Guides

Using iptables to route OpenVPN traffic
avatar

To have your vpn traffic be able to reach the internet you just need to add the following iptable rules:

iptables -A FORWARD -i tun0 -j ACCEPT
iptables -A FORWARD -i tun0 -o eth0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o tun0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth0 -j MASQUERADE

This would take the tunnel adapter of tun0 and route the traffic through eth0 for the vpn subnet of 192.168.0.0.

Posted in Arch, CentOS, Fedora, Guides, Linux, Networking | Tagged , | Leave a comment

NTFS permissions for Redirected Folders (or Home Directories) | Off Campus
avatar

Source: NTFS permissions for Redirected Folders (or Home Directories) | Off Campus

Posted in Guides | Leave a comment

Maltrail – Malicious Traffic Detection System
avatar

A malicious traffic detection system which can be deployed on your network with ease.

https://www.latesthackingnews.com/maltrail-malicious-traffic-detection-system/

Posted in Linux, Networking | Tagged | Leave a comment

Linux: Keep An Eye On Your System With Glances Monitor
avatar

 

 

This is a simple to install script which will make monitoring you system in real-time very easy.

 

Source: Linux: Keep An Eye On Your System With Glances Monitor

Posted in Linux | Leave a comment

Populate a Binary Database Field Using a Local File
avatar

You can run the following SQL statement to populate a binary database field using a local file.

UPDATE <table>
SET <field> = (SELECT BulkColumn from Openrowset( Bulk ‘<full file path accessible by the server>’, Single_Blob) as <field name>)
WHERE <where condition>

Posted in Development | Tagged , | Leave a comment