Skip to content

Instantly share code, notes, and snippets.

Aysad Kozanoglu AysadKozanoglu

Block or report user

Report or block AysadKozanoglu

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@AysadKozanoglu
AysadKozanoglu / firehol_service_mongo.conf
Created Apr 10, 2016
fireHOL example service port mongoweb
View firehol_service_mongo.conf
#FHVER: 1:213
server_mongoweb_ports="tcp/28017"
client_mongoweb_ports="default"
@AysadKozanoglu
AysadKozanoglu / firehol.conf
Created Apr 10, 2016
FireHOL example firehol.conf high secure burst connection limition
View firehol.conf
#
# $Id: client-all.conf,v 1.2 2002/12/31 15:44:34 ktsaou Exp $
#
# This configuration file will allow all requests originating from the
# local machine to be send through all network interfaces.
#
# No requests are allowed to come from the network. The host will be
# completely stealthed! It will not respond to anything, and it will
# not be pingable, although it will be able to originate anything
# (even pings to other hosts).
@AysadKozanoglu
AysadKozanoglu / de.appplant.cordova.plugin.local-notification-index.html
Last active Apr 10, 2016
Cordova Notification html Beispiel de.appplant.cordova.plugin.local-notification
View de.appplant.cordova.plugin.local-notification-index.html
<!DOCTYPE html>
<html>
<head>
<title>Device Ready Example</title>
<script type="text/javascript" charset="utf-8" src="cordova.js"></script>
<script type="text/javascript" charset="utf-8">
// Wait for device API libraries to load
//
function onLoad() {
@AysadKozanoglu
AysadKozanoglu / nginx.conf
Created Apr 10, 2016
Nginx block unwanted open proxy, allow only POST, GET HEAD methods, No iframe embed - istenmedik acik proxy yi bloke et ve sadece POST GET HEAD methodlarine izin ver Iframe yerlestirmeyi yasakla
View nginx.conf
http{
#...
#hide server version
server_tokens off;
# config to don't allow the browser to render the page inside an frame or iframe
add_header X-Frame-Options SAMEORIGIN;
server {
listen 80;
@AysadKozanoglu
AysadKozanoglu / nginx.conf
Last active Apr 10, 2016
NGINX strong Config - SIKI güvenlik ayarlari
View nginx.conf
### don't send the nginx version number in error pages and Server header
server_tokens off;
### config to don't allow the browser to render the page inside an frame or iframe
###if you need to allow [i]frames, you can use SAMEORIGIN or even set an uri with ALLOW-FROM uri
add_header X-Frame-Options SAMEORIGIN;
### when serving user-supplied content, include a X-Content-Type-Options: nosniff header along with the Content-Type: header,
@AysadKozanoglu
AysadKozanoglu / tmux.conf
Created Apr 10, 2016
tmux very useful shortcuts settings
View tmux.conf
# thanks goes to spicycode
# https://gist.github.com/spicycode/1229612
# nano ~/.tmux.conf
set -g base-index 1
# Automatically set window title
set-window-option -g automatic-rename on
set-option -g set-titles on
@AysadKozanoglu
AysadKozanoglu / fail2ban_jail.conf
Created Apr 10, 2016
fail2ban jail settings for nginx 400 444 403 404 filtering on http https
View fail2ban_jail.conf
#nano /etc/fail2ban/jail.conf
#
[nginx-4xx]
enabled = true
port = http,https
filter = nginx-4xx
logpath = /usr/local/nginx/logs/access.log
maxretry = 4
@AysadKozanoglu
AysadKozanoglu / postfix_main.cf
Created Apr 10, 2016
postfix mail version = 2.9.6 main.cf settings - worked
View postfix_main.cf
# See /usr/share/postfix/main.cf.dist for a commented, more complete version
# Debian specific: Specifying a file name will cause the first
# line of that file to be used as the name. The Debian default
# is /etc/mailname.
#myorigin = /etc/mailname
smtpd_banner = $myhostname ESMTP $mail_name (Debian/GNU)
biff = no
@AysadKozanoglu
AysadKozanoglu / postfix_master.cf
Created Apr 10, 2016
postfix mail version 2.9.6 master.cf settings worked (wheezy)
View postfix_master.cf
#
# Postfix master process configuration file. For details on the format
# of the file, see the master(5) manual page (command: "man 5 master").
#
# Do not forget to execute "postfix reload" after editing this file.
#
# ==========================================================================
# service type private unpriv chroot wakeup maxproc command + args
# (yes) (yes) (yes) (never) (100)
# ==========================================================================
@AysadKozanoglu
AysadKozanoglu / spamhaus-iptable.sh
Created Apr 10, 2016
spamhaus blacklisted iptable blocker script
View spamhaus-iptable.sh
#!/bin/bash
IPT=”/bin/iptables”
FILE=”/tmp/drop.lasso”
URL=”http://www.spamhaus.org/drop/drop.lasso”
echo “”
echo -n “Deleting DROP list from existing firewall…”
#This will delete all dropped ips from firewall
You can’t perform that action at this time.