I wrote a simple shell tool to interactively edit the current nftables ruleset using a terminal-based text editor (respecting environment variable EDITOR and defaulting to vim). For testing purposes, it can optionally revert the changes after a timeout specified in seconds (option –timeout SECONDS, requires systemd-run).
Artikel in Kategorie "Technik"
The way Bacula works is: A backup client runs a TCP server process bacula-fd, waiting for a backup server process bacula-dir to connect and perform backup and restore jobs. There is a simple authentication mechanism, where bacula-dir presents a shared secret to bacula-fd to be granted access. Opening the bacula-fd TCP server on an exposed […]
Since i always have to look this up, everytime i need it, i write it down once, as „note to self“! NAME=“John Smith“ EMAILfirstname.lastname@example.org \ dch –create \ –package my-package \ –newversion 0.1 \ „Initial release“ And that’s it! 🙂
Overview In this article, a procedure is described to generate multiple certificate signing requests (CSR) for TLS servers, such as SMTP-, IMAP- or HTTP-servers, so that we can submit them to a Certificate Authority (CA). The CA will eventually perform the signature and return a public certificate to us. A Shell and the software OpenSSL […]
Preface I find the world wide web and the spectrum of methods and instruments that make it happen full of dubiousness and opportunity alike. Caching is generally known as one of the „hard problems“ of information science, and this is not different when it comes to technologies of the web. The text presented here, as […]
Ich hatte am 5.2.2021 die Ehre, einen Vortrag zum Thema „Bourne Shell“ auf der Veranstaltung FIXME der UNIX-User-Group Rhein Neckar, UUGRN e.V. halten zu dürfen. Hier ein Link zu den schriftlichen Aufzeichnungen dazu: https://wiki.uugrn.org/Bourne_Shell Abseits des Vortrags, den ich auch mit Live-Demos usw. durchgeführt habe, hat die Mitschrift nur begrenzten Nutzen, aber die Linkliste am […]
Just a small finger exercise …
A communication between two communication partners, which on a technical level can also be called „endpoints“ or „ends“ of a connection (or more general, of a channel of communication), is either encrypted, or it is not. If somewhere in between the „ends“ of the connection, encryption takes place, such that there exist parts of the […]