blog

Modem Net HGB10R-02 Lista de Comandos / Páginas Ocultas

Como reiniciar rebootar o modem da net HGB10R-02
relação de paginas ocultas do modem da Net

—–QoS
http://192.168.0.1/qosqmgmt.html
http://192.168.0.1/qoscls.html
http://192.168.0.1/qospoliceradd.html
http://192.168.0.1/qosportshaping.html
—–Moca
http://192.168.0.1/mocacfg.html
http://192.168.0.1/cfgmoca.html
—–VLAN
http://192.168.0.1/lanvlancfg.html
—–Syslogs, Kernel Logs, Memory Info etc
http://192.168.0.1/sysinfo.cmd?action=view
—– cfg com as Configurações do modem
http://192.168.0.1/dumpcfgdynamic.cmd
—–Routing — RIP Configuration
http://192.168.0.1/ripcfg.cmd
—-Statistics — WAN
http://192.168.0.1/statswan.cmd?action=view
—-Routing — Static Route
http://192.168.0.1/rtroutecfg.cmd
http://192.168.0.1/rtroutecfg.cmd?action=view
—–Routing — Default Gateway
http://192.168.0.1/rtdefaultcfg.html
—–DSL Settings
http://192.168.0.1/adslcfgc.html
—-xDSL Settings
http://192.168.0.1/xdslcfg.html
—-DNS Server Configuration
http://192.168.0.1/dnscfg.html
—-Print Server settings
http://192.168.0.1/ippcfg.html
—-DNS Proxy Configuration
http://192.168.0.1/dnsproxycfg.html
—Diagnostics??
http://192.168.0.1/diaglan.html
—Reboot
http://192.168.0.1/resetrouter.html
—-Standby Configuration
http://192.168.0.1/standby.html
—-Batteries Configuration???
http://192.168.0.1/bmu.html
—-AS Server, WAPI AS functions
http://192.168.0.1/wlwapias.html
—-Voice, VoiIP
http://192.168.0.1/voicemgcp_basic.html
http://192.168.0.1/voicentr.html
http://192.168.0.1/voicesip_basic.html
http://192.168.0.1/voicesip_advanced.html
http://192.168.0.1/voicesip_debug.html
http://192.168.0.1/voicedect.html
—-TR-069 client – Configuration
http://192.168.0.1/tr69cfg.html
—-Routing — Static Route Add
http://192.168.0.1/routeadd.html
—-IPSec Settings
http://192.168.0.1/ipsconfig.html
Create new certificate request
http://192.168.0.1/certadd.html
http://192.168.0.1/certcaimport.html
http://192.168.0.1/certimport.html
http://192.168.0.1/certloadsigned.html
http://192.168.0.1/diagpppoe.html
—-Enable IGMP Multicast, and WAN Service
http://192.168.0.1/enblservice.html
—-WAN IP Settings
http://192.168.0.1/ipoacfg.html
—-IPSec Tunnel Mode Connections
http://192.168.0.1/ipsec.html
—-Interface grouping Configuration
http://192.168.0.1/portmapadd.html
—-Edit Port Mapping Configuration
http://192.168.0.1/portmapedit.html
—-Add IP Filter — Incoming
http://192.168.0.1/scinflt.html
—-Add IP Filter — Outgoing
http://192.168.0.1/scoutflt.html
—-SNMP – Configuration
http://192.168.0.1/snmpconfig.html
—-Access Time Restriction
http://192.168.0.1/todadd.html
—-Broadband Router Update
http://192.168.0.1/uploadinfo.html
—-OMCI — Download Software Image
http://192.168.0.1/omcidownload.html
—-OMCI System – Configuration
http://192.168.0.1/omcisystem.html
—-ATM PVC Configuration
http://192.168.0.1/cfgatm.html
—-PTM Configuration
http://192.168.0.1/cfgptm.html
—-GPON WAN Configuration
http://192.168.0.1/cfggpon.html
—-EPON WAN Configuration
http://192.168.0.1/cfgepon.html
—-Add a L2TP Client Side PPP Connection (PPPoL2TP WAN Service)
http://192.168.0.1/cfgl2tpac.html
—-802.1ag Connectivity Fault Management
http://192.168.0.1/diag8021ag.html
—-Storage User Account Setup
http://192.168.0.1/storageusraccadd.html
—-IP Tunneling — 4in6 Tunnel Configuration
http://192.168.0.1/tunnel4in6.html
—-IP Tunneling — 6in4 Tunnel Configuration
http://192.168.0.1/tunnel6in4.html
—-Digital Media Server settings – DLNA
http://192.168.0.1/dlnacfg.html
—-xDSL Bonding Capability Configuration
http://192.168.0.1/dslbondingcfg.html
—-Policy Routing Settup
http://192.168.0.1/pradd.html
—-PPP Username and Password
http://192.168.0.1/pppoe.html
http://192.168.0.1/wanL3Edit.cmd
—-Tools – Update Software
http://192.168.0.1/upload.html
—-Power Management
http://192.168.0.1/pwrmngt.html

Shadow Copy Due Long Filename – Nome do Arquivo Muito Longo

Quando estiver com dificuldades para recuperar um cópia de sompra porque o nome do arquivo está muito longo.

 

Siga esses passos

 

I had the exact same problem in Server 2008 R2 and this is how I solved it:

  1. Right click on the folder you’re trying to restore from shadow copy and chose Previous Versions. Chose a date and click on Open.
  2. Right click on any file or folder within the previous folder and chose Properties. On the General tab copy what’s shown in ‘location’, e.g.: \\localhost\D$\@GMT-2011.09.20-06.00.04\_Data
  3. Open cmd.exe and type in:
    subst X: \\localhost\D$\@GMT-2011.09.20-06.00.04\_Data
    
  4. Open PowerShell and use robocopy to copy content of X: e.g.:
    robocopy Z: D:\Folder\ /E /COPYALL
    
  5. Check that all files have been copied.
  6. When finished type subst X: /D in cmd

 

From: https://serverfault.com/questions/285997/unable-to-restore-from-shadow-copy-due-to-long-filename#:~:text=The%20source%20file%20name(s,s)%20before%20attempting%20this%20operation.

Openfire Monitoring Service Issue

Erro no Monitoring Service Openfire

org.jivesoftware.openfire.archive.ArchiveIndexer [CONVERSATION] – An exception occurred while initializing the Lucene index that is expected to exist in: C:\Program Files\Openfire\monitoring\search

Error on line 1 of document : O conteúdo não é permitido no prólogo.

 

Just rename that folder

C:\Program Files\Openfire\monitoring

 

Cobian Backup Alerta e-mail GMail – G-Suite

Segurança a nível de transporte : Explicito
Tipo de Autencicação: Auto
Modo SSL: Ambos
Metodos SSL TLSv1
Proteçao de porta de dados Limpar
Produnidade 0

Zabbix Install Service Windows

Download

https://www.zabbix.com/downloads/5.0.1/zabbix_agent-5.0.1-windows-amd64-openssl.zip

Extract all files to, don’t create subfolders    –> C:\zabbix

cd c:\zabbix

zabbix_agentd.exe –config zabbix_agentd.conf –install

zabbix_agentd.exe [2316]: service [Zabbix Agent] installed successfully
zabbix_agentd.exe [2316]: event source [Zabbix Agent] installed successfully

 

 

 

 

 

 

Zabbix Active Server – Client

Conf para Windows

LogType=file
LogFile=C:\zabbix\zabbix_agentd.log
LogFileSize=1
EnableRemoteCommands=1
LogRemoteCommands=1
Server=127.0.0.1
ServerActive=servidor.cuidadodigital.com.br
Hostname=ad02.minhaEmpresa.local
RefreshActiveChecks=120

 

Conf para Linux

PidFile=/var/run/zabbix/zabbix_agentd.pid
LogFile=/var/log/zabbix-agent/zabbix_agentd.log
LogFileSize=0
Server=127.0.0.1
ServerActive=servidor.cuidadodigital.com.br
Hostname=srvlinux.minhaempresa.local
RefreshActiveChecks=120
Include=/etc/zabbix/zabbix_agentd.conf.d/*.conf

E2Guardian MITN Criando Certificados


  1. Crie o diretório /etc/e2guardian/ssl/generatedcerts:
    mkdir -p /etc/e2guardian/ssl/generatedcerts
  2. Mude o mode do diretório /etc/e2guardian/ssl/generatedcerts para 777:
    chmod 777 /etc/e2guardian/ssl/generatedcerts
  3. Crie o arquivo /etc/e2guardian/ssl/mkcert e o execute:
    #!/bin/bash
    
    openssl genrsa 4096 > ca.key
    openssl req -new -x509 -days 3650 -key ca.key -out ca.pem
    openssl x509 -in ca.pem -outform DER -out ca.der
    openssl genrsa 4096 > cert.key
  4. Edite os arquivos:

/etc/e2guardian/e2guardian.conf:

# Enable SSL support
# This must be present to enable MITM and/or Cert checking
# default is off
enablessl = on
...
#SSL man in the middle
#CA certificate path
#Path to the CA certificate to use as a signing certificate for
#generated certificates.
# default is blank - required if ssl_mitm is enabled.
cacertificatepath = '/etc/e2guardian/ssl/ca.pem'

#CA private key path
#path to the private key that matches the public key in the CA certificate.
# default is blank - required if ssl_mitm is enabled.
caprivatekeypath = '/etc/e2guardian/ssl/ca.key'

#Cert private key path
#The public / private key pair used by all generated certificates
# default is blank - required if ssl_mitm is enabled.
certprivatekeypath = '/etc/e2guardian/ssl/cert.key'

#Generated cert path
#The location where generated certificates will be saved for future use.
#(must be writable by the dg user)
# default is blank - required if ssl_mitm is enabled.
generatedcertpath = '/etc/e2guardian/ssl/generatedcerts/'

Edite o arquivo e2guardianf1.conf

Localize a linha e ligue o SSLMITM

sslmitm = on

/etc/e2guardian/lists/bannedsitelist:

...
#List other sites to block:

# badboys.com
xxxbucetas.net
bucetas.b-cdn.net
xvideos.blog
...
# You will need to edit to add and remove categories you want
.Include</etc/e2guardian/lists/BL/porn/domains>
.Include</etc/e2guardian/lists/BL/aggressive/domains>
  1. Habilite e inicie o serviço e2guardian.service:
    systemctl enable e2guardian.service
    systemctl start e2guardian.service

Como mostrar todas as informações da Memória Ram

Dica rápida de como obter as especificações técnicas da memória Ram de um Computador / Servidor pelo Windows usando linha de Comando via Wmic.

Filtra as informações por especificação

wmic memorychip get devicelocator, manufacturer, partnumber, serialnumber, capacity, speed, memorytype, formfactor

 

Lista todas os informações possíveis

wmic memorychip list full

Complete list of supported memory types

Here’s a list with the memory types that the command can identify:

  • 0: Unknown.
  • 1: Other.
  • 2: DRAM.
  • 3: Synchronous DRAM.
  • 4: Cache DRAM.
  • 5: EDO.
  • 6: EDRAM.
  • 7: VRAM.
  • 8: SRAM.
  • 9: RAM.
  • 10: ROM.
  • 11: Flash.
  • 12: EEPROM.
  • 13: FEPROM.
  • 14: EPROM.
  • 15: CDRAM.
  • 16: 3DRAM.
  • 17: SDRAM.
  • 18: SGRAM.
  • 19: RDRAM.
  • 20: DDR.
  • 21: DDR2.
  • 22: DDR2 FB-DIMM.
  • 24: DDR3.
  • 25: FBD2.

    Complete list of supported form factors

  • 0: Unknown.
  • 1: Other.
  • 2: SIP.
  • 3: DIP.
  • 4: ZIP.
  • 5: SOJ
  • 6: Proprietary.
  • 7: SIMM.
  • 8: DIMM.
  • 9: TSOP.
  • 10: PGA.
  • 11: RIMM.
  • 12: SODIMM.
  • 13: SRIMM.
  • 14: SMD.
  • 15: SSMP.
  • 16: QFP.
  • 17: TQFP.
  • 18: SOIC.
  • 19: LCC.
  • 20: PLCC.
  • 21: BGA.
  • 22: FPBGA.
  • 23: LGA.
  • 24: FB-DIMM.

Usuários Como Administrador da Maquina Local via GPO

1- Crie um grupo no AD com o nome que você achar melhor, eu defini o meu como ADM, coloque os usuários nesse grupo

2- Edite a “Default Domain Policy”

expanda “configuração do usuário” > “preferencias” > “configuracoes do painel de controle” > “usuarios e grupos locais”

clique em “novo” > “grupo local”

defina a ação como “atualizar”

defina “não configurar para usuário atual”

clique em “adicionar” e adicione o grupo que você criou no AD.

de “ok”

3- atualize a diretiva / aplique o gpupdate /force

Comandos Básico do SystemD – Systemctl

systemctl enable aplicativo.service

systemctl disable aplicativo.service

systemctl status aplicativo.service

systemctl daemon-reload

systemctl reset-failed