Author's posts
Dec 11 2022
PXEBoot Addon Memtest86
SyBad RAM is one of the most frustrating computer problems to have as symptoms are often random and hard to pin down. MemTest86 can help diagnose faulty RAM (or rule it out as a cause of system instability). As such it is often used by system builders, PC repair stores, overlockers & PC manufacturers. These …
Dec 11 2022
PXEBoot Addon SystemRescue
SystemRescue is a platform which provides a boot image for system rescue of any system. This instructions will allow you to add this functionality to your PXEBoot environment
Dec 11 2022
PXEBoot (X86+EFI)
Any OS can support PXE/EFI boot possibilities to other systems booting. This post will focus on creating a X86/EFI boot environment using Debian for booting various other systems. The post will primarily focus on booting other Linux environments, there will be additional posts supporting Windows and other platforms.
Dec 04 2022
Pihole / DNSmasq
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network capability, such as the Raspberry Pi, but can be installed on almost any Linux machine. In my case primarily use it for protecting environment from ads, spam, malware …
Nov 13 2022
Prometheus/Grafana – Pihole
Prometheus and Grafana support various integrations including Pihole, following guide will provide instructions on how to integrate these products for interactive statistics and reporting.
Nov 12 2022
Nft-Blackhole
If you need on your server additional blackholing/blacklisting scripts to automatically update your Nftables firewall to exclude countries or lists, use this software. Ideal. See: https://github.com/tomasz-c/nft-blackhole
Oct 25 2022
VCF SDDC Manager – TCP/TLS Logging
The SDDC Manager in VCF 4.x does not contain an integrated/pre-installed vRealize LogInsight agent any more. If you need to forward log data to the centralized syslog environment this will require configuring additional OS rsylsog entries. The example below covers the configuration for TCP/TLS.
Jan 16 2022
Debian 11: rkhunter
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. …
Jan 02 2022
Windows Exchange Cleanup Logs
Starting from Exchange 2013 and higher, logs are taking up more space on the Windows Server. This is when cleanup logs Exchange 2013/2016/2019 script plays an important role. Clear Exchange logs with PowerShell and get free space on the Exchange Server. These logs are NOT database logs! You can safely delete these logs. In fact, …
Dec 31 2021
EdgeRouter SNMPv3
Ubiquiti EdgeRouters require a specific syntax to enable SNMPv3, see the following entry for details.