A must “USE” in these insecure days: nmap Portscan Tool use nmap -PN IP-Address to check failed Firewall Settings! arp-scan Network Scan to find active devices iftop to detect traffic and used Ports on a physical network Interface! ps aux show active processes on a Linux System htop more human friendly Process Monitor iotop human friendly traffic monitor from CPU/RAM to Drives Daily check Error Logs! Use always Firewalls and Disk/File Encryption! Don’t trust Hardware Protection (TPM) Chips most do communicate by clean signals on copper which can be read out by hardware hacking or magnetic fields! NEVER leave Hardware […]
Category: Linux General
Open a Console to checkout the IO of the REDIS Socket on Ubuntu Linux do: redis-cli -s /var/run/redis/redis-server.sock at the Prompt enter “MONITOR” ! redis /var/run/redis/redis-server.sock > MONITOR Lines run should be seen.. like 1643798561.129268 [0 unix:/var/run/redis/redis-server.sock] "EXPIRE" "98f4dfa05f67a630e9a828ad8a7c30d9/lockfiles/5cd93670745f7ff4ef4b456cc9c8b126" "3600" 1643798561.130843 [0 unix:/var/run/redis/redis-server.sock] "INCRBY" "98f4dfa05f67a630e9a828ad8a7c30d9/lockfiles/262023e9d503ea4158010bfebc4124bd" "1" 1643798561.131158 [0 unix:/var/run/redis/redis-server.sock] "EXPIRE" "98f4dfa05f67a630e9a828ad8a7c30d9/lockfiles/262023e9d503ea4158010bfebc4124bd" "3600" 1643798561.132725 [0 unix:/var/run/redis/redis-server.sock] "INCRBY" "98f4dfa05f67a630e9a828ad8a7c30d9/lockfiles/84b5072ee7801482b6bf7d661003df87" "1" 1643798561.133044 [0 unix:/var/run/redis/redis-server.sock] "EXPIRE" "98f4dfa05f67a630e9a828ad8a7c30d9/lockfiles/84b5072ee7801482b6bf7d661003df87" "3600" 1643798561.138752 [0 unix:/var/run/redis/redis-server.sock] "WATCH" "98f4dfa05f67a630e9a828ad8a7c30d9/lockfiles/84b5072ee7801482b6bf7d661003df87" 1643798561.139097 [0 unix:/var/run/redis/redis-server.sock] "GET" "98f4dfa05f67a630e9a828ad8a7c30d9/lockfiles/84b5072ee7801482b6bf7d661003df87"
If you use Nextcloud (Owncloud) and you login into the Admin Panel the Updater display you that your Setup is outdated, you MUST handle as follows to PREVENT System Problems: Do FULL-BACKUP the Server Setup before you CHANGE something! Pre-Check Nextcloud Version dependency‘s of PHP-Version and MYSQL Version! Cause Nextcloud offers NO System PRECHECK or Auto-Stop! Login into the Server via SSH Console and go to the /var/www/nextcloud folder. Run: sudo -u www-data php /var/www/nextcloud/updater/updater.phar Read Upgrade Echos on Console Advantage the Console-Version is mostly faster and more stable than the browser! Relogin as Admin to the Nextcloud Panel! In 99% of Problems the […]
If you use a odroid device like my odroid n2 you should know that the OFTEN needed DRM Browser Plugin “Widevine” in NOT available by default for ARM64. Google free Browser Chromium does not support Widevine without hacking (extracting from a Chromebook OS Recovery ARMHf/32bit Image.) I was not able to get it to run on Armbian or ubuntu for odroid. Its much simpler to setup Android and use the Apps like Amazon Video or else.. Google does NOT offer a Widevine to ARM64 CPU Support by default. Try x86 TV Sticks or Boxes like the intel tv stick if […]
If you setup Ubuntu 18.04 with openvpn you must install all Network Manager Plugins to run a stable VPN do: sudo apt-get install network-manager-openvpn network-manager-openvpn-gnome network-manager-pptp network-manager-pptp-gnome network-manager network-manager-gnome This fixes dependencies of Plugins to openvpn like pptp and more! The Syslog does not show any informations whats happening! only like this: vpn-connection[ID-XXXX-XXXX-XXXX-XXXX,”vpn”,34:(tun0)]: VPN plugin: failed: connect-failed (1) seen: 2019/10/31
If you tested pihole, you perhaps look for a smaller Command Line version? Install dnsmasq by: sudo apt-get install dnsmasq Here DNS Rule Injector Script (copy & paste): blocker.sh # www.linuxonlinehelp.eu 2019 # DNS Blocker for Small Linux with dnsmasq # #!/bin/bash # goto tmp (tmpfs) cd /tmp/ # get URL-Blocklists wget -O blocklist.txt https://v.firebog.net/hosts/Kowabit.txt # get Templates #SET Variables txt='blocklist.txt' IP='0.0.0.0' # set to 0.0.0.0 or to a Webserver with "white Page" showing Text "URL-blocked!! #merge URLs and redirect to wanted IP – Rule creation n=1; while read line; do echo 'address=/'$line'/$IP '>> 02-blocked1.conf ; n=$((n+1)); done < $txt […]