Posts for: #Tech

Screenly

This is something I’ve really been wanting to play with. I will one day. https://www.screenly.io/ose/
MORE →

Disable SuperMicro IPMI ADMIN user

Disable ADMIN user Before doing this bit you may wish to check that the new user you added works for everything you need it to. Those things might include: ssh to [email protected] Log in on web interface at https://192.168.1.22/ Various ipmitool commands like querying power status:$ ipmitool -I lanplus -H 192.168.1.22 -U somename -a power status Password: Chassis power is on If all of that is okay then you can disable ADMIN:
MORE →

Voice VLAN non-Cisco Phone

This is not my article I copy and pasted if from the below. The only reason it’s on here is because it took me a while to find so I figured I would put it here since it’s useful to me. Enable voice VLAN on Cisco switches for non-Cisco phones by lunarg on February 20th 2017, at 14:53 When provisioning non-Cisco phones on a Cisco-switched network, you may notice that the configured voice VLAN is not correctly provisioned to the phone.
MORE →

CloudFlare with nginx and plex

Add the following to the http in /etc/nginx/nginx.conf. This tells nginx where the actually IP is coming from instead of showing as cloudflare. # CF set real ip set_real_ip_from 103.21.244.0/22; set_real_ip_from 103.22.200.0/22; set_real_ip_from 103.31.4.0/22; set_real_ip_from 104.16.0.0/12; set_real_ip_from 108.162.192.0/18; set_real_ip_from 131.0.72.0/22; set_real_ip_from 141.101.64.0/18; set_real_ip_from 162.158.0.0/15; set_real_ip_from 172.64.0.0/13; set_real_ip_from 173.245.48.0/20; set_real_ip_from 188.114.96.0/20; set_real_ip_from 190.93.240.0/20; set_real_ip_from 197.234.240.0/22; set_real_ip_from 198.41.128.0/17; set_real_ip_from 2400:cb00::/32; set_real_ip_from 2606:4700::/32; set_real_ip_from 2803:f800::/32; set_real_ip_from 2405:b500::/32; set_real_ip_from 2405:8100::/32; set_real_ip_from 2c0f:f248::/32; set_real_ip_from 2a06:98c0::/29; # use any of the following two real_ip_header CF-Connecting-IP; #real_ip_header X-Forwarded-For; This is the reverse proxy file /etc/nginx/sites-available/plex.
MORE →

Install FusionIO ioDrive2 on Debian

If using Debian 10 you’ll have to use the github VSL. I just started using it, I will update if there’s issues. HERE’S the link. Now we need to make the module be loaded. mkdir /lib/modules/4.19.0-10-amd64/kernel/drivers/iomem cd root/usr/src/iomemory-vsl-3.2.16 cp iomemory-vsl.ko /lib/modules/4.19.0-10-amd64/kernel/drivers/iomem Now we need to add it to be loaded on bootup nano /etc/modules Paste iomemory_vsl into the /etc/modules file. `` First go to LINK and download the needed items I also have a copy that I downloaded HERE.
MORE →

Allow non-cisco SFP in switch

conf t 3850(config)# no errdisable detect cause gbic-invalid 3850(config)# service unsupported-transceiver Show inserted CFP ports sh interface transceiver
MORE →

Replace folder paths in sqlite for Sonarr

I can’t get the mass editor to work with sonarr v3. I did some googling and found a way to edit the paths at the database level. I’m not sure how safe this is so I backed up my db before I did it. UPDATE Series SET Path = REPLACE(Path, 'old_path', 'new_path') WHERE Path like '%old_path%'; This is not perfect. I did mess up a couple paths so I had to manually edit them.
MORE →

How to enable vlans on Debian 9

I just did this on Debian 9, it might work on older versions and more than likely Ubuntu Do everything as root: sudo su - Install vlan package: apt-get install vlan Load 8021q module: modprobe 8021q Add 8021q module at bootup: echo 8021q | sudo tee -a /etc/modules Make sure it is in the file: cat /etc/modules Now we need to edit the interfaces file: nano /etc/network/interfaces There will probably be something like below
MORE →

Enable RDP from CMD

open up CMD with admin privileges then type the following Enable RDP connections Set-ItemProperty ‘HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\‘ -Name “fDenyTSConnections” -Value 0 Make Firewall rule Enable-NetFirewallRule -DisplayGroup “Remote Desktop”
MORE →

Convert autocomplete.dat to nk2

For some reason I couldn’t get the normal move autocomplete.dat files to appdata and rename to work. I found this workaround. There might be an easier way, but this is the way that I was able to get it to work Download nk2edit Open the stream autocomplete files in nk2Edit %LocalAppData%\Microsoft\Outlook\RoamCache\stream_Autocomplete_* Select all with ctrl+A the right click on any of them and hit “Copy with tab delimit” Open a new excel or calc workbook and paste the previous data into it Then you delete the first column.
MORE →

Bash redirections

This data is pulled from Link. Overview: || visible in terminal || visible in file || existing Syntax || StdOut | StdErr || StdOut | StdErr || file ==========++==========+==========++==========+==========++=========== > || no | yes || yes | no || overwrite >> || no | yes || yes | no || append || | || | || 2> || yes | no || no | yes || overwrite 2>> || yes | no || no | yes || append || | || | || &> || no | no || yes | yes || overwrite &>> || no | no || yes | yes || append || | || | || | tee || yes | yes || yes | no || overwrite | tee -a || yes | yes || yes | no || append || | || | || n.
MORE →

Whitelist user/pc in barracuda

To whitelist PC in barracuda you have to create a JP Subnets/Groups. To do this you have to go to USERS/GROUPS > IP Subnets/Groups and create a Group Membership by IP. You put in the address and the netmask for a single address is 255.255.255.255. IKt wouldn’t hurt to put in the name of who this is for. Once you have that configured go to BLOCK/ACCEPT > Exceptions. Action: Allow Applies to: IP Group.
MORE →

UEFI CloneZilla

When cloning using clonezilla I notice sometimes if the PC was using UEFI it wouldn’t clone. After some googleing I was able to find a post that mentioned you had to manually copy over the bootloader. It is very simple to do. Once booted into CloneZilla you enter shell instead of the normal start. Once in the shell you’re going to become root. sudo su. Once you’re root you going to type the following command.
MORE →

Add Windows Server 2016 Core to Existing domain

First we need to configure static IP address This can be done by typing the below Enter Powershell powershell.exe Change computer name Rename-Computer -NewName "NewName" Reboot shutdown -s -t 0 log back in and go to power shell powershell.exe Find interface index Get-NetAdapter Set IP Address New-NetIPAddress –InterfaceIndex 2 –IPAddress 192.168.1.16 -PrefixLength 24 -DefaultGateway 192.168.1.1 Set DNS address Set-DnsClientServerAddress -InterfaceIndex 2 -ServerAddresses 127.0.0.1 Now it’s time for the “FUN” part. Now I realize why I don’t like core server.
MORE →

How to use SSH keys

create public and private keys. You can just hit enter or change the options. ssh-keygen -t rsa Now we need to copy our public key to the servers authorized keys cat ~/.ssh/id_rsa.pub | ssh [email protected] "mkdir -p ~/.ssh && chmod 700 ~/.ssh && cat >> ~/.ssh/authorized_keys" Now once you’ve completed teh above you should just be able to ssh to the remote host. If you want to be able to ssh as root.
MORE →

Add Linux Mint to Active Diretory

First we are going to become root sudo su Next we are going to join the realm. This should installed everything needed after you run the command below realm join domain.com --user domainadmin Permit all users to log in. realm permit --all Add user group as root nano /etc/sudoers Paste into above file %groupname@domain ALL=(ALL:ALL) ALL Allow sssd to create user directory nano /etc/pam.d/common-session Paste into above file session optional pam_mkhomedir.
MORE →

Cisco Cheat Sheet

Enter enable mode: en Enter Global Config (use this mode for 99% of the configuration, must be in enable mode): conf t Set port back to default default int G0/4 Encrypts all passwords on the device: service password-encryption Configure enable password (or secret in this case): enable secret ________ Create user with highest privilege: username _____ priv 15 password ______ Generate RSA key for SSH (needed if you plan to use SSH):
MORE →

Comments: