Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

154 total results found

First Steps

FreeBS Server

Add User To system root@balrock:~ # adduser Username: username Full name: Uid (Leave empty for default): Login group [username]: Login group is username. Invite username into other groups? []: wheel Login class [default]: Shell (sh csh tcsh bash rbash nolo...

Create Jail, Networking and NAT

FreeBS Server

Step 1: Enable IP Forwarding First, you need to enable IP forwarding on your FreeBSD host. This allows the host to forward packets between the jail and the outside network. Edit the /etc/sysctl.conf file and add the following line: net.inet.ip.forwarding=1 Ap...

Weechat conf

weechat

/server add uugrn irc.uugrn.org/6679 -ssl -autoconnect /set irc.server.uugrn.username "MeinNickname" /set irc.server.uugrn.autojoin "#uugrn" /connect uugrn /save /server add spotchat irc.spotchat.org/6667 -ssl -autoconnect /set irc.server.spotchat.autojoin "#l...

Install Software in Template using proxy

QubesOS

wget proxy Issue in Terminal: https_proxy=http://127.0.0.1:8082/ http_proxy=http://127.0.0.1:8082/ Then you can flatpak install xyz or sudo extrepo enable xyz Clone git in template git config --global http.proxy http://127.0.0.1:8082 then you can git clone...

Copy from and to dom0

QubesOS

Copy to dom0 qvm-run --pass-io vm-name "cat /path/to/file/in/vm" > "/path/to/file/in/dom0" Copy from dom0 qvm-copy-to-vm <target_vm> <file>

AWUS 1900 - Linux Drivers

Alfa AWUS

rtl8814au Drivers for the rtl8814au chipset wireless adapters Install Dependencies sudo apt update sudo apt install linux-headers-amd64 dkms rfkill git iw bc mokutil build & install git clone https://github.com/morrownr/8814au cd 8814au sudo ./install-driver....

Install custom Kernel in TemplateVM

QubesOS

install linux kernel sudo apt install linux linux-headers grub-install /dev/xvda grub-mkconfig -o /boot/grub/grub.cfg mkinitcpio -p linux switch vm to HVM in QubesManager

Attach Devices

QubesOS

Attach USB Device Once qvm-device usb attach vmname sys-usb:X-x Persistent qvm-device usb attach --persistent vmname sys-usb:X-x Attach Blockdevices Once qvm-block attach vmname dom0:diskname persistent qvm-block attach --persistent vmname dom0:diskname

Change Shell in Templates

QubesOS

sudo usermod -s /usr/bin/fish user

Enable USB support on StandaloneVM

QubesOS

qvm-features [standalone-qube] stubdom-qrexec 1

Install Software in dom0

QubesOS

sudo qubes-dom0-update <packagename>

Initial Configuration

UFW

Allow ipv6 edit vim /etc/default/ufw and add: IPV6=yes Deny incoming default ufw default deny incoming allow outcoming ufw default allow outgoing Allow SSH / HTTP / HTTPS: ufw allow 22/tcp ufw allow 80/tcp ufw allow 443/tcp

Create a hidden Service

TOR

Install Tor To enable all package managers using the libapt-pkg library to access metadata and packages available in sources accessible over https (Hypertext Transfer Protocol Secure). apt install apt-transport-https Create a new file in /etc/apt/sources.list...

Set up a Kubernetes cluster

Set up a Kubernetes cluster

INSTALLING KUBERNETES INSTALL CONTAINERD # update packages in apt package manager sudo apt update && apt dist-uppgrade # install containerd using the apt package manager # containerd is lightwieght, reliable and fast (CRI native) sudo apt-get install -y conta...