Prerequisite:
yum install cifs-utils
remote Windows machine windowspc share name on windowspc:data username: tomsmith password:blogs
password: Create a local mount point. For example:
mkdir /mnt/win
Edit the /etc/fstab file and add a line like:
//windowspc/data /mnt/win cifs user,uid=500,rw,suid,username=tomsmith,password=blogs 0 0
special for Git:
export https_proxy='https://user:pass@proxy:8080'
Special for wget:
export http_proxy=proxy:8080
wget --proxy-user=user --proxy-password='pass' http:/url2get/example-1.0.tar.gz
Special ruby gem:
export http_proxy='http://user:pass@proxy:8080'
Special Yum, edit yum.conf and add:
proxy=http://proxy:8080
proxy_username=user
proxy_password=pass
Special leinengen
export HTTP_PROXY=http://user:pass@proxy:8080
export HTTPS_PROXY=https://user:pass@proxy:8080
sudo route add -net 10.8.0.0 netmask 255.255.255.0 gw 192.168.77.17
sudo route -n add 10.8.0.0/24 192.168.77.17
sudo route delete -net 10.8.0.0 netmask 255.255.255.0 gw 192.168.77.17
sudo route -n delete 10.8.0.0/24 192.168.77.17
strace -f -o log [process2run] [args]
ref: https://linuxconfig.org/ubuntu-20-04-ssh-server
sudo apt install openssh-server
systemctl status sshd
sudo systemctl restart ssh
sudo ufw allow ssh
sudo systemctl enable ssh
ssh -L22222:localhost:222 remoteuser@remotehost
example:
ssh -L 0.0.0.0:1234:192.168.192.136:1234 192.168.192.136
ssh-keygen -p -f ~/.ssh/id_rsa
- Step # 1: Delete old ssh host keys
Login as the root and type the following command to delete files on your SSHD server:
# /bin/rm -v /etc/ssh/ssh_host_*
- Step # 2: Reconfigure OpenSSH Server
Now create a new set of keys on your SSHD server, enter:
# dpkg-reconfigure openssh-server
Sample output:
Creating SSH2 RSA key; this may take some time ...
Creating SSH2 DSA key; this may take some time ...
Restarting OpenBSD Secure Shell server: sshd.
mkdir ~/.ssh
chmod 700 ~/.ssh
ssh-keygen -t rsa
You'll get something like this:
Generating public/private rsa key pair.
Enter file in which to save the key (/home/b/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/b/.ssh/id_rsa.
Your public key has been saved in /home/b/.ssh/id_rsa.pub.
Then append the content of id_rsa.pub into the ~/.ssh/authorized_keys
Copy and paste or the following will work.
cp authorized_keys authorized_keys_Backup
cat id_rsa.pub >> authorized_keys
Alternativelly you can use this handy command:
ssh-copy-id <username>@<host>
vim /etc/ssh/sshd_config
modify the following:
ChallengeResponseAuthentication no
PasswordAuthentication no
UsePAM no
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys
PasswordAuthentication no is the most important.
Once this is done, restart the SSH daemon to apply the settings:
/etc/init.d/sshd restart
see this link for more reference.
On Synology you can restart the daemon with: Save the file and restart the SSH daemon. The easier is to use the GUI/WEB login. Click on the Control Panel -> Terminal. Uncheck Enable SSH Service, apply, check it again, and press apply again.
For Synology NAS follow this for more details.
lsof -i tcp:8000
lsof -nP -i4TCP | grep LISTEN
netstat -tulpn | grep 8000
setxkbmap gb
sudo useradd --uid 3395 --gid users -d /home/joeblog joeblog
adduser joeblog
7za a -t7z archive.7z file1 files*
7z t archive.7z file1 files* -r
see this for more details
sudo fallocate -l 32G /swapfile
sudo mkswap /swapfile
sudo swapon /swapfile
sudo swapoff -v /swapfile
ref: https://askubuntu.com/questions/248158/how-do-i-setup-an-encrypted-swap-file
ref: https://help.ubuntu.com/community/Grub2/ISOBoot
sudo apt-get install grml-rescueboot
Place bootable ISO files in the /boot/grml folder.
sudo mv ~/Downloads/<filename.iso> /boot/grml/
Update Grub
sudo update-grub
cryptsetup open /dev/nvme0n1p7 cryptoroot # only for luks drive
mkdir /mnt/cryptoroot
mount /dev/mapper/cryptoroot /mnt/cryptoroot
mount --bind /dev/ /mnt/cryptoroot/dev && mount --bind /dev/pts /mnt/cryptoroot/dev/pts && mount --bind /proc /mnt/cryptoroot/proc && mount --bind /sys /mnt/cryptoroot/sys
mount /dev/nvme0n1p3 /mnt/cryptoroot/boot
mount /dev/nvme0n1p1 /mnt/cryptoroot/boot/efi
chroot /mnt/cryptoroot
apt purge --auto-remove grub-pc
#Hit Enter to confirm the removal.
apt install grub-pc
grub-install /dev/nvme0n1
update-grub
update-initramfs -k all -c
/etc/crypttab
cat /etc/crypttab
cat /etc/crypttab
#cryptswap1 UUID=6e21de8a-d5b5-42d5-aadf-34cbc78c4d74 /dev/urandom swap,offset=1024,cipher=aes-xts-plain64
cryptoroot UUID=69ffeee2-ce39-4acc-9389-6c8638e3b048 none luks
/etc/fstab
cat /etc/fstab
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a
# device; this may be used with UUID= as a more robust way to name devices
# that works even if disks are added and removed. See fstab(5).
#
# <file system> <mount point> <type> <options> <dump> <pass>
# / was on /dev/nvme0n1p7 during installation
/dev/mapper/cryptoroot / ext4 errors=remount-ro 0 1
# /boot/efi was on /dev/nvme0n1p1 during installation
UUID=7420-AA7C /boot/efi vfat umask=0077 0 1
#/dev/mapper/cryptswap1 none swap sw 0 0
/swapfile none swap sw 0 0
If above does not work try this to force the efi re-install
apt-get install --reinstall grub-efi-amd64
That's an alternative but not as good.
sudo mount /dev/sdXXX /mnt
sudo mount /dev/sdXY /mnt/boot
sudo mount /dev/sdXX /mnt/boot/efi
for i in /dev /dev/pts /proc /sys /run; do sudo mount -B $i /mnt$i; done
sudo chroot /mnt
grub-install /dev/sdX
update-grub
#Note : sdX = disk | sdXX = efi partition | sdXY = boot partition | sdXXX = system partition
lsblk
sfdisk -d /dev/nvme0n1
gparted
ls -l /dev/disk/by-uuid
sudo rsync -axHAWXS --numeric-ids --info=progress2 /mnt/olddisk/ /mnt/newdisk/
ref: https://superuser.com/questions/307541/copy-entire-file-system-hierarchy-from-one-drive-to-another
sudo mount -o ro /dev/sda1 /media/2tb
sudo apt-get install luksipc
sudo luksipc -d /dev/nvme0n1p7
cryptsetup luksOpen --key-file /root/initial_keyfile.bin /dev/nvme0n1p7 cryptoroot
mkfs -t ext4 /dev/mapper/cryptroot
ref: http://blog.alanporter.com/2011-04-25/crypto-root/ https://help.ubuntu.com/community/Full_Disk_Encryption_Howto_2019 https://unix.stackexchange.com/questions/560439/how-to-encrypt-external-disk-without-backup-restore-the-existing-data
sudo -i
apt-get install cryptsetup
cryptsetup luksFormat --type=luks1 ${DEV}p1
cryptsetup luksOpen --key-file /root/initial_keyfile.bin /dev/nvme0n1p7 cryptoroot
cryptsetup close cryptoroot
cryptsetup luksDump /dev/<device> | grep BLED
cryptsetup luksAddKey /dev/<device> (/path/to/<additionalkeyfile>)
- mkdir /mnt/samba
- mount -t cifs //hal/public /mnt/samba -o uid=1000,iocharset=utf8,username=[username],password=[password],sec=ntlm
- partimage save /dev/sda1 /mnt/samba/staff/[username]/D600_training_img.pimg.gz
- dd if=/dev/hda of=/mnt/samba/staff/[username]/sda.mbr count=1 bs=512
- sfdisk -d /dev/hda > /mnt/samba/staff/[username]/sda.pt
- dd if=/mnt/samba/staff/[username]/sda.mbr of=/dev/sda
- sfdisk /dev/hda < /mnt/samba/staff/[username]/sda.pt
- mkdir /mnt/samba
- mount -t cifs //hal/public /mnt/samba -o iocharset=utf8,username=[username],sec=ntlm
- partimage -e restore /dev/sda1 /mnt/samba/staff/[username]/D600_training_img.pimg.gz.000
ocs-sr -q2 -c -j2 -z1p -i 4096 -sfsck -senc -p choose savedisk 2018-11-04-16-img nvme0n1
cat 2018-11-04-16-img/nvme0n1p7.ext4-ptcl-img.gz.* | gzip -d -c | sudo partclone.ext4 -r -s - -W -O images/restored.img
mount images/restored /mnt/olddisk
sudo rsync -axHAWXS --numeric-ids --info=progress2 /mnt/olddisk/ /mnt/newdisk/
mv Dropbox Dropbox.bak
mkdir Dropbox
dd if=/dev/zero of=~/.dropbox/storage bs=1M count=3072
mkfs.ext4 /home/<username>/.dropbox/storage
chattr +i /home/<user>/Dropbox
mkfs.ext4 /home/<username>/.dropbox/storage
in /etc/fstab:
/home/<username>/.dropbox/storage /home/<username>/Dropbox ext4 defaults,user_xattr,loop 0 0
cp -a Dropbox.bak/* Dropbox/
https://wiki.archlinux.org/index.php/sparse_file
sudo apt-get install vim htop iftop isc-dhcp-server bind9 git