Skip to content

This is the file where document learning

first point ctrl+k +v is for preview markdown in vscode

refer to this link for a guide about markdown. note that there exist different flavour of markdown.


04.06.2024

Create a dotfiles folder and move the configuration to that

also write scripts to link those files to any systems

The book mastering Algorithm with C, recommended by Rob. Search about fuzzy search


05.06.2024

learn about running a Tor Relays different kind of nodes gurd nodes and exit nodes This command show you the arch:

dpkg --print-architecture

09.06.2024

I have done The sicherheit in cloud schulung and that was very basic when I restarted the Services containers where down for some secends then they became up!

pandoc was a converter that I was looking for for example it takes markdowninput and gives txt, pdf or html output LDAP is auth server database structure cd /etc/openldap/slapd.d/cn=config.ldif High Performance Software Foundation (HPSF)this What the hell is personal radio station? maybe a nice hobby this Also learn about OpenSCAP [this] (https://www.open-scap.org/)


10.06.2024

vim shortcut $ move to the end of line also this is the cheetsheet link that can help sheet


1.06.2024

Okay so the new scope of our projct is to move the documentation from Confluence to gitlab

my first idea is to use confluence APi con-doc gitlab address HPC current docs

also there is a gem isovalent labs paths


Nice roadmap about sec

ToDo:

  • [x] write a Canaban boarda.

  • [x] Gather mind and set a todo list

  • [] Read sysadmin book "The practice of system administration book", "The Practice ofthe cloud System administration", "Time management for System Adminastrator"

  • [x] Do ENT4 Homework and saw the video

This


11.06.2024

Maybe run a MailServer on Hetzner Server SMTP: send message between servers, POP: sync from server to my computer IMAP: also sync


15.06.2024

Het-tennis youtube videos are greate learn about chaos engineering incident response and these kind of things also managing the control flow of updates SANs cheatsheet This

grep -i what does it do ? how to gather cpuinfo systemd-detect-virt show if you are on a vM vmstat why using swap is bad strategy ? in modern linux env add influx db and time series DB specially using for monitoring

Role of loopback interface, check out ethtool [interface]

specify the number of time you want to ping somewhere

ping -c4 ...

changing /etc/servives ? ss -tulpen read data from there

This is a website for eu alternative services


20.06.2024

Nice roadmap about sec

the command that i was looking for long time

dpkg -l

list the package that are on the server what is nfs pay more attention to Katacoda and kodekloud also think about eBPF and it's function

lscpu nproc cat /proc/cpuinfo dmidecode -d cpu lsblk -f lsof list the processes on a directory echo $$

lsof . |grep -v PID | awk'{2$}' |xargs kill -9

user group

This redhat

test the write and read spedd with loops and dd

for i in $(seq 5); do echo "I am writing $i file"; time dd if=/dev/zero of=bigfile$i bs=4096k count=250;

jumbo frames and mtu and icmp packets,

lsmod stat /etc/... tripwire linux what is that ?

encrypt a file using vi -x argument
ID USERNAME I know sudo -l shows you your sudoer permissions. sudo -lU maybe?

cat /proc/version
dpkg -l | grep kernel ? ls /boot apt list --installed | grep linux-image ps aux | grep ssh

lsb_release -a seven colum of passwd username password id group id home shell


25.06.2024

cilium what is that it seems that learning kubernetees is a part of learning process also lets do a research about HPC

27.06.2024

can you touch a file with today date in it? touch file.date +%F the little thing upside is strange touch file. $(date +%F)a for i b for i in $(seq 5); do touch $i; done touch {1..100} more about seq command read about sreps

echo $$ show current bash pid an you show all the packaages that have SSL in their name? - dpkg -l | awk '{print $2}' | grep -i ssl - dpkg -l | gawk '/ssl/{print $2}' using -E for persistant env


1.07.2024

Using the system engineering by nasa

2.07.2024

compare between wikis strategies,


04.07.2024

I learned materials for mkdocs it is a really good platforms


07.07.2024

learn about linux systemcall interface


08.07.2024

layer accsess technologies : Dial up, DSL, FFTH, wireless point adsl rj11 conector spliter DSLAM, modem : modoulation demodulation BRAS DSLAM ---> BRRAS


09.07.2024

learn how to work with multiple git how git works deeply and configure it and learn the owenership and overcome the difficulties

ps ps -u ps -efj ps -uf


15.07.2024

learn how to change tmux statusbar color tmux

0 in vim go to the first of the line shift+4 will go to the end of line

Virtualization is the logical sharing of compute, storage, and networking resources among multiple processes, allowing each to run as if it was a stand- alone physical computer

Linux and Unix system administration handbook ( for Linux admin stuff. Highly recommended)

Pro git (for git. Very usefull)

The linux command line (from the author of automating the boring stuff with Python)

The Pragmatic Programmer (for programming)

I have only read bits and pieces of these books, but I searched reddit a lot to find vest books to learn this stuff, and these were the recommendations.

UNIX and Linux System Administration Handbook

The UNIX-HATERS Handbook

ab tool is something for testing apache webserver sysstat needs to be set to true to run it uses cronjob

ab -n 1000 -c 10 https://nextcloud.baboojoo.ir/ this command test the apache web server but i guess ofcourse there are certeinly modern tools like influx db, time series database or many application metrics

The pmap command reports the memory map of a process or processes. pmap

mpstat command for cpu testing ntop ng is a heavy networking monitor tool

iftop is also sar -n is also good mtr advance pathping mtr -z show the ASN that is good for detecting autonomes network

/etc/issue MOTD creat motd for a banner tar stands for tape archive util tar -cf stands for create file name then path and the -z is for compression for decompressing tar -xzvf file name there is a -p option to preserve a permission the ownership and permission of tar should be take into consideration while doing tar a bit of history dd stands for copy and convert while cc was used by c compliler :)) in ideal situation you should unmount the disk status=progress also change the blocksize to 1m wow wow dd is really powerful and useful it is really interesting rsync -azurP rsunc listen on tcp 873 rsunc -azurP -e ssh we also can use --include and --exclude we also should include -p option for permissions also -AGo mess around with resolvectl command tracepath is the new traceroute compare the difference ip -s link nc tools

20.07.2024

dynnamic kernel modules lsmod modinfo [kernel module] sudo insmod rsmode sudo mode probe mosuldle with out ppath lsdev blkid lsblk

compare SSHgaurd, fail2ban, i heard the concept of creating a swap file with dd and stream of zero then use it as a swap and then make it mkswap

if we make a swap partition this way they are not presistant we should add them to fstab to make them persistant systemd can do mount point and unit

what is efi partition btrfs file system the is the file system that docker use? No it is not it uses onion file system what are layer 4 proxy?

The similar thing ti bitlocker in linux is LUKS, i mean it is crazy that some one think that maybe this feaure is better in windows, openBSD is a joke to you

for security paranoid we can use shred to wipe the disk and write new data in itteration

apt cryptsetup-bin IDE --> SATA type of disks hdparm

sudo hdparm -I /dev/sda |less The difference between NVMes ssd and SATA SSD

LVM has three levels 1.physical 2.groups 3.volumes sudo pvcreate sudo pgcreate

scp [email protected]:/home/mylogin/filename . copy a remote file to the current directory on your local machine

"But if this is all about automating file system actions, why not use the Bash script- ing skills you already have? Well, you probably could, but once you start trying to incorporate things like remote authentication and conflicting software stacks into those scripts, your life will quickly become insanely complicated. Orchestrators will safely and reliably manage variables and passwords for you, and apply them within the proper context as often and in as many ways as necessary. You don’t need to track all the fine details on your own. Because there are all kinds of orchestration tools, the one you choose will largely depend on the specifics of your project, organization, and background. You’ll need to ask yourself some basic ques- tions: “Are most of the people involved going to be developers or IT professionals?” “Will you be using a continuous integration methodology?” Table 16.1 provides some quick and dirty profiles of four of the main players."

The concept of service level objectives


22.07.2024

rsync rclone dd growisofs

nohup Run a process that continues after you log out. flock Ensure that only one instance of a command runs at a time.

at [options] time specification The at command schedules one or more shell commands to run later:

tty The tty command prints the name of the terminal device associated with the current shell:

man -k database | less

/boot Files for booting the system. The kernel lives here, typi‐ cally in /boot/vmlinuz or a file of similar name. /lost+found Damaged files that were rescued by a disk recovery tool. /proc Files for currently running processes; for advanced users. /sys Files for kernel internals; for advanced users.

how to use spell command to replace incorrect words with write ones using sed

also there is a tool called aspell

cat View files in their entirety. less View text files one page at a time. nl View text files with their lines numbered. head View the first lines of a text file. tail View the last lines of a text file. strings Display text that’s embedded in a binary file. od View data in octal (base 8) or other formats.

find Locate files in a directory hierarchy. xargs Turn a list of files into a list of commands (and much more). locate Create an index of files, and search the index for a string. which Locate executables in your search path (command). type Locate executables in your search path (bash built-in). whereis Locate executables, documentation, and source files.

Perhaps Linux’s greatest strength is text manipulation: massag‐ ing a text file (or standard input) into a desired form by apply‐ ing transformations, often in a pipeline. Many commands do this, but here I focus on some of the most important tools for transforming text.

pandoc Convert from one markup language to another. hxselect Extract information from an HTML file. jq Extract information from a JSON file. 6 I ran pandoc to convert material from the third edition of this book, written in DocBook XML, to AsciiDoc for the fourth edition. xmllint Validate and extract information from an XML file. csvtool Extract information from a comma-separated values (CSV) file. split Split up a file simply into multiple files. csplit Split up a file into multiple files using complex criteria

csplit

split

csvtool

PDF and PostScript File Handling pdftotext Extract text from PDF files. ps2ascii Extract text from PostScript or PDF files. pdfseparate Extract individual pages from a PDF file. pdftk Split, join, rotate, and otherwise manipulate PDF files. pdf2ps, ps2pdf Convert between PDF and PostScript file formats. ocrmypdf Perform optical character recognition (OCR) on a PDF

itfoss community

LQ

Stack

NixCraft kernel thing kernel stuff

TLDP

FreeIPA - Identity, Policy, Audit centeral thing probebly industery use THIS

Server fault

very important blog


23.07.2024

Linux kernel syscall tables Linux kernel syscall tables syscall things

sudo iptables -save

sudo nmap -Pn -p 1-3000 -sV 116.202.25.235
this command also show the services

vsftp is old standard for FTP, but the modern thing is SFTP

apachectl testconfig also what is fuzzy search algorithm after the LPIC2 course with it protv next i want to move to RIPE academy courses.


25.07.2024

BIND DNS server,


27.07.2024

Kant's maxim of enlightenment

  • enlarge thinking
  • thinking conssistently
  • put your self in others

take a critical distance of what we fancy os the core aspect of the enlightenment as a process of self revelation there is also a decision between freedom of chice and freedom of agency capitalism undermine the reall freedom with freedom of choice

good blog about thechnical stuff

homelab stuff

History of command line

Linux networking linux net sysctl

=============================

There is a thinker Lea Ypi, a professor at LSE, Kanitian marxist, do research of connection to liberal and freedom and marxism.

Host a Gitea server, create a subdomain set a reverse proxy point it to the right servise

useful docker command,

docker stats docker events docker inspect docker logs

----

Also for my next homelab project i want to run Gitea on gitea.baboojoo.ir also i want to set it as it does not have any conflict with nextcloud instance, and inssure the security of it is okay. printenv HOME

also a nice idea about a future blog post: explain where does the programs like htop, top get their value you should look at /proc/stat

sysconf is a function in Unix-like operating systems that provides a way to retrieve system configuration information at runtime. It is part of the POSIX standard and allows programs to query system-specific limits and options that are defined in header files such as unistd.h

Purpose of sysconf

The primary purpose of sysconf is to provide a way to obtain values for system limits and options that are defined at compile time but may vary between different systems or configurations. This makes programs more portable and adaptable to different environments.


28.07.2024

echo $PATH | tr : "\n"

recall the previous command and replace jg by jpg (first occurrence only), just as caret notation does, run: $ !!:s/jg/jpg/ Suppose you’ve mistakenly run the following command by typing jg instead of jpg: $ md5sum .jg | cut -c1-32 | sort | uniq -c | sort -nr md5sum: '.jg': No such file or directory To run the command properly, you could recall it from the command history, cursor over to the mistake and fix it, but there’s a quicker way to accomplish your goal. Just type the old (wrong) text, the new (corrected) text, and a pair of carets (^), like this: $ ^jg^jpg

pushd and popd maybe helpful

dirs print directory stack

Producing text, Isolating text,Combining text, Transforming text grep, cut, head, tail, awk paste, diff, tr, rev, sed

    dpkg -l
    tmux pipe-pane -o "exec cat >>$HOME/'logs-tmux.log'"
    curl -s https://raw.githubusercontent.com/sivel/speedtest-cli/master/speedtest.py | python -


Redhat satelite and Pulp project for patch management

Build RPms

The nobody user in Unix-like operating systems is a special system user account used for running unprivileged processes. This user has minimal permissions and is often used for security purposes to run services that do not require elevated privileges, thereby minimizing the potential damage that can be done if the service is compromised. Key Points About the nobody User

Unprivileged: The nobody user has very limited permissions and cannot perform actions that require higher privileges.
Security: Running processes as nobody helps in isolating and limiting the access of potentially vulnerable or less secure services.
System Use: It's commonly used by system services and daemons to run safely without the need for root privileges.

Understanding the Output

UID: The first column shows the user ID (nobody).
PID: The second column shows the process ID.
PPID: The third column shows the parent process ID.
C: The fourth column shows the CPU utilization.
STIME: The fifth column shows the start time of the process.
TTY: The sixth column shows the terminal associated with the process.
TIME: The seventh column shows the cumulative CPU time.
CMD: The eighth column shows the command that started the process.

Why Use the nobody User

Security: Running services with minimal permissions reduces the risk of system compromise.
Isolation: It helps in isolating services from each other and from critical system components.

Common Services Running as nobody

NFS Daemons: Network File System services often run as nobody.
Web Servers: Some web server processes, when configured to run without special privileges, may run as nobody.
Other Daemons: Various other system daemons and services that do not require elevated privileges might use the nobody user.

Conclusion

The nobody user is a system user with minimal privileges, commonly used to run unprivileged processes for enhanced security. Using ps -ef | grep nobody, you can identify which processes are running under this user, helping you to manage and secure your system effectively.

Warewulf: cluster managment like: xCAT, warewulf

Grymoire a learning blog Grymoire


02.08.2024

What are the difference between sourcing a script and running it, sourcing? sourcing tell your current bash session to exe that program ./.sh start up a new instance of bash


03.08.2024

MIT operating system, course which write the OS itself, OS ENG

Here are some courses regardig security find out from MIT: 1. Net_Sec 2. Network and Computer Security 3. Also see this

Haha This was easier than i thought: how to bind Kaps key to escape: setxkbmap -option caps:escape

Schneier Bloog Schneier on Security king Pi – Operating Systems Development


04.08.2024

awk '{print $1} path to the file

lmit the search to package names that include your search term: $ apt search packagename --names-only

awk 'BEGIN{FS=","; OFS="\t"} {print $!, $2, $3}' path

imagine the situation that find cant do symbolic link it does not go across file systemsshould be something about symbolic link ad these stuffs

nix shell nixpackage# see man mtr

mtr -wo LSRABW carlaschroder.com

grep tcp /etc/services

ps -eH ps -eFl ps is a very powerful command pidof pgrep

dd if=/dev/zero of=/dev/null

06.08.2024

different kind of filessystems,

BTrfs, ZFS

Question : when archiving a file or send it thrugh sftp or rsync when does the permission change? The tune2fs utility with the -j argument will add an ext3 journal to the specified file system.

How cpus work

/etc/shadow /etc/passwd /etc/login.def /etc/default/useradd

This command is to add user to a gorup

usermod -a -G group user how to lock and unlock thee user by usermod passwd -d delete password

passwd -e expire password also see chage command when user are able to loging when with sshkeey even when the accouunt is locked

There are to commands to set ACL permission on linux file

setacl getacl

set set -o posix

Look at Bash exe order, you knoww that one can overwrite commands with alias and bash functions, so if you want to make sure that the original command runs what you do ?

you do it with command

incus config trust add-certificate Downloads/incus-ui.crt

Article about reverse ssh

incus is a great tool

Try the github education pack, a


Do 8. Aug 14:57:33 CEST 2024

How to read json data format Root Object: The entire structure is a JSON: object, indicated by {}. This object contains multiple key-value pairs.

pilars of observality: what are they ? metric logs, incus docs


Fr 9. Aug 00:14:54 CEST 2024

book recomm: + Artificial Intelligence: A Modern Approach

+  Python for Data Analysis

+  Hands-On Machine Learning with Scikit-Learn and TensorFlow

+ Pattern Recognition and Machine Learning

+ Data Science from Scratch: First Principles with Python

sudo systemctl list-units --type=service

also try to learn systemctl command limits.conf file to limit users2 last w who TCP wraper and host.deny host.allow are they useful?This is shiift + N has word completion

dig -x reverse lookup +short nsswitch


Sa 10. Aug 14:30:00 CEST 2024

curl cheat.sh/tar for item in item{A..F} item{1,5,9}; do echo something with item; done IFS='\n' openssl s_client -connect example.com:443 -servername example.com curl --head --connect-to example.com:443:1.2.3.4:443 https://example.com

date +"%s" :print time in secend There is also systemd timer and these kinnd of things

ctl + A this was what i need jump to the fisrt of the line in shell ctrl +E at then end of the line

Kubernetees The Hardway

The Book of Kubernetes: A Complete Guide to Container Orchestration Complete Kubernetes Course/

virt-what tells if we are in a virtual machine

demidecode show hardware detail

lsmod shows the kernel module

systemd-analyze-time

what is the difference between restarting and reenabling a process in linux ?

systemd-analyze critical chain

echo $?

need restarting -r

needrestart -k

SWOT analysis last | tac

lsof -i :22we control systemd with systemctl

systemd-analyze-blame

cat /proc/cmdline


Mo 12. Aug 11:54:59 CEST 2024

Put set spell to check Spelling on vimrc

also There is nice if you know about how browser web engine Works? There are the gray area which I do not know

*** I signed up a course on ML on Quera ***

ctrl + a Goto BEGINNING of command line ctrl + e Goto END of command line ctrl + b move back one character ctrl + f move forward one character alt + f move cursor FORWARD one word alt + b move cursor BACK one word ctrl + xx Toggle between the start of line and current cursor position ctrl + ] + x Where x is any character, moves the cursor forward to the next occurance of x alt + ctrl + ] + x Where x is any character, moves the cursor backwards to the previous occurance of x

bash shortcut shortcuts

Tmux is not compatible with kitty This may or may not work when using terminal multiplexers, depending on whether they passthrough the escape codes and if the values of the environment variables KITTY_PID and KITTY_WINDOW_ID are correct in the current session (they can be wrong when connecting to a tmux session running in a different window) and the ssh kitten is run in the currently active multiplexer window.


Mo 2. Sep 01:38:17 CEST 2024

There is a nice hypervisor called bhyve and it is related to BSD look at it sometime - bhyve - Related article

NIST Post quantum crypto


what is apropos

What is the difference between SUID, SGID UUID find -perm fnd -size find -mmin find -name find -iname find -mmin -+ 5 find -not -min sudo find /var/log/ -perm -g=w ! -perm /o=rw > /home/bob/data.txt sudo find /usr -type f -mmin -120 grep -oi writ a regex to extract ip from auth.log

lspci | grep -i "net" | cut -d: -f3 find the Network adaptopr sed -i '500,2000s/enabled/disabled/g' values.conf Change all values enabled to disabled in /home/bob/values.conf config file from line number 500 to 2000.


22.09 .2024

I got my mechanical keyboard nuphy that is the best my best experience at the moment what can i say it is wondderful my best experience with a new keyboard kkkkkhhhhh


22.09 .2024

I got my mechanical keyboard nuphy that is the best my best experience at the moment what can i say it is wondderful my best experience with a new keyboard kkkkkhhhhh


kuber is specification it's not a software,


Mo 4. Nov 15:38:13 CET 2024

Nice Weblog blog


sort -f sort -u /var/log/syslog