiki == Configuring BGP on Arista EOS == To start configuring BGP, you need to enter global configuration mode and enable BGP for a specific Autonomous System (AS). <nowiki> router bgp [AS_NUMBER]</nowiki> Example: <nowiki> router bgp 65001</nowiki> == BGP Neighbors Configuration == You can define BGP neighbors, which are other BGP routers with which your device will exchange routing information. ### Add a Neighbor <nowiki> neighbor [IP_ADDRESS] r...") Tag: Recreated
- 10:24, 15 December 2025 Admin talk contribs deleted page ARISTA - Speed-Group Commands (content was: "Category:Wiki == Creating and Configuring a Speed-Group == The basic command structure to create a speed-group is as follows: <nowiki> speed-group <group_name> [speed <speed_value>] [duplex <duplex_mode>]</nowiki> - `<group_name>`: The name assigned to the speed group. - `<speed_value>`: The speed of the interfaces within the group (e.g., 10G, 40G, 100G, etc.). - `<duplex_mo...", and the only contributor was "Admin" (talk))
- 10:24, 15 December 2025 Admin talk contribs created page ARISTA - Speed-Group Commands with SerDes (Created page with "Category:Wiki == Speed-Group and SerDes Configuration == When configuring Speed-Groups with SerDes on Arista EOS, it's important to set both the speed and the appropriate SerDes settings for high-speed interfaces. The basic structure for configuring a Speed-Group with SerDes support is: <nowiki> speed-group <group_name> speed <speed_value> [serdes <serdes_mode>] duplex <duplex_mode> </nowiki> - `<group_name>`: The name of the speed-group. - `<speed_value>`: The s...")
- 10:08, 15 December 2025 Admin talk contribs created page ARISTA - Speed-Group Commands (Created page with "Category:Wiki == Creating and Configuring a Speed-Group == The basic command structure to create a speed-group is as follows: <nowiki> speed-group <group_name> [speed <speed_value>] [duplex <duplex_mode>] </nowiki> - `<group_name>`: The name assigned to the speed group. - `<speed_value>`: The speed of the interfaces within the group (e.g., 10G, 40G, 100G, etc.). - `<duplex_mode>`: The duplex setting for the interfaces (e.g., full or half). Example: <nowiki> sp...")
- 10:01, 15 December 2025 Admin talk contribs created page ARISTA - Port Speed and Duplex (Created page with "Category:Wiki == Port Speed Configuration == Arista EOS supports several methods for setting the port speed on an interface, including auto-negotiation and explicit manual configuration. === Setting Port Speed Manually === To manually set the speed of an interface, use the following command: <nowiki> switch# configure terminal switch(config)# interface ethernet 1 switch(config-if-Et1)# speed 10000</nowiki> In this example, the port speed is manually set to 10 G...")
- 16:49, 14 December 2025 Admin talk contribs deleted page ARISTA - Basic Commands (content was: "Category:Wiki ==Basic Configuration Commands== * '''enable''' - Enters privileged exec mode. * '''configure terminal''' or '''conf t''' - Enters global configuration mode. * '''show version''' - Displays EOS software version, device model, and hardware information. * '''show running-config''' - Displays the current active configuration. * '''show startup-config''' - Displays th...", and the only contributor was "Admin" (talk))
- 16:48, 14 December 2025 Admin talk contribs created page ARISTA - CLI Commands (Created page with "Category:Wiki ==Basic Configuration Commands== * '''enable''' - Enters privileged exec mode. * '''configure terminal''' or '''conf t''' - Enters global configuration mode. * '''show version''' - Displays EOS software version, device model, and hardware information. * '''show running-config''' - Displays the current active configuration. * '''show startup-config''' - Displays the configuration stored in NVRAM (startup config). * '''copy running-config startup-config'...")
- 16:47, 14 December 2025 Admin talk contribs created page ARISTA - Bash Commands (Created page with "Category:Wiki == Basic File System Commands == === Displaying File System Usage === To check the file system disk usage: <nowiki> df -h</nowiki> This will display the disk space usage of all mounted file systems in a human-readable format. === Checking Available Memory === To check available memory on an Arista switch: <nowiki> free -h</nowiki> This will display memory usage in a human-readable format, showing total, used, free, and available memory. === View...")
- 16:42, 14 December 2025 Admin talk contribs created page HYDRA - Command Overview (Created page with "Category:Wiki == Basic Syntax == The general syntax for Hydra is as follows: <nowiki> hydra [options] <target> <protocol> <username list> <password list></nowiki> - `[options]`: Various flags or settings to adjust the attack. - `<target>`: The IP address or hostname of the target system. - `<protocol>`: The protocol to attack, such as ftp, ssh, http, etc. - `<username list>`: A file containing a list of usernames to attempt. - `<password list>`: A file containing...")
- 16:39, 14 December 2025 Admin talk contribs created page HYDRA - Manpage (Created page with "Category:Wiki == hydra --help == <nowiki> HYDRA(1) General Commands Manual HYDRA(1) NAME hydra - a very fast network logon cracker which supports many different services SYNOPSIS hydra [-L FILE] [-p PASS|-P FILE|-x OPT -y | [-C FILE]]...")
- 16:31, 14 December 2025 Admin talk contribs created page ARISTA - AAA Commands (Created page with "Category:Wiki == AAA Overview == AAA refers to three main components used for managing access control and monitoring on network devices: * **Authentication**: Verifies the identity of users or devices attempting to connect. * **Authorization**: Determines what authenticated users or devices are allowed to do. * **Accounting**: Tracks what actions users or devices perform during a session. == Enabling AAA == To enable AAA on an Arista device, use the following com...")
- 16:23, 14 December 2025 Admin talk contribs created page IFCONFIG - Documentation (Created page with "Category:Wiki === Display Network Interfaces === To display all active network interfaces and their configurations: <nowiki> ifconfig</nowiki> This command will show information such as the interface name (e.g., `eth0`, `wlan0`), the IP address, the MAC address, and other network interface parameters. To display all interfaces, including those that are down, use: <nowiki> ifconfig -a</nowiki> === Configure an IP Address === You can configure an IP address f...")
- 16:20, 14 December 2025 Admin talk contribs created page IWCONFIG - Documentation (Created page with "Category:Wiki == Syntax == The general syntax for the `iwconfig` command is as follows: <nowiki> iwconfig [interface] [options] </nowiki> Where: - `[interface]` refers to the wireless network interface (e.g., `wlan0`, `wlan1`). - `[options]` are the various parameters you can modify or display. == Common Options == * `essid [SSID]`: Set the SSID (Service Set Identifier) for the wireless network. <nowiki> iwconfig wlan0 essid "MyNetwork"</nowiki> * `ke...")
- 16:16, 14 December 2025 Admin talk contribs created page IFCONFIG - Manpage (Created page with "Category:Wiki == ifconfig Manpage == <nowiki> IFCONFIG(8) Linux System Administrator's Manual IFCONFIG(8) NAME ifconfig - configure a network interface SYNOPSIS ifconfig [-v] [-a] [-s] [interface] ifconfig [-v] interface [aftype] options | address ... DESCRIPTION...")
- 16:14, 14 December 2025 Admin talk contribs created page IWCONFIG - Manpage (Created page with "Category:Wiki == ftp --help == <nowiki> IWCONFIG(8) Linux Programmer's Manual IWCONFIG(8) NAME iwconfig - configure a wireless network interface SYNOPSIS iwconfig [interface] iwconfig interface [essid X] [nwid N] [mode M] [freq F]...")
- 16:10, 14 December 2025 Admin talk contribs created page FreeRADIUS - Requests (Created page with "Category:Wiki == Introduction == FreeRADIUS is a widely used open-source RADIUS server that handles requests from network devices such as Wi-Fi access points, VPNs, or network switches. A request is any authentication, authorization, or accounting operation that FreeRADIUS processes. This document provides an in-depth exploration of FreeRADIUS request processing, covering the types of requests, handling mechanisms, and configuration examples. == Types of Requests...")
- 16:00, 14 December 2025 Admin talk contribs created page FreeRADIUS - Cluster on Debian with PostgreSQL Backend (Created page with "Category:Wiki FreeRADIUS_-_Cluster_on_Debian_with_PostgreSQL_Backend == Cluster Architecture == A typical FreeRADIUS cluster consists of multiple FreeRADIUS servers configured to authenticate against a central PostgreSQL database. The servers share a common configuration and load balance authentication requests. Components: * FreeRADIUS servers * PostgreSQL database backend * Load balancing mechanism (such as DNS or hardware load balancer) In this architecture,...")
- 15:54, 14 December 2025 Admin talk contribs created page DMIDECODE - Manpage (Created page with "Category:Wiki == dmidecode Manpage == <nowiki> DMIDECODE(8) System Manager's Manual DMIDECODE(8) NAME dmidecode - DMI table decoder SYNOPSIS dmidecode [OPTIONS] DESCRIPTION dmidecode is a tool for dumping a computer's DMI (some say SMBIOS) table conten...")
- 15:45, 14 December 2025 Admin talk contribs created page WHICH - Manpage (Created page with "Category:Wiki == which Manpage == <nowiki> WHICH(1) General Commands Manual WHICH(1) NAME which - locate a command SYNOPSIS which [-as] filename ... DESCRIPTION which returns the pathnames of the files (or links) which would be executed in the c...")
