For Linux (Ubuntu/Debian-based Distributions)
- Update the system repositories:
sudo apt update
- Install Open VMware Tools:
I hope this helps you all!
I’m the only one who has managed to solve this issue, and so far, no one else has posted about it. That’s why I’ll be the first to share the correct solution because I’ve successfully done it.
To keep using ESXi, the first thing you need is an ISO that includes the correct drivers. I’ve prepared an ISO specifically optimized for OVH servers.
The ISO is: ESXi-8.0U3sb-24262298-nvme-usbnic
function Get-WindowsKey { | |
$Path = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | |
$DigitalProductId = (Get-ItemProperty -Path $Path).DigitalProductId | |
$ProductKey = "" | |
$KeyOffset = 52 | |
$Chars = "BCDFGHJKMPQRTVWXY2346789" | |
for ($i = 0; $i -lt 25; $i++) { | |
$Current = 0 | |
for ($j = 14; $j -ge 0; $j--) { | |
$Current = $Current * 256 -bxor $DigitalProductId[$KeyOffset + $j] |
This guide will help you migrate a Koha 16.05 instance from an older Ubuntu 14.04.6 LTS server to a new Ubuntu 22.04 LTS server. The instance will be named "koha16".
This guide covers two important aspects:
The process described is applicable both for a new installation and for an update on the existing server. In my case, I migrated from CentOS 7 to AlmaLinux 9.4.
First, create a backup of the files and database of your old Passbolt server. To do this, execute:
Reference: https://docs.konghq.com/hub/kong-inc/rate-limiting-advanced/
The rate-limiting-advanced-ok plugin is designed to provide enhanced rate limiting capabilities to services managed by Kong API Gateway. This plugin extends the basic rate limiting features by offering more granular control over rate limits based on a variety of criteria including IP, consumer, credential, and more. It supports both sliding and fixed window types for flexibility in how rate limits are enforced.
NOTE: The code was rewritten based on the original "rate-limiting-advanced" on May 27, 2024.
This Python script automates the process of setting MySQL database privileges for users managed under a cPanel/WHM environment. It leverages the cPanel's UAPI and WHM API to modify database privileges based on a predefined list of users. The script is particularly useful for system administrators who need to manage database access rights efficiently across multiple users.
This Bash script automates the configuration of SSH services on Oracle Linux 8.9, including dynamic port assignment based on IP address input, SELinux and firewall adjustments, and SSH key pair generation with enhanced security measures.
The script starts by verifying the presence of an IP address as input. It then parses the IP address to construct a unique SSH port number based on predefined rules: the port number starts with a '6', followed by the first digit of the first IP octet, and the last digits of the remaining three octets.
The script provided is a Bash shell script designed to compute an SSH port number based on a specific set of rules applied to an input IP address. Here's a detailed description of how the script works and what it's designed to do:
The purpose of this Bash script is to dynamically calculate a port number for SSH connections based on a unique format derived from an IP address. The script takes a single IP address as an input argument and processes it to generate a custom SSH port. The custom port number is constructed following these rules:
This method ensures that each IP address is likely to correspond to a unique port number, facilitating distinct SSH configurations for different servers or devices identified by their IP addresses.
First off, I want to state that what I'm about to describe isn't lawful. If you need access to secret credentials, you should request them from your administrator. I am not responsible for any misuse of this information.
The aim is to obtain secret keys for Docker registry repositories accessible from a pipeline.
When a pipeline runs, Docker registry credentials aren't exposed in the output. This is a security measure; credentials are replaced with asterisks, like so: