Skip to content

Instantly share code, notes, and snippets.

View AysadKozanoglu's full-sized avatar
free 4 ever

Aysad Kozanoglu AysadKozanoglu

free 4 ever
View GitHub Profile
AysadKozanoglu / firehol_service_mongo.conf
Created April 10, 2016 22:38
fireHOL example service port mongoweb
View firehol_service_mongo.conf
#FHVER: 1:213
AysadKozanoglu / firehol.conf
Created April 10, 2016 22:39
FireHOL example firehol.conf high secure burst connection limition
View firehol.conf
# $Id: client-all.conf,v 1.2 2002/12/31 15:44:34 ktsaou Exp $
# This configuration file will allow all requests originating from the
# local machine to be send through all network interfaces.
# No requests are allowed to come from the network. The host will be
# completely stealthed! It will not respond to anything, and it will
# not be pingable, although it will be able to originate anything
# (even pings to other hosts).
AysadKozanoglu / de.appplant.cordova.plugin.local-notification-index.html
Last active April 10, 2016 22:57
Cordova Notification html Beispiel de.appplant.cordova.plugin.local-notification
View de.appplant.cordova.plugin.local-notification-index.html
<!DOCTYPE html>
<title>Device Ready Example</title>
<script type="text/javascript" charset="utf-8" src="cordova.js"></script>
<script type="text/javascript" charset="utf-8">
// Wait for device API libraries to load
function onLoad() {
AysadKozanoglu / nginx.conf
Created April 10, 2016 23:07
Nginx block unwanted open proxy, allow only POST, GET HEAD methods, No iframe embed - istenmedik acik proxy yi bloke et ve sadece POST GET HEAD methodlarine izin ver Iframe yerlestirmeyi yasakla
View nginx.conf
#hide server version
server_tokens off;
# config to don't allow the browser to render the page inside an frame or iframe
add_header X-Frame-Options SAMEORIGIN;
server {
listen 80;
AysadKozanoglu / nginx.conf
Last active April 10, 2016 23:08
NGINX strong Config - SIKI güvenlik ayarlari
View nginx.conf
### don't send the nginx version number in error pages and Server header
server_tokens off;
### config to don't allow the browser to render the page inside an frame or iframe
###if you need to allow [i]frames, you can use SAMEORIGIN or even set an uri with ALLOW-FROM uri
add_header X-Frame-Options SAMEORIGIN;
### when serving user-supplied content, include a X-Content-Type-Options: nosniff header along with the Content-Type: header,
AysadKozanoglu / tmux.conf
Created April 10, 2016 23:22
tmux very useful shortcuts settings
View tmux.conf
# thanks goes to spicycode
# nano ~/.tmux.conf
set -g base-index 1
# Automatically set window title
set-window-option -g automatic-rename on
set-option -g set-titles on
AysadKozanoglu / fail2ban_jail.conf
Created April 10, 2016 23:26
fail2ban jail settings for nginx 400 444 403 404 filtering on http https
View fail2ban_jail.conf
#nano /etc/fail2ban/jail.conf
enabled = true
port = http,https
filter = nginx-4xx
logpath = /usr/local/nginx/logs/access.log
maxretry = 4
AysadKozanoglu /
Created April 10, 2016 23:30
postfix mail version = 2.9.6 settings - worked
# See /usr/share/postfix/ for a commented, more complete version
# Debian specific: Specifying a file name will cause the first
# line of that file to be used as the name. The Debian default
# is /etc/mailname.
#myorigin = /etc/mailname
smtpd_banner = $myhostname ESMTP $mail_name (Debian/GNU)
biff = no
AysadKozanoglu /
Created April 10, 2016 23:33
postfix mail version 2.9.6 settings worked (wheezy)
# Postfix master process configuration file. For details on the format
# of the file, see the master(5) manual page (command: "man 5 master").
# Do not forget to execute "postfix reload" after editing this file.
# ==========================================================================
# service type private unpriv chroot wakeup maxproc command + args
# (yes) (yes) (yes) (never) (100)
# ==========================================================================
AysadKozanoglu /
Created April 10, 2016 23:40
spamhaus blacklisted iptable blocker script
echo “”
echo -n “Deleting DROP list from existing firewall…”
#This will delete all dropped ips from firewall