Skip to content

Instantly share code, notes, and snippets.

Aysad Kozanoglu AysadKozanoglu

Block or report user

Report or block AysadKozanoglu

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@AysadKozanoglu
AysadKozanoglu / firehol_service_mongo.conf
Created Apr 10, 2016
fireHOL example service port mongoweb
View firehol_service_mongo.conf
#FHVER: 1:213
server_mongoweb_ports="tcp/28017"
client_mongoweb_ports="default"
@AysadKozanoglu
AysadKozanoglu / firehol.conf
Created Apr 10, 2016
FireHOL example firehol.conf high secure burst connection limition
View firehol.conf
#
# $Id: client-all.conf,v 1.2 2002/12/31 15:44:34 ktsaou Exp $
#
# This configuration file will allow all requests originating from the
# local machine to be send through all network interfaces.
#
# No requests are allowed to come from the network. The host will be
# completely stealthed! It will not respond to anything, and it will
# not be pingable, although it will be able to originate anything
# (even pings to other hosts).
@AysadKozanoglu
AysadKozanoglu / sysctl.conf
Created Apr 10, 2016
high secure & perfornce debian sysctl.conf setting - debian sysctl yüksek güven ve performans ayarlari
View sysctl.conf
# Kernel sysctl configuration file for Linux
# Version 1.11 - 2015-07-07
# Aysad Kozanoglu Aysad K.
# This file should be saved as /etc/sysctl.conf and can be activated using the command:
# sysctl -e -p /etc/sysctl.conf
#
# For binary values, 0 is disabled, 1 is enabled. See sysctl(8) and sysctl.conf(5) for more details.
#
# Tested with: Ubuntu 14.04 LTS kernel version 3.13
@AysadKozanoglu
AysadKozanoglu / de.appplant.cordova.plugin.local-notification-index.html
Last active Apr 10, 2016
Cordova Notification html Beispiel de.appplant.cordova.plugin.local-notification
View de.appplant.cordova.plugin.local-notification-index.html
<!DOCTYPE html>
<html>
<head>
<title>Device Ready Example</title>
<script type="text/javascript" charset="utf-8" src="cordova.js"></script>
<script type="text/javascript" charset="utf-8">
// Wait for device API libraries to load
//
function onLoad() {
@AysadKozanoglu
AysadKozanoglu / cordova-plugin-camera-index.html
Created Apr 10, 2016
Cordova Camera Plugin cordova-plugin-camera upload jquery ajax to server request
View cordova-plugin-camera-index.html
<!DOCTYPE html>
<!-- Aysad Kozanoglu -->
<html>
<head>
<title>foto cek</title>
<style>
html {
-webkit-user-select: none;
}
</style>
@AysadKozanoglu
AysadKozanoglu / nginx.conf
Last active Apr 10, 2016
NGINX strong Config - SIKI güvenlik ayarlari
View nginx.conf
### don't send the nginx version number in error pages and Server header
server_tokens off;
### config to don't allow the browser to render the page inside an frame or iframe
###if you need to allow [i]frames, you can use SAMEORIGIN or even set an uri with ALLOW-FROM uri
add_header X-Frame-Options SAMEORIGIN;
### when serving user-supplied content, include a X-Content-Type-Options: nosniff header along with the Content-Type: header,
@AysadKozanoglu
AysadKozanoglu / nginx.conf
Created Apr 10, 2016
Nginx block unwanted open proxy, allow only POST, GET HEAD methods, No iframe embed - istenmedik acik proxy yi bloke et ve sadece POST GET HEAD methodlarine izin ver Iframe yerlestirmeyi yasakla
View nginx.conf
http{
#...
#hide server version
server_tokens off;
# config to don't allow the browser to render the page inside an frame or iframe
add_header X-Frame-Options SAMEORIGIN;
server {
listen 80;
@AysadKozanoglu
AysadKozanoglu / tmux.conf
Created Apr 10, 2016
tmux very useful shortcuts settings
View tmux.conf
# thanks goes to spicycode
# https://gist.github.com/spicycode/1229612
# nano ~/.tmux.conf
set -g base-index 1
# Automatically set window title
set-window-option -g automatic-rename on
set-option -g set-titles on
@AysadKozanoglu
AysadKozanoglu / nginx.conf
Last active Feb 25, 2019
fail2ban nginx 404 400 403 444 filter /etc/fail2ban/filter.d/nginx-4xx.conf
View nginx.conf
# nano /etc/fail2ban/filter.d/nginx-4xx.conf
#
[Definition]
failregex = ^<HOST>.*"(GET|POST).*" (404|444|403|400) .*$
ignoreregex =
@AysadKozanoglu
AysadKozanoglu / fail2ban_jail.conf
Created Apr 10, 2016
fail2ban jail settings for nginx 400 444 403 404 filtering on http https
View fail2ban_jail.conf
#nano /etc/fail2ban/jail.conf
#
[nginx-4xx]
enabled = true
port = http,https
filter = nginx-4xx
logpath = /usr/local/nginx/logs/access.log
maxretry = 4
You can’t perform that action at this time.