<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackepedia.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Franks</id>
	<title>Hackepedia - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://hackepedia.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Franks"/>
	<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Special:Contributions/Franks"/>
	<updated>2026-05-08T14:02:26Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://hackepedia.org/index.php?title=Timelapse&amp;diff=5709</id>
		<title>Timelapse</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Timelapse&amp;diff=5709"/>
		<updated>2021-06-16T19:37:19Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot;  # Move pics to new folder  $ mv IMG_{1842..1891}.JPG timeplapse2/  # Make the timeplase  $ ffmpeg -framerate 30 -pattern_type glob -i &amp;quot;*.JPG&amp;quot; -s:v 1440x1080 -c:v libx264 -cr...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
 # Move pics to new folder&lt;br /&gt;
 $ mv IMG_{1842..1891}.JPG timeplapse2/&lt;br /&gt;
 # Make the timeplase&lt;br /&gt;
 $ ffmpeg -framerate 30 -pattern_type glob -i &amp;quot;*.JPG&amp;quot; -s:v 1440x1080 -c:v libx264 -crf 17 -pix_fmt yuv420p timelapse.mp4&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Rsync&amp;diff=5708</id>
		<title>Rsync</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Rsync&amp;diff=5708"/>
		<updated>2021-05-02T19:58:03Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Trying to backup remotely using rsync + ssh so the transfer is encrypted. &lt;br /&gt;
Two things non-standard in my setup, I use a non-standard ssh port (4321), and I&#039;m connecting from the box I want backed up, to the server. In most examples, you&#039;re connecting from the server, to the client.&lt;br /&gt;
&lt;br /&gt;
 $ rsync -avz -e &#039;ssh -p4321&#039; /client/homedirectory remoteuser@remotehost:/remote/backup/directory&lt;br /&gt;
 &lt;br /&gt;
 From Dir1 to Dir2: &lt;br /&gt;
&lt;br /&gt;
 $ rsync -av --delete /Directory1/ /Directory2/&lt;br /&gt;
 –delete = This tells rsync to delete any files that are in Directory2 that aren’t in Directory1.&lt;br /&gt;
&lt;br /&gt;
 to exclude a few:&lt;br /&gt;
&lt;br /&gt;
 --exclude={&amp;quot;/tmp/*&amp;quot;,&amp;quot;/proc/*&amp;quot;}&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Wireless&amp;diff=5707</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Wireless&amp;diff=5707"/>
		<updated>2021-03-10T03:28:24Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Wireless is technology that allows communication without a cable.  Radio has been with us for more than 100 years and is the most well known wireless technology.  Other wireless technology are infrared and visual light as the bearer of data.&lt;br /&gt;
&lt;br /&gt;
In 1999 wireless [[ethernet]] (802.11abg+) became popular first offering 2 Mbps, 11 Mbps, 53 Mbps and currently they advertise 300 Mbps between laptop and base station.&lt;br /&gt;
&lt;br /&gt;
Some people say they are allergic to the microwaves produced by wireless ethernet.&lt;br /&gt;
&lt;br /&gt;
== Monitor your wireless connection ==&lt;br /&gt;
&lt;br /&gt;
 $ nmcli dev wifi&lt;br /&gt;
&lt;br /&gt;
 $ watch -n 3 cat /proc/net/wireless&lt;br /&gt;
&lt;br /&gt;
 $ nmcli connection show&lt;br /&gt;
&lt;br /&gt;
 $ nmcli connection show &amp;quot;$NAME&amp;quot;&lt;br /&gt;
&lt;br /&gt;
You can likely find your wireless adapter from: &lt;br /&gt;
&lt;br /&gt;
 $ ip addr&lt;br /&gt;
&lt;br /&gt;
or &lt;br /&gt;
&lt;br /&gt;
 $ sudo lshw -C network&lt;br /&gt;
&lt;br /&gt;
we&#039;ll assume it&#039;s wlan0, replace that below with yours: &lt;br /&gt;
&lt;br /&gt;
 $ sudo iwconfig wlan0 | grep -i  quality&lt;br /&gt;
&lt;br /&gt;
In terms of third party apps, I did `apt install wavemon` and then simply run: &lt;br /&gt;
&lt;br /&gt;
 $ wavemon&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ssh&amp;diff=5706</id>
		<title>Ssh</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ssh&amp;diff=5706"/>
		<updated>2021-03-09T19:03:29Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:socket.jpg]]&lt;br /&gt;
&lt;br /&gt;
SSH stands for &amp;quot;Secure Shell&amp;quot; and was first written by a Finnish computer scientist named Tatu Ylonen.  Mr. Ylonen went on to found [http://www.ssh.com SSH Communications] which continues developing the ssh program.  The program uses both symmetric and assymetric [[cryptography]] in order to keep the [[OSI]] session layer secure from session [[hijacking]] and [[sniffing]].&lt;br /&gt;
&lt;br /&gt;
== Public Key Differences ==&lt;br /&gt;
&lt;br /&gt;
There are three versions used in SSH.  One for v1 protocol, and two for v2.&lt;br /&gt;
&lt;br /&gt;
* RSA1 is referred to as the original RSA key used for v1 protocols.  These keys were used to encrypt the communications.&lt;br /&gt;
&lt;br /&gt;
* RSA is referred to as the v2 protocol.  This is used for signing the channel only since the underlying protocol is now handled by a different means.&lt;br /&gt;
&lt;br /&gt;
* DSA was added to v2 protocol after [http://www.rsasecurity.com/ RSA Security] assured patent rights, and the IETF included DSA to allow for patent free implementation. &#039;&#039;&#039;Note: Due to how DSA works it requires a lot more good enthropy to be secure compared to RSA.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Which is the right one for you?  Since the RSA patent has expired it is recommended by most of the OpenSSH team to stay with RSA keys since they have been around longer and are more known in terms of their strengths and weakness.  &lt;br /&gt;
&lt;br /&gt;
== The OpenSSH Fork ==&lt;br /&gt;
&lt;br /&gt;
[http://www.openssh.com OpenSSH] was forked from a free version of SSH 1.2.12 and shipped with the [[OpenBSD]] 2.6 system.  It has gained popularity among many vendors and is shipped with their products as well.  [http://ssh.com/ Tatu Ylonen&#039;s company] took OpenSSH to court but lost.&lt;br /&gt;
&lt;br /&gt;
== Cool SSH Tricks ==&lt;br /&gt;
&lt;br /&gt;
Modern SSH clients and servers allow you to do some pretty nifty tricks. The most common is [http://en.tldp.org/HOWTO/XDMCP-HOWTO/ssh.html X11 Port Forwarding].  You can also [http://www.coder.com/daniel/kwlug/ssh-tricks/slide010.html forward arbitrary ports], and [http://www.coder.com/daniel/kwlug/ssh-tricks/slide006.html compress] files when transfering them over the network (all in addition to encrypting the data).  One really nifty trick is to [[FlexLMForwarding| forward FlexLM]] connections. Another popular trick is [[ssh-keygen|passphraseless key exchange]].&lt;br /&gt;
&lt;br /&gt;
== Travel ==&lt;br /&gt;
&lt;br /&gt;
To use this, you&#039;ll need a [[shell]] account. This can be on a server you&#039;re running at home, or a machine that you trust. SOCKS mode is accomplished by adding the -D flag to start a SOCKS proxy.&lt;br /&gt;
&lt;br /&gt;
 $ ssh [[Variables|$home_machine]] -D127.0.0.1:8080&lt;br /&gt;
&lt;br /&gt;
Now in firefox I enter a SOCKS proxy of 127.0.0.1 with port 8080 and it will appear to any website I visit that I am at home, not at my remote location! You can do this in any applications you wish ([[Firefox]],[[Thunderbird]] or [[Pidgin]] for example, or you can use this as a [[VPN]] for all applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Lessons learned from Enigma ==&lt;br /&gt;
&lt;br /&gt;
In world war 2 the germans used a cipher mechanism called [[enigma]] to secure their communications.  Little did they know the british were able to read through this ciphertext and gain plain knowledge of everything being written.  Enigma was a lazy concept, it allowed comforts on part of the operator and it was so complex that noone on the german side questioned it because they probably were too lazy to dig up dirt.  &lt;br /&gt;
&lt;br /&gt;
The same can be said for SSH, don&#039;t get lazy.  Don&#039;t reuse private/public keys for passwordless access across systems.  So far the public knows not of a case where it&#039;s possible to derive a private key from a public key.  But we have a threat looming... quantum computers.  If they manage to make this easy all security over public/private keys is diminished.  It may even be safer to just use passwords (that are good! not simple ones).  Stay vigilant my crypto heros, ssh shouldn&#039;t make you lazy!&lt;br /&gt;
&lt;br /&gt;
== Rotate keys with ansible ==&lt;br /&gt;
&lt;br /&gt;
Generate your new keys: &lt;br /&gt;
&lt;br /&gt;
 $ ssh-keygen -t rsa -b 4096 -C &amp;quot;ansible 2021&amp;quot; -f &amp;quot;ansible2021&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The following is dangerous in that you could get locked out of a remote system. For testing, I did --limit=&#039;server_one&#039; in ansible to test on one host only, and I was manually ssh&#039;d into that machine in case I did something wrong and had to manually replace my ssh key.&lt;br /&gt;
&lt;br /&gt;
The following playbook assumes that your local username is localuser and in your hosts.yaml file you use ansible_user as the username: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
 ---&lt;br /&gt;
 - hosts: all&lt;br /&gt;
  tasks: &lt;br /&gt;
     - authorized_key:&lt;br /&gt;
         user: &amp;lt;nowiki&amp;gt;&amp;quot;{{ ansible_user }}&amp;quot; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
         state: present&lt;br /&gt;
         key: &amp;lt;nowiki&amp;gt;&amp;quot;{{ lookup(&#039;file&#039;, &#039;/home/localuser/.ssh/ansible2021.pub&#039;) }}&amp;quot; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
         exclusive: True&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Remove exclusive: True if you don&#039;t want to clobber/remove all existing ssh keys listed in authorized_keys, but simply want to add your new one!&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=SHA&amp;diff=5705</id>
		<title>SHA</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=SHA&amp;diff=5705"/>
		<updated>2021-02-07T13:08:59Z</updated>

		<summary type="html">&lt;p&gt;Franks: /* Using SHA256+ in Linux */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SHA-0 (Secure Hash Algorithm) was a proposal by the U.S. government that was replaced by SHA-1 in FIPS 180-1. SHA-1   addresses the weakness found in SHA-0 by adding an additional circular shift operation, thus deprecated SHA-0. SHA-1 has [http://theory.csail.mit.edu/~yiqun/shanote.pdf a reported weakness] as far as [[hash collision]]s are concerned and awareness should be raised if you are implementing it.&lt;br /&gt;
&lt;br /&gt;
If you have the sha1 application installed, you can make use of the command like so:&lt;br /&gt;
&lt;br /&gt;
 $ sha1 /etc/passwd&lt;br /&gt;
 SHA1 (/etc/passwd) = c7ae5b7306797d9f1f5fba85683cdd36ba8d1a08&lt;br /&gt;
&lt;br /&gt;
=== Using SHA256+ in OpenBSD and NetBSD ===&lt;br /&gt;
&lt;br /&gt;
As of OpenBSD 4.5 and NetBSD 4.0 the cksum command does SHA256, SHA384 and SHA512 the command is done like so:&lt;br /&gt;
&lt;br /&gt;
 $ cksum -a sha256 /dev/null           &lt;br /&gt;
 SHA256 (/dev/null) = e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855&lt;br /&gt;
 $ cksum -a sha384 /dev/null&lt;br /&gt;
 SHA384 (/dev/null) = 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b&lt;br /&gt;
 $ cksum -a sha512 /dev/null &lt;br /&gt;
 SHA512 (/dev/null) = cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e&lt;br /&gt;
&lt;br /&gt;
A neat feature in OpenBSD is the -b flag in cksum which outputs the SHA checksum in base64:&lt;br /&gt;
&lt;br /&gt;
 $ cksum -a sha512 -b /dev/null&lt;br /&gt;
 SHA512 (/dev/null) = z4PhNX7vuL3xVChQ1m2AB9Yg5AULVxXcg/SpIdNs6c5H0NE8XYXysP+DGNKHfuwvY7kxvUdBeoGlODJ6+SfaPg==&lt;br /&gt;
&lt;br /&gt;
The checksum is against the binary, NOT the hexdump of normal sha512.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== SHA256 in FreeBSD ===&lt;br /&gt;
&lt;br /&gt;
FreeBSD 7.0-stable has a sha256 program:&lt;br /&gt;
&lt;br /&gt;
 $ sha256 /dev/null&lt;br /&gt;
 SHA256 (/dev/null) =  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== SHA256+ in Solaris 10 ===&lt;br /&gt;
&lt;br /&gt;
Use the digest command:&lt;br /&gt;
&lt;br /&gt;
 $ digest -v -a sha256 /dev/null&lt;br /&gt;
 sha256 (/dev/null) = e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855&lt;br /&gt;
 $ digest -v -a sha384 /dev/null&lt;br /&gt;
 sha384 (/dev/null) = 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b       &lt;br /&gt;
 $ digest -v -a sha512 /dev/null&lt;br /&gt;
 sha512 (/dev/null) = cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Using SHA256+ in Linux ===&lt;br /&gt;
&lt;br /&gt;
On Debian/Ubuntu: &lt;br /&gt;
&lt;br /&gt;
 $ shasum -a 256 /dev/null&lt;br /&gt;
 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b936ca495991b7852b855  /dev/null&lt;br /&gt;
 # -a, --algorithm   1 (default), 224, 256, 384, 512, 512224, 512256&lt;br /&gt;
&lt;br /&gt;
In this example it&#039;s OpenSuse 10.3, one has to use the openssl package:&lt;br /&gt;
&lt;br /&gt;
 &amp;gt; openssl dgst -sha256 /dev/null&lt;br /&gt;
 SHA256(/dev/null)= e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 &lt;br /&gt;
 &amp;gt; openssl dgst -sha512 /dev/null&lt;br /&gt;
 SHA512(/dev/null)= cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e&lt;br /&gt;
&lt;br /&gt;
There doesn&#039;t seem to be a sha384 though.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Main_Page&amp;diff=5704</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Main_Page&amp;diff=5704"/>
		<updated>2020-10-08T07:29:28Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;87%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;4&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td rowspan=&amp;quot;2&amp;quot; width=&amp;quot;56%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#d7e7fa&amp;quot; style=&amp;quot;border:1px solid #CEDEF4; padding:1em;padding-top:0.2em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
The rough idea for this site was to create and provide answers to commonly asked questions and those that aren&#039;t currently answered online. It is maintained by hackers. If you do not understand a term, look it up at [http://www.wikipedia.org Wikipedia].  If you&#039;ve come here to find answers or examples, hopefully you will find them.  If you have an answer or example, we hope that you will leave those as well. Accounts are free, the only reason we require an email address to register here is to prevent the spam bots from hitting our site. &lt;br /&gt;
&lt;br /&gt;
Ideally everything recommended here is free, open source, and works on most operating systems. If you see a page that you could make easier to understand for most readers, or would like to create one that follows this philosophy, please help us out, accounts are free!&lt;br /&gt;
&lt;br /&gt;
You may have also been sent here because you&#039;re new to the [[internet]], or would like to learn the etiquette.&lt;br /&gt;
&lt;br /&gt;
A few pages to get you started:&lt;br /&gt;
               &lt;br /&gt;
*[[Manual]]&lt;br /&gt;
*[[Socket]]&lt;br /&gt;
*[[Cider]]&lt;br /&gt;
*[[Bytes]]&lt;br /&gt;
*[[Satellites]]&lt;br /&gt;
&lt;br /&gt;
As of Oct 7, 2020, we have surpassed over 14 million successful web requests!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td width=&amp;quot;24%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#e7f7e7&amp;quot; style=&amp;quot;border:1px solid #BAD0EF; padding: 1em; padding-top: 0.5em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Major Categories&#039;&#039;&#039;&lt;br /&gt;
{{MajorCategories}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please see [http://meta.wikipedia.org/wiki/MediaWiki_i18n documentation on customizing the interface]&lt;br /&gt;
and the [http://meta.wikipedia.org/wiki/MediaWiki_User&#039;s_Guide User&#039;s Guide] for usage and configuration help.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Android&amp;diff=5703</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Android&amp;diff=5703"/>
		<updated>2020-08-09T05:17:58Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you have an Android phone, here is some software that might be of interest: &lt;br /&gt;
&lt;br /&gt;
== Security/Privacy ==&lt;br /&gt;
&lt;br /&gt;
*[http://keepass.info/ KeePassDroid] - Password manager that uses encryption&lt;br /&gt;
*[http://www.whispersys.com/ TextSecure] - Encrypt SMS&lt;br /&gt;
*[http://code.google.com/p/droidwall/ DroidWall] - Firewall&lt;br /&gt;
*[http://bigtincan.com/downloads/android.html AdFree Android] - Requires root, but removes all ads&lt;br /&gt;
&lt;br /&gt;
== Performance == &lt;br /&gt;
&lt;br /&gt;
* Only have wifi or GPS on while using it, turn it off asap after use.&lt;br /&gt;
&lt;br /&gt;
== Samsung ==&lt;br /&gt;
&lt;br /&gt;
* Kies Air from Samsung Apps (allows you to exchange content on the LAN through a web server)&lt;br /&gt;
&lt;br /&gt;
== Backup == &lt;br /&gt;
&lt;br /&gt;
There are a few popular apps you should ensure you&#039;ve manually backed up the shared secrets for, such as: &lt;br /&gt;
* Signal&lt;br /&gt;
* Silence&lt;br /&gt;
* [https://android.stackexchange.com/questions/187342/is-google-authenticator-data-saved-in-the-google-backup-cloud/190311#190311 Google Authenticator]&lt;br /&gt;
* Whatsapp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You&#039;ll need adb for this. On [[Debian]] or [[Ubuntu]]: &lt;br /&gt;
 sudo apt-get install android-tools-adb&lt;br /&gt;
&lt;br /&gt;
then you&#039;ll want to make a directory to back your files up to: &lt;br /&gt;
 mkdir android-backup&lt;br /&gt;
&lt;br /&gt;
cd into that directory, and start by backing up all your installed applications: &lt;br /&gt;
&lt;br /&gt;
 adb backup -all # Consider adding -apk -obb -shared as well&lt;br /&gt;
&lt;br /&gt;
and now you can also backup your internal sdcard: &lt;br /&gt;
&lt;br /&gt;
 adb pull /sdcard/ .&lt;br /&gt;
&lt;br /&gt;
The above assumes you&#039;re in android-backup, otherwise replace the . with the directory you want to backup to.&lt;br /&gt;
&lt;br /&gt;
== Flash ==&lt;br /&gt;
&lt;br /&gt;
Wipe System, Dalvik, and Cache and flash rom, gapps and magisk again.&lt;br /&gt;
&lt;br /&gt;
Do NOT wipe Data and Internal Storage or you will lose all your data!&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Android&amp;diff=5702</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Android&amp;diff=5702"/>
		<updated>2020-02-10T19:00:35Z</updated>

		<summary type="html">&lt;p&gt;Franks: /* Backup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you have an Android phone, here is some software that might be of interest: &lt;br /&gt;
&lt;br /&gt;
== Security/Privacy ==&lt;br /&gt;
&lt;br /&gt;
*[http://keepass.info/ KeePassDroid] - Password manager that uses encryption&lt;br /&gt;
*[http://www.whispersys.com/ TextSecure] - Encrypt SMS&lt;br /&gt;
*[http://code.google.com/p/droidwall/ DroidWall] - Firewall&lt;br /&gt;
*[http://bigtincan.com/downloads/android.html AdFree Android] - Requires root, but removes all ads&lt;br /&gt;
&lt;br /&gt;
== Performance == &lt;br /&gt;
&lt;br /&gt;
* Only have wifi or GPS on while using it, turn it off asap after use.&lt;br /&gt;
&lt;br /&gt;
== Samsung ==&lt;br /&gt;
&lt;br /&gt;
* Kies Air from Samsung Apps (allows you to exchange content on the LAN through a web server)&lt;br /&gt;
&lt;br /&gt;
== Backup == &lt;br /&gt;
&lt;br /&gt;
There are a few popular apps you should ensure you&#039;ve manually backed up the shared secrets for, such as: &lt;br /&gt;
* Signal&lt;br /&gt;
* Silence&lt;br /&gt;
* [https://android.stackexchange.com/questions/187342/is-google-authenticator-data-saved-in-the-google-backup-cloud/190311#190311 Google Authenticator]&lt;br /&gt;
* Whatsapp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You&#039;ll need adb for this. On [[Debian]] or [[Ubuntu]]: &lt;br /&gt;
 sudo apt-get install android-tools-adb&lt;br /&gt;
&lt;br /&gt;
then you&#039;ll want to make a directory to back your files up to: &lt;br /&gt;
 mkdir android-backup&lt;br /&gt;
&lt;br /&gt;
cd into that directory, and start by backing up all your installed applications: &lt;br /&gt;
&lt;br /&gt;
 adb backup -all # Consider adding -apk -obb -shared as well&lt;br /&gt;
&lt;br /&gt;
and now you can also backup your internal sdcard: &lt;br /&gt;
&lt;br /&gt;
 adb pull /sdcard/ .&lt;br /&gt;
&lt;br /&gt;
The above assumes you&#039;re in android-backup, otherwise replace the . with the directory you want to backup to.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Android&amp;diff=5700</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Android&amp;diff=5700"/>
		<updated>2019-09-29T21:53:21Z</updated>

		<summary type="html">&lt;p&gt;Franks: /* Performance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you have an Android phone, here is some software that might be of interest: &lt;br /&gt;
&lt;br /&gt;
== Security/Privacy ==&lt;br /&gt;
&lt;br /&gt;
*[http://keepass.info/ KeePassDroid] - Password manager that uses encryption&lt;br /&gt;
*[http://www.whispersys.com/ TextSecure] - Encrypt SMS&lt;br /&gt;
*[http://code.google.com/p/droidwall/ DroidWall] - Firewall&lt;br /&gt;
*[http://bigtincan.com/downloads/android.html AdFree Android] - Requires root, but removes all ads&lt;br /&gt;
&lt;br /&gt;
== Performance == &lt;br /&gt;
&lt;br /&gt;
* Only have wifi or GPS on while using it, turn it off asap after use.&lt;br /&gt;
&lt;br /&gt;
== Samsung ==&lt;br /&gt;
&lt;br /&gt;
* Kies Air from Samsung Apps (allows you to exchange content on the LAN through a web server)&lt;br /&gt;
&lt;br /&gt;
== Backup == &lt;br /&gt;
&lt;br /&gt;
You&#039;ll need adb for this. On [[Debian]] or [[Ubuntu]]: &lt;br /&gt;
 sudo apt-get install android-tools-adb&lt;br /&gt;
&lt;br /&gt;
then you&#039;ll want to make a directory to back your files up to: &lt;br /&gt;
 mkdir android-backup&lt;br /&gt;
&lt;br /&gt;
cd into that directory, and start by backing up all your installed applications: &lt;br /&gt;
&lt;br /&gt;
 adb backup -all&lt;br /&gt;
&lt;br /&gt;
and now you can also backup your internal sdcard: &lt;br /&gt;
&lt;br /&gt;
 adb pull /storage/sdcard0/ .&lt;br /&gt;
&lt;br /&gt;
The above assumes you&#039;re in android-backup, otherwise replace the . with the directory you want to backup to.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Riot&amp;diff=5699</id>
		<title>Riot</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Riot&amp;diff=5699"/>
		<updated>2019-09-26T18:47:25Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Change a user&#039;s a password == &lt;br /&gt;
&lt;br /&gt;
 $ ssh -L 8448:localhost:8448 serveruser@matrix.server.com&lt;br /&gt;
&lt;br /&gt;
 $ curl -XPOST -d &#039;{&amp;quot;type&amp;quot;:&amp;quot;m.login.password&amp;quot;, &amp;quot;user&amp;quot;:&amp;quot;&amp;lt;userId&amp;gt;&amp;quot;, &amp;quot;password&amp;quot;:&amp;quot;&amp;lt;pasword&amp;gt;&amp;quot;}&#039; &amp;quot;https://localhost:8448/_matrix/client/r0/login&amp;quot;&lt;br /&gt;
&lt;br /&gt;
get token&lt;br /&gt;
&lt;br /&gt;
 $ curl -XPOST -H &amp;quot;Authorization: Bearer &amp;lt;access_token&amp;gt;&amp;quot; -H &amp;quot;Content-Type: application/json&amp;quot; -d &#039;{&amp;quot;new_password&amp;quot;:&amp;quot;&amp;lt;new_password&amp;gt;&amp;quot;}&#039; &amp;quot;https://localhost:8448/_matrix/client/r0/admin/reset_password/&amp;lt;userId&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Deactivate a user ==&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 #!/bin/bash &lt;br /&gt;
 # from [gist]&lt;br /&gt;
 echo -e &amp;quot;\e[97mPlease enter password for Synapse/Matrix root user:\e[0m&amp;quot;;&lt;br /&gt;
 read -s password&lt;br /&gt;
 echo -e &amp;quot;\e[97mEnter user you&#039;d like to deactivate\e[0m&amp;quot;;&lt;br /&gt;
 read user&lt;br /&gt;
 #&lt;br /&gt;
 url_user=`echo -n &amp;quot;$user&amp;quot; | jq -s -R -r @uri`&lt;br /&gt;
 #&lt;br /&gt;
 json=`curl -s --insecure -XPOST -d &#039;{&amp;quot;type&amp;quot;:&amp;quot;m.login.password&amp;quot;, &amp;quot;user&amp;quot;:&amp;quot;root&amp;quot;, &amp;quot;password&amp;quot;:&amp;quot;&#039;$password&#039;&amp;quot;}&#039;     &amp;quot;https://localhost:8448/_matrix/client/r0/login&amp;quot;`&lt;br /&gt;
 access_token=`echo &amp;quot;$json&amp;quot; | jq -r &amp;quot;.access_token&amp;quot;`&lt;br /&gt;
 #&lt;br /&gt;
 curl --insecure -XPOST -H &amp;quot;Authorization: Bearer $access_token&amp;quot; -H &amp;quot;Content-Type: application/json&amp;quot; -d \&lt;br /&gt;
  &#039;{}&#039; &amp;quot;https://localhost:8448/_matrix/client/r0/admin/deactivate/$url_user&amp;quot;&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Riot&amp;diff=5698</id>
		<title>Riot</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Riot&amp;diff=5698"/>
		<updated>2019-09-26T00:07:18Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot; == Change a user&amp;#039;s a password ==    $ ssh -L 8448:localhost:8448 serveruser@matrix.server.com   $ curl -XPOST -d &amp;#039;{&amp;quot;type&amp;quot;:&amp;quot;m.login.password&amp;quot;, &amp;quot;user&amp;quot;:&amp;quot;&amp;lt;userId&amp;gt;&amp;quot;, &amp;quot;password&amp;quot;:&amp;quot;&amp;lt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Change a user&#039;s a password == &lt;br /&gt;
&lt;br /&gt;
 $ ssh -L 8448:localhost:8448 serveruser@matrix.server.com&lt;br /&gt;
&lt;br /&gt;
 $ curl -XPOST -d &#039;{&amp;quot;type&amp;quot;:&amp;quot;m.login.password&amp;quot;, &amp;quot;user&amp;quot;:&amp;quot;&amp;lt;userId&amp;gt;&amp;quot;, &amp;quot;password&amp;quot;:&amp;quot;&amp;lt;pasword&amp;gt;&amp;quot;}&#039; &amp;quot;https://localhost:8448/_matrix/client/r0/login&amp;quot;&lt;br /&gt;
&lt;br /&gt;
get token&lt;br /&gt;
&lt;br /&gt;
 $ curl -XPOST -H &amp;quot;Authorization: Bearer &amp;lt;access_token&amp;gt;&amp;quot; -H &amp;quot;Content-Type: application/json&amp;quot; -d &#039;{&amp;quot;new_password&amp;quot;:&amp;quot;&amp;lt;new_password&amp;gt;&amp;quot;}&#039; &amp;quot;https://localhost:8448/_matrix/client/r0/admin/reset_password/&amp;lt;userId&amp;gt;&amp;quot;&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cryptsetup&amp;diff=5697</id>
		<title>Cryptsetup</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cryptsetup&amp;diff=5697"/>
		<updated>2019-07-31T23:26:02Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Find encrypted partitions ==&lt;br /&gt;
&lt;br /&gt;
* lsblk -lf | grep LUKS&lt;br /&gt;
&lt;br /&gt;
== Manually mounting an encrypted partition ==&lt;br /&gt;
&lt;br /&gt;
* $ sudo cryptsetup luksOpen /dev/sda1 encrypted_partition&lt;br /&gt;
* $ sudo mkdir /media/decrypted_partition&lt;br /&gt;
* $ sudo mount /dev/mapper/encrypted_partition /media/decrypted_partition&lt;br /&gt;
&lt;br /&gt;
== Manually unmounting a temporarily decrypted partition ==&lt;br /&gt;
&lt;br /&gt;
* $ sudo umount /media/decrypted_partition&lt;br /&gt;
* $ sudo cryptsetup luksClose encrypted_partition&lt;br /&gt;
&lt;br /&gt;
== Encrypting a partition on Ubuntu 7.10 (Gutsy) using cryptsetup (LUKS) ==&lt;br /&gt;
&lt;br /&gt;
* fdisk your [[partition]]s and remember them.&lt;br /&gt;
&lt;br /&gt;
I will use [[Variables|sdb2]] in my example. &lt;br /&gt;
&lt;br /&gt;
* $ sudo apt-get install cryptsetup&lt;br /&gt;
&lt;br /&gt;
* $ sudo cryptsetup luksFormat /dev/sdb2 -c aes -s 256 -h sha256&lt;br /&gt;
&lt;br /&gt;
 WARNING!&lt;br /&gt;
 ========&lt;br /&gt;
 This will overwrite data on /dev/sdb2 irrevocably.&lt;br /&gt;
 Are you sure? (Type uppercase yes): YES&lt;br /&gt;
 Enter LUKS passphrase: &lt;br /&gt;
&lt;br /&gt;
This is where you make up a [[password]].&lt;br /&gt;
&lt;br /&gt;
* sudo cryptsetup luksOpen /dev/sdb2 [[Variables|backup]]&lt;br /&gt;
&lt;br /&gt;
I called it backup, you can call it whatever you want. You can do &lt;br /&gt;
&lt;br /&gt;
 $ ls -la /dev/mapper&lt;br /&gt;
&lt;br /&gt;
and you should be able to see it!&lt;br /&gt;
&lt;br /&gt;
* $ sudo mke2fs -j /dev/mapper/backup -L backup&lt;br /&gt;
&lt;br /&gt;
You can label it whatever you want, most people use the same as that in /dev/mapper/ for simplicity. This also assumes you want an ext3 filesystem (the -j option). Make whatever [[filesystem]] you prefer. You can now [[mount]] /dev/mapper/backup manually, or add it to /etc/fstab and /etc/crypttab if it&#039;s a static partition.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== From passphrase prompt to a file ==&lt;br /&gt;
&lt;br /&gt;
Although not recommended unless you&#039;re aware of the repercussions, you may wish to store the passphrase in a file on your system instead of being prompted. If this is the case, you can create a file either randomly: &lt;br /&gt;
&lt;br /&gt;
 $ sudo dd if=/dev/urandom of=/[[Variables|root/lukssecretkey]] bs=1024 count=4 &lt;br /&gt;
&lt;br /&gt;
or manually create a file with any passphrase in it you choose. Assuming sdc5 is the partition you want to encrypt, add the new key:&lt;br /&gt;
&lt;br /&gt;
 $ sudo cryptsetup luksAddKey [[Variables|/dev/sdc5]] [[Variables|/root/lukssecretkey]]&lt;br /&gt;
&lt;br /&gt;
finally you want to edit your /etc/crypttab entry to use the keyfile:&lt;br /&gt;
&lt;br /&gt;
 # &amp;lt;target name&amp;gt;	&amp;lt;source device&amp;gt;		&amp;lt;key file&amp;gt;	&amp;lt;options&amp;gt;&lt;br /&gt;
 crypto 	 [[Variables|/dev/sdc5]]	[[Variables|/root/lukssecretkey]]	luks,check=ext2,retry=5&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Postfix:main.cf&amp;diff=5696</id>
		<title>Postfix:main.cf</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Postfix:main.cf&amp;diff=5696"/>
		<updated>2019-07-26T17:10:56Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a sample main.cf, not including the default [[variables]]. You can find the official options [http://www.postfix.org/postconf.5.html here]. If you like and understand the following, add it to the bottom of your main.cf file and run&lt;br /&gt;
 # postfix reload&lt;br /&gt;
&lt;br /&gt;
main.cf:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
strict_rfc821_envelopes = yes&lt;br /&gt;
smtpd_helo_required = yes&lt;br /&gt;
smtpd_etrn_restrictions = reject&lt;br /&gt;
smtpd_helo_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_invalid_hostname&lt;br /&gt;
 reject_non_fqdn_hostname&lt;br /&gt;
 permit&lt;br /&gt;
smtpd_sender_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_unknown_sender_domain&lt;br /&gt;
 reject_non_fqdn_sender&lt;br /&gt;
 permit_sasl_authenticated&lt;br /&gt;
 permit_tls_clientcerts&lt;br /&gt;
 warn_if_reject reject_unverified_sender&lt;br /&gt;
# Incoming email maximum size of one meg:&lt;br /&gt;
message_size_limit = 1024000&lt;br /&gt;
# This file needs to exist if you&#039;re going to use it.&lt;br /&gt;
header_checks = regexp:/usr/local/etc/postfix/header_checks&lt;br /&gt;
# If you don&#039;t have the following file, comment this out.&lt;br /&gt;
mime_header_checks = regexp:/usr/local/etc/postfix/mime_header_checks&lt;br /&gt;
html_directory = no&lt;br /&gt;
syslog_facility = mail&lt;br /&gt;
syslog_name = postfix&lt;br /&gt;
disable_vrfy_command = yes&lt;br /&gt;
smtpd_banner = NO UCE ESMTP&lt;br /&gt;
# SASL &lt;br /&gt;
smtpd_use_tls = yes&lt;br /&gt;
smtpd_sasl_auth_enable = yes&lt;br /&gt;
smtpd_sasl2_auth_enable = yes&lt;br /&gt;
smtpd_sasl_security_options = noanonymous&lt;br /&gt;
smtpd_sasl_local_domain =&lt;br /&gt;
broken_sasl_auth_clients = yes&lt;br /&gt;
# This will only allow authentication of users once TLS has been&lt;br /&gt;
# started and information being transferred is encrypted.&lt;br /&gt;
smtpd_tls_auth_only = yes&lt;br /&gt;
# TLS&lt;br /&gt;
smtp_use_tls = yes&lt;br /&gt;
smtpd_use_tls = yes&lt;br /&gt;
smtp_tls_note_starttls_offer = yes&lt;br /&gt;
smtpd_tls_key_file = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_cert_file = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_CAfile = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_loglevel = 1&lt;br /&gt;
smtpd_tls_received_header = yes&lt;br /&gt;
smtpd_tls_session_cache_timeout = 3600s&lt;br /&gt;
tls_random_source = dev:/dev/urandom&lt;br /&gt;
smtpd_recipient_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_invalid_hostname&lt;br /&gt;
 reject_unauth_pipelining&lt;br /&gt;
 reject_unknown_recipient_domain&lt;br /&gt;
 reject_unknown_sender_domain&lt;br /&gt;
 reject_non_fqdn_hostname&lt;br /&gt;
 reject_non_fqdn_recipient&lt;br /&gt;
 reject_non_fqdn_sender&lt;br /&gt;
 permit_sasl_authenticated&lt;br /&gt;
 permit_tls_clientcerts&lt;br /&gt;
 reject_unauth_destination &lt;br /&gt;
# A source of RBLs to use: https://www.dnsbl.info/dnsbl-list.php &lt;br /&gt;
 reject_rbl_client relays.ordb.org&lt;br /&gt;
 reject_rbl_client list.dsbl.org&lt;br /&gt;
 reject_rbl_client sbl.spamhaus.org&lt;br /&gt;
 reject_rbl_client cbl.abuseat.org&lt;br /&gt;
 reject_rbl_client dul.dnsbl.sorbs.net&lt;br /&gt;
 reject_rbl_client proxies.relays.monkeys.com&lt;br /&gt;
 reject_rbl_client opm.blitzed.org&lt;br /&gt;
 reject_rbl_client blackholes.wirehub.net&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also note these example [[header_checks]]&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Postfix&amp;diff=5695</id>
		<title>Postfix</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Postfix&amp;diff=5695"/>
		<updated>2019-06-06T07:10:21Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.postfix.org Postfix] is Wietse Venema&#039;s sendmail alternative that attempts to be fast, easy to administer, and secure, while at the same time being sendmail compatible enough to not upset existing users.&lt;br /&gt;
&lt;br /&gt;
[[Postfix:pmm]] is our shell script to review Postfix maillog.&lt;br /&gt;
&lt;br /&gt;
[[Postfix:main.cf]] contains additional ideas for your main.cf&lt;br /&gt;
&lt;br /&gt;
[[Spf]] is how to create SPF records&lt;br /&gt;
&lt;br /&gt;
== FreeBSD and TLS/SASL ==&lt;br /&gt;
&lt;br /&gt;
Ignore the version numbers, the port names are what is important.&lt;br /&gt;
 # pkg_info | egrep &#039;(postfix|sasl)&#039;&lt;br /&gt;
 cyrus-sasl-2.1.21_1 RFC 2222 SASL (Simple Authentication and Security Layer)&lt;br /&gt;
 cyrus-sasl-saslauthd-2.1.21 SASL authentication server for cyrus-sasl2&lt;br /&gt;
 postfix-2.2.6,1     A secure alternative to widely-used Sendmail&lt;br /&gt;
&lt;br /&gt;
postfix:main.cf:&lt;br /&gt;
 smtpd_use_tls = yes&lt;br /&gt;
 smtpd_sasl_auth_enable = yes&lt;br /&gt;
 smtpd_sasl_security_options = noanonymous&lt;br /&gt;
 smtpd_sasl_local_domain =&lt;br /&gt;
 broken_sasl_auth_clients = yes&lt;br /&gt;
&lt;br /&gt;
Anything extra in the directory below I put into the deactivated directory I created.&lt;br /&gt;
 # ls /usr/local/lib/sasl2/&lt;br /&gt;
 deactivated             libdigestmd5.so.2       libplain.so.2&lt;br /&gt;
 libcrammd5.a            liblogin.a              libsasldb.a&lt;br /&gt;
 libcrammd5.so           liblogin.so             libsasldb.so&lt;br /&gt;
 libcrammd5.so.2         liblogin.so.2           libsasldb.so.2&lt;br /&gt;
 libdigestmd5.a          libplain.a              smtpd.conf&lt;br /&gt;
 libdigestmd5.so         libplain.so&lt;br /&gt;
&lt;br /&gt;
rc.conf:&lt;br /&gt;
 saslauthd_enable=&amp;quot;YES&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In my case, I used the .pem file I had for imapd. You may have to generate on using mkimapdcert if you don&#039;t have [[variables|$file]].pem on your server.&lt;br /&gt;
And finally, start everything up.&lt;br /&gt;
 #  /usr/local/etc/rc.d/saslauthd.sh start&lt;br /&gt;
 # postfix reload&lt;br /&gt;
&lt;br /&gt;
Now &lt;br /&gt;
&lt;br /&gt;
 # tail -f /var/log/maillog&lt;br /&gt;
&lt;br /&gt;
and try to use TLS &amp;amp; SMTP AUTH with your email client, watching the logs.&lt;br /&gt;
&lt;br /&gt;
== OpenBSD and TLS/SASL ==&lt;br /&gt;
&lt;br /&gt;
I just configured this on my BSD and it seems to work.&lt;br /&gt;
A [[tcpdump]] showed that this works encrypted over the&lt;br /&gt;
wire. I had to relax the strictness with [[TLS]] because&lt;br /&gt;
my provider&#039;s authorized certificate doesn&#039;t match&lt;br /&gt;
with the hostname or something.&lt;br /&gt;
&lt;br /&gt;
Building from ports was like this&lt;br /&gt;
&lt;br /&gt;
 # cd /usr/ports/mail/postfix&lt;br /&gt;
 # cd snapshot&lt;br /&gt;
 # env FLAVOR=sasl2 make install&lt;br /&gt;
&lt;br /&gt;
that should build this.  My configuration looks like&lt;br /&gt;
this somewhat...:&lt;br /&gt;
&lt;br /&gt;
 # generic mailer stuff&lt;br /&gt;
 smtp_generic_maps = hash:/etc/postfix/generic&lt;br /&gt;
 # sasl stuff&lt;br /&gt;
 broken_sasl_auth_clients = no&lt;br /&gt;
 lmtp_sasl_auth_enable = no&lt;br /&gt;
 lmtp_sasl_security_options = noplaintext, noanonymous&lt;br /&gt;
 lmtp_sasl_tls_security_options = $lmtp_sasl_security_options&lt;br /&gt;
 lmtp_sasl_tls_verified_security_options = $lmtp_sasl_tls_security_options&lt;br /&gt;
 lmtp_sasl_type = cyrus&lt;br /&gt;
 smtp_sasl_auth_enable = yes&lt;br /&gt;
 smtp_sasl_password_maps =  hash:/etc/postfix/sasl_passwd &lt;br /&gt;
 smtp_sasl_security_options = noplaintext, noanonymous&lt;br /&gt;
 smtp_sasl_tls_security_options = $smtp_sasl_security_options&lt;br /&gt;
 smtp_sasl_tls_verified_security_options = $smtp_sasl_tls_security_options&lt;br /&gt;
 smtp_sasl_type = cyrus&lt;br /&gt;
 smtpd_sasl_auth_enable = no&lt;br /&gt;
 smtpd_sasl_authenticated_header = no&lt;br /&gt;
 smtpd_sasl_path = smtpd&lt;br /&gt;
 smtpd_sasl_security_options = noanonymous&lt;br /&gt;
 smtpd_sasl_tls_security_options =  $smtpd_sasl_security_options&lt;br /&gt;
 smtpd_sasl_type = cyrus&lt;br /&gt;
 smtp_enforce_tls = yes&lt;br /&gt;
 smtp_sasl_tls_security_options =  $smtp_sasl_security_options&lt;br /&gt;
 smtp_sasl_tls_verified_security_options = $smtp_sasl_tls_security_options&lt;br /&gt;
 smtp_starttls_timeout = 300s&lt;br /&gt;
 smtp_tls_dkey_file = $smtp_tls_dcert_file&lt;br /&gt;
 smtp_tls_enforce_peername = yes&lt;br /&gt;
 smtp_tls_key_file = $smtp_tls_cert_file&lt;br /&gt;
 smtp_tls_loglevel = 2&lt;br /&gt;
 smtp_tls_mandatory_ciphers = medium&lt;br /&gt;
 smtp_tls_mandatory_protocols = SSLv3, TLSv1&lt;br /&gt;
 smtp_tls_note_starttls_offer = no&lt;br /&gt;
 smtp_tls_scert_verifydepth = 5&lt;br /&gt;
 smtp_tls_secure_cert_match = nexthop, dot-nexthop&lt;br /&gt;
 smtp_tls_security_level = encrypt&lt;br /&gt;
 smtp_tls_session_cache_timeout = 3600s&lt;br /&gt;
 smtp_tls_verify_cert_match = hostname&lt;br /&gt;
 smtp_use_tls = yes&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== submission ==&lt;br /&gt;
&lt;br /&gt;
If you want to follow the [[RFC]], or if your [[ISP]] blocks port 25, you might want to have [[ports|port]] 587 available for [[SMTP]]. &lt;br /&gt;
This is trivial in postfix. Remove the # in master.cf:&lt;br /&gt;
 submission inet n       -       n       -       -       smtpd&lt;br /&gt;
and restart postfix&lt;br /&gt;
&lt;br /&gt;
 # postfix reload&lt;br /&gt;
&lt;br /&gt;
and now you should have both [[ports]] 25 and 587 listening.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Postfix&amp;diff=5694</id>
		<title>Postfix</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Postfix&amp;diff=5694"/>
		<updated>2019-06-06T07:09:43Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.postfix.org Postfix] is Wietse Venema&#039;s sendmail alternative that attempts to be fast, easy to administer, and secure, while at the same time being sendmail compatible enough to not upset existing users.&lt;br /&gt;
&lt;br /&gt;
[[Postfix:pmm]] is our shell script to review Postfix maillog.&lt;br /&gt;
[[Postfix:main.cf]] contains additional ideas for your main.cf&lt;br /&gt;
[[Spf]] is how to create SPF records&lt;br /&gt;
&lt;br /&gt;
== FreeBSD and TLS/SASL ==&lt;br /&gt;
&lt;br /&gt;
Ignore the version numbers, the port names are what is important.&lt;br /&gt;
 # pkg_info | egrep &#039;(postfix|sasl)&#039;&lt;br /&gt;
 cyrus-sasl-2.1.21_1 RFC 2222 SASL (Simple Authentication and Security Layer)&lt;br /&gt;
 cyrus-sasl-saslauthd-2.1.21 SASL authentication server for cyrus-sasl2&lt;br /&gt;
 postfix-2.2.6,1     A secure alternative to widely-used Sendmail&lt;br /&gt;
&lt;br /&gt;
postfix:main.cf:&lt;br /&gt;
 smtpd_use_tls = yes&lt;br /&gt;
 smtpd_sasl_auth_enable = yes&lt;br /&gt;
 smtpd_sasl_security_options = noanonymous&lt;br /&gt;
 smtpd_sasl_local_domain =&lt;br /&gt;
 broken_sasl_auth_clients = yes&lt;br /&gt;
&lt;br /&gt;
Anything extra in the directory below I put into the deactivated directory I created.&lt;br /&gt;
 # ls /usr/local/lib/sasl2/&lt;br /&gt;
 deactivated             libdigestmd5.so.2       libplain.so.2&lt;br /&gt;
 libcrammd5.a            liblogin.a              libsasldb.a&lt;br /&gt;
 libcrammd5.so           liblogin.so             libsasldb.so&lt;br /&gt;
 libcrammd5.so.2         liblogin.so.2           libsasldb.so.2&lt;br /&gt;
 libdigestmd5.a          libplain.a              smtpd.conf&lt;br /&gt;
 libdigestmd5.so         libplain.so&lt;br /&gt;
&lt;br /&gt;
rc.conf:&lt;br /&gt;
 saslauthd_enable=&amp;quot;YES&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In my case, I used the .pem file I had for imapd. You may have to generate on using mkimapdcert if you don&#039;t have [[variables|$file]].pem on your server.&lt;br /&gt;
And finally, start everything up.&lt;br /&gt;
 #  /usr/local/etc/rc.d/saslauthd.sh start&lt;br /&gt;
 # postfix reload&lt;br /&gt;
&lt;br /&gt;
Now &lt;br /&gt;
&lt;br /&gt;
 # tail -f /var/log/maillog&lt;br /&gt;
&lt;br /&gt;
and try to use TLS &amp;amp; SMTP AUTH with your email client, watching the logs.&lt;br /&gt;
&lt;br /&gt;
== OpenBSD and TLS/SASL ==&lt;br /&gt;
&lt;br /&gt;
I just configured this on my BSD and it seems to work.&lt;br /&gt;
A [[tcpdump]] showed that this works encrypted over the&lt;br /&gt;
wire. I had to relax the strictness with [[TLS]] because&lt;br /&gt;
my provider&#039;s authorized certificate doesn&#039;t match&lt;br /&gt;
with the hostname or something.&lt;br /&gt;
&lt;br /&gt;
Building from ports was like this&lt;br /&gt;
&lt;br /&gt;
 # cd /usr/ports/mail/postfix&lt;br /&gt;
 # cd snapshot&lt;br /&gt;
 # env FLAVOR=sasl2 make install&lt;br /&gt;
&lt;br /&gt;
that should build this.  My configuration looks like&lt;br /&gt;
this somewhat...:&lt;br /&gt;
&lt;br /&gt;
 # generic mailer stuff&lt;br /&gt;
 smtp_generic_maps = hash:/etc/postfix/generic&lt;br /&gt;
 # sasl stuff&lt;br /&gt;
 broken_sasl_auth_clients = no&lt;br /&gt;
 lmtp_sasl_auth_enable = no&lt;br /&gt;
 lmtp_sasl_security_options = noplaintext, noanonymous&lt;br /&gt;
 lmtp_sasl_tls_security_options = $lmtp_sasl_security_options&lt;br /&gt;
 lmtp_sasl_tls_verified_security_options = $lmtp_sasl_tls_security_options&lt;br /&gt;
 lmtp_sasl_type = cyrus&lt;br /&gt;
 smtp_sasl_auth_enable = yes&lt;br /&gt;
 smtp_sasl_password_maps =  hash:/etc/postfix/sasl_passwd &lt;br /&gt;
 smtp_sasl_security_options = noplaintext, noanonymous&lt;br /&gt;
 smtp_sasl_tls_security_options = $smtp_sasl_security_options&lt;br /&gt;
 smtp_sasl_tls_verified_security_options = $smtp_sasl_tls_security_options&lt;br /&gt;
 smtp_sasl_type = cyrus&lt;br /&gt;
 smtpd_sasl_auth_enable = no&lt;br /&gt;
 smtpd_sasl_authenticated_header = no&lt;br /&gt;
 smtpd_sasl_path = smtpd&lt;br /&gt;
 smtpd_sasl_security_options = noanonymous&lt;br /&gt;
 smtpd_sasl_tls_security_options =  $smtpd_sasl_security_options&lt;br /&gt;
 smtpd_sasl_type = cyrus&lt;br /&gt;
 smtp_enforce_tls = yes&lt;br /&gt;
 smtp_sasl_tls_security_options =  $smtp_sasl_security_options&lt;br /&gt;
 smtp_sasl_tls_verified_security_options = $smtp_sasl_tls_security_options&lt;br /&gt;
 smtp_starttls_timeout = 300s&lt;br /&gt;
 smtp_tls_dkey_file = $smtp_tls_dcert_file&lt;br /&gt;
 smtp_tls_enforce_peername = yes&lt;br /&gt;
 smtp_tls_key_file = $smtp_tls_cert_file&lt;br /&gt;
 smtp_tls_loglevel = 2&lt;br /&gt;
 smtp_tls_mandatory_ciphers = medium&lt;br /&gt;
 smtp_tls_mandatory_protocols = SSLv3, TLSv1&lt;br /&gt;
 smtp_tls_note_starttls_offer = no&lt;br /&gt;
 smtp_tls_scert_verifydepth = 5&lt;br /&gt;
 smtp_tls_secure_cert_match = nexthop, dot-nexthop&lt;br /&gt;
 smtp_tls_security_level = encrypt&lt;br /&gt;
 smtp_tls_session_cache_timeout = 3600s&lt;br /&gt;
 smtp_tls_verify_cert_match = hostname&lt;br /&gt;
 smtp_use_tls = yes&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== submission ==&lt;br /&gt;
&lt;br /&gt;
If you want to follow the [[RFC]], or if your [[ISP]] blocks port 25, you might want to have [[ports|port]] 587 available for [[SMTP]]. &lt;br /&gt;
This is trivial in postfix. Remove the # in master.cf:&lt;br /&gt;
 submission inet n       -       n       -       -       smtpd&lt;br /&gt;
and restart postfix&lt;br /&gt;
&lt;br /&gt;
 # postfix reload&lt;br /&gt;
&lt;br /&gt;
and now you should have both [[ports]] 25 and 587 listening.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Spf&amp;diff=5693</id>
		<title>Spf</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Spf&amp;diff=5693"/>
		<updated>2019-06-06T07:09:08Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot;If you run a mail server, you likely want to setup spf and DKIM.  For SPF, edit your DNS records and create a TXT record for your domain that says:   v=spf1 a mx ip4:1.1.1.1 -...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you run a mail server, you likely want to setup spf and DKIM.&lt;br /&gt;
&lt;br /&gt;
For SPF, edit your DNS records and create a TXT record for your domain that says:&lt;br /&gt;
&lt;br /&gt;
 v=spf1 a mx ip4:1.1.1.1 -all&lt;br /&gt;
&lt;br /&gt;
Replace 1.1.1.1 with the IP address of your email server. Once you push the DNS, wait at least an hour and you can test it with:&lt;br /&gt;
&lt;br /&gt;
 $ nslookup -type=txt example.com&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
 $ dig example.com txt&lt;br /&gt;
&lt;br /&gt;
replacing example.com with your domain name.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Main_Page&amp;diff=5692</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Main_Page&amp;diff=5692"/>
		<updated>2019-06-05T18:57:19Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;87%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;4&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td rowspan=&amp;quot;2&amp;quot; width=&amp;quot;56%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#d7e7fa&amp;quot; style=&amp;quot;border:1px solid #CEDEF4; padding:1em;padding-top:0.2em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
The rough idea for this site was to create and provide answers to commonly asked questions and those that aren&#039;t currently answered online. It is maintained by hackers. If you do not understand a term, look it up at [http://www.wikipedia.org Wikipedia].  If you&#039;ve come here to find answers or examples, hopefully you will find them.  If you have an answer or example, we hope that you will leave those as well. Accounts are free, the only reason we require an email address to register here is to prevent the spam bots from hitting our site. &lt;br /&gt;
&lt;br /&gt;
Ideally everything recommended here is free, open source, and works on most operating systems. If you see a page that you could make easier to understand for most readers, or would like to create one that follows this philosophy, please help us out, accounts are free!&lt;br /&gt;
&lt;br /&gt;
You may have also been sent here because you&#039;re new to the [[internet]], or would like to learn the etiquette.&lt;br /&gt;
&lt;br /&gt;
A few pages to get you started:&lt;br /&gt;
               &lt;br /&gt;
*[[Manual]]&lt;br /&gt;
*[[Socket]]&lt;br /&gt;
*[[Cider]]&lt;br /&gt;
*[[Bytes]]&lt;br /&gt;
*[[Satellites]]&lt;br /&gt;
&lt;br /&gt;
As of June 5, 2019, we have surpassed over 9.5 million successful web requests, and we&#039;re on track to surpass 10mm before the end of 2019!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td width=&amp;quot;24%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#e7f7e7&amp;quot; style=&amp;quot;border:1px solid #BAD0EF; padding: 1em; padding-top: 0.5em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Major Categories&#039;&#039;&#039;&lt;br /&gt;
{{MajorCategories}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please see [http://meta.wikipedia.org/wiki/MediaWiki_i18n documentation on customizing the interface]&lt;br /&gt;
and the [http://meta.wikipedia.org/wiki/MediaWiki_User&#039;s_Guide User&#039;s Guide] for usage and configuration help.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Main_Page&amp;diff=5691</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Main_Page&amp;diff=5691"/>
		<updated>2019-06-05T18:56:15Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As of June 5, 2019, we have surpassed over 9.5 million successful web requests! Thanks! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;87%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;4&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td rowspan=&amp;quot;2&amp;quot; width=&amp;quot;56%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#d7e7fa&amp;quot; style=&amp;quot;border:1px solid #CEDEF4; padding:1em;padding-top:0.2em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
The rough idea for this site was to create and provide answers to commonly asked questions and those that aren&#039;t currently answered online. It is maintained by hackers. If you do not understand a term, look it up at [http://www.wikipedia.org Wikipedia].  If you&#039;ve come here to find answers or examples, hopefully you will find them.  If you have an answer or example, we hope that you will leave those as well. Accounts are free, the only reason we require an email address to register here is to prevent the spam bots from hitting our site. &lt;br /&gt;
&lt;br /&gt;
Ideally everything recommended here is free, open source, and works on most operating systems. If you see a page that you could make easier to understand for most readers, or would like to create one that follows this philosophy, please help us out, accounts are free!&lt;br /&gt;
&lt;br /&gt;
You may have also been sent here because you&#039;re new to the [[internet]], or would like to learn the etiquette.&lt;br /&gt;
&lt;br /&gt;
A few pages to get you started:&lt;br /&gt;
               &lt;br /&gt;
*[[Manual]]&lt;br /&gt;
*[[Socket]]&lt;br /&gt;
*[[Cider]]&lt;br /&gt;
*[[Bytes]]&lt;br /&gt;
*[[Satellites]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On December 8, 2012 we reached our first million views.  It is predicted that we&#039;ll reach&lt;br /&gt;
two million views around April 1, 2016.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td width=&amp;quot;24%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#e7f7e7&amp;quot; style=&amp;quot;border:1px solid #BAD0EF; padding: 1em; padding-top: 0.5em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Major Categories&#039;&#039;&#039;&lt;br /&gt;
{{MajorCategories}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please see [http://meta.wikipedia.org/wiki/MediaWiki_i18n documentation on customizing the interface]&lt;br /&gt;
and the [http://meta.wikipedia.org/wiki/MediaWiki_User&#039;s_Guide User&#039;s Guide] for usage and configuration help.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Osxbackups&amp;diff=5659</id>
		<title>Osxbackups</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Osxbackups&amp;diff=5659"/>
		<updated>2015-12-08T19:00:08Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page assumes you want to back up to a Ubuntu host. &lt;br /&gt;
&lt;br /&gt;
 apt-get install netatalk avahi-daemon&lt;br /&gt;
&lt;br /&gt;
Now uncomment the last line in /etc/netatalk/afpd.conf &lt;br /&gt;
&lt;br /&gt;
  - -tcp -noddp -uamlist uams_dhx2.so -nosavepassword&lt;br /&gt;
&lt;br /&gt;
Notice above I remove one of the old defaults from uamlist, this isn&#039;t needed for anything after osx 10.7.&lt;br /&gt;
&lt;br /&gt;
Now you should prepare your backup partition. In my case, I created a user called &#039;maclaptop&#039; (and thus my backup directory will be /home/maclaptop). &lt;br /&gt;
&lt;br /&gt;
Now edit /etc/netatalk/AppleVolumes.default&lt;br /&gt;
&lt;br /&gt;
 /home/maclaptop &amp;quot;OpenSource Capsule&amp;quot; cnidscheme:dbd options:usedots,upriv,tm allow:timecapsule,@maclaptop&lt;br /&gt;
&lt;br /&gt;
notice above the file entry allows the user maclaptop to ssh in. Also, you can rename &amp;quot;OpenSource Capsule&amp;quot; to what you want yours to be called. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Errors ==&lt;br /&gt;
&lt;br /&gt;
 dsi_stream_read: len:0, unexpected EOF&lt;br /&gt;
&lt;br /&gt;
Make sure the username after allow is allowed, and the path is correct.&lt;br /&gt;
&lt;br /&gt;
  timecapsule afpd[11819]: volume “TimeMachine” does not support Extended Attributes, using ea:ad instead&lt;br /&gt;
&lt;br /&gt;
You can specify these if you wish&lt;br /&gt;
&lt;br /&gt;
== Debug == &lt;br /&gt;
&lt;br /&gt;
add this to the afpd.conf file above: &lt;br /&gt;
&lt;br /&gt;
 - -tcp -noddp -uamlist uams_dhx2.so -nosavepassword  -setuplog &amp;quot;default log_maxdebug /var/log/afpd.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
warning, this will fill your disk space quickly, don&#039;t forget to remove this log entry, and empty afpd.log when done.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=User_talk:Vigeek&amp;diff=5653</id>
		<title>User talk:Vigeek</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=User_talk:Vigeek&amp;diff=5653"/>
		<updated>2015-06-26T16:48:55Z</updated>

		<summary type="html">&lt;p&gt;Franks: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Welcome to &#039;&#039;Hackepedia&#039;&#039;!&#039;&#039;&#039;&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Franks|Franks]] ([[User talk:Franks|talk]]) 09:48, 26 June 2015 (PDT)&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=User:Vigeek&amp;diff=5652</id>
		<title>User:Vigeek</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=User:Vigeek&amp;diff=5652"/>
		<updated>2015-06-26T16:48:54Z</updated>

		<summary type="html">&lt;p&gt;Franks: Creating user page for new user.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Pdf&amp;diff=5651</id>
		<title>Pdf</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Pdf&amp;diff=5651"/>
		<updated>2015-05-19T20:12:06Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot; If you need to edit a PDF document, I just came across [http://xournal.sourceforge.net/ xournal] which was really handy. In this case, I was able to insert an image of my sig...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
If you need to edit a PDF document, I just came across [http://xournal.sourceforge.net/ xournal] which was really handy. In this case, I was able to insert an image of my signature into the pdf, export it back out as a pdf, no problem. There didn&#039;t seem to be any other handy tools that did this on [[UBO]]s.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Webdav&amp;diff=5649</id>
		<title>Webdav</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Webdav&amp;diff=5649"/>
		<updated>2015-04-24T05:59:04Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot; I should have started documenting this from the beginning, but hopefully this helps. &amp;lt;pre&amp;gt;  &amp;lt;VirtualHost cal.example.com:80&amp;gt; 	ServerAdmin frank@example.com         ServerName...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
I should have started documenting this from the beginning, but hopefully this helps.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 &amp;lt;VirtualHost cal.example.com:80&amp;gt;&lt;br /&gt;
	ServerAdmin frank@example.com&lt;br /&gt;
        ServerName cal.example.com&lt;br /&gt;
	DocumentRoot /var/www/cal.example.com&lt;br /&gt;
	&amp;lt;Directory /&amp;gt;&lt;br /&gt;
		Options FollowSymLinks&lt;br /&gt;
		AllowOverride all&lt;br /&gt;
 #                Order allow,deny&lt;br /&gt;
 # This line below, allows my subnet only (which if my IP is 1.2.3.4, I used the first 3 octets)!&lt;br /&gt;
        Allow from 1.2.3&lt;br /&gt;
	&amp;lt;/Directory&amp;gt;&lt;br /&gt;
	ErrorLog ${APACHE_LOG_DIR}/webdav.error.log&lt;br /&gt;
	# Possible values include: debug, info, notice, warn, error, crit,&lt;br /&gt;
	# alert, emerg.&lt;br /&gt;
	LogLevel warn&lt;br /&gt;
	CustomLog ${APACHE_LOG_DIR}/webdav.access.log combined&lt;br /&gt;
        Alias /webdav /var/www/cal.example.com/webdav&lt;br /&gt;
       &amp;lt;Location /webdav&amp;gt;&lt;br /&gt;
           Dav On&lt;br /&gt;
           AuthType Basic&lt;br /&gt;
           AuthName &amp;quot;webdav&amp;quot;&lt;br /&gt;
           AuthUserFile /var/www/cal.example.com/passwd.dav&lt;br /&gt;
           Require valid-user&lt;br /&gt;
       &amp;lt;/Location&amp;gt;&lt;br /&gt;
 &amp;lt;/VirtualHost&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In your apache logs, if you see: &lt;br /&gt;
&lt;br /&gt;
  (13)Permission denied: An error occurred while opening a resource.  [500, #0]&lt;br /&gt;
&lt;br /&gt;
then make sure this matches (apache needs write permissions to the webdav directory!)&lt;br /&gt;
&lt;br /&gt;
 webdav$ ls -la&lt;br /&gt;
 total 12&lt;br /&gt;
 drwxrwxr-x 2 root     www-data 4096 Apr 24 05:50 .&lt;br /&gt;
 drwxr-xr-x 4 www-data www-data 4096 Apr 24 04:07 ..&lt;br /&gt;
 -rw-r--r-- 1 www-data www-data 2970 Apr 24 05:50 mycal.ics&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Dpkg&amp;diff=5648</id>
		<title>Dpkg</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Dpkg&amp;diff=5648"/>
		<updated>2015-03-29T05:36:42Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A friend told me to check the &amp;quot;menu&amp;quot; package in Debian GNU/Linux to find out how to autogenerate my [[fluxbox]] [[windowmanager]]. A quick look at the dpkg [[Manual]] shows that -L will show me what files were installed on my system from that package. In my case, I know I&#039;m looking for an application, which are usually installed in a directory that ends with bin:&lt;br /&gt;
&lt;br /&gt;
 # dpkg -L menu | grep bin/&lt;br /&gt;
 /usr/bin/update-menus&lt;br /&gt;
 /usr/bin/update-menus.real&lt;br /&gt;
 /usr/sbin/install-menu&lt;br /&gt;
 /usr/sbin/su-to-root&lt;br /&gt;
 /usr/sbin/wm-menu-config&lt;br /&gt;
 /usr/bin/install-menu&lt;br /&gt;
 /usr/bin/su-to-root&lt;br /&gt;
&lt;br /&gt;
Lucky for me, when I read the first man page (update-menus) I realized this is the application I was looking for. &lt;br /&gt;
&lt;br /&gt;
To see the files a .deb file will install: &lt;br /&gt;
&lt;br /&gt;
 # dpkg-query -c [[Variables|sensors-applet.deb]]&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Encfs&amp;diff=5647</id>
		<title>Encfs</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Encfs&amp;diff=5647"/>
		<updated>2015-03-09T20:34:35Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== on [[osx]] ==&lt;br /&gt;
&lt;br /&gt;
You will need [http://brew.sh brew] and [https://osxfuse.github.io/ osxfuse] installed. Once you have them installed, run the following in Applications/Utilities/Terminal: &lt;br /&gt;
&lt;br /&gt;
 $ brew install encfs &lt;br /&gt;
&lt;br /&gt;
This will take some time, as it downloads all of your dependencies. Now to create your first encrypted directory. The encrypted data will be stored in .crypt, and when you mount it, it will be ~/crypt in your home directory. You could replace ~/.crypt with ~/Dropbox/Private to store your encrypted drive on Dropbox. &lt;br /&gt;
&lt;br /&gt;
 $ encfs ~/.crypt ~/crypt&lt;br /&gt;
&lt;br /&gt;
To umount it, make sure you&#039;re not in the directory (~/crypt in the above example) and: &lt;br /&gt;
&lt;br /&gt;
 $ umount ~/crypt&lt;br /&gt;
&lt;br /&gt;
You can mount it elsewhere later if you wish: &lt;br /&gt;
&lt;br /&gt;
 $ encfs ~/.crypt ~/newcryptdir&lt;br /&gt;
&lt;br /&gt;
== errors ==&lt;br /&gt;
&lt;br /&gt;
You may get the error: &lt;br /&gt;
 $ encfs ~/.crypt ~/crypt&lt;br /&gt;
 dyld: Library not loaded: /usr/local/opt/gettext/lib/libintl.8.dylib&lt;br /&gt;
  Referenced from: /usr/local/bin/encfs&lt;br /&gt;
  Reason: image not found&lt;br /&gt;
 Trace/BPT trap: 5&lt;br /&gt;
&lt;br /&gt;
If you get this error, install gettext and you should be OK:&lt;br /&gt;
 $ brew install gettext&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Encfs&amp;diff=5646</id>
		<title>Encfs</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Encfs&amp;diff=5646"/>
		<updated>2015-03-09T20:32:37Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== on [[osx]] ==&lt;br /&gt;
&lt;br /&gt;
You will need [http://brew.sh brew] installed.&lt;br /&gt;
&lt;br /&gt;
 $ brew install encfs &lt;br /&gt;
&lt;br /&gt;
This will take some time, as it downloads all of your dependencies. Now to create your first encrypted directory. The encrypted data will be stored in .crypt, and when you mount it, it will be ~/crypt in your home directory. You could replace ~/.crypt with ~/Dropbox/Private to store your encrypted drive on Dropbox. &lt;br /&gt;
&lt;br /&gt;
 $ encfs ~/.crypt ~/crypt&lt;br /&gt;
&lt;br /&gt;
To umount it, make sure you&#039;re not in the directory (~/crypt in the above example) and: &lt;br /&gt;
&lt;br /&gt;
 $ umount ~/crypt&lt;br /&gt;
&lt;br /&gt;
You can mount it elsewhere later if you wish: &lt;br /&gt;
&lt;br /&gt;
 $ encfs ~/.crypt ~/newcryptdir&lt;br /&gt;
&lt;br /&gt;
== errors ==&lt;br /&gt;
&lt;br /&gt;
You may get the error: &lt;br /&gt;
 $ encfs ~/.crypt ~/crypt&lt;br /&gt;
 dyld: Library not loaded: /usr/local/opt/gettext/lib/libintl.8.dylib&lt;br /&gt;
  Referenced from: /usr/local/bin/encfs&lt;br /&gt;
  Reason: image not found&lt;br /&gt;
 Trace/BPT trap: 5&lt;br /&gt;
&lt;br /&gt;
If you get this error, install gettext and you should be OK:&lt;br /&gt;
 $ brew install gettext&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Osx&amp;diff=5645</id>
		<title>Osx</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Osx&amp;diff=5645"/>
		<updated>2015-02-26T08:19:22Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[osxbackups]]&lt;br /&gt;
* Encrypt directories with [[encfs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shortcuts ==&lt;br /&gt;
&lt;br /&gt;
* Hold down &amp;quot;d&amp;quot; on boot to do a hardware test&lt;br /&gt;
* Hold down alt/option on boot to boot into safe mode&lt;br /&gt;
* Hold down apple + &amp;quot;s&amp;quot; on boot for single user mode&lt;br /&gt;
* Hold down apple + &amp;quot;v&amp;quot; on boot for verbose mode&lt;br /&gt;
* Command + Control + Power also brings one into single user mode&lt;br /&gt;
&lt;br /&gt;
== dynamic_paging ==&lt;br /&gt;
&lt;br /&gt;
I noticed on my MacBook Air that after a few weeks I would run out of diskspace, without downloading anything, forcing me to reboot. Before I did, I checked /tmp and nothing looked large enough. Bryan F from [yh] pointed out &amp;quot;man dynamic_pager&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 $ ls -la /private/var/vm/swapfile&lt;br /&gt;
 $ sysctl vm.swapusage&lt;br /&gt;
&lt;br /&gt;
I noticed gigs worth of files! At your own risk: &lt;br /&gt;
&lt;br /&gt;
 $ sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.dynamic_pager.plist&lt;br /&gt;
&lt;br /&gt;
and reboot. After reboot, sysctl vm.swapusage shows 0 and /private/var/vm/swapfile is empty. replace &amp;quot;unload&amp;quot; with &amp;quot;load&amp;quot; above to revert to default.&lt;br /&gt;
&lt;br /&gt;
== Make application default ==&lt;br /&gt;
&lt;br /&gt;
When trying to open video files, I noticed that it defaults to Quicktime, and I wanted it to default to VLC. With no obvious way to delete quicktime, I wasn&#039;t sure what to do. While I tried to setup &amp;quot;Always open with&amp;quot; and pick VLC, that didn&#039;t seem to work. In the end, I discovered you need to right click on the file then&lt;br /&gt;
&lt;br /&gt;
 Get Info -&amp;gt; Open With (Choose VLC) and then click &amp;quot;Change all...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Re-install ==&lt;br /&gt;
&lt;br /&gt;
Do this at your own risk, and after backups. These steps worked on a MacBook Air with OSX Lion 10.8!&lt;br /&gt;
* Install [http://blog.gete.net/lion-diskmaker-us/ Diskmaker 2]&lt;br /&gt;
* Using the App Store, download the InstallESD.dmg&lt;br /&gt;
* Follow the steps in Diskmaker 2 and install the image on an 8G USB stick&lt;br /&gt;
* Reboot holding down the ALT key, choose the USB stick as the boot device&lt;br /&gt;
* Choose Disk Utility, and Erase the main partition/image&lt;br /&gt;
* Close Disk Utility and Install OSX&lt;br /&gt;
&lt;br /&gt;
== Format a disk on the command line == &lt;br /&gt;
&lt;br /&gt;
In Terminal (Applications -&amp;gt; Utilities) on the command line type:&lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
will show you all of the disks. In my case, disk1 is the one I want to erase and format:&lt;br /&gt;
&lt;br /&gt;
 diskutil eraseDisk HFS+ UntitledUFS disk1&lt;br /&gt;
&lt;br /&gt;
== dd an .iso ==&lt;br /&gt;
&lt;br /&gt;
Instead of using Disk utility, I find it easier to simply dd your iso to a USB stick. Find out what your USB stick device is. &lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
then I added the USB stick and ran the same command. Under the IDENTIFIER column it will show you the name, in my case disk1. Make sure it&#039;s unmounted: &lt;br /&gt;
&lt;br /&gt;
 diskutil umount /dev/disk1&lt;br /&gt;
&lt;br /&gt;
then&lt;br /&gt;
&lt;br /&gt;
  sudo dd if=&amp;quot;[[Variables|mydiskimage.iso]]&amp;quot; of=/dev/disk1&lt;br /&gt;
&lt;br /&gt;
and then patiently wait. When it&#039;s done, if the numbers match for input and output, you should be good to go!&lt;br /&gt;
&lt;br /&gt;
== Wifi spots in range from the command line ==&lt;br /&gt;
&lt;br /&gt;
Add airport to your path: &lt;br /&gt;
&lt;br /&gt;
 sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport&lt;br /&gt;
&lt;br /&gt;
To see a list of the nearby wifi spots from a broadcast scan: &lt;br /&gt;
&lt;br /&gt;
 airport -s &lt;br /&gt;
&lt;br /&gt;
Your current wireless status: &lt;br /&gt;
&lt;br /&gt;
 airport -I&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Encfs&amp;diff=5644</id>
		<title>Encfs</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Encfs&amp;diff=5644"/>
		<updated>2015-02-26T08:18:36Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== on [[osx]] ==&lt;br /&gt;
&lt;br /&gt;
You will need [http://brew.sh brew] installed.&lt;br /&gt;
&lt;br /&gt;
 $ brew install encfs &lt;br /&gt;
&lt;br /&gt;
This will take some time, as it downloads all of your dependencies. Now to create your first encrypted directory. The encrypted data will be stored in .crypt, and when you mount it, it will be ~/crypt in your home directory. You could replace ~/.crypt with ~/Dropbox/Private to store your encrypted drive on Dropbox. &lt;br /&gt;
&lt;br /&gt;
 $ encfs ~/.crypt ~/crypt&lt;br /&gt;
&lt;br /&gt;
To umount it, make sure you&#039;re not in the directory (~/crypt in the above example) and: &lt;br /&gt;
&lt;br /&gt;
 $ umount ~/crypt&lt;br /&gt;
&lt;br /&gt;
You can mount it elsewhere later if you wish: &lt;br /&gt;
&lt;br /&gt;
 $ encfs ~/.crypt ~/newcryptdir&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Encfs&amp;diff=5643</id>
		<title>Encfs</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Encfs&amp;diff=5643"/>
		<updated>2015-02-25T21:19:47Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot; == on osx ==  You will need [http://brew.sh brew] installed.   $ brew install encfs   This will take some time, as it downloads all of your dependencies. Now to create yo...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== on [[osx]] ==&lt;br /&gt;
&lt;br /&gt;
You will need [http://brew.sh brew] installed.&lt;br /&gt;
&lt;br /&gt;
 $ brew install encfs &lt;br /&gt;
&lt;br /&gt;
This will take some time, as it downloads all of your dependencies. Now to create your first encrypted directory. The encrypted data will be stored in .crypt, and when you mount it, it will be ~/crypt in your home directory. &lt;br /&gt;
&lt;br /&gt;
 $ encfs ~/.crypt ~/crypt&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Sitesupport-url&amp;diff=5642</id>
		<title>Sitesupport-url</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Sitesupport-url&amp;diff=5642"/>
		<updated>2015-02-17T20:12:38Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Monday Oct 13, 2014: Upgraded licence from Attribution 2.0 Canada to Attribution 2.5 Canada - Creative Commons.&lt;br /&gt;
&lt;br /&gt;
Feb 17, 2015: Upgraded to Mediawiki 1.24.1&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Osx&amp;diff=5641</id>
		<title>Osx</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Osx&amp;diff=5641"/>
		<updated>2015-01-23T23:46:03Z</updated>

		<summary type="html">&lt;p&gt;Franks: /* Wifi spots in range from the command line */  case sensitivity&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[osxbackups]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shortcuts ==&lt;br /&gt;
&lt;br /&gt;
* Hold down &amp;quot;d&amp;quot; on boot to do a hardware test&lt;br /&gt;
* Hold down alt/option on boot to boot into safe mode&lt;br /&gt;
* Hold down apple + &amp;quot;s&amp;quot; on boot for single user mode&lt;br /&gt;
* Hold down apple + &amp;quot;v&amp;quot; on boot for verbose mode&lt;br /&gt;
* Command + Control + Power also brings one into single user mode&lt;br /&gt;
&lt;br /&gt;
== dynamic_paging ==&lt;br /&gt;
&lt;br /&gt;
I noticed on my MacBook Air that after a few weeks I would run out of diskspace, without downloading anything, forcing me to reboot. Before I did, I checked /tmp and nothing looked large enough. Bryan F from [yh] pointed out &amp;quot;man dynamic_pager&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 $ ls -la /private/var/vm/swapfile&lt;br /&gt;
 $ sysctl vm.swapusage&lt;br /&gt;
&lt;br /&gt;
I noticed gigs worth of files! At your own risk: &lt;br /&gt;
&lt;br /&gt;
 $ sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.dynamic_pager.plist&lt;br /&gt;
&lt;br /&gt;
and reboot. After reboot, sysctl vm.swapusage shows 0 and /private/var/vm/swapfile is empty. replace &amp;quot;unload&amp;quot; with &amp;quot;load&amp;quot; above to revert to default.&lt;br /&gt;
&lt;br /&gt;
== Make application default ==&lt;br /&gt;
&lt;br /&gt;
When trying to open video files, I noticed that it defaults to Quicktime, and I wanted it to default to VLC. With no obvious way to delete quicktime, I wasn&#039;t sure what to do. While I tried to setup &amp;quot;Always open with&amp;quot; and pick VLC, that didn&#039;t seem to work. In the end, I discovered you need to right click on the file then&lt;br /&gt;
&lt;br /&gt;
 Get Info -&amp;gt; Open With (Choose VLC) and then click &amp;quot;Change all...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Re-install ==&lt;br /&gt;
&lt;br /&gt;
Do this at your own risk, and after backups. These steps worked on a MacBook Air with OSX Lion 10.8!&lt;br /&gt;
* Install [http://blog.gete.net/lion-diskmaker-us/ Diskmaker 2]&lt;br /&gt;
* Using the App Store, download the InstallESD.dmg&lt;br /&gt;
* Follow the steps in Diskmaker 2 and install the image on an 8G USB stick&lt;br /&gt;
* Reboot holding down the ALT key, choose the USB stick as the boot device&lt;br /&gt;
* Choose Disk Utility, and Erase the main partition/image&lt;br /&gt;
* Close Disk Utility and Install OSX&lt;br /&gt;
&lt;br /&gt;
== Format a disk on the command line == &lt;br /&gt;
&lt;br /&gt;
In Terminal (Applications -&amp;gt; Utilities) on the command line type:&lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
will show you all of the disks. In my case, disk1 is the one I want to erase and format:&lt;br /&gt;
&lt;br /&gt;
 diskutil eraseDisk HFS+ UntitledUFS disk1&lt;br /&gt;
&lt;br /&gt;
== dd an .iso ==&lt;br /&gt;
&lt;br /&gt;
Instead of using Disk utility, I find it easier to simply dd your iso to a USB stick. Find out what your USB stick device is. &lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
then I added the USB stick and ran the same command. Under the IDENTIFIER column it will show you the name, in my case disk1. Make sure it&#039;s unmounted: &lt;br /&gt;
&lt;br /&gt;
 diskutil umount /dev/disk1&lt;br /&gt;
&lt;br /&gt;
then&lt;br /&gt;
&lt;br /&gt;
  sudo dd if=&amp;quot;[[Variables|mydiskimage.iso]]&amp;quot; of=/dev/disk1&lt;br /&gt;
&lt;br /&gt;
and then patiently wait. When it&#039;s done, if the numbers match for input and output, you should be good to go!&lt;br /&gt;
&lt;br /&gt;
== Wifi spots in range from the command line ==&lt;br /&gt;
&lt;br /&gt;
Add airport to your path: &lt;br /&gt;
&lt;br /&gt;
 sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport&lt;br /&gt;
&lt;br /&gt;
To see a list of the nearby wifi spots from a broadcast scan: &lt;br /&gt;
&lt;br /&gt;
 airport -s &lt;br /&gt;
&lt;br /&gt;
Your current wireless status: &lt;br /&gt;
&lt;br /&gt;
 airport -I&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Osx&amp;diff=5640</id>
		<title>Osx</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Osx&amp;diff=5640"/>
		<updated>2015-01-23T20:54:42Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[osxbackups]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shortcuts ==&lt;br /&gt;
&lt;br /&gt;
* Hold down &amp;quot;d&amp;quot; on boot to do a hardware test&lt;br /&gt;
* Hold down alt/option on boot to boot into safe mode&lt;br /&gt;
* Hold down apple + &amp;quot;s&amp;quot; on boot for single user mode&lt;br /&gt;
* Hold down apple + &amp;quot;v&amp;quot; on boot for verbose mode&lt;br /&gt;
* Command + Control + Power also brings one into single user mode&lt;br /&gt;
&lt;br /&gt;
== dynamic_paging ==&lt;br /&gt;
&lt;br /&gt;
I noticed on my MacBook Air that after a few weeks I would run out of diskspace, without downloading anything, forcing me to reboot. Before I did, I checked /tmp and nothing looked large enough. Bryan F from [yh] pointed out &amp;quot;man dynamic_pager&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 $ ls -la /private/var/vm/swapfile&lt;br /&gt;
 $ sysctl vm.swapusage&lt;br /&gt;
&lt;br /&gt;
I noticed gigs worth of files! At your own risk: &lt;br /&gt;
&lt;br /&gt;
 $ sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.dynamic_pager.plist&lt;br /&gt;
&lt;br /&gt;
and reboot. After reboot, sysctl vm.swapusage shows 0 and /private/var/vm/swapfile is empty. replace &amp;quot;unload&amp;quot; with &amp;quot;load&amp;quot; above to revert to default.&lt;br /&gt;
&lt;br /&gt;
== Make application default ==&lt;br /&gt;
&lt;br /&gt;
When trying to open video files, I noticed that it defaults to Quicktime, and I wanted it to default to VLC. With no obvious way to delete quicktime, I wasn&#039;t sure what to do. While I tried to setup &amp;quot;Always open with&amp;quot; and pick VLC, that didn&#039;t seem to work. In the end, I discovered you need to right click on the file then&lt;br /&gt;
&lt;br /&gt;
 Get Info -&amp;gt; Open With (Choose VLC) and then click &amp;quot;Change all...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Re-install ==&lt;br /&gt;
&lt;br /&gt;
Do this at your own risk, and after backups. These steps worked on a MacBook Air with OSX Lion 10.8!&lt;br /&gt;
* Install [http://blog.gete.net/lion-diskmaker-us/ Diskmaker 2]&lt;br /&gt;
* Using the App Store, download the InstallESD.dmg&lt;br /&gt;
* Follow the steps in Diskmaker 2 and install the image on an 8G USB stick&lt;br /&gt;
* Reboot holding down the ALT key, choose the USB stick as the boot device&lt;br /&gt;
* Choose Disk Utility, and Erase the main partition/image&lt;br /&gt;
* Close Disk Utility and Install OSX&lt;br /&gt;
&lt;br /&gt;
== Format a disk on the command line == &lt;br /&gt;
&lt;br /&gt;
In Terminal (Applications -&amp;gt; Utilities) on the command line type:&lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
will show you all of the disks. In my case, disk1 is the one I want to erase and format:&lt;br /&gt;
&lt;br /&gt;
 diskutil eraseDisk HFS+ UntitledUFS disk1&lt;br /&gt;
&lt;br /&gt;
== dd an .iso ==&lt;br /&gt;
&lt;br /&gt;
Instead of using Disk utility, I find it easier to simply dd your iso to a USB stick. Find out what your USB stick device is. &lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
then I added the USB stick and ran the same command. Under the IDENTIFIER column it will show you the name, in my case disk1. Make sure it&#039;s unmounted: &lt;br /&gt;
&lt;br /&gt;
 diskutil umount /dev/disk1&lt;br /&gt;
&lt;br /&gt;
then&lt;br /&gt;
&lt;br /&gt;
  sudo dd if=&amp;quot;[[Variables|mydiskimage.iso]]&amp;quot; of=/dev/disk1&lt;br /&gt;
&lt;br /&gt;
and then patiently wait. When it&#039;s done, if the numbers match for input and output, you should be good to go!&lt;br /&gt;
&lt;br /&gt;
== Wifi spots in range from the command line ==&lt;br /&gt;
&lt;br /&gt;
Add airport to your path: &lt;br /&gt;
&lt;br /&gt;
 sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport&lt;br /&gt;
&lt;br /&gt;
To see a list of the nearby wifi spots from a broadcast scan: &lt;br /&gt;
&lt;br /&gt;
 airport -s &lt;br /&gt;
&lt;br /&gt;
Your current wireless status: &lt;br /&gt;
&lt;br /&gt;
 airport -i&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Thunderbird&amp;diff=5639</id>
		<title>Thunderbird</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Thunderbird&amp;diff=5639"/>
		<updated>2015-01-05T08:34:39Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thunderbird is a an [[MUA]]. If you&#039;ve made the change from Internet explorer to the [[Firefox]] [[browser]], you should [http://www.mozilla.com/en-US/thunderbird/ give thunderbird a try]. It also comes from Mozilla.&lt;br /&gt;
&lt;br /&gt;
== Remember your password==&lt;br /&gt;
&lt;br /&gt;
If you have to enter the password for your email account(s) every time you start Mozilla Thunderbird, you can open your prefs.js file on most [[UBO]]s&lt;br /&gt;
&lt;br /&gt;
 $ find ~ -name prefs.js | grep thunderbird&lt;br /&gt;
&lt;br /&gt;
to find the file. open it, and modify the line that says:&lt;br /&gt;
 user_pref(&amp;quot;signon.rememberSignons&amp;quot;, false);&lt;br /&gt;
and change false to true. Now start thunderbird again and you should be set.&lt;br /&gt;
&lt;br /&gt;
I had an issue where thunderbird kept showing me 3 new messages in one folder, but when I clicked on that folder, there was nothing new. The next time I looked at thunderbird, it said 3 new messages in that folder again. What I did was right click on the folder, and chose both &lt;br /&gt;
&lt;br /&gt;
 Mark Folder Read&lt;br /&gt;
 Compact This Folder&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Transition between [[Linux]] and [[Windows]] ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You will want to copy the data from: &lt;br /&gt;
(on Windows) &lt;br /&gt;
 Application Data/Thunderbird/Profiles/*&lt;br /&gt;
(If you do not see these folders in Windows explorer, you might need to change: Tools -&amp;gt; Folder options -&amp;gt; View -&amp;gt; Show hidden files and folders)&lt;br /&gt;
to &lt;br /&gt;
(on Linux) &lt;br /&gt;
 $HOME/.thunderbird/*&lt;br /&gt;
(.thunderbird might also be .mozilla-thunderbird)&lt;br /&gt;
&lt;br /&gt;
You can also follow these steps in reverse&lt;br /&gt;
&lt;br /&gt;
I&#039;ve used * above in place of xxxxxxx.default/, this is the directory you want to copy over. Before starting thunderbird on the other system, &lt;br /&gt;
change profiles.ini from&lt;br /&gt;
&lt;br /&gt;
 IsRelative=1 to IsRelative=0&lt;br /&gt;
and &lt;br /&gt;
  Path=Profiles/xxxxxx.default to Path=/home/you/.thunderbird/xxxxxx.default&lt;br /&gt;
&lt;br /&gt;
== Transition between [[Linux]] and [[OSX]] ==&lt;br /&gt;
&lt;br /&gt;
scp -rp ~/.thunderbird on linux machine to ~/Library/Thunderbird on OSX.&lt;br /&gt;
&lt;br /&gt;
== Encryption == &lt;br /&gt;
&lt;br /&gt;
[http://enigmail.mozdev.org/home/index.php Enigmail]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[http://kb.mozillazine.org/Import_.pst_files Convert Outlook .pst files into Thunderbird]&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Screensaver&amp;diff=5637</id>
		<title>Screensaver</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Screensaver&amp;diff=5637"/>
		<updated>2014-11-12T06:52:43Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot;  == Using Gnome ==  The command that worked for me:   gnome-screensaver-command --lock  You can    gnome-control-center   and then scroll to Keyboard and click the Shortcuts...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
== Using Gnome ==&lt;br /&gt;
&lt;br /&gt;
The command that worked for me:&lt;br /&gt;
&lt;br /&gt;
 gnome-screensaver-command --lock&lt;br /&gt;
&lt;br /&gt;
You can &lt;br /&gt;
&lt;br /&gt;
 gnome-control-center &lt;br /&gt;
&lt;br /&gt;
and then scroll to Keyboard and click the Shortcuts tab. In my case, I went to Custom Shortcuts, and created one called &amp;quot;Lock my screen&amp;quot; and ran the command above with --lock. After I entered that, I clicked on the right side of the window and hit the keyboard sequence I wanted to use, to have the screen lock come on immediately, requiring a password to use the system.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Android&amp;diff=5636</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Android&amp;diff=5636"/>
		<updated>2014-11-09T01:03:34Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you have an Android phone, here is some software that might be of interest: &lt;br /&gt;
&lt;br /&gt;
== Security/Privacy ==&lt;br /&gt;
&lt;br /&gt;
*[http://keepass.info/ KeePassDroid] - Password manager that uses encryption&lt;br /&gt;
*[http://www.whispersys.com/ TextSecure] - Encrypt SMS&lt;br /&gt;
*[http://code.google.com/p/droidwall/ DroidWall] - Firewall&lt;br /&gt;
*[http://bigtincan.com/downloads/android.html AdFree Android] - Requires root, but removes all ads&lt;br /&gt;
&lt;br /&gt;
== Performance == &lt;br /&gt;
&lt;br /&gt;
* Only have wifi or GPS on while using it, turn it off asap after use.&lt;br /&gt;
&lt;br /&gt;
* [http://www.androidtapp.com/advanced-task-killer/ Advanced Task killer]&lt;br /&gt;
* [http://latedroid.com/juicedefender Juice Defender]&lt;br /&gt;
* [http://www.appbrain.com/app/juiceplotter/com.latedroid.juiceplotter Juice plotter]&lt;br /&gt;
* [http://www.appbrain.com/app/green-power-free-battery-saver/org.gpo.greenpower Green power]&lt;br /&gt;
&lt;br /&gt;
== Samsung ==&lt;br /&gt;
&lt;br /&gt;
* Kies Air from Samsung Apps (allows you to exchange content on the LAN through a web server)&lt;br /&gt;
&lt;br /&gt;
== Backup == &lt;br /&gt;
&lt;br /&gt;
You&#039;ll need adb for this. On [[Debian]] or [[Ubuntu]]: &lt;br /&gt;
 sudo apt-get install android-tools-adb&lt;br /&gt;
&lt;br /&gt;
then you&#039;ll want to make a directory to back your files up to: &lt;br /&gt;
 mkdir android-backup&lt;br /&gt;
&lt;br /&gt;
cd into that directory, and start by backing up all your installed applications: &lt;br /&gt;
&lt;br /&gt;
 adb backup -all&lt;br /&gt;
&lt;br /&gt;
and now you can also backup your internal sdcard: &lt;br /&gt;
&lt;br /&gt;
 adb pull /storage/sdcard0/ .&lt;br /&gt;
&lt;br /&gt;
The above assumes you&#039;re in android-backup, otherwise replace the . with the directory you want to backup to.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=OpenBSD&amp;diff=5634</id>
		<title>OpenBSD</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=OpenBSD&amp;diff=5634"/>
		<updated>2014-10-31T10:28:30Z</updated>

		<summary type="html">&lt;p&gt;Franks: /* Export Restrictions */ removing test&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OpenBSD is an open source Unix-like Operating System.  It is free to download, copy and modify.  It is not similar to [[Linux]] in a sense because it was based on the 4.4BSD Operating System developed at the University of California at Berkeley ([[UCB]]).  OpenBSD&#039;s mascot is [[puffy]] the Blowfish. [http://www.openbsd.org OpenBSD Project Home Page]&lt;br /&gt;
OpenBSD is written with [[C]] programming language.&lt;br /&gt;
&lt;br /&gt;
== OpenBSD 5.6 ==&lt;br /&gt;
&lt;br /&gt;
The [http://www.openbsd.org current] OpenBSD version is 5.6:&lt;br /&gt;
&lt;br /&gt;
OpenBSD&#039;s preorders for 5.6 are on:&lt;br /&gt;
&lt;br /&gt;
[http://www.openbsd.org/56.html OpenBSD 5.6 Release Page]&lt;br /&gt;
&lt;br /&gt;
This season puffy does LibreSSL.&lt;br /&gt;
&lt;br /&gt;
== Ported programs that orginated at OpenBSD ==&lt;br /&gt;
&lt;br /&gt;
* [[ssh|OpenSSH]] is a side-project of OpenBSD.  It was forked from ssh with an old version that had little license restrictions and is compatible now with ssh 2.0.&lt;br /&gt;
* [[pf]] was created at OpenBSD first (before being ported to other BSD&#039;s).  Pf stands for Packet Filter and is a layer 3+ firewall.  It was created to replace ipf.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Release Song ==&lt;br /&gt;
&lt;br /&gt;
Since release 3.0 OpenBSD has released a promotional song with its CD, it makes the project more hip this way.  The songs and their lyrics can be found [http://www.openbsd.org/lyrics.html here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hackathons ==&lt;br /&gt;
&lt;br /&gt;
Hackathons are get-togethers of the programmers of OpenBSD.  Since OpenBSD makes money by selling CD&#039;s and other merchandise, there is enough money to pay some developers travel, room and board.  At a hackathon which spans usually over a week or so the programmers do a lot of code and can help others that need some information at hand.  [http://marc.info/?l=openbsd-cvs&amp;amp;r=1&amp;amp;w=2 Marc.info] can be used to track changes to the openbsd source tree which gets updated very often during a hackathon (otherwise one can subscribe to the list through majordomo).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Export Restrictions ==&lt;br /&gt;
&lt;br /&gt;
[[FreeBSD]] recently implemented ACPI code in its implemenatation that has [http://marc.info/?l=openbsd-misc&amp;amp;m=128634319422034&amp;amp;w=2 export restrictions].  OpenBSD has no such export restrictions since the project is based in Canada which is known for its liberal export rules.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=OpenBSD&amp;diff=5633</id>
		<title>OpenBSD</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=OpenBSD&amp;diff=5633"/>
		<updated>2014-10-31T10:20:19Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OpenBSD is an open source Unix-like Operating System.  It is free to download, copy and modify.  It is not similar to [[Linux]] in a sense because it was based on the 4.4BSD Operating System developed at the University of California at Berkeley ([[UCB]]).  OpenBSD&#039;s mascot is [[puffy]] the Blowfish. [http://www.openbsd.org OpenBSD Project Home Page]&lt;br /&gt;
OpenBSD is written with [[C]] programming language.&lt;br /&gt;
&lt;br /&gt;
== OpenBSD 5.6 ==&lt;br /&gt;
&lt;br /&gt;
The [http://www.openbsd.org current] OpenBSD version is 5.6:&lt;br /&gt;
&lt;br /&gt;
OpenBSD&#039;s preorders for 5.6 are on:&lt;br /&gt;
&lt;br /&gt;
[http://www.openbsd.org/56.html OpenBSD 5.6 Release Page]&lt;br /&gt;
&lt;br /&gt;
This season puffy does LibreSSL.&lt;br /&gt;
&lt;br /&gt;
== Ported programs that orginated at OpenBSD ==&lt;br /&gt;
&lt;br /&gt;
* [[ssh|OpenSSH]] is a side-project of OpenBSD.  It was forked from ssh with an old version that had little license restrictions and is compatible now with ssh 2.0.&lt;br /&gt;
* [[pf]] was created at OpenBSD first (before being ported to other BSD&#039;s).  Pf stands for Packet Filter and is a layer 3+ firewall.  It was created to replace ipf.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Release Song ==&lt;br /&gt;
&lt;br /&gt;
Since release 3.0 OpenBSD has released a promotional song with its CD, it makes the project more hip this way.  The songs and their lyrics can be found [http://www.openbsd.org/lyrics.html here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hackathons ==&lt;br /&gt;
&lt;br /&gt;
Hackathons are get-togethers of the programmers of OpenBSD.  Since OpenBSD makes money by selling CD&#039;s and other merchandise, there is enough money to pay some developers travel, room and board.  At a hackathon which spans usually over a week or so the programmers do a lot of code and can help others that need some information at hand.  [http://marc.info/?l=openbsd-cvs&amp;amp;r=1&amp;amp;w=2 Marc.info] can be used to track changes to the openbsd source tree which gets updated very often during a hackathon (otherwise one can subscribe to the list through majordomo).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Export Restrictions ==&lt;br /&gt;
&lt;br /&gt;
[[FreeBSD]] recently implemented ACPI code in its implemenatation that has [http://marc.info/?l=openbsd-misc&amp;amp;m=128634319422034&amp;amp;w=2 export restrictions].  OpenBSD has no such export restrictions since the project is based in Canada which is known for its liberal export rules.&lt;br /&gt;
&lt;br /&gt;
testing for pbug&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=User_talk:Adnascentia&amp;diff=5631</id>
		<title>User talk:Adnascentia</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=User_talk:Adnascentia&amp;diff=5631"/>
		<updated>2014-10-25T20:47:36Z</updated>

		<summary type="html">&lt;p&gt;Franks: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Welcome to &#039;&#039;Hackepedia&#039;&#039;!&#039;&#039;&#039;&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [[https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents|help pages]].&lt;br /&gt;
Again, welcome and have fun! [[User:Franks|Franks]] ([[User talk:Franks|talk]]) 13:47, 25 October 2014 (PDT)&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=User:Adnascentia&amp;diff=5630</id>
		<title>User:Adnascentia</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=User:Adnascentia&amp;diff=5630"/>
		<updated>2014-10-25T20:47:36Z</updated>

		<summary type="html">&lt;p&gt;Franks: Creating user page for new user.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A moment of happiness,&lt;br /&gt;
you and I sitting on the verandah,&lt;br /&gt;
apparently two, but one in soul, you and I.&lt;br /&gt;
We feel the flowing water of life here,&lt;br /&gt;
you and I, with the garden’s beauty&lt;br /&gt;
and the birds singing.&lt;br /&gt;
The stars will be watching us,&lt;br /&gt;
and we will show them&lt;br /&gt;
what it is to be a thin crescent moon.&lt;br /&gt;
You and I unselfed, will be together,&lt;br /&gt;
indifferent to idle speculation, you and I.&lt;br /&gt;
The parrots of heaven will be cracking sugar&lt;br /&gt;
as we laugh together, you and I.&lt;br /&gt;
In one form upon this earth,&lt;br /&gt;
and in another form in a timeless sweet land.&lt;br /&gt;
Rumi&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Osxbackups&amp;diff=5629</id>
		<title>Osxbackups</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Osxbackups&amp;diff=5629"/>
		<updated>2014-10-20T02:41:59Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot;This page assumes you want to back up to a Ubuntu host.    apt-get install netatalk avahi-daemon  Now uncomment the last line in /etc/netatalk/afpd.conf     - -tcp -noddp -uam...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page assumes you want to back up to a Ubuntu host. &lt;br /&gt;
&lt;br /&gt;
 apt-get install netatalk avahi-daemon&lt;br /&gt;
&lt;br /&gt;
Now uncomment the last line in /etc/netatalk/afpd.conf &lt;br /&gt;
&lt;br /&gt;
  - -tcp -noddp -uamlist uams_dhx2.so -nosavepassword&lt;br /&gt;
&lt;br /&gt;
Notice above I remove one of the old defaults from uamlist, this isn&#039;t needed for anything after osx 10.7.&lt;br /&gt;
&lt;br /&gt;
Now you should prepare your backup partition. In my case, I created a user called &#039;maclaptop&#039; (and thus my backup directory will be /home/maclaptop). &lt;br /&gt;
&lt;br /&gt;
Now edit /etc/netatalk/AppleVolumes.default&lt;br /&gt;
&lt;br /&gt;
 /home/maclaptop &amp;quot;OpenSource Capsule&amp;quot; cnidscheme:dbd options:usedots,upriv,tm allow:timecapsule,@maclaptop&lt;br /&gt;
&lt;br /&gt;
notice above the file entry allows the user maclaptop to ssh in. Also, you can rename &amp;quot;OpenSource Capsule&amp;quot; to what you want yours to be called. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Errors ==&lt;br /&gt;
&lt;br /&gt;
 dsi_stream_read: len:0, unexpected EOF&lt;br /&gt;
&lt;br /&gt;
Make sure the username after allow is allowed, and the path is correct.&lt;br /&gt;
&lt;br /&gt;
  timecapsule afpd[11819]: volume “TimeMachine” does not support Extended Attributes, using ea:ad instead&lt;br /&gt;
&lt;br /&gt;
You can specify these if you wish&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Osx&amp;diff=5628</id>
		<title>Osx</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Osx&amp;diff=5628"/>
		<updated>2014-10-20T02:29:59Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[osxbackups]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shortcuts ==&lt;br /&gt;
&lt;br /&gt;
* Hold down &amp;quot;d&amp;quot; on boot to do a hardware test&lt;br /&gt;
* Hold down alt/option on boot to boot into safe mode&lt;br /&gt;
* Hold down apple + &amp;quot;s&amp;quot; on boot for single user mode&lt;br /&gt;
* Hold down apple + &amp;quot;v&amp;quot; on boot for verbose mode&lt;br /&gt;
* Command + Control + Power also brings one into single user mode&lt;br /&gt;
&lt;br /&gt;
== dynamic_paging ==&lt;br /&gt;
&lt;br /&gt;
I noticed on my MacBook Air that after a few weeks I would run out of diskspace, without downloading anything, forcing me to reboot. Before I did, I checked /tmp and nothing looked large enough. Bryan F from [yh] pointed out &amp;quot;man dynamic_pager&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 $ ls -la /private/var/vm/swapfile&lt;br /&gt;
 $ sysctl vm.swapusage&lt;br /&gt;
&lt;br /&gt;
I noticed gigs worth of files! At your own risk: &lt;br /&gt;
&lt;br /&gt;
 $ sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.dynamic_pager.plist&lt;br /&gt;
&lt;br /&gt;
and reboot. After reboot, sysctl vm.swapusage shows 0 and /private/var/vm/swapfile is empty. replace &amp;quot;unload&amp;quot; with &amp;quot;load&amp;quot; above to revert to default.&lt;br /&gt;
&lt;br /&gt;
== Make application default ==&lt;br /&gt;
&lt;br /&gt;
When trying to open video files, I noticed that it defaults to Quicktime, and I wanted it to default to VLC. With no obvious way to delete quicktime, I wasn&#039;t sure what to do. While I tried to setup &amp;quot;Always open with&amp;quot; and pick VLC, that didn&#039;t seem to work. In the end, I discovered you need to right click on the file then&lt;br /&gt;
&lt;br /&gt;
 Get Info -&amp;gt; Open With (Choose VLC) and then click &amp;quot;Change all...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Re-install ==&lt;br /&gt;
&lt;br /&gt;
Do this at your own risk, and after backups. These steps worked on a MacBook Air with OSX Lion 10.8!&lt;br /&gt;
* Install [http://blog.gete.net/lion-diskmaker-us/ Diskmaker 2]&lt;br /&gt;
* Using the App Store, download the InstallESD.dmg&lt;br /&gt;
* Follow the steps in Diskmaker 2 and install the image on an 8G USB stick&lt;br /&gt;
* Reboot holding down the ALT key, choose the USB stick as the boot device&lt;br /&gt;
* Choose Disk Utility, and Erase the main partition/image&lt;br /&gt;
* Close Disk Utility and Install OSX&lt;br /&gt;
&lt;br /&gt;
== Format a disk on the command line == &lt;br /&gt;
&lt;br /&gt;
In Terminal (Applications -&amp;gt; Utilities) on the command line type:&lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
will show you all of the disks. In my case, disk1 is the one I want to erase and format:&lt;br /&gt;
&lt;br /&gt;
 diskutil eraseDisk HFS+ UntitledUFS disk1&lt;br /&gt;
&lt;br /&gt;
== dd an .iso ==&lt;br /&gt;
&lt;br /&gt;
Instead of using Disk utility, I find it easier to simply dd your iso to a USB stick. Find out what your USB stick device is. &lt;br /&gt;
&lt;br /&gt;
 diskutil list&lt;br /&gt;
&lt;br /&gt;
then I added the USB stick and ran the same command. Under the IDENTIFIER column it will show you the name, in my case disk1. Make sure it&#039;s unmounted: &lt;br /&gt;
&lt;br /&gt;
 diskutil umount /dev/disk1&lt;br /&gt;
&lt;br /&gt;
then&lt;br /&gt;
&lt;br /&gt;
  sudo dd if=&amp;quot;[[Variables|mydiskimage.iso]]&amp;quot; of=/dev/disk1&lt;br /&gt;
&lt;br /&gt;
and then patiently wait. When it&#039;s done, if the numbers match for input and output, you should be good to go!&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Sitesupport-url&amp;diff=5627</id>
		<title>Sitesupport-url</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Sitesupport-url&amp;diff=5627"/>
		<updated>2014-10-14T19:45:46Z</updated>

		<summary type="html">&lt;p&gt;Franks: updated copyright licence&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Monday Oct 13, 2014: Upgraded licence from Attribution 2.0 Canada to Attribution 2.5 Canada - Creative Commons.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Robots.txt&amp;diff=5626</id>
		<title>Robots.txt</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Robots.txt&amp;diff=5626"/>
		<updated>2014-10-14T09:41:13Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot;If you&amp;#039;re wonder how search engines get your website&amp;#039;s information, it&amp;#039;s through automated tools, or robots, called spiders. Once a spider discovers a new domain name, like on...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;re wonder how search engines get your website&#039;s information, it&#039;s through automated tools, or robots, called spiders. Once a spider discovers a new domain name, like onedaywebsite.ca, it will ask the domain for a unique file called robots.txt.&lt;br /&gt;
The robots.txt file has several purposes, most notable to tell the robot what to exlcude. This standard is known as the Robots Exclusion Protocol or robots.txt protocol. &lt;br /&gt;
You should take a second right now try https://www.google.com/robots.txt as well as add /robots.txt to the URL to the root of your website to see if it exists. (don&#039;t try a subdirectory like example.com/example/subdirectory/robots.txt)&lt;br /&gt;
&lt;br /&gt;
If you don&#039;t yet have a robots.txt file, you can create one and just have the following two lines: &lt;br /&gt;
 User-agent: *&lt;br /&gt;
 Disallow: &lt;br /&gt;
&lt;br /&gt;
This tells all robots visiting your website that they are welcome to visit all files on your website. If you don&#039;t want any robots visiting your website to index you on their search engines, simply add a / after Disallow: &lt;br /&gt;
&lt;br /&gt;
 User-agent: *&lt;br /&gt;
 Disallow: /&lt;br /&gt;
&lt;br /&gt;
Robots all have a User-agent, and you can change the rules for each. &lt;br /&gt;
 User-Agent: googlebot&lt;br /&gt;
 Disallow: /private/&lt;br /&gt;
&lt;br /&gt;
tells googlebot to ignore your /private/ directory&lt;br /&gt;
&lt;br /&gt;
That&#039;s the basics. A few other nonstandard extensions: &lt;br /&gt;
Allow, which makes an exemption from a Disallow extension. For example, to allow the robot access to a specific file in a disallowed extenstion:&lt;br /&gt;
&lt;br /&gt;
 Allow: /private/onepublicfile.pdf&lt;br /&gt;
 Disallow: /private/&lt;br /&gt;
&lt;br /&gt;
There&#039;s the Sitemap directive: &lt;br /&gt;
&lt;br /&gt;
 Sitemap: www.onedaywebsite.ca/sitemap.xml&lt;br /&gt;
&lt;br /&gt;
Host allows websites with multiple mirror websites to specify their preferred domain: &lt;br /&gt;
&lt;br /&gt;
 Host: newsite.example.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now you can take another look at https://www.google.com/robots.txt and understand what&#039;s in this file. Take the time to build your robots.txt, so you don&#039;t have any surprises on which of your files are now indexed on the popular search engines. &lt;br /&gt;
&lt;br /&gt;
It&#039;s worth noting that there&#039;s no technical requirement to follow robots.txt, it&#039;s just the commonly accepted behaviour by popular search engines. There&#039;s nothing stopping a bot, or a human, from looking at files and directories listed under Disallow: as that&#039;s where you can often find some interesting things! If you don&#039;t want your files or directories published, they should never be made available.&lt;br /&gt;
&lt;br /&gt;
[http://www.robotstxt.org/db.html List of popular robots to consider when building your robots.txt file]&lt;br /&gt;
&lt;br /&gt;
I wonder if there is a search engine that only hosts Disallow information?&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Header_checks&amp;diff=5622</id>
		<title>Header checks</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Header_checks&amp;diff=5622"/>
		<updated>2013-12-29T03:58:08Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot; # Important! This might break stuff. Once you have installed it, do a # postfix reload while running tail -f /var/log/mail.log and watch for errors. Send some text emails usi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; # Important! This might break stuff. Once you have installed it, do a # postfix reload while running tail -f /var/log/mail.log and watch for errors. Send some text emails using the subjects below and watch what happens&lt;br /&gt;
 # This should block everything from 1900-2012.&lt;br /&gt;
 /^Date: .* 200[0-12]/ REJECT Spam Header Past Date 2000s&lt;br /&gt;
 /^Date: .* 19[0-9][0-9]/ REJECT Spam Header Past Date 1900s&lt;br /&gt;
 /^Subject: .*Make Money Fast!/ REJECT  &lt;br /&gt;
 /^Subject: .*Loan Offer/ REJECT Not looking for a loan thanks&lt;br /&gt;
 /^Subject: *Your email contains VIRUSES/ DISCARD virus notification&lt;br /&gt;
 /^Content-Disposition:.*VIRUS1_DETECTED_AND_REMOVED/&lt;br /&gt;
        DISCARD virus notification&lt;br /&gt;
 /^Content-Disposition:.*VirusWarning.txt/ DISCARD virus notification&lt;br /&gt;
 # Do not accept these types of attachments&lt;br /&gt;
 /^Content-(Type|Disposition):.*(file)?name=.*\.(bat|com|exe)/ REJECT Bad Attachment .${3}&lt;br /&gt;
 # non-RFC Compliance headers&lt;br /&gt;
 /[^[:print:]]{7}/  REJECT 2047rfc&lt;br /&gt;
 /^.*=20[a-z]*=20[a-z]*=20[a-z]*=20[a-z]*/ REJECT 822rfc1&lt;br /&gt;
 /(.*)?\{6,\}/ REJECT 822rfc2&lt;br /&gt;
 /(.*)[X|x]\{3,\}/ REJECT 822rfc3&lt;br /&gt;
 # Unreadable Language Types? -- NON-acsii un-printable&lt;br /&gt;
 /^Subject:.*=\?(GB2312|big5|euc-kr|ks_c_5601-1987|koi8)\?/ REJECT NotReadable1&lt;br /&gt;
 /^Content-Type:.*charset=&amp;quot;?(GB2312|big5|euc-kr|ks_c_5601-1987|koi8)/ REJECT NotReadable2&lt;br /&gt;
 /^Subject: =?big5?/     REJECT Chinese encoding not accepted by this server&lt;br /&gt;
 /^Subject: =?EUC-KR?/   REJECT Korean encoding not allowed by this server&lt;br /&gt;
 /^Subject: ADV:/        REJECT Advertisements not accepted by this server &lt;br /&gt;
 /^Subject: =?Windows-1251?/     REJECT Russian encoding not allowed by this server&lt;br /&gt;
 /^Subject: =\?KOI8-R\?/ REJECT Russian encoding not allowed by this server&lt;br /&gt;
 /^Subject:.*=\?(big5|euc-kr|gb2312|ks_c_5601-1987)\?/   REJECT Language not accepted by this server as it is probably spam&lt;br /&gt;
 /[^[:print:]]{8}/       REJECT Sorry, ascii characters only permitted by this server&lt;br /&gt;
 /^From:.*\@.*\.cn/      REJECT Sorry, Chinese mail not allowed here&lt;br /&gt;
 /^From:.*\@.*\.kr/      REJECT Sorry, Korean mail not allowed here&lt;br /&gt;
 /^From:.*\@.*\.tr/      REJECT Sorry, Turkish mail not allowed here&lt;br /&gt;
 /^From:.*\@.*\.ru/      REJECT Sorry, Russian mail not allowed here&lt;br /&gt;
 /^From:.*\@.*\.ro/      REJECT Sorry, Romanian mail not allowed here&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Postfix:main.cf&amp;diff=5621</id>
		<title>Postfix:main.cf</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Postfix:main.cf&amp;diff=5621"/>
		<updated>2013-12-29T03:22:45Z</updated>

		<summary type="html">&lt;p&gt;Franks: header_checks link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a sample main.cf, not including the default [[variables]]. You can find the official options [http://www.postfix.org/postconf.5.html here]. If you like and understand the following, add it to the bottom of your main.cf file and run&lt;br /&gt;
 # postfix reload&lt;br /&gt;
&lt;br /&gt;
main.cf:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
strict_rfc821_envelopes = yes&lt;br /&gt;
smtpd_helo_required = yes&lt;br /&gt;
smtpd_etrn_restrictions = reject&lt;br /&gt;
smtpd_helo_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_invalid_hostname&lt;br /&gt;
 reject_non_fqdn_hostname&lt;br /&gt;
 permit&lt;br /&gt;
smtpd_sender_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_unknown_sender_domain&lt;br /&gt;
 reject_non_fqdn_sender&lt;br /&gt;
 permit_sasl_authenticated&lt;br /&gt;
 permit_tls_clientcerts&lt;br /&gt;
 warn_if_reject reject_unverified_sender&lt;br /&gt;
# Incoming email maximum size of one meg:&lt;br /&gt;
message_size_limit = 1024000&lt;br /&gt;
# This file needs to exist if you&#039;re going to use it.&lt;br /&gt;
header_checks = regexp:/usr/local/etc/postfix/header_checks&lt;br /&gt;
# If you don&#039;t have the following file, comment this out.&lt;br /&gt;
mime_header_checks = regexp:/usr/local/etc/postfix/mime_header_checks&lt;br /&gt;
html_directory = no&lt;br /&gt;
syslog_facility = mail&lt;br /&gt;
syslog_name = postfix&lt;br /&gt;
disable_vrfy_command = yes&lt;br /&gt;
smtpd_banner = NO UCE ESMTP&lt;br /&gt;
# SASL &lt;br /&gt;
smtpd_use_tls = yes&lt;br /&gt;
smtpd_sasl_auth_enable = yes&lt;br /&gt;
smtpd_sasl2_auth_enable = yes&lt;br /&gt;
smtpd_sasl_security_options = noanonymous&lt;br /&gt;
smtpd_sasl_local_domain =&lt;br /&gt;
broken_sasl_auth_clients = yes&lt;br /&gt;
# This will only allow authentication of users once TLS has been&lt;br /&gt;
# started and information being transferred is encrypted.&lt;br /&gt;
smtpd_tls_auth_only = yes&lt;br /&gt;
# TLS&lt;br /&gt;
smtp_use_tls = yes&lt;br /&gt;
smtpd_use_tls = yes&lt;br /&gt;
smtp_tls_note_starttls_offer = yes&lt;br /&gt;
smtpd_tls_key_file = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_cert_file = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_CAfile = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_loglevel = 1&lt;br /&gt;
smtpd_tls_received_header = yes&lt;br /&gt;
smtpd_tls_session_cache_timeout = 3600s&lt;br /&gt;
tls_random_source = dev:/dev/urandom&lt;br /&gt;
smtpd_recipient_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_invalid_hostname&lt;br /&gt;
 reject_unauth_pipelining&lt;br /&gt;
 reject_unknown_recipient_domain&lt;br /&gt;
 reject_unknown_sender_domain&lt;br /&gt;
 reject_non_fqdn_hostname&lt;br /&gt;
 reject_non_fqdn_recipient&lt;br /&gt;
 reject_non_fqdn_sender&lt;br /&gt;
 permit_sasl_authenticated&lt;br /&gt;
 permit_tls_clientcerts&lt;br /&gt;
 reject_unauth_destination &lt;br /&gt;
 reject_rbl_client relays.ordb.org&lt;br /&gt;
 reject_rbl_client list.dsbl.org&lt;br /&gt;
 reject_rbl_client sbl.spamhaus.org&lt;br /&gt;
 reject_rbl_client cbl.abuseat.org&lt;br /&gt;
 reject_rbl_client dul.dnsbl.sorbs.net&lt;br /&gt;
 reject_rbl_client proxies.relays.monkeys.com&lt;br /&gt;
 reject_rbl_client opm.blitzed.org&lt;br /&gt;
 reject_rbl_client blackholes.wirehub.net&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also note these example [[header_checks]]&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Postfix:main.cf&amp;diff=5620</id>
		<title>Postfix:main.cf</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Postfix:main.cf&amp;diff=5620"/>
		<updated>2013-12-29T03:19:45Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a sample main.cf, not including the default [[variables]]. You can find the official options [http://www.postfix.org/postconf.5.html here]. If you like and understand the following, add it to the bottom of your main.cf file and run&lt;br /&gt;
 # postfix reload&lt;br /&gt;
&lt;br /&gt;
main.cf:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
strict_rfc821_envelopes = yes&lt;br /&gt;
smtpd_helo_required = yes&lt;br /&gt;
smtpd_etrn_restrictions = reject&lt;br /&gt;
smtpd_helo_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_invalid_hostname&lt;br /&gt;
 reject_non_fqdn_hostname&lt;br /&gt;
 permit&lt;br /&gt;
smtpd_sender_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_unknown_sender_domain&lt;br /&gt;
 reject_non_fqdn_sender&lt;br /&gt;
 permit_sasl_authenticated&lt;br /&gt;
 permit_tls_clientcerts&lt;br /&gt;
 warn_if_reject reject_unverified_sender&lt;br /&gt;
# Incoming email maximum size of one meg:&lt;br /&gt;
message_size_limit = 1024000&lt;br /&gt;
# This file needs to exist if you&#039;re going to use it.&lt;br /&gt;
[[header_checks]] = regexp:/usr/local/etc/postfix/header_checks&lt;br /&gt;
# If you don&#039;t have the following file, comment this out.&lt;br /&gt;
mime_header_checks = regexp:/usr/local/etc/postfix/mime_header_checks&lt;br /&gt;
html_directory = no&lt;br /&gt;
syslog_facility = mail&lt;br /&gt;
syslog_name = postfix&lt;br /&gt;
disable_vrfy_command = yes&lt;br /&gt;
smtpd_banner = NO UCE ESMTP&lt;br /&gt;
# SASL &lt;br /&gt;
smtpd_use_tls = yes&lt;br /&gt;
smtpd_sasl_auth_enable = yes&lt;br /&gt;
smtpd_sasl2_auth_enable = yes&lt;br /&gt;
smtpd_sasl_security_options = noanonymous&lt;br /&gt;
smtpd_sasl_local_domain =&lt;br /&gt;
broken_sasl_auth_clients = yes&lt;br /&gt;
# This will only allow authentication of users once TLS has been&lt;br /&gt;
# started and information being transferred is encrypted.&lt;br /&gt;
smtpd_tls_auth_only = yes&lt;br /&gt;
# TLS&lt;br /&gt;
smtp_use_tls = yes&lt;br /&gt;
smtpd_use_tls = yes&lt;br /&gt;
smtp_tls_note_starttls_offer = yes&lt;br /&gt;
smtpd_tls_key_file = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_cert_file = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_CAfile = /usr/local/share/courier-imap/imapd.pem&lt;br /&gt;
smtpd_tls_loglevel = 1&lt;br /&gt;
smtpd_tls_received_header = yes&lt;br /&gt;
smtpd_tls_session_cache_timeout = 3600s&lt;br /&gt;
tls_random_source = dev:/dev/urandom&lt;br /&gt;
smtpd_recipient_restrictions = &lt;br /&gt;
 permit_mynetworks&lt;br /&gt;
 reject_invalid_hostname&lt;br /&gt;
 reject_unauth_pipelining&lt;br /&gt;
 reject_unknown_recipient_domain&lt;br /&gt;
 reject_unknown_sender_domain&lt;br /&gt;
 reject_non_fqdn_hostname&lt;br /&gt;
 reject_non_fqdn_recipient&lt;br /&gt;
 reject_non_fqdn_sender&lt;br /&gt;
 permit_sasl_authenticated&lt;br /&gt;
 permit_tls_clientcerts&lt;br /&gt;
 reject_unauth_destination &lt;br /&gt;
 reject_rbl_client relays.ordb.org&lt;br /&gt;
 reject_rbl_client list.dsbl.org&lt;br /&gt;
 reject_rbl_client sbl.spamhaus.org&lt;br /&gt;
 reject_rbl_client cbl.abuseat.org&lt;br /&gt;
 reject_rbl_client dul.dnsbl.sorbs.net&lt;br /&gt;
 reject_rbl_client proxies.relays.monkeys.com&lt;br /&gt;
 reject_rbl_client opm.blitzed.org&lt;br /&gt;
 reject_rbl_client blackholes.wirehub.net&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Django&amp;diff=5619</id>
		<title>Django</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Django&amp;diff=5619"/>
		<updated>2013-12-28T19:22:56Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot;== Install on Debian ==   sudo apt-get install python-django  You can verify it&amp;#039;s installed after by running:    $ python  Python 2.6.6 (r266:84292, Dec 26 2010, 22:31:48)   [...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Install on Debian ==&lt;br /&gt;
&lt;br /&gt;
 sudo apt-get install python-django&lt;br /&gt;
&lt;br /&gt;
You can verify it&#039;s installed after by running: &lt;br /&gt;
&lt;br /&gt;
 $ python&lt;br /&gt;
 Python 2.6.6 (r266:84292, Dec 26 2010, 22:31:48) &lt;br /&gt;
 [GCC 4.4.5] on linux2&lt;br /&gt;
 Type &amp;quot;help&amp;quot;, &amp;quot;copyright&amp;quot;, &amp;quot;credits&amp;quot; or &amp;quot;license&amp;quot; for more information.&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import django;&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; django.VERSION&lt;br /&gt;
 (1, 2, 3, &#039;final&#039;, 0)&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; quit();&lt;br /&gt;
&lt;br /&gt;
and now to create and test our first app: &lt;br /&gt;
&lt;br /&gt;
 $ django-admin startproject test_project&lt;br /&gt;
 $ cd test_project&lt;br /&gt;
&lt;br /&gt;
Replace 1.2.3.4 in the following line with your IP: &lt;br /&gt;
&lt;br /&gt;
 $ python manage.py runserver 1.2.3.4:9090&lt;br /&gt;
 Validating models...&lt;br /&gt;
 0 errors found&lt;br /&gt;
&lt;br /&gt;
 Django version 1.2.3, using settings &#039;test_project.settings&#039;&lt;br /&gt;
 Development server is running at http://1.2.3.4:9090/&lt;br /&gt;
 Quit the server with CONTROL-C.&lt;br /&gt;
&lt;br /&gt;
and now you should be able to go into your browser and look at ttp://1.2.3.4:9090/&lt;br /&gt;
If everything worked, the page will read: &lt;br /&gt;
&lt;br /&gt;
 It worked!&lt;br /&gt;
 Congratulations on your first Django-powered page.&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Aircrack-ng&amp;diff=5618</id>
		<title>Aircrack-ng</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Aircrack-ng&amp;diff=5618"/>
		<updated>2013-12-28T11:10:55Z</updated>

		<summary type="html">&lt;p&gt;Franks: Created page with &amp;quot;== Installation on OSX ==  It&amp;#039;s easy with brew!    $ brew install aircrack-ng  Warning: You have not agreed to the Xcode license.  Builds will fail! Agree to the licen...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Installation on [[OSX]] ==&lt;br /&gt;
&lt;br /&gt;
It&#039;s easy with [[brew]]! &lt;br /&gt;
&lt;br /&gt;
 $ brew install aircrack-ng&lt;br /&gt;
 Warning: You have not agreed to the Xcode license.&lt;br /&gt;
 Builds will fail! Agree to the license by opening Xcode.app or running:&lt;br /&gt;
    xcodebuild -license&lt;br /&gt;
 Warning: It appears you have MacPorts or Fink installed.&lt;br /&gt;
 Software installed with other package managers causes known problems for&lt;br /&gt;
 Homebrew. If a formula fails to build, uninstall MacPorts/Fink and try again.&lt;br /&gt;
 ==&amp;gt; Downloading http://download.aircrack-ng.org/aircrack-ng-1.1.tar.gz&lt;br /&gt;
 ######################################################################## 100.0%&lt;br /&gt;
 ==&amp;gt; Patching&lt;br /&gt;
 patching file scripts/airodump-ng-oui-update&lt;br /&gt;
 ==&amp;gt; make CC=clang&lt;br /&gt;
 ==&amp;gt; make prefix=/usr/local/Cellar/aircrack-ng/1.1 mandir=/usr/local/Cellar/aircr&lt;br /&gt;
 ==&amp;gt; Caveats&lt;br /&gt;
 Run `airodump-ng-oui-update` install or update the Airodump-ng OUI file.&lt;br /&gt;
 ==&amp;gt; Summary&lt;br /&gt;
 🍺  /usr/local/Cellar/aircrack-ng/1.1: 34 files, 1.0M, built in 33 seconds&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=WEP&amp;diff=5617</id>
		<title>WEP</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=WEP&amp;diff=5617"/>
		<updated>2013-12-28T11:08:42Z</updated>

		<summary type="html">&lt;p&gt;Franks: /* Fluhrer, Mantin, and Shamir attack */ added link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WEP stands for Wired Equivalent Privacy and was the first encryption used in [[Wifi]] (WLAN).  It has been replaced with WPA2, however most wifi cards still support WEP for whatever reason.&lt;br /&gt;
&lt;br /&gt;
== WEP payload ==&lt;br /&gt;
&lt;br /&gt;
The plaintext payload has a 4 byte (32 bit) CRC trailer.  The message is then XOR&#039;ed against a keystream.  The ciphertext is then prepended by a 24 bit [[IV]].&lt;br /&gt;
&lt;br /&gt;
== RC4 keystream ==&lt;br /&gt;
&lt;br /&gt;
Given a 24 bit IV and either a 40 bit or 104 bit [[PSK]] an [[RC4]] keystream is derived.  A keystream is meant as a stream of bytes that look random but are reproduceable with the same IV and PSK.&lt;br /&gt;
&lt;br /&gt;
== 24 bit IV ==&lt;br /&gt;
&lt;br /&gt;
A random 24 bit IV is prepended to every encrypted payload (every frame).  Given its limited size there will be IV collisions after so many frames.  A collision means that the value is the same for two or more IV&#039;s.  When an IV is the same that means that the keystream between those collision packets is the same as well.&lt;br /&gt;
&lt;br /&gt;
== Fluhrer, Mantin, and Shamir attack ==&lt;br /&gt;
&lt;br /&gt;
This is a successful attack (also known as FMS attack) against WEP.  It is used by the program [[aircrack-ng]].&lt;br /&gt;
Due to this WPA was invented supposedly.&lt;br /&gt;
&lt;br /&gt;
== Replay attacks ==&lt;br /&gt;
&lt;br /&gt;
Replay attacks are possible with WEP, and they are the reason that people can replay [[ARP]] requests and gather IV&#039;s (and IV collisions) that way.&lt;br /&gt;
&lt;br /&gt;
== Injection attacks ==&lt;br /&gt;
&lt;br /&gt;
Because the payload has a 32 bit CRC at the end someone can make a replay with an IP address changed.  One needs to recompute the IP checksum which is 16 bits and recompute the 32 bit CRC at the end of the plaintext payload (802.11 header + IP packet + CRC32 checksum).&lt;br /&gt;
Most home routers should allow outgoing packets...&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Brew&amp;diff=5616</id>
		<title>Brew</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Brew&amp;diff=5616"/>
		<updated>2013-12-28T10:57:30Z</updated>

		<summary type="html">&lt;p&gt;Franks: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I was having issues with brew on [[osx]], when I would try &lt;br /&gt;
&lt;br /&gt;
 brew update&lt;br /&gt;
&lt;br /&gt;
I was getting a long list that ended with: &lt;br /&gt;
&lt;br /&gt;
 Please move or remove them before you can merge.&lt;br /&gt;
 Aborting&lt;br /&gt;
 Error: Failure while executing: git pull -q origin refs/heads/master:refs/remotes/origin/master&lt;br /&gt;
&lt;br /&gt;
To resolve it, I did: &lt;br /&gt;
 &lt;br /&gt;
 $ cd $(brew --prefix)&lt;br /&gt;
 $ rm Library/Formula/argp-standalone.rb&lt;br /&gt;
 $ rm Library/Formula/cocot.rb&lt;br /&gt;
 $ git fetch origin&lt;br /&gt;
 remote: Counting objects: 306, done.&lt;br /&gt;
 remote: Compressing objects: 100% (150/150), done.&lt;br /&gt;
 remote: Total 301 (delta 116), reused 298 (delta 113)&lt;br /&gt;
 Receiving objects: 100% (301/301), 109.15 KiB, done.&lt;br /&gt;
 Resolving deltas: 100% (116/116), done.&lt;br /&gt;
 From https://github.com/mxcl/homebrew&lt;br /&gt;
 * [new branch]      gh-pages   -&amp;gt; origin/gh-pages&lt;br /&gt;
 * [new branch]      go         -&amp;gt; origin/go&lt;br /&gt;
 $ sudo git reset --hard origin/master&lt;br /&gt;
 Password:&lt;br /&gt;
 HEAD is now at bf807ec etcd 0.2.0&lt;br /&gt;
 &lt;br /&gt;
Now you should be good to go again!&lt;br /&gt;
&lt;br /&gt;
  $ brew update&lt;br /&gt;
 Already up-to-date.&lt;br /&gt;
&lt;br /&gt;
Now&#039;s a good time to see what else you can do to optimize brew:&lt;br /&gt;
&lt;br /&gt;
 $ brew doctor&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
</feed>