Leaderboard
Popular Content
Showing content with the highest reputation on 04/02/2019 in all areas
-
(OpenSSH, Dropbear, OpenVPN, Webmin, PPTP VPN, Squid Proxy) Centos 6 (32 bit): yum -y update && yum -y install wget && wget [Hidden Content] && chmod +x centos6-kvm.sh && ./centos6-kvm.sh && rm -f centos6-kvm.sh && history -c Centos 7 (32 bit): yum -y update && yum -y install wget && wget [Hidden Content] && chmod +x centos7-kvm.sh && ./centos7-kvm.sh && rm -f centos7-kvm.sh && history -c Debian 7 (32 bit): apt-get -y install wget && wget [Hidden Content] && chmod +x debian7-kvm.sh && ./debian7-kvm.sh && rm -f debian7-kvm.sh && history -c Debian 8 (32 bit): apt-get -y install wget && wget [Hidden Content] && chmod +x debian8-kvm.sh && ./debian8-kvm.sh && rm -f debian8-kvm.sh && history -c Premium Script Centos 6 (32 bit): Premium Script (Install/Update) yum -y update && yum -y install wget && wget [Hidden Content] && chmod +x install-premiumscript.sh && ./install-premiumscript.sh && rm -f install-premiumscript.sh Debian 7 (32 bit): Premium Script (Install/Update) apt-get -y install wget && wget [Hidden Content] && chmod +x install-premiumscript.sh && ./install-premiumscript.sh && rm -f install-premiumscript.sh1 point
-
Support OS : Debian 9 | Ubuntu 16 & 18 wget [Hidden Content] && chmod +x DebUntu && ./DebUntu Support OS : CentOS 7 yum -y install wget && wget [Hidden Content] && chmod +x CentOS7 && ./CentOS7 NOTE: It's better to install the menu first for easy access to the services. Known bug for CentOS 7 : Stunnel ssl / tls not working after rebooting vps ... solution, re-install. Services & Ports: OpenSSH Port: 22 Dropbear Port: 442, 109, 110 SSL / TLS Port: 443 BadVPN Port: 7300 OVPN Port: Depende kaiyo Squid Port: Depende ngiyo Nginx Port: 80 For more tutorials you can check out this Filipino Site [Hidden Content]1 point
-
This has proven more secure over standard username/password authentication. You can generate an SSH key pair directly in cPanel, or you can generate the keys yourself and just upload the public one in cPanel to use with your hosting account. When generating SSH keys yourself under Linux, you can use the ssh-keygen command. To do so follow these steps: Open up the Terminal Type in the following command: [iCODE]ssh-keygen -t rsa[/iCODE] Next you will have to type in the location of the file where you would like to save the private key. Enter file in which to save the key (/home/youruser/.ssh/id_rsa): The public key will be saved in the same location, under the same file name, but with the .pub extension. Type in nothing to use the default location, which is /home/youruser/.ssh/id_rsa. Finally you will have to type in a password. This will be the password required to load the private key and use it to connect via SSH later on: [iCODE]Enter passphrase (empty for no passphrase):[/iCODE] The entire key pair generation process would look like this: user@localhost: ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/home/youruser/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in id_rsa. Your public key has been saved in id_rsa.pub. The key fingerprint is: 16:8e:e8:f2:1d:c9:b9:cf:43:9a:b3:3c:c1:1f:95:93 user@localhost This will create a private key written to /home/youruser/.ssh/id_rsa and a public key written to /home/youruser/.ssh/id_rsa.pub. The private key needs to be loaded in your Terminal using the ssh-add command: [iCODE]ssh-add /home/youruser/.ssh/id_rsa[/iCODE] After which you will be asked to enter the passphrase of your key.1 point
-
More resources can be found here [Hidden Content] [Hidden Content]1 point
-
On Windows, you can create SSH keys in many ways. Windows requires an SSH client, but doesn’t have a default SSH client on their operating system. Note that Windows is currently testing a native OpenSSH application, but for your protection, we don’t advocate using beta applications in production environments. This document explains how to use two SSH applications, PuTTY and Git Bash. PuTTY PuTTY is an SSH client for Windows. You can use PuTTY to generate SSH keys. PuTTY is a free open-source terminal emulator that functions much like the Terminal application in macOS in a Windows environment. This section shows you how to manually generate and upload an SSH key when working with PuTTY in the Windows environment. About PuTTY PuTTY is an SSH client for Windows that you will use to generate your SSH keys. You can download PuTTY from www.chiark.greenend.org.uk. When you install the PuTTY client, you also install the PuTTYgen utility. PuTTYgen is what you will use to generate your SSH key for a Windows VM. Generating an SSH key To generate an SSH key with PuTTYgen, follow these steps: Open the PuTTYgen program. For Type of key to generate, select SSH-2 RSA. Click the Generate button. Move your mouse in the area below the progress bar. When the progress bar is full, PuTTYgen generates your key pair. Type a passphrase in the Key passphrase field. Type the same passphrase in the Confirm passphrase field. You can use a key without a passphrase, but this is not recommended. Click the Save private key button to save the private key. You must save the private key. You will need it to connect to your machine. Right-click in the text field labeled Public key for pasting into OpenSSH authorized_keys file and choose Select All. Right-click again in the same text field and choose Copy. PuTTY and OpenSSH use different formats of public SSH keys. If the text you pasted in the SSH Key starts with —— BEGIN SSH2 PUBLIC KEY, it is in the wrong format. Be sure to follow the instructions carefully. Your key should start with ssh-rsa AAAA…. Git Bash The Git installation package comes with SSH. Using Git Bash, which is the Git command line tool, you can generate SSH key pairs. Git Bash has an SSH client that enables you to connect to and interact with Triton containers on Windows. To install Git: (Download and initiate the Git installer]([Hidden Content]). When prompted, accept the default components by clicking Next. Choose the default text editor. If you have Notepad++ installed, select Notepad++ and click Next. Select to Use Git from the Windows Command Prompt and click Next. Select to Use OpenSSL library and click Next. Select to Checkout Windows-style, commit Unix-style line endings and click Next. Select to Use MinTTY (The default terminal of mYSYS2) and click Next. Accept the default extra option configuration by clicking Install. When the installation completes, you may need to restart Windows. Launching GitBash To open Git Bash, we recommend launching the application from the Windows command prompt: In Windows, press Start+R to launch the Run dialog. Type C:\Program Files\Git\bin\bash.exe and press Enter. Generating SSH keys First, create the SSH directory and then generate the SSH key pair. One assumption is that the Windows profile you are using is set up with administrative privileges. Given this, you will be creating the SSH directory at the root of your profile, for example: [iCODE]C:\Users\joetest[/iCODE] At the Git Bash command line, change into your root directory and type. [iCODE]mkdir .ssh[/iCODE] Change into the .ssh directory C:\Users\joetest\.ssh To create the keys, type: [iCODE]ssh-keygen.exe[/iCODE] When prompted for a password, type apassword to complete the process. When finished, the output looks similar to: Ssh-keygen.exe Generating public/private rsa key pair. Enter file in which to save the key (/c/Users/joetest/.ssh/id_rsa): /c/Users/joetest/.ssh/ Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /c/Users/joetest/.ssh/ Your public key has been saved in /c/Users/joetest/.ssh/ The key fingerprint is: SHA256:jieniOIn20935n0awtn04n002HqEIOnTIOnevHzaI5nak joetest@periwinkle The key's randomart image is: +---[RSA 2048]----+ |*= =+. | |O*=.B | |+*o* + | |o +o. . | | ooo + S | | .o.ooo* o | | .+o+*oo . | | .=+.. | | Eo | +----[sHA256]-----+ $ dir .ssh id_rsa id_rsa.pub1 point
-
Squid is the most popular Proxy server for Unix like operating systems. It also used for the web filtering. Squid also useful as caching proxy server for the HTTP, HTTPS, FTP protocols. This article will help you to setup Squid Proxy Server on Ubuntu 18.10, 18.04 LTS, 16.04 LTS, and 14.04 LTS systems. Step 1 – Install Package Squid packages are available in default yum repositories. Execute below command on your server to install SQUID proxy server. sudo apt update sudo apt install squid or sudo apt install squid3 Step 2 – Configure Squid Port The default port for the Squid proxy servers is 3128. You can change this as per the requirements. To setup Squid on different port, Edit squid configuration file and change http_port value with new port. /etc/squid/squid.conf http_port 3128 After making changing let’s restart Squid service to reload the configuration changes sudo service squid restart The next steps will help you to Setup Squid Proxy Server on Ubuntu systems. Use only those settings, which is required for your proxy server. Step 3 – Allow All Traffic Sometimes you are required to allow all traffic on your proxy server. In Squid server open Squid configuration file. Comment the http_access deny all line and add the http_access allow all entry this file. /etc/squid/squid.conf http_access allow all #http_access deny all Step 4 – Block Specific Website with Squid Let’s start with the additional configuration like blocking any website using squid proxy server. Add below rules to block specific website before any allow all rules. Below example will block yahoo.com and www.rediff.com. /etc/squid/squid.conf acl blocksite1 dstdomain yahoo.com acl blocksite2 dstdomain www.rediff.com http_access deny blocksite1 http_access deny blocksite2 If you have a long list of domain names, Create a file /etc/squid/blockwebsites.lst and put domain names one per line and add below rule in the squid configuration file. /etc/squid/squid.conf acl blocksitelist dstdomain "/etc/squid/blockwebsites.lst" http_access deny blocksitelist [b]blockwebsites.lst[/b] file content example: cat /etc/squid/blockwebsites.lst yahoo.com www.rediff.com Step 5 – Block Specific Keyword with Squid Add below rules to block specific website before any allow all rules. Below example will block all pages having keyword yahoo or Gmail. /etc/squid/squid.conf acl blockkeyword1 url_regex yahoo acl blockkeyword2 url_regex gmail http_access deny blockkeyword1 http_access deny blockkeyword2 If you have a long list of keywords, Create a file /etc/squid/blockkeywords.lst and put keywords one per line and add below rule in the squid configuration file. /etc/squid/squid.conf acl blockkeywordlist url_regex "/etc/squid/blockkeywords.lst" http_access deny blockkeywordlist blockkeywords.lst file content example: cat /etc/squid/blockkeywords.lst yahoo gmail facebook Congratulation’s you have successfully install and configured Squid proxy server. Credits to tecadmin.net1 point