start new:
tmux
start new with session name:
tmux new -s myname
Sometimes after a hard reboot (power cut), if your synology cannot be logged in with DSM and it shows "System is getting ready. Please log in later" , please do these steps : | |
#Admin login via ssh | |
> synobootseq --set-boot-done | |
> synobootseq --is-ready | |
#optional | |
> /usr/syno/etc/rc.d/S97apache-sys.sh start | |
> /usr/syno/etc/rc.d/S95sshd.sh start |
############################################################################### | |
# The MIT License | |
# | |
# Copyright 2012-2014 Jakub Jirutka <jakub@jirutka.cz>. | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy | |
# of this software and associated documentation files (the "Software"), to deal | |
# in the Software without restriction, including without limitation the rights | |
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
# copies of the Software, and to permit persons to whom the Software is |
#!/bin/bash | |
# name of the ipset - v4 or v6 will be appended. | |
IPSET_NAME=cloudflare- | |
# argument: v4 or v6 (defaults to v4) | |
cloudflare_ipset () | |
{ | |
local ipv | |
local inetv |
Please see the most up-to-date version of this protocol on my blog at https://darencard.net/blog/.
inotify-tools
is installed (https://github.com/rvoicilas/inotify-tools)This worker script will evaluate your origin response, and replace html comments marked as fragment:key
with a respective prefetch defined in a X-Fragments
response header.
Your origin must include the X-Fragments
header, specifying the a comma separated list of prefetch requests to make for that response.
< HTTP/1.1 200 OK
The patch described below may no longer be necessary. CloudFlare instructions here. Perl module JSON::Any
may still be required, however, see comments.
Dyn's free dynamic DNS service will be ending on Wednesday, May 7th, 2014.
CloudFlare, however, has a little known feature that will allow you to update your DNS records via API or a command line script called ddclient. This will
Enclosed are some sanitized samples of data GreyNoise has identified and collected related to the Log4J vulnerability exploitation in the wild. GreyNoise infrastructure IPs have been removed while preserving the data to the best of our ability. Please note that GreyNoise HAS NOT verified if any of these are effective. These examples are not a comprehensive coverage of all the payloads GreyNoise have observed.
These samples are intended to provide individuals with a clearer idea of some of the variation in the wild.
The follow section includes Log4Shell samples seen in the wild
What appears to be a failed attempt:
from scapy.all import * | |
import requests | |
import time | |
MAGIC_FORM_URL = 'http://put-your-url-here' | |
def record_poop(): | |
data = { | |
"Timestamp": time.strftime("%Y-%m-%d %H:%M"), | |
"Measurement": 'Poopy Diaper' | |
} |