ISP Config 2 – Step by step – #3 additional PHP version
In this tutorial I will show you how to add additional PHP version to ISP Config. Don’t worrry it is really easy!
ISP Config 2 – Step by step – #3 additional PHP version Read More »
In this tutorial I will show you how to add additional PHP version to ISP Config. Don’t worrry it is really easy!
ISP Config 2 – Step by step – #3 additional PHP version Read More »
Ok you got Debian installed. (if not see my previeous tutorial). Now is time to install ISP config so let’s get started.
ISP Config 2 – Step by Step – ISP config install Read More »
Ok this is really first tutorial in this series. Let’s start with install Debian linux. And prepare enviroment to install ISP Config.
ISP Config 2 – Step by Step – Debian install Read More »
If you try open exe file from network drive you can face error: “We can’t verify who created this file”, is is because network drive is not recognized as the trusted network place. You can add this network place to trusted sites. Select “Start“, then type “Internet Options“. Open “Internet Options“. Select the “Security” tab. Select “Local intranet“,
Windows “We can’t verify who created this file” – SOLVED Read More »
Basic setup If you need setup entry and exit nodes for TOR it is quite easy. It is really useful when you developing websites or make penetration testing network firewall. navigate to your tor browser install directory open Browser folder open TorBrowser folder open Data folder open Tor folder open torrc file in your favorite text editor in torrc file insert these
TOR – setup entry and exit nodes – SOLVED Read More »
What is a problem? Images in email signatures are visible when composing messages in 2016, but not visible when composing messages or opening emails in the recipients’ inboxes. So I analyze delivered email source code. … <img width=”400″ height=”120″ id=”_x0000_i1025″ src=”file:///C:/davidstein.cz/signatureimage.png” name=”_x0000_i1025″></span> … So the image is linked but not embedded. So it can not be
Outlook 2013/2016 embeded image in signature Read More »
Its long time ago but MikroTik removed P2P matcher from mangle rule, so now you have to use L7 analyze to mangle this traffic. Here is code to paste to the terminal: /ip firewall layer7-protocol add name=P2Pmatch regexp=”^(\\x13bittorrent protocol|azver\\x01\$|get /scrape\\\ \?info_hash=get /announce\\\?info_hash=|get /client/bitcomet/|GET /data\\\?f\ id=)|d1:ad2:id20:|\\x08’7P\\)[RP]” /ip firewall mangle add action=mark-connection chain=prerouting layer7-protocol=P2Pmatch \ new-connection-mark=P2Pconnection passthrough=yes
Mikrotik P2P mangle rule – SOLVED Read More »
Sometimes if you make changes to your local DNS server windows do not works ok to resolve this DNS record in a local network. What? nslookup ykylo Server: Address: 192.168.50.1 Name: ykylo Address: 192.168.50.100 C:\> ping ykylo Ping request could not find host wolfman. Please check the name and try again. C:\> ping 192.168.50.100 Pinging 192.168.50.100
Ping unable to resolve but nslookup works fine – workaround Read More »
Block schematic Today post will be short, just about the schematic. Software and codes will be in future posts. Arduino pro mini You can get one here for cheap. I choose Arduino pro mini because it’s size and price. It is really fast, easy to program and low power consumption. FT232RL TTL USB Serial I
FireWeatherStation – block schematic Read More »