OptionField - How to Succeed with Binary Options Trading ...

Ethereum on ARM. New Eth2.0 Raspberry Pi 4 image for joining the Medalla multi-client testnet. Step-by-step guide for installing and activating a validator (Prysm, Teku, Lighthouse and Nimbus clients included)

TL;DR: Flash your Raspberry Pi 4, plug in an ethernet cable, connect the SSD disk and power up the device to join the Eth2.0 medalla testnet.
The image takes care of all the necessary steps to join the Eth2.0 Medalla multi-client testnet [1], from setting up the environment and formatting the SSD disk to installing, managing and running the Eth1.0 and Eth2.0 clients.
You will only need to choose an Eth2.0 client, start the beacon chain service and activate / run the validator.
Note: this is an update for our previous Raspberry Pi 4 Eth2 image [2] so some of the instructions are directly taken from there.

MAIN FEATURES

SOFTWARE INCLUDED

INSTALLATION GUIDE AND USAGE

RECOMMENDED HARDWARE AND SETUP
STORAGE
You will need an SSD to run the Ethereum clients (without an SSD drive there’s absolutely no chance of syncing the Ethereum blockchain). There are 2 options:
Use an USB portable SSD disk such as the Samsung T5 Portable SSD.
Use an USB 3.0 External Hard Drive Case with a SSD Disk. In our case we used a Inateck 2.5 Hard Drive Enclosure FE2011. Make sure to buy a case with an UASP compliant chip, particularly, one of these: JMicron (JMS567 or JMS578) or ASMedia (ASM1153E).
In both cases, avoid getting low quality SSD disks as it is a key component of your node and it can drastically affect the performance (and sync times). Keep in mind that you need to plug the disk to an USB 3.0 port (in blue).
IMAGE DOWNLOAD AND INSTALLATION
1.- Download the image:
http://www.ethraspbian.com/downloads/ubuntu-20.04.1-preinstalled-server-arm64+raspi-eth2-medalla.img.zip
SHA256 149cb9b020d1c49fcf75c00449c74c6f38364df1700534b5e87f970080597d87
2.- Flash the image
Insert the microSD in your Desktop / Laptop and download the file.
Note: If you are not comfortable with command line or if you are running Windows, you can use Etcher [10]
Open a terminal and check your MicroSD device name running:
sudo fdisk -l
You should see a device named mmcblk0 or sdd. Unzip and flash the image:
unzip ubuntu-20.04.1-preinstalled-server-arm64+raspi-eth2-medalla.img.zip
sudo dd bs=1M if=ubuntu-20.04.1-preinstalled-server-arm64+raspi.img of=/dev/mmcblk0 conv=fdatasync status=progress
3.- Insert de MicroSD into the Raspberry Pi 4. Connect an Ethernet cable and attach the USB SSD disk (make sure you are using a blue port).
4.- Power on the device
The Ubuntu OS will boot up in less than one minute but you will need to wait approximately 7-8 minutes in order to allow the script to perform the necessary tasks to install the Medalla setup (it will reboot again)
5.- Log in
You can log in through SSH or using the console (if you have a monitor and keyboard attached)
User: ethereum Password: ethereum 
You will be prompted to change the password on first login, so you will need to log in twice.
6.- Forward 30303 port in your router (both UDP and TCP). If you don’t know how to do this, google “port forwarding” followed by your router model. You will need to open additional ports as well depending on the Eth2.0 client you’ve chosen.
7.- Getting console output
You can see what’s happening in the background by typing:
sudo tail -f /valog/syslog
8.- Grafana Dashboards
There are 5 Grafana dashboards available to monitor the Medalla node (see section “Grafana Dashboards” below).

The Medalla Eth2.0 multi-client testnet

Medalla is the official Eth2.0 multi-client testnet according to the latest official specification for Eth2.0, the v0.12.2 [11] release (which is aimed to be the final) [12].
In order to run a Medalla Eth 2.0 node you will need 3 components:
The image takes care of the Eth1.0 setup. So, once flashed (and after a first reboot), Geth (Eth1.0 client) starts to sync the Goerli testnet.
Follow these steps to enable your Eth2.0 Ethereum node:
CREATE THE VALIDATOR KEYS AND MAKE THE DEPOSIT
We need to get 32 Goerli ETH (fake ETH) ir order to make the deposit in the Eth2.0 contract and run the validator. The easiest way of getting ETH is by joining Prysm Discord's channel.
Open Metamask [14], select the Goerli Network (top of the window) and copy your ETH Address. Go to:
https://discord.com/invite/YMVYzv6
And open the “request-goerli-eth” channel (on the left)
Type:
!send $YOUR_ETH_ADDRESS (replace it with the one copied on Metamask)
You will receive enough ETH to run 1 validator.
Now it is time to create your validator keys and the deposit information. For your convenience we’ve packaged the official Eth2 launchpad tool [4]. Go to the EF Eth2.0 launchpad site:
https://medalla.launchpad.ethereum.org/
And click “Get started”
Read and accept all warnings. In the next screen, select 1 validator and go to your Raspberry Pi console. Under the ethereum account run:
cd && deposit --num_validators 1 --chain medalla
Choose your mnemonic language and type a password for keeping your keys safe. Write down your mnemonic password, press any key and type it again as requested.
Now you have 2 Json files under the validator_keys directory. A deposit data file for sending the 32 ETH along with your validator public key to the Eth1 chain (goerli testnet) and a keystore file with your validator keys.
Back to the Launchpad website, check "I am keeping my keys safe and have written down my mnemonic phrase" and click "Continue".
It is time to send the 32 ETH deposit to the Eth1 chain. You need the deposit file (located in your Raspberry Pi). You can, either copy and paste the file content and save it as a new file in your desktop or copy the file from the Raspberry to your desktop through SSH.
1.- Copy and paste: Connected through SSH to your Raspberry Pi, type:
cat validator_keys/deposit_data-$FILE-ID.json (replace $FILE-ID with yours)
Copy the content (the text in square brackets), go back to your desktop, paste it into your favourite editor and save it as a json file.
Or
2.- Ssh: From your desktop, copy the file:
scp [email protected]$YOUR_RASPBERRYPI_IP:/home/ethereum/validator_keys/deposit_data-$FILE_ID.json /tmp
Replace the variables with your data. This will copy the file to your desktop /tmp directory.
Upload the deposit file
Now, back to the Launchpad website, upload the deposit_data file and select Metamask, click continue and check all warnings. Continue and click “Initiate the Transaction”. Confirm the transaction in Metamask and wait for the confirmation (a notification will pop up shortly).
The Beacon Chain (which is connected to the Eth1 chain) will detect this deposit (that includes the validator public key) and the Validator will be enabled.
Congrats!, you just started your validator activation process.
CHOOSE AN ETH2.0 CLIENT
Time to choose your Eth2.0 client. We encourage you to run Lighthouse, Teku or Nimbus as Prysm is the most used client by far and diversity is key to achieve a resilient and healthy Eth2.0 network.
Once you have decided which client to run (as said, try to run one with low network usage), you need to set up the clients and start both, the beacon chain and the validator.
These are the instructions for enabling each client (Remember, choose just one Eth2.0 client out of 4):
LIGHTHOUSE ETH2.0 CLIENT
1.- Port forwarding
You need to open the 9000 port in your router (both UDP and TCP)
2.- Start the beacon chain
Under the ethereum account, run:
sudo systemctl enable lighthouse-beacon
sudo systemctl start lighthouse-beacon
3.- Start de validator
We need to import the validator keys. Run under the ethereum account:
lighthouse account validator import --directory=/home/ethereum/validator_keys
Then, type your previously defined password and run:
sudo systemctl enable lighthouse-validator
sudo systemctl start lighthouse-validator
The Lighthouse beacon chain and validator are now enabled

PRYSM ETH2.0 CLIENT
1.- Port forwarding
You need to open the 13000 and 12000 ports in your router (both UDP and TCP)
2.- Start the beacon chain
Under the ethereum account, run:
sudo systemctl enable prysm-beacon
sudo systemctl start prysm-beacon
3.- Start de validator
We need to import the validator keys. Run under the ethereum account:
validator accounts-v2 import --keys-dir=/home/ethereum/validator_keys
Accept the default wallet path and enter a password for your wallet. Now enter the password previously defined.
Lastly, set up your password and start the client:
echo "$YOUR_PASSWORD" > /home/ethereum/validator_keys/prysm-password.txt
sudo systemctl enable prysm-validator
sudo systemctl start prysm-validator
The Prysm beacon chain and the validator are now enabled.

TEKU ETH2.0 CLIENT
1.- Port forwarding
You need to open the 9151 port (both UDP and TCP)
2.- Start the Beacon Chain and the Validator
Under the Ethereum account, check the name of your keystore file:
ls /home/ethereum/validator_keys/keystore*
Set the keystore file name in the teku config file (replace the $KEYSTORE_FILE variable with the file listed above)
sudo sed -i 's/changeme/$KEYSTORE_FILE/' /etc/ethereum/teku.conf
Set the password previously entered:
echo "yourpassword" > validator_keys/teku-password.txt
Start the beacon chain and the validator:
sudo systemctl enable teku
sudo systemctl start teku
The Teku beacon chain and validator are now enabled.

NIMBUS ETH2.0 CLIENT
1.- Port forwarding
You need to open the 19000 port (both UDP and TCP)
2.- Start the Beacon Chain and the Validator
We need to import the validator keys. Run under the ethereum account:
beacon_node deposits import /home/ethereum/validator_keys --data-dir=/home/ethereum/.nimbus --log-file=/home/ethereum/.nimbus/nimbus.log
Enter the password previously defined and run:
sudo systemctl enable nimbus
sudo systemctl start nimbus
The Nimbus beacon chain and validator are now enabled.

WHAT's NEXT
Now you need to wait for the Eth1 blockchain and the beacon chain to get synced. In a few hours the validator will get enabled and put into a queue. These are the validator status that you will see until its final activation:
Finally, it will get activated and the staking process will start.
Congratulations!, you join the Medalla Eth2.0 multiclient testnet!

Grafana Dashboards

We configured 5 Grafana Dashboards to let users monitor both Eth1.0 and Eth2.0 clients. To access the dashboards just open your browser and type your Raspberry IP followed by the 3000 port:
http://replace_with_your_IP:3000 user: admin passwd: ethereum 
There are 5 dashboards available:
Lots of info here. You can see for example if Geth is in sync by checking (in the Blockchain section) if Headers, Receipts and Blocks fields are aligned or find Eth2.0 chain info.

Updating the software

We will be keeping the Eth2.0 clients updated through Debian packages in order to keep up with the testnet progress. Basically, you need to update the repo and install the packages through the apt command. For instance, in order to update all packages you would run:
sudo apt-get update && sudo apt-get install geth teku nimbus prysm-beacon prysm-validator lighthouse-beacon lighthouse-validator
Please follow us on Twitter in order to get regular updates and install instructions.
https://twitter.com/EthereumOnARM

References

  1. https://github.com/goerli/medalla/tree/mastemedalla
  2. https://www.reddit.com/ethereum/comments/hhvi2ethereum_on_arm_new_eth20_raspberry_pi_4_image/
  3. https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20
  4. https://github.com/ethereum/eth2.0-deposit-cli/releases
  5. https://github.com/prysmaticlabs/prysm/releases/tag/v1.0.0-alpha.23
  6. https://github.com/PegaSysEng/teku
  7. https://github.com/sigp/lighthouse/releases/tag/v0.2.8
  8. https://github.com/status-im/nim-beacon-chain
  9. https://grafana.com
  10. https://www.balena.io/etcher
  11. https://github.com/ethereum/eth2.0-specs/releases/tag/v0.12.2
  12. https://blog.ethereum.org/2020/08/03/eth2-quick-update-no-14
  13. https://goerli.net
  14. https://metamask.io
submitted by diglos76 to ethereum [link] [comments]

11-04 23:47 - 'DON'T USE THIS' (self.linux) by /u/CreeperTyE removed from /r/linux within 6-16min

'''
This is for cyberpatriots, pls don't use this.
#!/bin/bash
# CyberPatriot Ubuntu (Trusty Tahr) Script v0.3.5
# Root is required to run this script, but chmod should not be used on script or run as root.
# User running script must be in group 'sudo'.
#
# Not everything is covered in this script. Please make sure to review checklist and the Securing Debian Manual.
# This script is only meant to be used for whichever team Keita Susuki is on.
# CHANGES: sed is now more often used to find and replace instead of append to config files
function main {
kernel_info=$(uname -a)
time=$(date)
display_info=$(whoami)
sshd="/etc/ssh/sshd_config"
apache_s="/etc/apache2/apache2.conf"
vsftpd_s="/etc/vsftpd.conf"
echo "---------------------------------------------------------"
echo "Script version: v0.3.5"
echo "Current User: $display_info"
echo "Team: Binary Bros"
echo "Current Time: $time"
echo "Kernel info: $kernel_info"
echo "Now, what can I do for you today?"
echo "---------------------------------------------------------"
echo -en '\n'
read -p "Press ENTER to continue."
echo -en '\n'
echo "WARNING: IF YOU HAVE NEGLECTED TO COMPLETE THE FORENSICS QUESTIONS, IMMEDIATELY CTRL+C THIS SCRIPT."
echo "HAVE YOU COMPLETED ALL THE FORENSICS QUESTIONS? [Y/N]"
read -r forensic_questions
if [[ $forensic_questions == "y" || $forensic_questions == "Y" ]]; then
clear
echo "Good. Now let's start working."
elif [[ $forensic_questions == "n" || $forensic_questions == "N" ]]; then
echo "Finish the forensics questions and come back."
exit
else
echo "Error: bad input."
fi
echo "Before using apt, we need to check to see if sources.list hasn't been tampered with."
echo "Redirecting you to /etc/apt/sources.list in 5 seconds..."
sleep 5
sudo gedit /etc/apt/sources.list
echo "Securing /run/shm."
echo "r-- is dangerous, only on servers if there is no reason for /run/shm."
echo "Read only /run/shm can cause many programs to break. Be cautious."
echo -en '\n'
echo "Options:"
echo "Mount /run/shm r-- (read-only) [r]"
echo "Mount /run/shm rw- (read-write) [w]"
echo "Skip this method. [x]"
read -r shared_memory
if [[ $shared_memory == "r" || $shared_memory == "R" ]]; then
echo "none /run/shm tmpfs defaults,ro 0 0" | sudo tee -a /etc/fstab
echo "Done. Restart box after script has run its course."
elif [[ $shared_memory == "w" || $shared_memory == "w" ]]; then
echo "none /run/shm tmpfs rw,noexec,nosuid,nodev 0 0" | sudo tee -a /etc/fstab
echo "Done. Restart box after script has run its course."
elif [[ $shared_memory == "x" || $shared_memory == "X" ]]; then
echo "Understood. Check UnsafeDefaults page on Ubuntu's website."
fi
echo -en '\n'
echo "Next, we will check hosts file. Make sure nothing looks amiss (default config)."
echo "Redirecting you to hosts file in 5 seconds..."
sleep 5
sudo gedit /etc/hosts
echo -en '\n'
echo "See if nameserver is unfamiliar, if it is, change to google public (8.8.8.8)."
echo "Redirecting you in 3 seconds..."
sudo gedit /etc/resolv.conf
echo -en '\n'
echo "I will now install packages necessary for the security of the system."
echo -en '\n'
sudo apt-get -y -qq install rkhunter clamav clamtk gufw ufw libpam-cracklib vim nmap sysv-rc-conf bum unattended-upgrades logcheck lynis members auditd chkrootkit fail2ban
echo -en '\n'
echo "Configuring automatic upgrades.."
sudo dpkg-reconfigure --priority=low unattended-upgrades
echo "Would you like to manually use gufw or have the script automatically use ufw and close off ports?"
echo -en '\n'
echo "Options:"
echo "g: gufw"
echo "a: auto ufw"
echo "ga: ufw then manual gufw"
read -r firewall_config
if [[ $firewall_config == "g" || $firewall_config == "G" ]]; then
echo "Opening gufw in 5 seconds..."
sleep 5
sudo gufw
elif [[ $firewall_config == "a" || $firewall_config == "A" ]]; then
sudo ufw enable
sudo ufw deny 23
sudo ufw deny 2049
sudo ufw deny 515
sudo ufw deny 111
sudo ufw deny 9051
sudo ufw deny 31337
sudo ufw status
echo "Automatic configuration of firewall completed. I recommend that you look over this again."
sleep 10
elif [[ $firewall_config == "ga" || $firewall_config == "GA" ]]; then
sudo ufw enable
sudo ufw deny 23
sudo ufw deny 2049
sudo ufw deny 515
sudo ufw deny 111
sudo ufw deny 9051
sudo ufw deny 31337
sudo gufw
else
echo "Error: bad input."
fi
clear
echo -en '\n'
echo "Running nmap on 127.0.0.1 to display open ports..." # nmap isn't considered a "hacking tool"
echo "Would you also like to save output to nmap_output.txt [y/n]?"
echo -en '\n'
read -r nmap_input
if [[ $nmap_input == "y" || $nmap_input == "Y" ]]; then
echo "Sending output to nmap_output.txt.."
touch nmap_output.txt
echo "Running nmap on localhost again so you can see the output."
nmap -sV 127.0.0.1 > nmap_output.txt
sleep 10
echo -en '\n'
elif [[ $nmap_input == "n" || $nmap_input == "N" ]]; then
echo "Understood. Running nmap on localhost.."
nmap -sV 127.0.0.1
sleep 10
echo -en '\n'
else
echo "Error: bad input."
echo -en '\n'
fi
echo "Now please disable unneeded processes keeping ports open."
sleep 5
sudo sysv-rc-conf # preferred tool for this
echo -en '\n'
echo "Please make sure there is nothing besides exit 0 and some comments."
sleep 5
sudo vim /etc/rc.local
echo -en '\n'
echo "Checking for sshd_config file"
if [ -f "$sshd" ]; then
echo "sshd is present on this system."
echo "Is sshd a critical service on this machine? [y/n]"
echo "note: selecting N will remove sshd from this system. Proceed with caution."
read -r sshd_critical
if [[ $sshd_critical == "y" || $sshd_critical == "Y" ]]; then
sshd_secure_config
elif [[ $sshd_critical == "n" || $sshd_critical == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
echo -en '\n'
echo "Would you like to restart sshd? [y/n]"
read -r sshd_restart_uinput
if [[ $sshd_restart_uinput == "Y" || $sshd_restart_uinput == "y" ]]; then # may take points and then give back
echo "Restarting sshd..."
sudo service sshd restart
elif [[ $sshd_restart_uinput == "n" || $sshd_restart_uinput == "N" ]]; then
echo "Understood. Remember that changes will not happen until sshd is restarted."
else
echo "Error: bad input."
fi
fi
clear
echo -en '\n'
echo "Disabling guest user and turning off autologin. Editing /etc/lightdm/lightdm.conf"
echo "Checklist reference: GENERAL/8 Alpha, Bravo"
echo "Remember to restart lightdm or restart box later on."
echo "I will direct you there in 5 seconds."
sleep 5
sudo vim /etc/lightdm/lightdm.conf
echo -en '\n'
printf "Now, would you like for me to add some better settings for /etc/sysctl.conf? [y\n]"
read -r secure_sysctl
if [[ $secure_sysctl == "y" || $secure_sysctl == "Y" ]]; then
sysctl_secure_config
elif [[ $secure_sysctl == "n" || $secure_sysctl == "N" ]]; then
echo -en '\n'
echo "Understood, I recommend you do this manually however."
else
echo -en '\n'
echo "Error: bad input"
fi
echo -en '\n'
echo "Lock the root account? [y/n]"
read -r disable_root
echo -en '\n'
if [[ $disable_root == "y" || $disable_root == "Y" ]]; then
sudo passwd -l root
echo "Root account locked."
elif [[ $disable_root == "n" || $disable_root == "N" ]]; then
echo "Understood, manually lock please."
else
echo "Bad input."
fi
clear
echo -en '\n'
echo "Limit access to su to all users but the ones in group wheel? [y/n]"
echo -en '\n'
read -r lim_su
if [[ $lim_su == "y" || $lim_su == "Y" ]]; then
sudo chown [link]1 /bin/su sudo
chmod 04750 /bin/su
echo "Done."
elif [[ $lim_su == "n" || $lim_su == "N" ]]; then
echo "Remember to manually limit access to su! All it takes is a single uncomment..."
else
echo "Bad input."
fi
clear
if [[ -f "$apache_s" ]]; then
echo "Is apache2 supposed to be installed on this system? [y/n]"
echo "If you choose N then you will subsequently uninstall apache2. Be careful."
read -r apache2_que
if [[ $apache2_que == "y" || $apache2_que == "Y" ]]; then
echo "Understood, moving on to securing apache2."
apache2_secure
elif [[ $apache2_que == "n" || $apache2_que == "N" ]]; then
echo "Uninstalling apache2..."
sudo service apache2 stop
sudo apt-get purge apache2
else
echo "Bad input."
fi
else
echo "Apache2 is not installed, moving on."
fi
if [[ -f "$vsftpd_s" ]]; then
echo "vsftpd configuration file detected."
echo "Is vsftpd a critical service on this machine? [y/n]"
echo "If you choose N then you will subsequently uninstall vsftpd. Be careful."
read -r vsftpd_choice
if [[ $vsftpd_choice == "y" || $vsftpd_choice == "Y" ]]; then
echo "Understood, moving on to securing vsftpd."
vsftpd_secure
elif [[ $vsftpd_choice == "n" || $vsftpd_choice == "N" ]]; then
sudo service vsftpd stop
sudo apt-get purge vsftpd
else
echo "Bad input."
fi
else
echo "vsftpd is not installed on this machine, moving on."
fi
clear
echo "Check apparmor? [y/n]"
read -r apparmor_check
if [[ $apparmor_check == "y" || $apparmor_check == "Y" ]]; then
apparmor_fix
elif [[ $apparmor_check == "n" || $apparmor_check == "N" ]]; then
echo "Understood, moving on."
echo -en '\n'
else
echo "Error: bad input."
fi
echo -en '\n'
echo "Deny su to non admins? [y/n]"
echo -en '\n'
read -r deny_su
if [[ $deny_su == "y" || $deny_su == "Y" ]]; then
sudo dpkg-statoverride --update --add root sudo 4750 /bin/su
echo "Done."
elif [[ $deny_su == "n" || $deny_su == "N" ]]; then
sudo "Understood, moving on."
else
echo "Error: bad input."
fi
echo -en '\n'
echo "Secure home directory? [y/n]"
echo "NOTE: potentially dangerous."
echo -en '\n'
read -r home_secure
if [[ $home_secure == "y" || $home_secure == "Y" ]]; then
echo "What is your username?"
echo "I need it so I can chmod 0700 your home directory."
read -r username_uinput
sudo chmod 0700 /home/"$username_uinput"
echo "Thanks!."
elif [[ $home_secure == "n" || $home_secure == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
clear
echo -en '\n'
echo "Prevent IP spoofing? [y/n]"
echo "(/etc/host.conf)"
read -r ip_spoof
echo -en '\n'
if [[ $ip_spoof == "y" || $ip_spoof == "Y" ]]; then
echo "order bind,hosts" | sudo tee -a /etc/host.conf
echo "nospoof on" | sudo tee -a /etc/host.conf
echo "IP spoofing disabled."
elif [[ $ip_spoof == "n" || $ip_spoof == "N" ]]; then
echo "Understood, skipping disabling ip spoofing."
else
echo "Error: bad input."
fi
echo "Would you like to edit /etc/pam.d? [y/n]"
read -r pam_secure
if [[ $pam_secure == "y" || $pam_secure == "Y" ]]; then
echo "Use subroutine pam_secure? [y/n]"
read -r choose_pam_secure
if [[ $choose_pam_secure == "y" || $choose_pam_secure == "Y" ]]; then
pam_secure
elif [[ $choose_pam_secure == "n" || $choose_pam_secure == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
echo "Redirecting you to /etc/pam.d/common-password. Use checklist."
echo "Checklist reference: GENERAL/10 ALPHA"
echo -en '\n'
sleep 5
sudo vim /etc/pam.d/common-password
echo -en '\n'
echo "Redirecting you to /etc/pam.d/common-auth. Use checklist."
echo "Checklist reference: GENERAL/10 BRAVO"
sleep 5
sudo vim /etc/pam.d/common-auth
echo -en '\n'
echo "Redirecting you to /etc/login.defs. Use checklist."
echo "Checklist reference: GENERAL/10 CHARLIE"
sleep 5
sudo vim /etc/login.defs
elif [[ $pam_secure == "n" || $pam_secure == "N" ]]; then
echo "Understood, will skip securing pam.d. Make sure to use the checklist and do so manually."
else
echo "Sorry, bad input."
fi
clear
echo -en '\n'
echo "Would you like to delete media files? [y/n]"
echo "Warning: Feature untested due to obvious reasons."
echo -en '\n'
read -r media_input
if [[ $media_input == "y" || $media_input == "Y" ]]; then
sudo find / -name '*.mp3' -type f -delete
sudo find / -name '*.mov' -type f -delete
sudo find / -name '*.mp4' -type f -delete
sudo find / -name '*.avi' -type f -delete
sudo find / -name '*.mpg' -type f -delete
sudo find / -name '*.mpeg' -type f -delete
sudo find / -name '*.flac' -type f -delete
sudo find / -name '*.m4a' -type f -delete
sudo find / -name '*.flv' -type f -delete
sudo find / -name '*.ogg' -type f -delete
sudo find /home -name '*.gif' -type f -delete
sudo find /home -name '*.png' -type f -delete
sudo find /home -name '*.jpg' -type f -delete
sudo find /home -name '*.jpeg' -type f -delete
elif [[ $media_input == "n" || $media_input == "N" ]]; then
echo "Understood, manually search and destroy media files."
else
echo "Error: bad input."
fi
echo -en '\n'
clear
echo "Would you like to install updates? [y/n]"
read -r update_input
if [[ $update_input == "y" || $update_input == "Y" ]]; then
sudo apt-get -qq -y update
sudo apt-get -qq -y upgrade
sudo apt-get -qq -y dist-upgrade
sudo apt-get -qq -y autoremove
elif [[ $update_input == "n" || $update_input == "N" ]]; then
echo "Understood, moving on."
echo -en '\n'
else
echo "Error: bad input."
echo -en '\n'
fi
sudo freshclam
clear
echo "Run chkrootkit and rkhunter? [y/n]"
read -r rootkit_chk
if [[ $rootkit_chk == "y" || $rootkit_chk == "Y" ]]; then
touch rkhunter_output.txt
echo "Rkhunter output file created as rkhunter_output.txt."
touch chkrootkit_output.txt
echo "chkrootkit output file created as chkrootkit_output.txt."
sudo chkrootkit | tee chkrootkit_output.txt
sudo rkhunter -c | tee rkhunter_output.txt
elif [[ $rootkit_chk == "n" || $rootkit_chk == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
sudo clamscan -r /
clear
echo -en '\n'
sleep 5
touch lynis_output.txt
echo "Lynis output file created as lynis_output.txt."
sudo lynis -c | tee lynis_output.txt
echo "Enable apparmor? [y/n]"
read -r apparmor_enabling
if [[ $apparmor_enabling == "y" || $apparmor_enabling == "Y" ]]; then
sudo perl -pi -e 's,GRUB_CMDLINE_LINUX="(.*)"$,GRUB_CMDLINE_LINUX="$1 apparmor=1 security=apparmor",' /etc/default/grub
sudo update-grub
elif [[ $apparmor_enabling == "n" || $apparmor_enabling == "N" ]]; then
echo "Understood, you should enable it however."
else
echo "Error: bad input."
fi
echo "The script has run it's course."
echo "Remember to manually check config files and finish any changes."
echo -en '\n'
echo "--------------------------------------------------------"
echo "INFORMATION"
echo "--------------------------------------------------------"
echo "Current User: $display_info"
echo "Current Time: $time"
echo "Kernel info: $kernel_info"
echo "--------------------------------------------------------"
echo -en '\n'
read -p "Press ENTER to reboot the system."
sudo reboot
}
function apache2_secure {
sudo apt-get -y install libapache2-modsecurity
sudo apt-get -y install libapache2-modevasive
sudo sed -i 's/^#?ServerSignature .*/ServerSignature Off/g' /etc/apache2/conf-enabled/security.conf
sudo sed -i 's/^#?ServerTokens .*/ServerTokens Off/g' /etc/apache2/conf-enabled/security.conf
sudo sed -i 's/^#?Options .*/Options None/g' /etc/apache2/apache2.conf
sudo sed -i 's/^#?AllowOverride .*/AllowOverride None/g' /etc/apache2/apache2.conf
sudo sed -i 's/^#?Require*/Require all granted/g' /etc/apache2/apache2.conf
sudo sed -i 's/^#?LimitRequestBody*/LimitRequestBody 204800/g' /etc/apache2/apache2.conf
echo "" | sudo tee -a /etc/apache2/apache2.conf
echo "Order deny, allow" | sudo tee -a /etc/apache2/apache2.conf
echo "Deny from all" | sudo tee -a /etc/apache2/apache2.conf
echo "Check if mod_security module is running..."
echo "
" | sudo tee -a /etc/apache2/apache2.conf
sudo sed -i 's/^#?Timeout*/Timeout 15/g' /etc/apache2/apache2.conf
sudo sed -i 's/^#?LimitXMLRequestBody*/LimitXMLRequestBody 204800/' /etc/apache2/apache2.conf
sudo apachectl -M | grep --color security
echo "Is mod_security on? It should say security2_module somewhere."
read -r security_a2_on
if [[ $security_a2_on == "y" || $security_a2_on == "Y" ]]; then
echo "Good. I will move on."
elif [[ $security_a2_on == "n" || $security_a2_on == "N" ]]; then
sudo mv /etc/modsecurity/modsecurity.conf-recommended /etc/modsecurity/modsecurity.conf
sudo sed -i 's/^#?SecRuleEngine .*/SecRuleEngine On/g' /etc/modsecurity/modsecurity.conf
sudo service apache2 restart
else
echo "Error: bad input."
fi
return 1
}
function pam_secure {
sudo sed -i 's/^#?PASS_MAX_DAYS .*/PASS_MAX_DAYS 90/g' /etc/login.defs
sudo sed -i 's/^#?PASS_MIN_DAYS .*/PASS_MIN_DAYS 7/g' /etc/login.defs
sudo sed -i 's/^#?PASS_WARN_AGE .*/PASS_WARN_AGE 7/g' /etc/login.defs
echo "Setup failed login attempts in /etc/pam.d/common-auth and add some config changes? [y/n]"
read -r fail_pamd_ca
if [[ $fail_pamd_ca == "y" || $fail_pamd_ca == "Y" ]]; then
echo "auth optional pam_tally.so deny=5 unlock_time=900 onerr=fail audit even_deny_root_account silent" | sudo tee -a /etc/pam.d/common-auth
sudo sed -i 's/^#?pam_unix.so .*/password [success=1 default=ignore] pam_unix.so obscure use_authtok try_first_pass sha512
remember=10 minlen=8 difok=5/g' /etc/pam.d/common-password
elif [[ $fail_pamd_ca == "n" || $fail_pamd_ca == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
echo "Create brutally paranoid configuration for /etc/pam.d/other? [y/n]"
echo "NOTE: IF PAM FILES ARE DELETED ACCIDENTALLY, SYSTEM FAILURE MAY OCCUR."
read -r other_paranoid
if [[ $other_paranoid == "y" || $other_paranoid == "Y" ]]; then
echo "auth required pam_deny.so" | sudo tee -a /etc/pam.d/other
echo "auth required pam_warn.so" | sudo tee -a /etc/pam.d/other
echo "account required pam_deny.so" | sudo tee -a /etc/pam.d/other
echo "account required pam_warn.so" | sudo tee -a /etc/pam.d/other
echo "password required pam_deny.so" | sudo tee -a /etc/pam.d/other
echo "password required pam_warn.so" | sudo tee -a /etc/pam.d/other
echo "session required pam_deny.so" | sudo tee -a /etc/pam.d/other
echo "session required pam_warn.so" | sudo tee -a /etc/pam.d/other
elif [[ $other_paranoid == "n" || $other_paranoid == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
return 1
}
function vsftpd_secure {
sudo sed -i 's/^anonymous_enable=.*/anonymous_enable=NO/g' /etc/vsftpd.conf
echo "Anonymous FTP login disabled."
sudo sed -i 's/^chroot_local_user=.*/chroot_local_user=YES/g' /etc/vsftpd.conf
echo "Local users restricted to their home directories."
echo "Create SSL/TLS certificate and private key for vsftpd server? [y/n]"
read -r ssl_vsftpd
if [[ $ssl_vsftpd == "y" || $ssl_vsftpd == "Y" ]]; then
sudo openssl req -x509 -days 365 -newkey [link]2 -nodes -keyout /etc/vsftpd.pem -out /etc/vsftpd.pem
echo "Created."
echo "Making config changes..."
sudo sed -i 's/^#?ssl_enable=.*/ssl_enable=YES/g' /etc/vsftpd.conf #enable tls/ssl
echo "SSL enabled."
sudo sed -i 's/^#?allow_anon_ssl=.*/allow_anon_ssl=NO/g' /etc/vsftpd.conf
sudo sed -i 's/^#?force_local_data_ssl=.*/force_local_data_ssl=YES/g' /etc/vsftpd.conf
sudo sed -i 's/^#?force_local_logins_ssl=.*/force_local_logins_ssl=YES/g' /etc/vsftpd.conf
sudo sed -i 's/^#?ssl_tlsv1=.*/ssl_tlsv1=YES/g' /etc/vsftpd.conf
sudo sed -i 's/^#?ssl_sslv2=.*/ssl_sslv2=NO/g' /etc/vsftpd.conf
sudo sed -i 's/^#?ssl_sslv3=.*/ssl_sslv3=NO/g' /etc/vsftpd.conf
sudo sed -i 's/^#?require_ssl_reuse=.*/require_ssl_reuse=NO/g' /etc/vsftpd.conf
sudo sed -i 's/^#?ssl_ciphers=.*/ssl_ciphers=HIGH/g' /etc/vsftpd.conf
sudo sed -i 's/^#?rsa_cert_file=.*/rsa_cert_file=/etc/vsftpd.pem/g' /etc/vsftpd.conf
sudo sed -i 's/^#?rsa_private_key_file=.*/rsa_private_key_file=/etc/vsftpd.pem/g' /etc/vsftpd.conf
sudo sed -i 's/^#?pasv_max_port=.*/pasv_max_port=65535/g' /etc/vsftpd.conf
sudo sed -i 's/^#?pasv_min_port=.*/pasv_min_port=64000/g' /etc/vsftpd.conf
sudo sed -i 's/^#?local_max_rate=.*/local_max_rate=30000/g' /etc/vsftpd.conf
sudo sed -i 's/^#?idle_session_timeout=.*/idle_session_timeout=120/g' /etc/vsftpd.conf
sudo sed -i 's/^#?max_per_ip=.*/max_per_ip=15/g' /etc/vsftpd.conf
sudo sed -i 's/^#?xferlog_enable=.*/xferlog_enable=YES/g' /etc/vsftpd.conf
sudo sed -i 's/^#?xferlog_std_format=.*/xferlog_std_format=NO/g' /etc/vsftpd.conf
sudo sed -i 's/^#?xferlog_file=.*/xferlog_file=/valog/vsftpd.log/g' /etc/vsftpd.conf
echo "Log file set at /valog/vsftpd.log"
sudo sed -i 's/^#?log_ftp_protocol=.*/log_ftp_protocol=YES/g' /etc/vsftpd.conf
sudo sed -i 's/^#?debug_ssl=.*/debug_ssl=YES/g' /etc/vsftpd.conf
echo "Configuration changes complete. Check /etc/vsftpd.conf later to see if they have all been done."
echo -en '\n'
echo "[link]3 "
echo -en '\n'
echo "Adding firewall exceptions.."
sudo ufw allow 20
sudo ufw allow 21
sudo ufw allow 64000:65535/tcp
sudo iptables -I INPUT -p tcp --dport 64000:65535 -j ACCEPT
elif [[ $ssl_vsftpd == "n" || $ssl_vsftpd == "N" ]]; then
echo "Understood. However, this is recommended."
else
echo "Error: bad input."
fi
echo "Restart vsftpd? [y/n]"
read -r vsftpd_restart
if [[ $vsftpd_restart == "y" || $vsftpd_restart == "Y" ]]; then
sudo service vsftpd restart
elif [[ $vsftpd_restart == "n" || $vsftpd_restart == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
return 1
}
function apparmor_fix {
if [ -f /ussbin/apparmor_status ]; then
echo "Apparmor already installed."
else
echo "Apparmor not installed, installing."
sudo apt-get install -y -qq apparmor apparmor-profiles apparmor-utils
echo "Apparmor will be enabled at the end of the script."
fi
return 1
}
function sshd_secure_config {
sudo sed -i 's/^#?PermitRootLogin .*/PermitRootLogin no/' /etc/ssh/sshd_config
return 1
sudo sed -i 's/^#?PermitEmptyPasswords .*/PermitEmptyPasswords no/' /etc/ssh/sshd_config
sudo sed -i 's/^#?Port .*/Port 2223/' /etc/ssh/sshd_config
sudo sed -i 's/^#?X11Forwarding .*/X11Forwarding no/' /etc/ssh/sshd_config
sudo ufw allow 2223
sudo sed -i 's/^#?Protocol .*/Protocol 2/' /etc/ssh/sshd_config
sudo sed -i 's/^#?PrintLastLog .*/PrintLastLog no/' /etc/ssh/sshd_config
sudo sed -i 's/^#?IgnoreRhosts .*/IgnoreRhosts yes/' /etc/ssh/sshd_config
sudo sed -i 's/^#?RhostsAuthentication .*/RhostsAuthentication no/' /etc/ssh/sshd_config
sudo sed -i 's/^#?RSAAuthentication .*/RSAAuthentication yes/' /etc/ssh/sshd_config
sudo sed -i 's/^#?HostbasedAuthentication .*/HostbasedAuthentication no/' /etc/ssh/sshd_config
sudo sed -i 's/^#?LoginGraceTime .*/LoginGraceTime 60/' /etc/ssh/sshd_config
sudo sed -i 's/^#?MaxStartups .*/MaxStartups 4/' /etc/ssh/sshd_config
echo "Automatic configuration complete."
sudo sed -i 's/^#?LogLevel .*/LogLevel VERBOSE/' /etc/ssh/sshd_config
echo "ClientAliveInterval 300" | sudo tee -a /etc/ssh/sshd_config
echo "ClientAliveCountMax 0" | sudo tee -a /etc/ssh/sshd_config
sudo sed -i 's/^#?StrictModes .*/StrictModes yes/' /etc/ssh/sshd_config
clear
echo "Use iptables to try to prevent bruteforcing? [y/n]"
read -r iptable_ssh
if [[ $iptable_ssh == "y" || $iptable_ssh == "Y" ]]; then
iptables -A INPUT -p tcp --dport 2223 -m state --state NEW -m recent --set --name ssh --rsource
iptables -A INPUT -p tcp --dport 2223 -m state --state NEW -m recent ! --rcheck --seconds 60 --hitcount 4 --name ssh --rsource -j ACCEPT
echo "Done."
elif [[ $iptable_ssh == "n" || $iptable_ssh == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
echo "Use public/private keys for authentication instead of passwords? [y/n]"
read -r auth_private
if [[ $auth_private == "y" || $auth_private == "Y" ]]; then
sudo ssh-keygen -t rsa
clear
sudo chmod 700 ~/.ssh
sudo chmod 600 ~/.ssh/id_rsa
cat id_rsa.pub >> ~/.ssh/authorized_keys
sudo chmod 600 ~/.ssh/authorized_keys
restorecon -Rv ~/.ssh
sudo sed -i 's/^#?PasswordAuthentication .*/PasswordAuthentication no/' /etc/ssh/sshd_config
elif [[ $auth_private == "n" || $auth_private == "N" ]]; then
echo "Understood, moving on."
else
echo "Error: bad input."
fi
return 1
}
function sysctl_secure_config {
echo "kernel.sysrq = 0" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.accept_source_route = 0" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.accept_redirects = 0" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.rp_filter = 1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.log_martians = 1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.icmp_echo_ignore_all = 1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.tcp_syncookies=1" | sudo tee -a /etc/sysctl.conf
clear
echo -en '\n'
echo "Disable IPv6? [y/n]"
echo -en '\n'
read -r ipv6_disable
if [[ $ipv6_disable == "y" || $ipv6_disable == "Y" ]]; then
echo "net.ipv6.conf.all.disable_ipv6 = 1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv6.conf.default.disable_ipv6 = 1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv6.conf.lo.disable_ipv6 = 1" | sudo tee -a /etc/sysctl.conf
echo "IPv6 disabled."
elif [[ $ipv6_disable == "n" || $ipv6_disable == "N" ]]; then
echo "Understood, skipping disabling IPv6."
else
echo "Error: bad input."
fi
return 1
}
if [ "$(id -u)" != "0" ]; then
echo "Please run this script as root. I promise I won't dd /dev/urandom into /dev/sda..."
exit
else
main
fi
'''
DON'T USE THIS
Go1dfish undelete link
unreddit undelete link
Author: CreeperTyE
1: root:admin 2: rsa:2048 3: *modulo.co*/*e*u*e-ftp*s*rvi*e-v*ftp*-linux*ht*l
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

crash help

dcs has been cashing for months, used to never crash before :/

=== Log opened UTC 2020-10-11 14:18:20
2020-10-11 14:18:20.217 INFO DCS: Command line: D:\SteamLibrary\steamapps\common\DCSWorld\bin\DCS.exe
2020-10-11 14:18:20.217 INFO DCS: DCS/2.5.6.55960 (x86_64; Windows NT 10.0.18363)
2020-10-11 14:18:20.217 INFO DCS: DCS revision: 175957
2020-10-11 14:18:20.217 INFO DCS: Renderer revision: 20900
2020-10-11 14:18:20.217 INFO DCS: Terrain revision: 20771
2020-10-11 14:18:20.217 INFO DCS: CPU cores: 6, threads: 12, System RAM: 16333 MB, Pagefile: 9728 MB
2020-10-11 14:18:20.574 INFO EDCORE: (dDispatcher)enterToState_:0
2020-10-11 14:18:21.012 INFO Dispatcher: 2020/10/11 10:18 V1803061700
2020-10-11 14:18:21.081 INFO INPUT: Device [Keyboard] created deviceId = -1
2020-10-11 14:18:21.102 INFO INPUT: Device [Joystick - HOTAS Warthog {9BEE9130-944C-11ea-8002-444553540000}] created deviceId = -1
2020-10-11 14:18:21.102 INFO INPUT: Joystick created[Joystick - HOTAS Warthog {9BEE9130-944C-11ea-8002-444553540000}], ForceFeedBack: no
2020-10-11 14:18:21.151 INFO INPUT: Device [Throttle - HOTAS Warthog {7F0A2CA0-944C-11ea-8001-444553540000}] created deviceId = -1
2020-10-11 14:18:21.151 INFO INPUT: Joystick created[Throttle - HOTAS Warthog {7F0A2CA0-944C-11ea-8001-444553540000}], ForceFeedBack: no
2020-10-11 14:18:21.151 INFO INPUT: Device [Mouse] created deviceId = -1
2020-10-11 14:18:21.229 INFO SOUND: Using driver: wasapi
2020-10-11 14:18:21.232 INFO SOUND: Found 4 available audio device(s):
2020-10-11 14:18:21.232 INFO SOUND: 0: ID: "{0.0.0.00000000}.{a3bc94c3-9243-4999-94ca-cf14d01bfd63}", Name: "VG248 (3- NVIDIA High Definition Audio)"
2020-10-11 14:18:21.232 INFO SOUND: 1: ID: "{0.0.0.00000000}.{b9b8fde4-1f79-4ade-bbaa-bf1f2d844bc0}", Name: "Headphones (Oculus Virtual Audio Device)"
2020-10-11 14:18:21.232 INFO SOUND: 2: ID: "{0.0.0.00000000}.{e7804ff2-fc95-4bbc-9ba2-0e82dab295c7}", Name: "VE228 (3- NVIDIA High Definition Audio)"
2020-10-11 14:18:21.232 INFO SOUND: 3: ID: "{0.0.0.00000000}.{eefc5f93-4c6c-44cd-98cc-74f502409cb3}", Name: "Speakers (2- Yeti Stereo Microphone)"
2020-10-11 14:18:25.940 INFO SOUND: Added sound path: Sounds
2020-10-11 14:18:26.057 INFO SOUNDER: Loaded 207 packed sounders.
2020-10-11 14:18:26.057 INFO Dispatcher: InitLow
2020-10-11 14:18:28.003 INFO NET: Got Steam auth data.
2020-10-11 14:18:28.267 INFO DCS: Successfully got Steam authorization data.
2020-10-11 14:18:28.267 INFO Dispatcher: Loading installed modules...
2020-10-11 14:18:41.794 INFO Scripting: OBSOLETE mount_vfs_sound_path() used in ./CoreMods/aircraft/AJS37/entry.lua
2020-10-11 14:18:41.987 INFO Scripting: PLUGINS START-------------------------------------------------
2020-10-11 14:18:42.289 INFO SOUND: Added sound path: ./CoreMods/tech/TechWeaponPack/Sounds
2020-10-11 14:18:42.306 INFO SOUNDER: Loaded 3 packed sounders.
2020-10-11 14:18:42.734 INFO SOUND: Added sound path: ./CoreMods/tech/USS John C Stennis/Sounds
2020-10-11 14:18:42.735 INFO SOUNDER: Loaded 1 packed sounders.
2020-10-11 14:18:42.762 INFO SOUND: Added sound path: ./CoreMods/tech/USS_Nimitz/Sounds
2020-10-11 14:18:42.776 INFO SOUNDER: Loaded 3 packed sounders.
2020-10-11 14:18:43.542 INFO SOUND: Added sound path: ./CoreMods/aircraft/AJS37/Sounds
2020-10-11 14:18:43.661 INFO SOUND: Added sound path: ./CoreMods/aircraft/AV8BNA/Sounds
2020-10-11 14:18:43.669 INFO SOUNDER: Loaded 1 sounders.
2020-10-11 14:18:43.672 WARNING EDCORE: Source ./CoreMods/aircraft/AV8BNA/Shapes is already mounted to the same mount /models/.
2020-10-11 14:18:43.783 INFO SOUND: Added sound path: ./CoreMods/aircraft/C-101/Sounds
2020-10-11 14:18:44.163 INFO SOUND: Added sound path: ./CoreMods/aircraft/ChinaAssetPack/Sounds
2020-10-11 14:18:44.210 INFO SOUNDER: Loaded 11 sounders.
2020-10-11 14:18:44.487 INFO SOUND: Added sound path: ./CoreMods/aircraft/Christen Eagle II/Sounds
2020-10-11 14:18:46.253 INFO SOUND: Added sound path: ./CoreMods/aircraft/F14/Sounds
2020-10-11 14:18:46.302 INFO SOUNDER: Loaded 1 sounders.
2020-10-11 14:18:46.982 INFO SOUND: Added sound path: ./CoreMods/aircraft/Hawk/Sounds
2020-10-11 14:18:47.256 INFO SOUND: Added sound path: ./CoreMods/aircraft/I-16/Sounds
2020-10-11 14:18:47.502 INFO SOUND: Added sound path: ./CoreMods/aircraft/M-2000C/Sounds
2020-10-11 14:18:47.832 INFO SOUND: Added sound path: ./CoreMods/aircraft/MiG-21bis/Sounds
2020-10-11 14:18:47.992 INFO SOUND: Added sound path: ./CoreMods/aircraft/SA342/Sounds
2020-10-11 14:18:48.183 INFO SOUND: Added sound path: ./Mods/aircraft/F-15C/Sounds
2020-10-11 14:18:48.318 INFO SOUND: Added sound path: ./Mods/aircraft/F-16C/Sounds
2020-10-11 14:18:48.527 INFO SOUND: Added sound path: ./Mods/aircraft/FA-18C/Sounds
2020-10-11 14:18:48.667 INFO SOUND: Added sound path: ./Mods/aircraft/TF-51D/Sounds
2020-10-11 14:18:48.717 INFO SOUND: Added sound path: ./Mods/terrains/PersianGulf/Sounds
2020-10-11 14:18:48.782 INFO Scripting: PLUGINS DONE--------------------------------------------------
2020-10-11 14:18:49.315 INFO SECURITYCONTROL: Loaded ./CoreMods/aircraft/AV8BNA/bin/AV8B_AI.dll
2020-10-11 14:18:49.318 INFO SECURITYCONTROL: Loaded ./CoreMods/aircraft/C-101/bin/C101Core.dll
2020-10-11 14:18:49.322 INFO SECURITYCONTROL: Loaded ./CoreMods/aircraft/ChinaAssetPack/bin/CAP_AI.dll
2020-10-11 14:18:49.326 INFO SECURITYCONTROL: Loaded ./CoreMods/aircraft/ChinaAssetPack/bin/JF-17_AI.dll
2020-10-11 14:18:49.329 INFO CE2_AI: Loading CE AI
2020-10-11 14:18:49.329 INFO SECURITYCONTROL: Loaded ./CoreMods/aircraft/Christen Eagle II/bin/CE2_AI.dll
2020-10-11 14:18:49.333 INFO SECURITYCONTROL: Loaded ./CoreMods/aircraft/F14/bin/F14-AI.dll
2020-10-11 14:18:49.337 INFO MiG21_AI: Loading CE AI
2020-10-11 14:18:49.337 INFO SECURITYCONTROL: Loaded ./CoreMods/aircraft/MiG-21bis/bin/MiG21_AI.dll
2020-10-11 14:18:49.345 INFO SECURITYCONTROL: Loaded ./CoreMods/services/CaptoGlove/bin/edCaptoGlove.dll
2020-10-11 14:18:49.401 INFO SECURITYCONTROL: Loaded ./CoreMods/services/VoiceChat/bin/VoiceChat.dll
2020-10-11 14:18:49.802 INFO SECURITYCONTROL: Loaded ./Mods/aircraft/jsAvionics/bin/jsAvionics.dll
2020-10-11 14:18:52.059 INFO DCS: options.graphics =
{
\['messagesFontScale'\] = 1; \['rainDroplets'\] = true; \['LensEffects'\] = 0; \['heatBlr'\] = 1; \['anisotropy'\] = 3; \['water'\] = 2; \['motionBlur'\] = 0; \['outputGamma'\] = 2.2; \['treesVisibility'\] = 10000; \['aspect'\] = 1.7777777777778; \['lights'\] = 2; \['shadows'\] = 4; \['MSAA'\] = 1; \['SSAA'\] = 0; \['civTraffic'\] = 'high'; \['clutterMaxDistance'\] = 1000; \['cockpitGI'\] = 1; \['terrainTextures'\] = 'max'; \['multiMonitorSetup'\] = '1camera'; \['shadowTree'\] = false; \['chimneySmokeDensity'\] = 5; \['fullScreen'\] = true; \['DOF'\] = 0; \['clouds'\] = 1; \['forestDistanceFactor'\] = 1; \['flatTerrainShadows'\] = 0; \['width'\] = 1920; \['visibRange'\] = 'High'; \['SSLR'\] = 1; \['effects'\] = 3; \['SSAO'\] = 0; \['useDeferredShading'\] = 1; \['sync'\] = true; \['textures'\] = 2; \['scaleGui'\] = true; \['preloadRadius'\] = 60000; \['height'\] = 1080; \['terrainMapMFD'\] = { \['distance'\] = { \['mapLodDistance3'\] = 200000; \['mapLodDistance2'\] = 100000; \['mapLodDistance0'\] = 25000; \['mapLodDistance1'\] = 50000; }; }; 
};
2020-10-11 14:18:56.924 INFO GRAPHICSVISTA: renderer: 'dx11backend.dll'
2020-10-11 14:18:59.187 INFO DX11BACKEND: DX11Renderer initialization (w:1920 h:1080 fullscrn:1 vsync:0 adapter:0 monitor:1 shaderErrors:1)
2020-10-11 14:18:59.535 INFO DX11BACKEND: Driver Concurrent Creates - 1
2020-10-11 14:18:59.535 INFO DX11BACKEND: Driver Command Lists - 1
2020-10-11 14:18:59.654 INFO DX11BACKEND: NVIDIA API init OK
2020-10-11 14:18:59.660 INFO DX11BACKEND: NVIDIA Display Driver Version 45206.r452_02
2020-10-11 14:18:59.660 INFO DX11BACKEND: GPU count:1
2020-10-11 14:18:59.835 INFO DX11BACKEND: commonPool: 68-128, cbPool: 4-14, samplerPool: 5-16
2020-10-11 14:19:00.202 INFO DX11BACKEND: DX11ShaderBinaries::loadCache Bazashaders/fxo/fxo.zip
2020-10-11 14:19:05.330 ERROR EDCORE: Can't open file 'bazashaders/posteffects/slot.fx.' from fs
2020-10-11 14:19:05.330 WARNING DX11BACKEND: Shader posteffects/slot.fx:DIRECTX11=true;USE_DCS_DEFERRED=1; is outdated as file bazashaders/posteffects/slot.fx is modified.
2020-10-11 14:19:13.699 INFO DX11BACKEND: DX11ShaderBinaries::loadCache done. Loaded 1118/1119.
2020-10-11 14:19:13.753 INFO DX11BACKEND: DX11ShaderBinaries::loadCache C:\Users\ApBoy\Saved Games\DCS\fxo
2020-10-11 14:19:14.086 INFO DX11BACKEND: DX11ShaderBinaries::loadCache done. Loaded 62/62.
2020-10-11 14:19:14.509 INFO VISUALIZER: SceneManager initialization
2020-10-11 14:19:15.669 INFO VISUALIZER: cascade shadows init (preset:'default' quality:4 layers:4 size:4096)
2020-10-11 14:19:16.500 INFO SOUND: Opening default audio device.
2020-10-11 14:19:16.508 INFO SOUND: Driver reports 2 channels with mask 0x3
2020-10-11 14:19:16.508 INFO SOUND: Using 2 channels at 48000 Hz
2020-10-11 14:19:16.508 INFO SOUND: Channel layout: Headphones/Stereo
2020-10-11 14:19:16.859 INFO DCS: gDescription: "NVIDIA GeForce RTX 2070" gVendorId: 4318 gDeviceId: 7943 gMemory: 8031 MB
2020-10-11 14:19:16.983 ERROR EDOBJECTS: Destruction shape not found AVIASHTAB_CRASH
2020-10-11 14:19:16.985 ERROR EDOBJECTS: Object HB_F14_EXT_PHX_ALU with id=320 already declared in table MissileTable
2020-10-11 14:19:21.202 INFO EDCORE: (dDispatcher)enterToState_:1
2020-10-11 14:19:32.406 INFO UIBASERENDERER: Cannot load font [D:\SteamLibrary\steamapps\common\DCSWorld\dxgui\skins\fonts\]!
2020-10-11 14:19:38.362 INFO Dispatcher: //=== END OF INIT ======================================//
2020-10-11 14:19:38.362 INFO EDCORE: (dDispatcher)enterToState_:2
2020-10-11 14:19:38.463 INFO EDCORE: (dDispatcher)enterToState_:3
2020-10-11 14:19:38.463 INFO Lua: Lua CPU usage: metric: average game loading: 47.8552 %
2020-10-11 14:19:38.474 INFO DCS: Screen: MainMenu
2020-10-11 14:19:42.706 INFO NET: Login success.
2020-10-11 14:20:12.735 INFO SOUND: Using SSSE3 for peak calc.
2020-10-11 14:20:12.957 INFO DCS: Screen: Mission
2020-10-11 14:21:21.851 INFO DCS: Screen: MainMenu
2020-10-11 14:21:28.161 INFO DCS: Screen: FastMission
2020-10-11 14:21:37.690 INFO DCS: Screen: FastMissionAdvanced
2020-10-11 14:22:10.929 INFO DCS: Screen: MainMenu
2020-10-11 14:22:10.933 INFO DCS: Screen: FastMission
2020-10-11 14:22:29.263 INFO LUA-TERRAIN: Init('./Mods/terrains/Caucasus\terrain.cfg.lua')
2020-10-11 14:22:29.277 INFO TERRAIN: lSystem::load(./Mods/terrains/Caucasus\terrain.cfg.lua)
2020-10-11 14:22:29.277 INFO TERRAIN: lSystem::CleanScenes()
2020-10-11 14:22:29.277 INFO TERRAIN: lSystem::exit()
2020-10-11 14:22:29.277 INFO VISUALIZER: TerrainRenderer::release
2020-10-11 14:22:29.277 INFO TERRAIN: lSystem::CleanScenes()
2020-10-11 14:22:29.277 INFO EDOBJECTS: lTypeObjectManagerImpl::clear 13
2020-10-11 14:22:30.151 INFO EDTERRAIN4: TERRAIN_REVISION = 3634
2020-10-11 14:22:30.152 INFO EDTERRAIN4: Open terrain cfg "./Mods/terrains/Caucasus\terrain.cfg.lua"
2020-10-11 14:22:30.152 INFO EDTERRAIN4: Build date:
2020-10-11 14:22:30.152 INFO EDTERRAIN4: Texture quality: "max"
2020-10-11 14:22:31.277 INFO EDCORE: 1.072 s terrain references
2020-10-11 14:22:31.280 INFO EDCORE: 0.000 s terrain models
2020-10-11 14:22:31.284 INFO EDCORE: 0.000 s terrain assets
2020-10-11 14:22:31.519 INFO EDCORE: 0.232 s terrain assets2
2020-10-11 14:22:31.789 INFO EDCORE: 0.266 s terrain landfile
2020-10-11 14:22:31.807 INFO EDCORE: 0.014 s terrain surfaceTile
2020-10-11 14:22:31.812 INFO EDTERRAIN4: switchTextures (season=1, minTexture=false)
2020-10-11 14:22:33.298 INFO EDCORE: 1.487 s terrain vfstextures
2020-10-11 14:22:33.420 INFO EDCORE: 0.118 s terrain scene
2020-10-11 14:22:33.423 INFO EDCORE: 0.000 s terrain roaddetails
2020-10-11 14:22:33.427 INFO EDCORE: 0.000 s terrain forest
2020-10-11 14:22:40.255 INFO EDCORE: 6.824 s terrain routes
2020-10-11 14:22:40.260 INFO EDCORE: 0.000 s terrain surfacedetails
2020-10-11 14:22:40.263 INFO EDCORE: 0.000 s terrain blocks
2020-10-11 14:22:40.297 INFO EDCORE: 0.000 s terrain references
2020-10-11 14:22:40.588 INFO EDCORE: 0.322 s terrain superficials
2020-10-11 14:22:40.628 INFO EDCORE: 0.035 s terrain lma
2020-10-11 14:22:40.632 INFO EDCORE: 0.000 s terrain vectordatasettings
2020-10-11 14:22:42.496 INFO EDCORE: 1.860 s terrain navgraph
2020-10-11 14:22:42.544 INFO EDCORE: 0.043 s terrain vti
2020-10-11 14:22:43.670 INFO EDTERRAIN4: terrain time: 13.517271 s
2020-10-11 14:22:43.896 INFO TERRAIN: lSystem::InitScenes()
2020-10-11 14:22:43.896 INFO EDTERRAIN4: lTerraDispatchImpl::setDate( day=22, month=6)
2020-10-11 14:22:43.896 INFO EDTERRAIN4: switchTextures (season=1, minTexture=false)
2020-10-11 14:22:43.896 INFO DX11BACKEND: Reloading textures ...
2020-10-11 14:22:43.903 INFO LUA-TERRAIN: Init done
2020-10-11 14:22:44.032 INFO EDTERRAINGRAPHICS41: ITerrainGraphicsImpl4::openTerrain() START
2020-10-11 14:22:44.045 INFO EDTERRAINGRAPHICS41: loading terrain options: Config/terrain/terrainoptions41.lua
2020-10-11 14:22:44.059 INFO EDTERRAINGRAPHICS41: loading terrain shading options: ./Mods/terrains/Caucasus/shadingOptions/Caucasus.lua
2020-10-11 14:22:44.100 INFO METASHADER: MetaShaderCache2: [108] from ./Mods/terrains/Caucasus/misc/metacache/dcs.lua
2020-10-11 14:22:47.790 INFO METASHADER: loaded [108/108]
2020-10-11 14:22:47.890 WARNING EDTERRAINGRAPHICS41: failed to open "surfaceDetailsHints" section in terrain config
2020-10-11 14:22:47.995 INFO EDTERRAINGRAPHICS41: 0.000010s Loaded reference file "caucasus" buffers: 0
2020-10-11 14:22:47.995 INFO EDCORE: 0.000 s landscape4::lReferenceFile
2020-10-11 14:22:48.073 INFO EDTERRAINGRAPHICS41: 0.073605s Loaded reference file "airfieldslights" buffers: 7
2020-10-11 14:22:48.073 INFO EDCORE: 0.074 s landscape4::lReferenceFile
2020-10-11 14:22:48.655 INFO EDTERRAINGRAPHICS41: 0.578093s Loaded reference file "blockbuildings" buffers: 7
2020-10-11 14:22:48.655 INFO EDCORE: 0.578 s landscape4::lReferenceFile
2020-10-11 14:22:49.225 INFO EDTERRAINGRAPHICS41: 0.565400s Loaded reference file "blocktrees" buffers: 0
2020-10-11 14:22:49.225 INFO EDCORE: 0.565 s landscape4::lReferenceFile
2020-10-11 14:22:49.623 INFO EDTERRAINGRAPHICS41: 0.393164s Loaded reference file "caucasusafbbuildings_new" buffers: 27
2020-10-11 14:22:49.623 INFO EDCORE: 0.393 s landscape4::lReferenceFile
2020-10-11 14:22:49.639 INFO EDTERRAINGRAPHICS41: 0.012748s Loaded reference file "caucasusbridges" buffers: 11
2020-10-11 14:22:49.639 INFO EDCORE: 0.013 s landscape4::lReferenceFile
2020-10-11 14:22:49.697 INFO EDTERRAINGRAPHICS41: 0.053496s Loaded reference file "caucasusobjects" buffers: 0
2020-10-11 14:22:49.697 INFO EDCORE: 0.054 s landscape4::lReferenceFile
2020-10-11 14:22:49.711 INFO EDTERRAINGRAPHICS41: 0.008986s Loaded reference file "communication" buffers: 7
2020-10-11 14:22:49.711 INFO EDCORE: 0.009 s landscape4::lReferenceFile
2020-10-11 14:22:49.716 INFO EDTERRAINGRAPHICS41: 0.000351s Loaded reference file "crashmodels" buffers: 1
2020-10-11 14:22:49.716 INFO EDCORE: 0.000 s landscape4::lReferenceFile
2020-10-11 14:22:49.807 INFO EDTERRAINGRAPHICS41: 0.085697s Loaded reference file "crashmodelsfromedm" buffers: 22
2020-10-11 14:22:49.807 INFO EDCORE: 0.086 s landscape4::lReferenceFile
2020-10-11 14:22:49.837 INFO EDTERRAINGRAPHICS41: 0.025959s Loaded reference file "housedetails" buffers: 9
2020-10-11 14:22:49.837 INFO EDCORE: 0.026 s landscape4::lReferenceFile
2020-10-11 14:22:49.844 INFO EDTERRAINGRAPHICS41: 0.003396s Loaded reference file "industrial" buffers: 7
2020-10-11 14:22:49.844 INFO EDCORE: 0.003 s landscape4::lReferenceFile
2020-10-11 14:22:49.875 INFO EDTERRAINGRAPHICS41: 0.026320s Loaded reference file "misc" buffers: 3
2020-10-11 14:22:49.875 INFO EDCORE: 0.026 s landscape4::lReferenceFile
2020-10-11 14:22:49.886 INFO EDTERRAINGRAPHICS41: 0.006227s Loaded reference file "oilplatforms" buffers: 7
2020-10-11 14:22:49.886 INFO EDCORE: 0.006 s landscape4::lReferenceFile
2020-10-11 14:22:49.896 INFO EDTERRAINGRAPHICS41: 0.006233s Loaded reference file "tuapserefinery" buffers: 6
2020-10-11 14:22:49.896 INFO EDCORE: 0.006 s landscape4::lReferenceFile
2020-10-11 14:22:49.905 INFO EDTERRAINGRAPHICS41: 0.004649s Loaded reference file "vehicles" buffers: 9
2020-10-11 14:22:49.905 INFO EDCORE: 0.005 s landscape4::lReferenceFile
2020-10-11 14:22:49.914 INFO EDTERRAINGRAPHICS41: 0.004507s Loaded reference file "vessels" buffers: 7
2020-10-11 14:22:49.914 INFO EDCORE: 0.005 s landscape4::lReferenceFile
2020-10-11 14:22:49.926 INFO EDTERRAINGRAPHICS41: 0.008617s Loaded reference file "walls" buffers: 2
2020-10-11 14:22:49.926 INFO EDCORE: 0.009 s landscape4::lReferenceFile
2020-10-11 14:22:49.942 INFO EDTERRAINGRAPHICS41: 0.010335s Loaded reference file "americanbeech" buffers: 0
2020-10-11 14:22:49.942 INFO EDCORE: 0.010 s landscape4::lReferenceFile
2020-10-11 14:22:49.947 INFO EDTERRAINGRAPHICS41: 0.001066s Loaded reference file "caucasus_fir" buffers: 0
2020-10-11 14:22:49.947 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.952 INFO EDTERRAINGRAPHICS41: 0.000813s Loaded reference file "cypress_oak" buffers: 0
2020-10-11 14:22:49.952 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.957 INFO EDTERRAINGRAPHICS41: 0.000834s Loaded reference file "european_beech" buffers: 0
2020-10-11 14:22:49.957 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.961 INFO EDTERRAINGRAPHICS41: 0.000630s Loaded reference file "green_ash" buffers: 0
2020-10-11 14:22:49.961 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.966 INFO EDTERRAINGRAPHICS41: 0.000919s Loaded reference file "honey_mesquite" buffers: 0
2020-10-11 14:22:49.966 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.972 INFO EDTERRAINGRAPHICS41: 0.001254s Loaded reference file "italiancypress" buffers: 0
2020-10-11 14:22:49.972 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.979 INFO EDTERRAINGRAPHICS41: 0.001002s Loaded reference file "lombardypoplar" buffers: 0
2020-10-11 14:22:49.979 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.984 INFO EDTERRAINGRAPHICS41: 0.001451s Loaded reference file "mountain_maple" buffers: 0
2020-10-11 14:22:49.984 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.991 INFO EDTERRAINGRAPHICS41: 0.001008s Loaded reference file "norwayspruce" buffers: 0
2020-10-11 14:22:49.991 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.998 INFO EDTERRAINGRAPHICS41: 0.000759s Loaded reference file "shrub" buffers: 0
2020-10-11 14:22:49.998 INFO EDCORE: 0.001 s landscape4::lReferenceFile
2020-10-11 14:22:49.998 INFO EDTERRAINGRAPHICS41: InstanceManager2 is completing initialization...
2020-10-11 14:22:50.002 INFO EDTERRAINGRAPHICS41: InstanceManager2::updateObjectDeclBuffer()
2020-10-11 14:22:50.002 INFO EDTERRAINGRAPHICS41: InstanceManager2::updateObjectLodDeclBuffer()
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: InstanceManager2 complete initialization:
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: objects: 666
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: subObjects: 493
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: objectLods: 2911
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: objectLodRenderItems: 330
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: MAX_LODS_IN_OBJECT: 10
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: MAX_SUBOBJECTS_IN_OBJECT: 74
2020-10-11 14:22:50.004 INFO EDTERRAINGRAPHICS41: GEOMETRY BUFFERS: 132
2020-10-11 14:22:50.016 INFO EDCORE: 0.000 s landscape5::OceanFile
2020-10-11 14:22:51.136 INFO EDCORE: 1.115 s landscape5::GrassFile
2020-10-11 14:22:51.141 INFO EDCORE: 0.000 s landscape5::lModels5File
2020-10-11 14:22:51.401 WARNING LOG: 16 duplicate message(s) skipped.
2020-10-11 14:22:51.401 INFO EDTERRAINGRAPHICS41: remapper.deformers is not empty
2020-10-11 14:22:51.751 INFO EDTERRAINGRAPHICS41: materialParams[29084]*1536
2020-10-11 14:22:51.754 INFO EDCORE: 0.507 s landscape5::Surface5File
2020-10-11 14:22:51.784 INFO EDTERRAINGRAPHICS41: materialParams[810]*1536
2020-10-11 14:22:51.784 INFO EDCORE: 0.026 s landscape5::SurfaceTile
2020-10-11 14:22:51.790 INFO EDCORE: 0.001 s landscape5::Scene5File
2020-10-11 14:22:51.829 INFO EDCORE: 0.036 s landscape4::lRoutesFile
2020-10-11 14:22:51.867 INFO EDCORE: 0.034 s landscape4::lSurfaceDetails2File
2020-10-11 14:22:51.884 INFO EDTERRAINGRAPHICS41: materialParams[1]*1536
2020-10-11 14:22:51.884 INFO EDCORE: 0.013 s landscape4::lSuperficialFile
2020-10-11 14:22:51.908 INFO EDCORE: 0.020 s landscape4::lGeoNamesFile
2020-10-11 14:22:51.913 INFO EDCORE: 0.000 s landscape5::sup5File
2020-10-11 14:22:51.921 WARNING LOG: 1 duplicate message(s) skipped.
2020-10-11 14:22:51.921 INFO EDCORE: 0.000 s landscape5::navGraph5File
2020-10-11 14:22:51.921 INFO EDTERRAINGRAPHICS41: ITerrainGraphicsImpl4::openTerrain() END 7.889645 s
2020-10-11 14:22:51.989 ERROR_ONCE DX11BACKEND: render target 'mainDepthBuffer_copy' not found
2020-10-11 14:22:51.989 ERROR_ONCE DX11BACKEND: render target 'DummyShadowMap' not found
2020-10-11 14:23:26.265 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\cn\LC_MESSAGES\dcs.mo
2020-10-11 14:23:26.266 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\cs\LC_MESSAGES\dcs.mo
2020-10-11 14:23:26.266 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\de\LC_MESSAGES\dcs.mo
2020-10-11 14:23:26.267 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\es\LC_MESSAGES\dcs.mo
2020-10-11 14:23:26.268 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\fr\LC_MESSAGES\dcs.mo
2020-10-11 14:23:26.309 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\jp\LC_MESSAGES\dcs.mo
2020-10-11 14:23:26.345 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\pl\LC_MESSAGES\dcs.mo
2020-10-11 14:23:26.346 ERROR EDCORE: can't open MO-file D:\SteamLibrary\steamapps\common\DCSWorld\l10n\ru\LC_MESSAGES\dcs.mo
2020-10-11 14:23:41.607 INFO Dispatcher: loadMission C:\Users\ApBoy\AppData\Local\Temp\DCS\tempMission.miz
2020-10-11 14:23:41.607 INFO WORLDGENERAL: loading mission from: "C:\Users\ApBoy\AppData\Local\Temp\DCS\tempMission.miz"
2020-10-11 14:23:41.695 INFO EDCORE: (dDispatcher)enterToState_:4
2020-10-11 14:23:41.695 INFO Dispatcher: Terrain theatre Caucasus
2020-10-11 14:23:41.734 INFO Dispatcher: Start
2020-10-11 14:23:41.912 INFO Dispatcher: Terrain theatre Caucasus
2020-10-11 14:23:41.914 INFO TERRAIN: lSystem::load(./Mods/terrains/Caucasus\terrain.cfg.lua)
2020-10-11 14:23:41.914 INFO TERRAIN: lSystem::CleanScenes()
2020-10-11 14:23:41.914 INFO TERRAIN: lSystem::InitScenes()
2020-10-11 14:23:41.914 INFO EDTERRAIN4: lTerraDispatchImpl::setDate( day=18, month=11)
2020-10-11 14:23:41.914 INFO EDTERRAIN4: switch to season = autumn
2020-10-11 14:23:41.914 INFO EDTERRAIN4: switchTextures (season=2, minTexture=false)
2020-10-11 14:23:42.526 INFO DX11BACKEND: Reloading textures ...
2020-10-11 14:23:47.486 WARNING GRAPHICSCORE: already registered Renderer callback
2020-10-11 14:23:47.492 INFO VISUALIZER: StartSimulation
2020-10-11 14:23:47.993 INFO VISUALIZER: cascade shadows init (preset:'default' quality:4 layers:4 size:4096)
2020-10-11 14:23:48.869 ERROR_ONCE DX11BACKEND: texture 'lightning.dds' not found. Asked from 'EFFECTS2'
2020-10-11 14:23:50.385 ERROR_ONCE DX11BACKEND: texture 'LiquidAnimationAlphas' not found. Asked from 'EFFECTS2'
2020-10-11 14:23:50.385 ERROR_ONCE DX11BACKEND: texture 'LiquidAnimationNormals' not found. Asked from 'EFFECTS2'
2020-10-11 14:23:51.331 INFO Dispatcher: initial random seed = 6230979
2020-10-11 14:23:51.331 INFO Dispatcher: apply random seed = 6230979
2020-10-11 14:23:53.818 INFO WORLDGENERAL: loaded from mission Scripts/World/GPS_GNSS.lua
2020-10-11 14:23:55.957 INFO WORLDGENERAL: loaded from mission Config/View/SnapViewsDefault.lua
2020-10-11 14:23:55.965 INFO WORLDGENERAL: loaded from mission Config/View/View.lua
2020-10-11 14:23:55.975 INFO WORLDGENERAL: loaded from mission Config/View/Server.lua
2020-10-11 14:23:56.577 INFO Config: netview started
2020-10-11 14:23:57.705 INFO VISUALIZER: CameraIndependedPreload()
2020-10-11 14:23:57.705 INFO VISUALIZER: CameraIndependedPreload() finished
2020-10-11 14:23:57.705 INFO DCS: use_xRay: no
2020-10-11 14:24:17.625 INFO DCS: MissionSpawn:initScript
2020-10-11 14:24:17.625 INFO DCS: MissionSpawn:spawnCoalition red
2020-10-11 14:24:17.625 INFO DCS: MissionSpawn:spawnPlanes 18
2020-10-11 14:24:19.322 INFO DCS: MissionSpawn:spawnVehicles 24
2020-10-11 14:24:20.877 INFO GRAPHICSVISTA: Creating Resource "Unicode" of type 1
2020-10-11 14:24:21.800 INFO DCS: MissionSpawn:spawnVehicles 27
2020-10-11 14:24:21.803 INFO DCS: MissionSpawn:spawnVehicles 37
2020-10-11 14:24:22.260 INFO DCS: MissionSpawn:spawnPlanes 38
2020-10-11 14:24:22.318 INFO DCS: MissionSpawn:spawnHelicopters 0
2020-10-11 14:24:23.478 INFO DCS: MissionSpawn:spawnVehicles 0
2020-10-11 14:24:23.864 INFO DCS: MissionSpawn:spawnVehicles 43
2020-10-11 14:24:24.491 INFO DCS: MissionSpawn:spawnVehicles 19
2020-10-11 14:24:24.975 INFO DCS: MissionSpawn:spawnVehicles 47
2020-10-11 14:24:25.054 INFO DCS: MissionSpawn:spawnCoalition blue
2020-10-11 14:24:25.054 INFO DCS: MissionSpawn:spawnVehicles 16
2020-10-11 14:24:25.768 INFO DCS: MissionSpawn:spawnVehicles 15
2020-10-11 14:24:26.161 INFO DCS: MissionSpawn:spawnPlanes 9
2020-10-11 14:24:27.207 INFO DCS: MissionSpawn:spawnPlanes 2
2020-10-11 14:24:27.259 INFO DCS: MissionSpawn:spawnHelicopters 2
2020-10-11 14:24:29.025 INFO DCS: MissionSpawn:spawnVehicles 2
2020-10-11 14:24:31.391 INFO DCS: MissionSpawn:spawnLocalPlayer 62,F-16C_50
2020-10-11 14:24:31.973 INFO SECURITYCONTROL: Loaded ./Mods/aircraft/F-16C/bin/F16C.dll
2020-10-11 14:24:38.276 WARNING EDCORE: Source ./Mods/aircraft/F-16C/Cockpit/Scripts/../Shape is already mounted to the same mount /models/.
2020-10-11 14:24:38.757 INFO VISUALIZER: cockpit ILV loaded
2020-10-11 14:24:39.133 ERROR_ONCE DX11BACKEND: Can't load 'Fonts/font_general_RU.dds' in texture array ''.
2020-10-11 14:24:40.122 ERROR COCKPITBASE: devices_keeper::link_all: unable to find link target 'SMS' for device 'MAV_INTERFACE'
2020-10-11 14:24:41.652 ERROR COCKPITBASE: controller "SMS_AG_Harm_TER_TBL" missed in class cockpit::F16::ccMFD_F16
2020-10-11 14:24:44.257 WARNING LOG: 1 duplicate message(s) skipped.
2020-10-11 14:24:44.257 INFO COCKPITBASE: lua state still active DED, 26 (status undefined)
2020-10-11 14:24:44.257 INFO COCKPITBASE: lua state still active EHSI, 28 (status undefined)
2020-10-11 14:24:44.258 INFO COCKPITBASE: lua state still active UHF_RADIO, 36
2020-10-11 14:24:44.258 INFO COCKPITBASE: lua state still active VHF_RADIO, 38
2020-10-11 14:24:44.258 INFO COCKPITBASE: lua state still active INTERCOM, 39 (status undefined)
2020-10-11 14:24:44.259 INFO COCKPITBASE: lua state still active MACROS, 52 (status undefined)
2020-10-11 14:24:44.259 INFO COCKPITBASE: lua state still active TGP_INTERFACE, 58 (status undefined)
2020-10-11 14:24:44.666 ERROR SOUND: source_add(host:COCKPIT_MAIN, proto:Aircrafts/F-16/Cockpits/GearLockDown_In, alt_proto:Aircrafts//Cockpits/GearLockDown_In): can't find proto
2020-10-11 14:24:44.697 WARNING LOG: 1 duplicate message(s) skipped.
2020-10-11 14:24:44.697 INFO WORLDGENERAL: loaded from mission Scripts/World/birds.lua
2020-10-11 14:24:44.697 INFO DCS: dbox not found , skip
2020-10-11 14:24:46.709 INFO EDTERRAINGRAPHICS41: surface5 gc() LOD 0 0 squares
2020-10-11 14:24:46.709 INFO EDTERRAINGRAPHICS41: surface5 gc() LOD 1 0 squares
2020-10-11 14:24:46.709 INFO EDTERRAINGRAPHICS41: surface5 gc() 0.035400 ms
2020-10-11 14:24:46.813 INFO VISUALIZER: Preload() camera=15734.308756, 2023.594708, 233822.516476 radius=60000.000000
2020-10-11 14:24:46.813 INFO EDTERRAINGRAPHICS41: ITerrainGraphicsImpl4::forceLoading(): pos=(15734.3, 2023.59, 233823), radius=60000
2020-10-11 14:24:49.285 INFO EDCORE: try to write dump information
2020-10-11 14:24:49.287 INFO EDCORE: # -------------- 20201011-142449 --------------
2020-10-11 14:24:49.287 INFO EDCORE: DCS/2.5.6.55960 (x86_64; Windows NT 10.0.18363)
2020-10-11 14:24:49.289 INFO EDCORE: C:\WINDOWS\SYSTEM32\VCRUNTIME140.dll
2020-10-11 14:24:49.289 INFO EDCORE: # C0000005 ACCESS_VIOLATION at 10841637 00:00000000
2020-10-11 14:24:49.292 INFO EDCORE: SymInit: Symbol-SearchPath: '.', symOptions: 534, UserName: 'ApBoy'
2020-10-11 14:24:49.294 INFO EDCORE: OS-Version: 10.0.18363 () 0x300-0x1
2020-10-11 14:24:49.688 INFO EDCORE: 0x0000000000001637 (VCRUNTIME140): memcpy + 0x347
2020-10-11 14:24:49.688 INFO EDCORE: 0x000000000000988B (renderer): RenderAPI::openShader + 0x48B
2020-10-11 14:24:49.690 INFO EDCORE: 0x0000000000009280 (renderer): RenderAPI::openFromBlobShader + 0x180
2020-10-11 14:24:49.691 INFO EDCORE: 0x0000000000067D31 (metaShader): BaseBinder::render + 0x11431
2020-10-11 14:24:49.691 INFO EDCORE: 0x00000000000676AB (metaShader): BaseBinder::render + 0x10DAB
2020-10-11 14:24:49.691 INFO EDCORE: 0x000000000006BCCE (metaShader): BaseBinder::render + 0x153CE
2020-10-11 14:24:49.691 INFO EDCORE: 0x000000000000C624 (metaShader): render::MetaShaderManager::loadMetaShader + 0x174
2020-10-11 14:24:49.691 INFO EDCORE: 0x0000000000054101 (metaShader): RenderAPI::loadMetaShader + 0x41
2020-10-11 14:24:49.692 INFO EDCORE: 0x0000000000006604 (metaShader): render::MetaShader::open + 0x34
2020-10-11 14:24:49.692 INFO EDCORE: 0x00000000000990C8 (edterrainGraphics41): createInstancerRenderable + 0x6598
2020-10-11 14:24:49.693 INFO EDCORE: 0x000000000009B275 (edterrainGraphics41): createInstancerRenderable + 0x8745
2020-10-11 14:24:49.693 INFO EDCORE: 0x00000000000D9827 (edterrainGraphics41): CreateITerrainGraphics + 0x2227
2020-10-11 14:24:49.693 INFO EDCORE: 0x00000000000DAC19 (edterrainGraphics41): CreateITerrainGraphics + 0x3619
2020-10-11 14:24:49.693 INFO EDCORE: 0x00000000000F3B2D (edterrainGraphics41): edtg41::lMaterialParamsArrayGraphics::clear + 0xD5D
2020-10-11 14:24:49.693 INFO EDCORE: 0x0000000000063AE8 (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x531D8
2020-10-11 14:24:49.693 INFO EDCORE: 0x00000000000642EF (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x539DF
2020-10-11 14:24:49.694 INFO EDCORE: 0x0000000000063DF9 (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x534E9
2020-10-11 14:24:49.694 INFO EDCORE: 0x000000000006256E (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x51C5E
2020-10-11 14:24:49.694 INFO EDCORE: 0x0000000000060913 (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x50003
2020-10-11 14:24:49.694 INFO EDCORE: 0x0000000000060941 (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x50031
2020-10-11 14:24:49.695 WARNING LOG: 4 duplicate message(s) skipped.
2020-10-11 14:24:49.695 INFO EDCORE: 0x0000000000066220 (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x55910
2020-10-11 14:24:49.695 INFO EDCORE: 0x00000000000658FC (edterrainGraphics41): edtg41::TerrainRenderable::dumpRenderItem + 0x54FEC
2020-10-11 14:24:49.696 INFO EDCORE: 0x00000000000D0C15 (edterrainGraphics41): createInstancerRenderable + 0x3E0E5
2020-10-11 14:24:49.696 INFO EDCORE: 0x000000000011F30E (Visualizer): TerrainRenderer::forceLoading + 0x7E
2020-10-11 14:24:49.715 INFO EDCORE: 0x000000000014427E (Visualizer): smSceneManager::CreateSceneManager + 0x372E
2020-10-11 14:24:49.715 INFO EDCORE: 0x00000000007267A7 (DCS): CoreUtils::TempFilesManager::operator= + 0x3B8B77
2020-10-11 14:24:49.719 INFO EDCORE: 0x00000000007114D0 (DCS): CoreUtils::TempFilesManager::operator= + 0x3A38A0
2020-10-11 14:24:49.719 INFO EDCORE: 0x000000000011C27A (edCore): Common::FSM::sendOutputSymbol_ + 0x4A
2020-10-11 14:24:49.719 INFO EDCORE: 0x000000000011B912 (edCore): Common::FSM::enterToState_ + 0xC2
2020-10-11 14:24:49.719 INFO EDCORE: 0x000000000011C0F9 (edCore): Common::FSM::onSymbol_ + 0x1A9
2020-10-11 14:24:49.720 INFO EDCORE: 0x00000000007243A5 (DCS): CoreUtils::TempFilesManager::operator= + 0x3B6775
2020-10-11 14:24:49.720 INFO EDCORE: 0x00000000006F6604 (DCS): CoreUtils::TempFilesManager::operator= + 0x3889D4
2020-10-11 14:24:49.720 INFO EDCORE: 0x00000000006F69C9 (DCS): CoreUtils::TempFilesManager::operator= + 0x388D99
2020-10-11 14:24:49.720 INFO EDCORE: 0x00000000016E8CEB (DCS): AmdPowerXpressRequestHighPerformance + 0xB1ACE7
2020-10-11 14:24:49.722 INFO EDCORE: 0x00000000008E261E (DCS): CoreUtils::TempFilesManager::operator= + 0x5749EE
2020-10-11 14:24:49.724 INFO EDCORE: 0x0000000000017BD4 (KERNEL32): BaseThreadInitThunk + 0x14
2020-10-11 14:24:49.724 INFO EDCORE: 0x000000000006CE51 (ntdll): RtlUserThreadStart + 0x21
2020-10-11 14:24:52.510 INFO EDCORE: Minidump created.
2020-10-11 14:24:52.520 INFO DCS: enumerating loaded modules
=== Log closed.
submitted by buddy1225 to dcs [link] [comments]

Ethereum on ARM. New Eth2.0 Raspberry pi 4 image for automatically joining Prylabs Onyx Eth2.0 testnet. Step-by-step guide for installing and activating a validator.

TL;DR: Flash your Raspberry Pi 4, plug in an ethernet cable, connect the SSD disk and power up the device to join the Eth2.0 Onyx testnet.
The image takes care of all the necessary steps to join the Eth2.0 Onyx testnet [1], from setting up the environment and formatting the SSD disk to installing and running the Ethereum Eth1.0 and Eth2.0 clients as well as starting the blockchains synchronization (for both Geth Eth1.0 Goerli [2] and Prysm [3] Eth2.0 Beacon Chain).
You will only need to create a validator account, send the deposit of 32 Goerli ETH to the Onyx contract and start the validator systemd service.
MAIN FEATURES
SOFTWARE INCLUDED

INSTALLATION GUIDE AND USAGE

RECOMMENDED HARDWARE AND SETUP
STORAGE
You will need and SSD to run the Ethereum clients (without an SSD drive there’s absolutely no chance of syncing the Ethereum blockchain). There are 2 options:
In both cases, avoid getting low quality SSD disks as it is a key component of you node and it can drastically affect the performance (and sync times). Keep in mind that you need to plug the disk to an USB 3.0 port (in blue).
IMAGE DOWNLOAD AND INSTALLATION
1.- Download the image:
http://www.ethraspbian.com/downloads/ubuntu-20.04-preinstalled-server-arm64+raspi-eth2-onyx.img.zip
SHA256 13bc7ac4de6e18093b99213511791b2a24b659727b22a8a8d44f583e73a507cc
2.- Flash the image
Insert the microSD in your Desktop / Laptop and download the file:
Note: If you are not comfortable with command line or if you are running Windows, you can use Etcher [8]
Open a terminal and check your MicroSD device name running:
sudo fdisk -l 
You should see a device named mmcblk0 or sdd. Unzip and flash the image:
unzip ubuntu-20.04-preinstalled-server-arm64+raspi-eth2-onyx.img.zip sudo dd bs=1M if=ubuntu-20.04-preinstalled-server-arm64+raspi.img of=/dev/mmcblk0 conv=fdatasync status=progress 
3.- Insert de MicroSD into the Raspberry Pi 4. Connect an Ethernet cable and attach the USB SSD disk (make sure you are using a blue port).
4.- Power on the device
The Ubuntu OS will boot up in less than one minute but you will need to wait approximately 7 minutes in order to allow the script to perform the necessary tasks to join the Onyx testnet (it will reboot again)
5.- Log in
You can log in through SSH or using the console (if you have a monitor and keyboard attached)
User: ethereum Password: ethereum 
You will be prompted to change the password on first login, so you will need to log in twice.
6.- Forward 30303 and 13000 ports in your router (both UDP and TCP). If you don’t know how to do this, google “port forwarding” followed by your router model.
7.- Getting console output
You can see what’s happening in the background by typing:
sudo tail -f /valog/syslog 
7.- Grafana Dashboards
There are 2 Grafana dashboards to monitor the node (see section “Grafana Dashboards below”.
See [9]

The Onyx Eth2.0 testnet

Onyx is an Eth2.0 testnet created by Prylabs according to the latest official specification for Eth2.0, the v0.12.1 [10] release (which is aimed to be the final).
In order to run an Onyx Eth 2.0 node you will need 3 components:
The image takes care of the Eth1.0 Geth and Eth2.0 Beacon Chain configurations and syncs. So, once flashed (and after a first reboot), Geth (Eth1.0 client) starts syncing the Goerli testnet and the Beacon Chain (Eth2.0 client) gets activated through the Prysm client, both as systemd services.
When the Goerli testnet sync is completed, the Beacon Chain starts syncing. Both chains are necessary as the validator needs to communicate with them (as explained below).
Activating the validator
Once Goerli and the Beacon chain are in sync you have just one task left, configure the Validator for enabling the staking process.
The image provides the Prysm validator client for running the staking process. With this validator, you will create an account with 2 keys (public and private) and get an HEX string that needs to be sent to the Eth 1.0 blockchain as data through a 32 ETH transaction.
The Beacon Chain (which is connected to the Eth1 chain) will detect this deposit (which includes the validator public key) and the Validator will be activated.
So, let’s get started. Geth Goerli testnet and the Beacon Chain are already syncing in the background. Goerli will sync in about 1 hour and the Beacon Chain in about 2 hours (so this will take 3 hours overall).
The easiest way to enable a Prysm validator is to use the Prylabs web portal to get Goerli ETH (testnet ETH) and follow their instructions:
https://prylabs.net/participate
Let’s break this down:
Step 1) Get Prysm
Nothing to do here. Prysm is already installed.
Step 2) Get GöETH — Test ETH
We need 32 ETH to stake (it is fake ETH as this is a tesnet). Prylabs created a faucet with a great UI so you can easily get 32.5 Goerli ETH.
You will need a web3 provider to use the faucet. Install Metamask browser extension (if you don’t have it running yet). Create an account and set the network to “Goerli test network” (on the top of the Metamask screen). Now, click once in “Metamask” and then click “Need GoETH?” button. Confirm the transaction.
Once funded, you will see something like this:
You are 0x0b2eFdbFB8EcaF7F4eCF6853cbd5eaD86510d63C and you have 32.5 GöETH. 
Step 3). Generate a validator public / private key
Go to your Raspberry Pi console and run the following command (make sure you are logged in with your ethereum user):
validator accounts create 
Press return to confirm the default path
Enter a password twice (you will need it later to run the validator so write it down and be careful). Once finished, your account will be created (under the /home/ethereum/.eth2validators directory) containing, among other info, your validator keys. Additionally you will get the deposit data as follows (this is an example):
========================Deposit Data======================= 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 =================================================================== ***Enter the above deposit data into step 3 on https://prylabs.net/participate*** 
Copy this data (just the hexadecimal part, from 0x to the last number), go back to step 3 of Prylabs website and paste it into the field “Your validator deposit data”.
Step 4) Start your beacon chain & validator clients
Beacon chain is already running in the background so let’s configure the validator. Just edit the /etc/ethereum/prysm-validator.conf file and replace “changeme” string with your password (you can use nano or vim editors). Now run:
sudo systemctl enable prysm-validator && sudo systemctl start prysm-validator 
Check if everything went right by running:
sudo systemctl status prysm-validator 
Step 5) Send a validator deposit
We are almost there. Just click the “Make deposit” button and confirm the transaction.
Done!
Now you need to wait for the validator to get activated. In time, the beacon chain will detect the 32 ETH deposit (which contains the validator public key) and the system will put your validator in queue. These are the validator status that you will see during the activation process:

Grafana Dashboards

We configured 2 Grafana Dashboards to let users monitor both Eth1.0 and Eth2.0 progress. To access the dashboards just open your browser and type your Raspberry IP followed by the 3000 port:
http://replace_with_your_IP:3000 user: admin passwd: ethereum 
There are 3 dashboards available:
Lot of info here. You can see for example if Geth is in sync by checking (in the Blockchain section) if Headers, Receipts and Blocks are aligned or easily find the validator status.

Whats's next

We are planning a new release for a multi testnet Eth2.0 network including Prysm, Teku and Lighthouse client (and hopefully Nimbus).

Gitcoin Grant

Gitcoin Grants round 6 is on!. If you appreciate our work, please consider donating. Even $1 can make the difference!
https://gitcoin.co/grants/384/ethereum-on-arm
Follow us on Twitter. We post regular updates and info you may be interested in!
https://twitter.com/EthereumOnARM

References

  1. https://medium.com/prysmatic-labs/introducing-the-onyx-testnet-6dadbd95d873
  2. https://goerli.net
  3. https://docs.prylabs.network/docs/getting-started/
  4. https://www.reddit.com/ethereum/comments/gf3nhg/ethereum_on_arm_raspberry_pi_4_images_release/
    1. Installation script: https://github.com/diglos/pi-gen/blob/ethraspbian2.0/stage2/04-ethereum/files/rc.local.eth2.onyx
  5. https://github.com/ethereum/go-ethereum/releases/tag/v1.9.15
  6. https://github.com/prysmaticlabs/prysm/releases/tag/v1.0.0-alpha.13
  7. https://grafana.com/
    1. Prysm Dashboard: https://github.com/GuillaumeMiralles/prysm-grafana-dashboard/tree/master
  8. https://etcher.io
  9. https://twitter.com/EthereumOnARM/status/1277184480189517824
  10. https://github.com/ethereum/eth2.0-specs/releases
  11. https://github.com/goerli/altona
submitted by diglos76 to ethereum [link] [comments]

How to start hacking? The ultimate two-path guide to information security. (Repost from r/hacking)

Before I begin - everything about this should be totally and completely ethical at it's core. I'm not saying this as any sort of legal coverage, or to not get somehow sued if any of you screw up, this is genuinely how it should be. The idea here is information security. I'll say it again. information security. The whole point is to make the world a better place. This isn't for your reckless amusement and shot at recognition with your friends. This is for the betterment of human civilisation. Use your knowledge to solve real-world issues.
There's no singular all-determining path to 'hacking', as it comes from knowledge from all areas that eventually coalesce into a general intuition. Although this is true, there are still two common rapid learning paths to 'hacking'. I'll try not to use too many technical terms.
The first is the simple, effortless and result-instant path. This involves watching youtube videos with green and black thumbnails with an occasional anonymous mask on top teaching you how to download well-known tools used by thousands daily - or in other words the 'Kali Linux Copy Pasterino Skidder'. You might do something slightly amusing and gain bit of recognition and self-esteem from your friends. Your hacks will be 'real', but anybody that knows anything would dislike you as they all know all you ever did was use a few premade tools. The communities for this sort of shallow result-oriented field include HowToHack and probably hacking as of now. ​
The second option, however, is much more intensive, rewarding, and mentally demanding. It is also much more fun, if you find the right people to do it with. It involves learning everything from memory interaction with machine code to high level networking - all while you're trying to break into something. This is where Capture the Flag, or 'CTF' hacking comes into play, where you compete with other individuals/teams with the goal of exploiting a service for a string of text (the flag), which is then submitted for a set amount of points. It is essentially competitive hacking. Through CTF you learn literally everything there is about the digital world, in a rather intense but exciting way. Almost all the creators/finders of major exploits have dabbled in CTF in some way/form, and almost all of them have helped solve real-world issues. However, it does take a lot of work though, as CTF becomes much more difficult as you progress through harder challenges. Some require mathematics to break encryption, and others require you to think like no one has before. If you are able to do well in a CTF competition, there is no doubt that you should be able to find exploits and create tools for yourself with relative ease. The CTF community is filled with smart people who can't give two shits about elitist mask wearing twitter hackers, instead they are genuine nerds that love screwing with machines. There's too much to explain, so I will post a few links below where you can begin your journey.
Remember - this stuff is not easy if you don't know much, so google everything, question everything, and sooner or later you'll be down the rabbit hole far enough to be enjoying yourself. CTF is real life and online, you will meet people, make new friends, and potentially find your future.
What is CTF? (this channel is gold, use it) - https://www.youtube.com/watch?v=8ev9ZX9J45A
More on liveoverflow, http://www.liveoverflow.com is hands down one of the best places to learn, along with liveoverflow
CTF compact guide - https://ctf101.org/
Upcoming CTF events online/irl, live team scores - https://ctftime.org/
What is CTF? - https://ctftime.org/ctf-wtf/
Full list of all CTF challenge websites - http://captf.com/practice-ctf/
> be careful of the tool oriented offensivesec oscp ctf's, they teach you hardly anything compared to these ones and almost always require the use of metasploit or some other program which does all the work for you.
http://picoctf.com is very good if you are just touching the water.
and finally,
netsec - where real world vulnerabilities are shared.
submitted by Dezo_Ghoste to hacking4noobs [link] [comments]

How to start hacking? The ultimate two path guide to information security.

Before I begin - everything about this should be totally and completely ethical at it's core. I'm not saying this as any sort of legal coverage, or to not get somehow sued if any of you screw up, this is genuinely how it should be. The idea here is information security. I'll say it again. information security. The whole point is to make the world a better place. This isn't for your reckless amusement and shot at recognition with your friends. This is for the betterment of human civilisation. Use your knowledge to solve real-world issues.

There's no singular all-determining path to 'hacking', as it comes from knowledge from all areas that eventually coalesce into a general intuition. Although this is true, there are still two common rapid learning paths to 'hacking'. I'll try not to use too many technical terms.

The first is the simple, effortless and result-instant path. This involves watching youtube videos with green and black thumbnails with an occasional anonymous mask on top teaching you how to download well-known tools used by thousands daily - or in other words the 'Kali Linux Copy Pasterino Skidder'. You might do something slightly amusing and gain bit of recognition and self-esteem from your friends. Your hacks will be 'real', but anybody that knows anything would dislike you as they all know all you ever did was use a few premade tools. The communities for this sort of shallow result-oriented field include HowToHack and probably hacking as of now. ​
The second option, however, is much more intensive, rewarding, and mentally demanding. It is also much more fun, if you find the right people to do it with. It involves learning everything from memory interaction with machine code to high level networking - all while you're trying to break into something. This is where Capture the Flag, or 'CTF' hacking comes into play, where you compete with other individuals/teams with the goal of exploiting a service for a string of text (the flag), which is then submitted for a set amount of points. It is essentially competitive hacking. Through CTF you learn literally everything there is about the digital world, in a rather intense but exciting way. Almost all the creators/finders of major exploits have dabbled in CTF in some way/form, and almost all of them have helped solve real-world issues. However, it does take a lot of work though, as CTF becomes much more difficult as you progress through harder challenges. Some require mathematics to break encryption, and others require you to think like no one has before. If you are able to do well in a CTF competition, there is no doubt that you should be able to find exploits and create tools for yourself with relative ease. The CTF community is filled with smart people who can't give two shits about elitist mask wearing twitter hackers, instead they are genuine nerds that love screwing with machines. There's too much to explain, so I will post a few links below where you can begin your journey.

Remember - this stuff is not easy if you don't know much, so google everything, question everything, and sooner or later you'll be down the rabbit hole far enough to be enjoying yourself. CTF is real life and online, you will meet people, make new friends, and potentially find your future.

What is CTF? (this channel is gold, use it) - https://www.youtube.com/watch?v=8ev9ZX9J45A
More on liveoverflow, http://www.liveoverflow.com is hands down one of the best places to learn, along with liveoverflow
CTF compact guide - https://ctf101.org/
Upcoming CTF events online/irl, live team scores - https://ctftime.org/
What is CTF? - https://ctftime.org/ctf-wtf/
Full list of all CTF challenge websites - http://captf.com/practice-ctf/
> be careful of the tool oriented offensivesec oscp ctf's, they teach you hardly anything compared to these ones and almost always require the use of metasploit or some other program which does all the work for you.

http://picoctf.com is very good if you are just touching the water.
and finally,
netsec - where real world vulnerabilities are shared.
submitted by SlickLibro to hacking [link] [comments]

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

SEEDIT4.ME bigass update

Hey folks,
I recently joined the seedit4.me team. The rest of the team i have been friends with for about 15 years, we've all got a decent track record when it comes to p2p, scene, sysop work and stuff and they were very happy to have me on the team after not hearing from me for a few years. I'm a full time full stack coder and usually ain't got no time for dis but i joined the project not only because we are friends but because it's a really interesting thing and the tech stack is awesome.
Anyways, i've spent the last couple months revamping the whole thing, not only the complete ui but backend stuff too, app installers, billing, website, virtualization and whatnot. We recently added crypto currencies as payment method too and there is still a ton of updates waiting to be rolled out to production. We have been really working our asses off day and night. Would love to hear some opinions of my work, if you have recommendations, ideas, criticism, just post it.
I will leave you with some delicious copypasta from the site and some screenshots because i'm tired af ok.

check out https://seedit4.me


fancypants dark mode
this is where the magic happens
yes, very fast internets, very gud
Apps, we have them all

Seedit4me Major Update

Hey guys, we've got news! Over the last few months we have been very busy working on updates, it escalated a little bit so now we are here with a nearly complete overhaul of our user dashboard, website, virtualization backend, billing, apps selection as well as a ton of other new features! It's such a big update, you could call it Seedit4Me 2.0
In the next days we will be rolling out more and more of these updates and will keep you posted. And because we know you like lists...
...here are some of the major points that have been keeping us busy day and night:
Your dashboard now shows a ton of useful info, just some examples:
We have added 21 more apps for you to pick from and introduced app limits to plans.Apart from the 4 preinstalled default apps, you can install 10 on Sidekick Boxes, 15 on Hero, and an unlimited number of apps on SuperHero and Super Seedbox Man plans.
Stable apps
These apps are fully tested and working they may need to be configed by clients following the FAQ
Unstable apps
These are not fully working the way we want yet. You may encounter issues while using them but we plan to fix those as well.
...and there are more in development.
If you have a specific app you would like to see on our list, let us know, as well as any other feature suggestions! We hope you enjoy the updates!
Seedit4Me Staff
submitted by Seedit4me to seedboxes [link] [comments]

Built a control panel over 16 years, free lifetime release

Site Admin demoSource
16 years ago I stumbled into hosting with Ensim WEBppliance, which was a clusterfuck of a control panel necessitating a bunch of bugfixes. Those bugfixes spawned a control panel, apnscp, that I've continued to develop to this day. v3 is the first public release of apnscp and to celebrate I'm giving away 400 free lifetime licenses on webhosting each good for 1 server.
Visit apnscp.com/activate/webhosting-lt to get started customizing the installer. Database + PHP are vendor agnostic. apnscp supports any-version Node/Ruby/Python/Go. I'm interested in feedback, if not bugs then certainly ideas for improvement.
apnscp ships with integrated Route 53/CF DNS support in addition to Linode, DO, and Vultr. Additional providers are easy to create. apnscp includes 1-click install/updates for Wordpress, Drupal, Laravel, Ghost, Discourse, and Magento. Enabling Passenger, provided you have at least 2 GB memory, opens the door to use any-version Ruby, Node, and Python on your server.

Minimum requirements

Features

apnscp won't fix all of your woes; you still need to be smart about whom you host and what you host, but it is a step in the right direction. apnscp is not a replacement for a qualified system administrator. It is however a much better alternative to emerging panels in this market.

Installation

Use apnscp Customizer to configure your server as you'd like. See INSTALL.md for installation + usage.
Monitoring installation
apnscp will provision your server and this takes around 45 minutes to 2 hours to complete the first time. You can monitor installation real-time from the terminal:
tail -f /root/apnscp-bootstrapper.log
Post Install
If you entered an email address while customizing (apnscp_admin_email) and the server isn't in a RBL, then you will receive an email with your login information. If you don't get an email after 2 hours, log into the server and check the status:
tail -n30 /root/apnscp-bootstrapper.log
The last line should be similar to: 2019-01-30 18:39:02,923 p=3534 u=root | localhost : ok=3116 changed=1051 unreachable=0 failed=0
If failed=0, everything is set! You can reset the password and refer back to the login information to access the panel or reset your credentials. Post-install will welcome you with a list of helpful commands to get started as well. You may want to change -n30 to -n50!
If failed=n where n > 0, send me a PM, email ([email protected]), get in touch on the forums, or Discord.
Shoot me a PM if you have a question or hop on Discord chat. Either way feedback makes this process tick. Enjoy!

Installation FAQ

Resources

License information

Licenses are tied to the server but may be transferred to a new server. Once transferred from the server apnscp will become deactivated on the server, which means your sites will continue to operate but apnscp can no longer help you manage your server, as well as deploy automatic updates. A copy of the license can be made either by copying /uslocal/apnscp/config/license.pem or License > Download License in the top-right corner. Likewise to install the license on a new machine just replace config/license.pem with your original copy.
Update: v3.0.17 released. Thank you everyone for your exotic build environments and feedback thus far!
submitted by tsammons to webhosting [link] [comments]

How to Trade Binary Options on Binary.com Platform High ... Binary.com - Secret Higher/Lower - Binary Options Strategy ... Guide ║ highlow binary options login - YouTube Binary Options Strategy 2020  100% WIN GUARANTEED ... HighLow Review 2020 by Binary Today - YouTube SUCCESS BINARY OPTIONS - YouTube Guide ║ high low binary options review - YouTube Free Signals $ high low binary options review - YouTube Indicators on Highlow binary options login You Should Know ...

The return rate on Highlow can be as high as 180% – 200% for winning trades. Is HighLow a Scam? No. Highlow is in fact the most trustworthy binary options broker in Australia. Company: HighLow Markets Pty Ltd: Address: Level 10, 20 Martin Place, Sydney, NSW 2000, Australia: Phone Support: 1300-870-442: Regulation and License: ASIC with license #364264: Australian Company Number (ACN ... Binary option trading on margin involves high risk, and is not suitable for all investors. As a leveraged product losses are able to exceed initial deposits and capital is at risk. Before deciding to trade binary options or any other financial instrument you should carefully consider your investment objectives, level of experience, and risk appetite. HighLow binary options broker is one of the most popular Australian binary options service providers since it opened gates in 2014. even though this broker is not one of the long term Fair Binary Options partners, for now, it seems to provide an excellent service for all its customers, as all our readers can see in our HighLow review. We have tested most of the important aspects of this broker ... OptionField.com review. OptionField offer binary options trading, demo account competitions, three trading platforms (Webtrader, desktop and mobile) and Classic, Pro and Elite Account type options. They a relatively new broker claiming to have the best customer service and guaranteed withdrawals. The company is owned by Optionfield Limited, a ... High/Low – Obviously! These are standard binary options – Decide if the asset value will finish higher or lower than the current strike price. Expiry times of these go from 15 minutes up to ‘End of Day’ expiries. High/Low Spread – Spread options differ in the payout and strike price. The basics remain the same as a standard High/Low ... What are binary options. A binary option is a type of option with a fixed payout in which you predict the outcome from two possible results. If your prediction is correct, you receive the agreed payout. If not, you lose your initial stake, and nothing more. It's called 'binary' because there can be only two outcomes – win or lose. Advantages of binary options trading. Aside from the ... Binary options trading is associated with high level of risk and every user must be aware of the risks and be willing to accept them With the high number high low binary options login of brokers offering binary options trading services today, it is perfectly natural for you as a trader to be wary of scammers. 100% Auto Trading Binary Options Software. This form of trading can provide huge ... High/Low is the most basic type of binary options trade. Turbo is the short-term version of it. You will also notice that there are additional tree types called High/Low Spread and Turbo Spread. These are essentially the same, except that as the name implies, you pay a spread when you place these trades. Doing so allows you to receive a higher payout should you win—up to 200%. These high ... High/Low – They had to offer these didn’t they? The standard binary trade – will the asset value finish higher or lower than the current price. Expiries range from 15 minutes up to ‘End of Day’ expiries. High/Low Spread – As above, but the difference is in the payout and strike price. Payouts on the ‘spread’ options are 100% ... With the High/Low Spread binary options at HighLow, you need to make up the spread. Example: The current market price on the UK100 is 7389.2. You are presented with 7389.5 to go higher and 7388.9 to go lower. The construction makes it possible for HighLow to offer bigger payouts on High/Low Spread options that finnish in the money; some of them pay 200% of the purchase price! Underlyings ...

[index] [29440] [27595] [22437] [23259] [22789] [1899] [9180] [11716] [4277] [20839]

How to Trade Binary Options on Binary.com Platform High ...

The road to success through trading IQ option Best Bot Reviews Iq Option 2020 ,We make videos using this softwhere bot which aims to make it easier for you t... Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. Binary.com - Secret Higher/Lower - Binary Options Strategy You Can Download The Latest Bot / Signal Vfxalert Please Click on The link below! Contact Telegram... Hello everyone!:) My name is Anastasia, but it's too hard to pronounce, that's why you may call me just ANA. I'm a pro trader for more than 2 years already a... 👨🏽‍💻 IQ Option $ The best broker 2020: - https://bit.ly/3hMNU9b I'll show you 100% winning iq option strategy 7 win VS 0 loss Hello everyone!:) My name is Anastasia, but it's too hard to pronounce, that's why you may call me just ANA. I'm a pro trader for more than 2 years already a... Website https://ExpertBinaryTrader2020.Blogspot.com We Manage Your Binary Options Trading Account How to Trade Binary Options on Binary.com Platform High/Low... 【Special Release】The way to earn the money as passive income like me→ https://line.me/R/ti/p/%40miatrade Start Forex 1. XM : https://clicks.pipaffiliates.com... HighLow is my #1 binary options broker currently. I recommend checking it out here. https://binarytoday.com/broker-review-highlow-demo-withdrawal-payouts-etc... Try This Out: https://bit.ly/3hLzKpe - Indicators on Highlow binary options login You Should Know Anticipate if the market will stay in between or go outside...

https://binary-optiontrade.emkauza.ml