New pages

From IT-Arts.net
New pages
Hide registered users | Hide bots | Show redirects
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)

16 December 2025

  • 17:2417:24, 16 December 2025 FAIL2BAN - Filter.d - http-graylog (hist | edit) [759 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> # /etc/fail2ban/filter.d/http-graylog.conf # Fail2Ban filter for Graylog Web interface behind Nginx [Definition] # Match failed login attempts in Nginx access log failregex = ^<HOST> - .* "POST /api/login HTTP/.*" 401 ^<HOST> - .* "POST /login HTTP/.*" 401 # Optionally match basic auth failures (if enabled) # failregex = ^<HOST> - .* "GET /.*" 401 ignoreregex = </nowiki> = Jail.conf = <nowiki> [http-graylog]...")
  • 17:0917:09, 16 December 2025 QUAGGA - Documentation (hist | edit) [3,287 bytes] Admin (talk | contribs) (Created page with "Category:Wiki === Starting the OSPF Daemon === The OSPF daemon (ospfd) is used to configure Open Shortest Path First (OSPF) routing. <nowiki> sudo systemctl start ospfd</nowiki> === Starting the BGP Daemon === The BGP daemon (bgpd) configures Border Gateway Protocol (BGP) routing. <nowiki> sudo systemctl start bgpd</nowiki> == Configuring OSPF == To configure OSPF, the `ospfd.conf` file needs to be modified. This file is usually located in `/etc/quagga/ospfd.c...")
  • 17:0217:02, 16 December 2025 BASH - crtl-snort2c-fail2ban.sh (hist | edit) [4,987 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == crtl-snort2c-fail2ban.sh == <nowiki> #!/bin/bash # Define the IP addresses at the top for easy customization IP_PFSENSE_SOURCE_01="1.2.3.4" IP_PFSENSE_SOURCE_02="1.2.3.5" IP_FAIL2BAN="1.2.3.6" IP_PFSENSE_DEST="1.2.3.7" SSH_KEY="/path/to/your/ssh/key" # Specify your SSH private key location SNORT_TABLE="snort2c" # Define the pfSense Snort table name # Function to fetch banned IPs from the remote pfSense Snort2c table via SSH fetch_pfs...")
  • 16:4516:45, 16 December 2025 SPLUNK - Filters Documentation (hist | edit) [7,556 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Understanding Splunk Log Filtering == Splunk log filtering works primarily through the following features: * **Search Processing Language (SPL)**: This is the language used to filter, analyze, and transform data in Splunk. * **Event Types**: Classifying logs into different event types helps in simplifying complex log data into easy-to-analyze categories. * **Field Extraction**: Fields are used to create searchable and filterable data from the raw l...")
  • 16:3116:31, 16 December 2025 VIRSH - Documentation (hist | edit) [4,592 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Basic Usage == === Connect to a Hypervisor === You can connect to a local or remote hypervisor with the following command: <nowiki> virsh connect qemu:///system</nowiki> This connects to the local system's hypervisor. For remote systems, replace `qemu:///system` with a URI of the remote host, such as `qemu+ssh://user@hostname/system`. === List Virtual Machines === To list all virtual machines on the system, including running, paused, and shut o...")
  • 16:2816:28, 16 December 2025 QEMU - Documentation (hist | edit) [7,039 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == QEMU Basics == === Architecture Emulation === QEMU can emulate different hardware architectures. For example, if you want to run a PowerPC-based system on an x86 host, you can use QEMU to emulate PowerPC hardware. <nowiki> qemu-system-ppc -cdrom install.iso -m 1024</nowiki> This command starts a virtual machine emulating a PowerPC architecture with 1024 MB of RAM and an installation ISO image mounted as a CD-ROM. === Virtualization vs. Emulatio...")
  • 16:2316:23, 16 December 2025 PWGEN - Manpage (hist | edit) [5,394 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == pwgen Manpage == <nowiki> PWGEN(1) General Commands Manual PWGEN(1) NAME pwgen - generate pronounceable passwords SYNOPSIS pwgen [ OPTION ] [ pw_length ] [ num_pw ] DESCRIPTION The pwgen program generates passwords which are designed to be easily memorized by hum...")
  • 14:5514:55, 16 December 2025 FAIL2BAN - Filter.d - http-nextcloud (hist | edit) [4,627 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Definition = <nowiki> [Definition] # /etc/fail2ban/filter.d/http-nextcloud.conf # Nextcloud-specific abuse patterns failregex = ^<HOST>.*( # Login related attacks (brute-forcing, password guessing, and login attempts) /index.php.*action=login.*| # Login attempts /index.php.*user.*| # User login page /index.php.*password.*| # Password reset or login-related parameters /index.php.*a...")
  • 14:5414:54, 16 December 2025 FAIL2BAN - Filter.d - http-dolibarr (hist | edit) [4,182 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # Dolibarr specific attack patterns failregex = ^<HOST>.*( # Login-related attacks (Brute-forcing, password guessing) /index.php.*action=login.*| # Login page (login attempt) /index.php.*login.*| # Generic login attempt /index.php.*password.*| # Password reset or login with parameter /index.php.*user.*| # User login attempt...")
  • 14:4314:43, 16 December 2025 FAIL2BAN - Filter.d - http-wordpress (hist | edit) [5,563 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # /etc/fail2ban/filter.d/http-wordpress.conf # WordPress specific attack patterns failregex = ^<HOST>.*( # WordPress Core and Admin /wp-admin/install.php.*| # WordPress install script /wp-admin/.*/| # Wildcard to catch all wp-admin paths /wp-login.php.*| # Login page /wp-activate.php.*| # Account activation /wp-config.php...")
  • 14:3014:30, 16 December 2025 FAIL2BAN - Filter.d - http-kevins (hist | edit) [4,213 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # Script-kiddies and Kevins patterns failregex = ^<HOST>.*/wp-content/plugins/hellopress/wp_filemanager.php.* ^<HOST>.*/wp-includes/rest-api/alfa-rex.php7.* ^<HOST>.*/widgets.php.* ^<HOST>.*/b.php.* ^<HOST>.*/admin.php.* ^<HOST>.*/autoload_classmap.php.* ^<HOST>.*/wp-activate.php.* ^<HOST>.*/db.php.* ^<HOST>.*/bless.php.* ^<HOST>.*/blurbs.php.* ^<HOST>.*/cord.php.* ^<HOST>.*/axx.php...")
  • 14:2814:28, 16 December 2025 FAIL2BAN - Filter.d - http-xss (hist | edit) [642 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-xss.conf # Cross-Site Scripting (XSS) # Matches typical XSS attack vectors where input is reflected on the web page failregex = ^<HOST>.*(<script.*>.*</script>|<.*javascript:.*|<.*onerror=.*|<.*onload=.*|<.*alert\(.*\)).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-xss] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -...")
  • 14:2714:27, 16 December 2025 FAIL2BAN - Filter.d - http-suspicious (hist | edit) [604 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-suspicious.conf # General Suspicious URL Patterns (including bad characters like `\`, `;`, `&`, etc.) failregex = ^<HOST>.*(\/\.\.\/|\.\.\/|\.\.\\|\\|%%3b|%%26|%%2f|%%2e%%2e).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-suspicious] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</now...")
  • 14:2614:26, 16 December 2025 FAIL2BAN - Filter.d - http-sql-like (hist | edit) [688 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-sql-like.conf # SQL-like SELECT Statements that could indicate SQL Injection Attempts # This also tries to capture long SELECT/INSERT/UPDATE queries with SQL injection techniques failregex = ^<HOST>.*(select.*from.*|insert.*into.*|update.*set.*|delete.*from.*).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-sql-like] enabled = true banaction = %(banaction_allports)s logpath = /var/lo...")
  • 14:2514:25, 16 December 2025 FAIL2BAN - Filter.d - http-sql-inj (hist | edit) [747 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-sql-inj.conf # SQL Injection Attempts # Matches common SQL injection patterns such as ' or 1=1 --, ; DROP TABLE, etc. failregex = ^<HOST>.*(select.*from.*where.*union.*select.*from.*information_schema.tables|insert.*into.*values.*select.*from.*information_schema.tables|union.*select.*null.*from.*information_schema.tables|or.*1=1).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-sql-inj] enabled =...")
  • 14:2314:23, 16 December 2025 FAIL2BAN - Filter.d - http-shell-command (hist | edit) [635 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-shell-command.conf # Attempted Shell Command Execution in URLs (e.g., using ?cmd=) # This could indicate an attempt to execute system commands via web apps. failregex = ^<HOST>.*(\?cmd=|system\(|exec\().*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-shell-command] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findt...")
  • 14:2214:22, 16 December 2025 FAIL2BAN - Filter.d - http-rfi (hist | edit) [671 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-rfi.conf # Remote File Inclusion (RFI) # Matches attempts to include remote files (e.g. http://example.com/malicious_file.php) failregex = ^<HOST>.*(?:https?|ftp):\/\/(?:[a-zA-Z0-9-]+\.)+[a-zA-Z]{2,6}\/.*\.(?:php|jsp|asp|cgi|pl|txt|xml|json|html?).*$` ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-rfi] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access....")
  • 14:2114:21, 16 December 2025 FAIL2BAN - Filter.d - http-php-code-inj (hist | edit) [605 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-php-code-inj.conf # PHP Code Injection # Matches PHP-based code injection attempts such as `<?php eval($_POST[cmd]); ?>` failregex = ^<HOST>.*(\<\?php.*eval.*\$_POST.*\;\?\>).* ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-php-code-inj] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</no...")
  • 14:2014:20, 16 December 2025 FAIL2BAN - Filter.d - http-path-t (hist | edit) [638 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-path-t.conf # Path Traversal Attacks # Matches attempts to traverse the directory structure (e.g., ../../etc/passwd or .\..\etc\passwd) failregex = ^<HOST>.*(\.\./|\.\.\\|%%2e%%2e%%2f|%%2e%%2e%%5c).*\/etc\/passwd.*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-path-t] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 fi...")
  • 14:1914:19, 16 December 2025 FAIL2BAN - Filter.d - http-non-exist (hist | edit) [742 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-non-exist.conf # Requesting non-existent files like backup, .git, or config files # These are often targeted by attackers to find hidden sensitive files. # THIS FILE NEED TO BE CUSTOMIZED REGARDING YOUR NEEDS # failregex = ^<HOST>.*(\.git\/|\.env|\.bak|\.tar.gz|\.sql|\.sh|config\.php).*$ failregex = ^<HOST>.*(\.git\/|\.env|\.bak|\.tar.gz|\.sql|config\.php).*$ ignoreregex =</nowiki> =...")
  • 14:1614:16, 16 December 2025 FAIL2BAN - Filter.d - http-malicious (hist | edit) [600 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-malicious.conf # Malicious HTTP Methods # Matches attempts to use HTTP methods that are often abused (e.g., TRACE, DELETE, PATCH) failregex = ^<HOST>.*(TRACE|DELETE|PATCH).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-malicious] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
  • 14:1514:15, 16 December 2025 FAIL2BAN - Filter.d - http-lfi (hist | edit) [587 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-lfi.conf # Local File Inclusion (LFI) # Matches patterns that indicate an attempt to include local files (e.g. ../../etc/passwd) failregex = ^<HOST>.*(\.\./|\.\.\\).*\/etc\/passwd.*$</nowiki> = Jail.conf = <nowiki> [http-lfi] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
  • 14:1414:14, 16 December 2025 FAIL2BAN - Filter.d - http-dir-trav (hist | edit) [578 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-dir-trav.conf # Directory Traversal Attempts # Matches the occurrence of '../' which is often used for directory traversal failregex = ^<HOST>.*\.\.\/.*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-dir-trav] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
  • 14:1314:13, 16 December 2025 FAIL2BAN - Filter.d - http-crlf (hist | edit) [593 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-crlf.conf # HTTP Response Splitting (CRLF Injection) # Matches attempts to inject headers or CRLF sequences into the response failregex = ^<HOST>.*(\r\n|\n\r|\r|\n).*Host:.*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-crlf] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend = polling</nowiki>")
  • 14:0714:07, 16 December 2025 FAIL2BAN - Filter.d - http-command-inj (hist | edit) [619 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> [Definition] # http-command-inj.conf # Command Injection # Matches typical command injection patterns like 'cat /etc/passwd', or 'ls; rm -rf' failregex = ^<HOST>.*(cat.*\/etc\/passwd|ls;.*rm.*-rf|\/bin\/bash).*$ ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-command-inj] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*.access.log maxretry = 1 bantime = -1 findtime = 3d backend...")
  • 13:4413:44, 16 December 2025 FAIL2BAN - Filter.d - http-502-503 (hist | edit) [615 bytes] Admin (talk | contribs) (Created page with "Category:Wiki = Filter.d = <nowiki> # /etc/fail2ban/filter.d/http-502-503.conf [Definition] failregex = ^<HOST> -.*"(GET|POST|HEAD).*HTTP.*" 502 = ^<HOST> -.*"(GET|POST|HEAD).*HTTP.*" 503 ignoreregex =</nowiki> = Jail.conf = <nowiki> [http-502-503] enabled = true banaction = %(banaction_allports)s logpath = /var/log/nginx/*error*.log /var/log/nginx/*access*.log maxretry = 20 findtime = 20 backend = polling</nowiki>")
  • 07:5407:54, 16 December 2025 PROXMOX - Troubleshoot Cluster (hist | edit) [16,100 bytes] Admin (talk | contribs) (Created page with "Category:Wiki When managing a Proxmox cluster, various issues may arise that can affect cluster functionality, node communication, virtual machine performance, or storage. This guide outlines common troubleshooting steps and tools for resolving issues in a Proxmox cluster. == Cluster Communication Issues == Cluster communication issues often occur when nodes are unable to properly sync with each other. These issues can prevent quorum, affect high availability, or...")
  • 07:4307:43, 16 December 2025 PROXMOX - Clustering (hist | edit) [5,204 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Proxmox Cluster Configuration with 4 Nodes == Before starting, ensure that: * All nodes have Proxmox installed and updated. * The nodes are on the same network. * SSH key-based authentication is set up between the nodes. * You have a consistent hostname and DNS setup across all nodes. * Ensure NTP (Network Time Protocol) is configured and synchronized across all nodes. === Cluster Configuration Overview === A Proxmox cluster uses the Corosync and...")
  • 06:3906:39, 16 December 2025 ARISTA - BGP Commands (hist | edit) [5,913 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Configuring BGP on Arista EOS == To start configuring BGP, you need to enter global configuration mode and enable BGP for a specific Autonomous System (AS). <nowiki> router bgp [AS_NUMBER]</nowiki> Example: <nowiki> router bgp 65001</nowiki> == BGP Neighbors Configuration == You can define BGP neighbors, which are other BGP routers with which your device will exchange routing information. ### Add a Neighbor <nowiki> neighbor [IP_ADDRESS] r...") Tag: Recreated

15 December 2025

  • 10:2410:24, 15 December 2025 ARISTA - Speed-Group Commands with SerDes (hist | edit) [3,942 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Speed-Group and SerDes Configuration == When configuring Speed-Groups with SerDes on Arista EOS, it's important to set both the speed and the appropriate SerDes settings for high-speed interfaces. The basic structure for configuring a Speed-Group with SerDes support is: <nowiki> speed-group <group_name> speed <speed_value> [serdes <serdes_mode>] duplex <duplex_mode> </nowiki> - `<group_name>`: The name of the speed-group. - `<speed_value>`: The s...")
  • 10:0110:01, 15 December 2025 ARISTA - Port Speed and Duplex (hist | edit) [5,218 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Port Speed Configuration == Arista EOS supports several methods for setting the port speed on an interface, including auto-negotiation and explicit manual configuration. === Setting Port Speed Manually === To manually set the speed of an interface, use the following command: <nowiki> switch# configure terminal switch(config)# interface ethernet 1 switch(config-if-Et1)# speed 10000</nowiki> In this example, the port speed is manually set to 10 G...")

14 December 2025

  • 16:4816:48, 14 December 2025 ARISTA - CLI Commands (hist | edit) [4,778 bytes] Admin (talk | contribs) (Created page with "Category:Wiki ==Basic Configuration Commands== * '''enable''' - Enters privileged exec mode. * '''configure terminal''' or '''conf t''' - Enters global configuration mode. * '''show version''' - Displays EOS software version, device model, and hardware information. * '''show running-config''' - Displays the current active configuration. * '''show startup-config''' - Displays the configuration stored in NVRAM (startup config). * '''copy running-config startup-config'...")
  • 16:4716:47, 14 December 2025 ARISTA - Bash Commands (hist | edit) [4,937 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Basic File System Commands == === Displaying File System Usage === To check the file system disk usage: <nowiki> df -h</nowiki> This will display the disk space usage of all mounted file systems in a human-readable format. === Checking Available Memory === To check available memory on an Arista switch: <nowiki> free -h</nowiki> This will display memory usage in a human-readable format, showing total, used, free, and available memory. === View...")
  • 16:4216:42, 14 December 2025 HYDRA - Command Overview (hist | edit) [2,750 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Basic Syntax == The general syntax for Hydra is as follows: <nowiki> hydra [options] <target> <protocol> <username list> <password list></nowiki> - `[options]`: Various flags or settings to adjust the attack. - `<target>`: The IP address or hostname of the target system. - `<protocol>`: The protocol to attack, such as ftp, ssh, http, etc. - `<username list>`: A file containing a list of usernames to attempt. - `<password list>`: A file containing...")
  • 16:3916:39, 14 December 2025 HYDRA - Manpage (hist | edit) [5,672 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == hydra --help == <nowiki> HYDRA(1) General Commands Manual HYDRA(1) NAME hydra - a very fast network logon cracker which supports many different services SYNOPSIS hydra [-L FILE] [-p PASS|-P FILE|-x OPT -y | [-C FILE]]...")
  • 16:3116:31, 14 December 2025 ARISTA - AAA Commands (hist | edit) [5,621 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == AAA Overview == AAA refers to three main components used for managing access control and monitoring on network devices: * **Authentication**: Verifies the identity of users or devices attempting to connect. * **Authorization**: Determines what authenticated users or devices are allowed to do. * **Accounting**: Tracks what actions users or devices perform during a session. == Enabling AAA == To enable AAA on an Arista device, use the following com...")
  • 16:2316:23, 14 December 2025 IFCONFIG - Documentation (hist | edit) [3,798 bytes] Admin (talk | contribs) (Created page with "Category:Wiki === Display Network Interfaces === To display all active network interfaces and their configurations: <nowiki> ifconfig</nowiki> This command will show information such as the interface name (e.g., `eth0`, `wlan0`), the IP address, the MAC address, and other network interface parameters. To display all interfaces, including those that are down, use: <nowiki> ifconfig -a</nowiki> === Configure an IP Address === You can configure an IP address f...")
  • 16:2016:20, 14 December 2025 IWCONFIG - Documentation (hist | edit) [4,324 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Syntax == The general syntax for the `iwconfig` command is as follows: <nowiki> iwconfig [interface] [options] </nowiki> Where: - `[interface]` refers to the wireless network interface (e.g., `wlan0`, `wlan1`). - `[options]` are the various parameters you can modify or display. == Common Options == * `essid [SSID]`: Set the SSID (Service Set Identifier) for the wireless network. <nowiki> iwconfig wlan0 essid "MyNetwork"</nowiki> * `ke...")
  • 16:1616:16, 14 December 2025 IFCONFIG - Manpage (hist | edit) [8,788 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == ifconfig Manpage == <nowiki> IFCONFIG(8) Linux System Administrator's Manual IFCONFIG(8) NAME ifconfig - configure a network interface SYNOPSIS ifconfig [-v] [-a] [-s] [interface] ifconfig [-v] interface [aftype] options | address ... DESCRIPTION...")
  • 16:1416:14, 14 December 2025 IWCONFIG - Manpage (hist | edit) [19,791 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == ftp --help == <nowiki> IWCONFIG(8) Linux Programmer's Manual IWCONFIG(8) NAME iwconfig - configure a wireless network interface SYNOPSIS iwconfig [interface] iwconfig interface [essid X] [nwid N] [mode M] [freq F]...")
  • 16:1016:10, 14 December 2025 FreeRADIUS - Requests (hist | edit) [7,323 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Introduction == FreeRADIUS is a widely used open-source RADIUS server that handles requests from network devices such as Wi-Fi access points, VPNs, or network switches. A request is any authentication, authorization, or accounting operation that FreeRADIUS processes. This document provides an in-depth exploration of FreeRADIUS request processing, covering the types of requests, handling mechanisms, and configuration examples. == Types of Requests...")
  • 16:0016:00, 14 December 2025 FreeRADIUS - Cluster on Debian with PostgreSQL Backend (hist | edit) [5,895 bytes] Admin (talk | contribs) (Created page with "Category:Wiki FreeRADIUS_-_Cluster_on_Debian_with_PostgreSQL_Backend == Cluster Architecture == A typical FreeRADIUS cluster consists of multiple FreeRADIUS servers configured to authenticate against a central PostgreSQL database. The servers share a common configuration and load balance authentication requests. Components: * FreeRADIUS servers * PostgreSQL database backend * Load balancing mechanism (such as DNS or hardware load balancer) In this architecture,...")
  • 15:5415:54, 14 December 2025 DMIDECODE - Manpage (hist | edit) [11,669 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == dmidecode Manpage == <nowiki> DMIDECODE(8) System Manager's Manual DMIDECODE(8) NAME dmidecode - DMI table decoder SYNOPSIS dmidecode [OPTIONS] DESCRIPTION dmidecode is a tool for dumping a computer's DMI (some say SMBIOS) table conten...")
  • 15:4515:45, 14 December 2025 WHICH - Manpage (hist | edit) [1,406 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == which Manpage == <nowiki> WHICH(1) General Commands Manual WHICH(1) NAME which - locate a command SYNOPSIS which [-as] filename ... DESCRIPTION which returns the pathnames of the files (or links) which would be executed in the c...")
  • 15:3515:35, 14 December 2025 POWERDNS - Cluster with PostgreSQL Backend (hist | edit) [7,251 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == PowerDNS Configuration == PowerDNS needs to be configured to use PostgreSQL as the backend for managing DNS data. Below is an example of a typical PowerDNS configuration file (`pdns.conf`) when using PostgreSQL. <nowiki> # Configuration for PowerDNS with PostgreSQL Backend launch=gpgsql gpgsql-host=127.0.0.1 gpgsql-user=pdns gpgsql-password=yourpassword gpgsql-dbname=pdns gpgsql-port=5432 gpgsql-pool-size=20 gpgsql-ssl=0 </nowiki> === Configurat...")
  • 11:5311:53, 14 December 2025 OPENVPN - Multiple Server Processes to Combine Link Speeds (hist | edit) [3,471 bytes] Admin (talk | contribs) (Created page with "Category:Wiki Multiple_Server_Processes_to_Combine_Link_Speeds == Configure OpenVPN Server Process for Multiple Links == === Create Multiple OpenVPN Configuration Files === The first step is to create two separate OpenVPN server configurations, each bound to a different internet link. This will allow the OpenVPN process to listen on different interfaces for each connection. Example `server1.conf`: <nowiki> port 1194 proto udp dev tun serv...")
  • 11:2611:26, 14 December 2025 HSTS - Setup (hist | edit) [4,530 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == HSTS Setup on Apache2 == === Configuration for HSTS in Apache2 === In Apache2, HSTS can be configured by modifying the SSL configuration files for your virtual host. You need to ensure that SSL is enabled for your site before proceeding with HSTS configuration. To enable HSTS, you will add the `Strict-Transport-Security` header in the server configuration file, typically in the SSL-specific virtual host. <nowiki> <VirtualHost *:443> ServerN...")
  • 11:1911:19, 14 December 2025 APACHE2 - Virtual Host Configuration Security Best Practices (hist | edit) [5,388 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == Secure ServerTokens and ServerSignature == By default, Apache may reveal sensitive information about your server version, OS, and modules. It’s important to disable these headers to minimize information exposure. <nowiki> # Disable ServerTokens to prevent detailed server version disclosure ServerTokens Prod # Disable ServerSignature to prevent the display of server version info in error pages ServerSignature Off</nowiki> == Restrict Access to...")
  • 11:1111:11, 14 December 2025 WIFI - Documentation (hist | edit) [7,021 bytes] Admin (talk | contribs) (Created page with "Category:Wiki ==Wi-Fi Standards and Their Characteristics== ===Recapitulative Table=== {| class="wikitable" ! Wi-Fi Standard !! Frequency Band !! Maximum Speed !! Maximum Range !! Modulation !! Channels !! Typical Use Case |- | 802.11a || 5 GHz || 54 Mbps || 35 meters (indoor) || OFDM || 23 || High-speed indoor networks, business environments |- | 802.11b || 2.4 GHz || 11 Mbps || 150 meters (outdoor) || DSSS || 11 || Legacy devices, long-range but slower speeds |-...")
  • 11:0611:06, 14 December 2025 NETBOX - Install Script On Ubuntu 24.4 (hist | edit) [4,789 bytes] Admin (talk | contribs) (Created page with "Category:Wiki == install-netbox.sh == <nowiki> #!/bin/bash # Script to install and configure NetBox on Ubuntu 24.04 # Define variables NETBOX_VERSION="v3.4.5" # Specify the desired NetBox version here NETBOX_DIR="/opt/netbox" NETBOX_USER="netbox" DB_NAME="netbox" DB_USER="netbox" DB_PASS="your-db-password" SECRET_KEY="your-secret-key" ALLOWED_HOSTS="127.0.0.1,localhost" # Update this to your domain or IP addresses # Update and upgrade system packages echo "Up...")
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)