Purchasing a Comodo PositiveSSL cert via gogetssl.com and installing it on an Nginx server.
Prior to purchasing a cert, you need to generate a private key, and a CSR file
Set up a new Debian 7 machine and install the usual basic packages | |
sudo apt-get install open-vm-tools lynx vim curl psmisc snmpd ntp patch rcconf rsync equivs | |
Add wheezy-backport apt-source | |
sudo vim /etc/apt/sources.list: | |
deb http://ftp.se.debian.org/debian/ wheezy-backports main non-free contrib | |
deb-src http://ftp.se.debian.org/debian/ wheezy-backports main non-free contrib | |
sudo apt-get update |
I hereby claim:
To claim this, I am signing this object:
## A spamassassin plugin for calling clamav | |
# Version 2.0 was downloaded from https://wiki.apache.org/spamassassin/ClamAVPlugin | |
# | |
# # version 2.0, 2010-01-07 | |
# - use SA public interface set_tag() and add_header, instead of | |
# pushing a header field directly into $conf->{headers_spam} | |
# | |
# # version 2.1, 2017-09-09 (pmeulen): | |
# - Allow ClamAV::Client, which is provided by debian package libclamav-client-perl, to be used | |
# in addition to File::Scan::ClamAV |
This guide provides instructions on how to install and configure the Network UPS Tools (NUT) server/client to manage the power supply of your homelab components through a pfSense router, VMware ESXi hypervisor, and Synology NAS.
In this configuration, the pfSense router acts as the NUT server connected to the UPS, while the VMware ESXi and Synology NAS act as NUT clients, receiving UPS status information from the NUT server running on the pfSense router.