PARANOIDIX

Where technology and lunacy meet

Posts

  • Centos Networking

    Static IPs are typically only used on servers. Remembering how to set it up has always been so-so as it's done only once when setting up the server the first time.
    I've not use Centos much before I started working for my current employer. There we use it constantly though, alongside windows server, and I got into checking it out for my own setup as well.

  • Move to Jekyll

    As I have grown weary of updating wordpress all the time I have decided to move my blog to static html instead.

    I am using jekyll to archive this and am using a home made theme. If you haven’t tried Jekyll yet, I suggest you do. It’s pretty easy to setup but of course takes a more manual approach and it requires you to re-upload files when they are changed.

  • Ignore case on tab completion

    This is rather handy if you're not sure of the case of the starting letter of a program you wish to expand to using tab completion.
    All that is needed is that the following line is present in either ~/.inputrc or /etc/inputrc

    set completion-ignore-case on
  • List open network ports

    Here are a few ways to list open ports in the linux terminal.
    First we'll try lsof.

  • tar

    As I always forget which switches to use on tar I made this little note.

  • rsync

    A quick reminder to myself on rsync usage

    $ rsync -Cvrtp <source> <destination>
    C = cvs-exclude
    V = verbose
    r = recursive
    t = times
    p = permissions
    K = keep dir links
  • DNSmasq and Pi-hole

    For a long time I have been using bind as a LAN DNS server. Just for my local server setup, so that I can use hostnames instead of IP addresses. I found the hosts file to be a bit low-tech, and it was a good chance to learn a little about DNS along the way. :-)

    A short while ago I was watching the Linux Action Show, where the Pi-hole system was introduced. Now being able to block ads before they are even entering the network (or more correctly before they are requested) seems like a super idea to me. So I started reading up on the requirements.

  • Sakura time

  • Email server and iptables

    Ever notice how many braindead people try to break into your email server? It's a daily battle to stay ahead of them. Especially when, like in my case, fail2ban just... well... fails... :-)

    For some time I have just manually added IP addresses to my iptables array. The list gets kind of long after a while though. See the following for what I did. And then imagine a lot of these lines.

    iptables -A INPUT -s <ip>/<cidr> -p tcp -m tcp --dport 25 -j DROP
  • Software Freedom Conservancy

    Become a Conservancy Supporter!

    If you have the possibility, please support them. They are fighting for you!