Christian Berding

Author's posts

PXEBoot Addon Memtest86

SyBad RAM is one of the most frustrating computer problems to have as symptoms are often random and hard to pin down. MemTest86 can help diagnose faulty RAM (or rule it out as a cause of system instability). As such it is often used by system builders, PC repair stores, overlockers & PC manufacturers. These …

Continue reading

PXEBoot Addon SystemRescue

SystemRescue is a platform which provides a boot image for system rescue of any system. This instructions will allow you to add this functionality to your PXEBoot environment

Continue reading

PXEBoot (X86+EFI)

Any OS can support PXE/EFI boot possibilities to other systems booting. This post will focus on creating a X86/EFI boot environment using Debian for booting various other systems. The post will primarily focus on booting other Linux environments, there will be additional posts supporting Windows and other platforms.

Continue reading

Pihole / DNSmasq

Pi-hole is a Linux network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network capability, such as the Raspberry Pi, but can be installed on almost any Linux machine. In my case primarily use it for protecting environment from ads, spam, malware …

Continue reading

Prometheus/Grafana – Pihole

Prometheus and Grafana support various integrations including Pihole, following guide will provide instructions on how to integrate these products for interactive statistics and reporting.

Continue reading

Nft-Blackhole

If you need on your server additional blackholing/blacklisting scripts to automatically update your Nftables firewall to exclude countries or lists, use this software. Ideal. See: https://github.com/tomasz-c/nft-blackhole

Continue reading

VCF SDDC Manager – TCP/TLS Logging

VMware Workspace One Access

The SDDC Manager in VCF 4.x does not contain an integrated/pre-installed vRealize LogInsight agent any more.  If you need to forward log data to the centralized syslog environment this will require configuring additional OS rsylsog entries.  The example below covers the configuration for TCP/TLS.

Continue reading

Debian 11: rkhunter

rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. …

Continue reading

Windows Exchange Cleanup Logs

Starting from Exchange 2013 and higher, logs are taking up more space on the Windows Server. This is when cleanup logs Exchange 2013/2016/2019 script plays an important role. Clear Exchange logs with PowerShell and get free space on the Exchange Server. These logs are NOT database logs! You can safely delete these logs. In fact, …

Continue reading

EdgeRouter SNMPv3

Ubiquiti EdgeRouters require a specific syntax to enable SNMPv3, see the following entry for details.

Continue reading

Load more