<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://www.hackerbruecke.net/</link>
        <lastBuildDate>Sun, 12 Apr 2026 13:29:12 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://www.hackerbruecke.net/</link>
        </image>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/egroupware/config?rev=1293466841&amp;do=diff</link>
            <description>eGroupWare Version 1.4.001

pre-requisites:

	*  required PHP version 4.3+ (recommended 5+)
	*  php.ini: safe_mode = Off
	*  php.ini: magic_quotes_runtime = Off
	*  php.ini: register_globals = Off
	*  php.ini: memory_limit &gt;= 16M
	*  php.ini: max_execution_time &gt;= 30</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>hardware</title>
            <link>https://www.hackerbruecke.net/linux/debian/hardware?rev=1493131617&amp;do=diff</link>
            <description>2014-06-17



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

zusaetzlich „auf dem Blech“:



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=&quot;http://proxy01.ukbw.de:3128/&quot;
### LiHAS GPG-Key importieren:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:57 +0000</pubDate>
        </item>
        <item>
            <title>spamreport</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamreport?rev=1493132098&amp;do=diff</link>
            <description>Spamreport




spamcheck.sh


#!/bin/bash

#########################################################
# UKBW-Spam-Report, 2007-05-01, chhaas, IuK / Netzwerke #
#########################################################

#set -o verbose

########
# ToDo #
########
# - printvariablen bei &quot;grep X-Spam-Status:&quot; korrigieren
# - Mail an antispam@uk-bw.de zusammenfassen: 1 Mail die alle Spammails inkl. Empfaenger beinhaltet
# - Variablen fuer FROM: und RETURN-PATH einrichten
# - evtl. SpamAssassin Spam-T…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:54:58 +0000</pubDate>
        </item>
        <item>
            <title>gosa2egw</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/gosa2egw?rev=1293466843&amp;do=diff</link>
            <description>patching GOsa for seamless eGroupWare integration
&quot;-------- Original-Nachricht --------&quot;
Betreff: Re: [GOsa] gosa+samba3.schema conflicts with evolutionPerson.schema
Datum: Tue, 5 Jun 2007 15:23:31 +0200
Von: Cajus Pollmeier &lt;pollmeier@gonicus.de&gt;
An: GONICUS site administration project &lt;gosa@oss.gonicus.de&gt;

These are from two different RFCs, I guess. Bad luck. GOsa uses dateOfBirth 
internally. So, the simpliest way would be to remove the definition from the 
gosa+samba3.schema and add the ali…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>all</title>
            <link>https://www.hackerbruecke.net/linux/debian/all?rev=1493131598&amp;do=diff</link>
            <description>2014-08-08



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

auf allen Server-Instanzen („Blech“, Linux VServer, LXC):



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=„&lt;http://proxy01.ukbw.de:3128/&gt;“

### LiHAS GPG-Key importieren:
wget -O -</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:38 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/config?rev=1293466843&amp;do=diff</link>
            <description>GOsa

GOsa is a GPL&#039;ed PHP based administration tool for managing accounts and systems in LDAP databases. It administers users and groups, mail distribution lists, thin clients, applications, phones and faxes. 

Get GOsa from: &lt;http://oss.gonicus.de/pub/gosa/&gt; 

Project homepage: &lt;http://www.gosa-project.org/&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>slapd_conf</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/slapd_conf?rev=1293466843&amp;do=diff</link>
            <description>/etc/openldap/slapd.conf

&lt;http://www.stanford.edu/services/directory/openldap/configuration/bdb-config.html&gt;




# The database configuration parameters must appear *after* the &quot;database&quot;
# directive, as DB_CONFIG files are &#039;per backend&#039;.
dbconfig set_cachesize  4 0 1
dbconfig set_lg_regionmax 262144
dbconfig set_lg_bsize 2097152
dbconfig set_lg_dir /var/log
# Automatically remove log files that are no longer needed.
dbconfig set_flags DB_LOG_AUTOREMOVE
# 
# Setting set_tas_spins reduces resour…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>spamassassin</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamassassin?rev=1493132319&amp;do=diff</link>
            <description>SpamAssassin

SA-config-genarator: &lt;http://www.yrex.com/spam/spamconfig.php&gt; 


/etc/mail/spamassassin/local.cf:
# SpamAssassin config file for version 3.x
# NOTE: NOT COMPATIBLE WITH VERSIONS 2.5 or 2.6
# See http://www.yrex.com/spam/spamconfig25.php for earlier versions
# Generated by http://www.yrex.com/spam/spamconfig.php (version 1.50)

# How many hits before a message is considered spam.
required_score           5.0

# Encapsulate spam in an attachment (0=no, 1=yes, 2=safe)
report_safe    …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:39 +0000</pubDate>
        </item>
        <item>
            <title>paketverwaltung</title>
            <link>https://www.hackerbruecke.net/linux/debian/paketverwaltung?rev=1493131639&amp;do=diff</link>
            <description>Debian-Paketverwaltung:



Debian-Paket selbst bauen:

----------

&lt;http://www.martin-bock.de/pc/pc-0101.html&gt;

&lt;http://antbear.org/debpkg-intro.html&gt;

&lt;http://debiananwenderhandbuch.de/debianpaketeerstellen.html&gt;

&lt;http://www.linuxdelta.de/uploads/media/debian_workshop.pdf&gt;

&lt;https://www.luga.de/Angebote/Vortraege/DPKG/DPKG.pdf&gt;\ß
&lt;https://webseiten.hs-weingarten.de/winkelmh/zopecms/hrwcms/installation/debian-paket-manager&gt;


Anzeige aller installierten Pakete

----------

(&lt;http://wiki.debianf…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:47:19 +0000</pubDate>
        </item>
        <item>
            <title>amavisd</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/amavisd?rev=1493132275&amp;do=diff</link>
            <description>AmaVisd-new

/etc/amavis/amavisd.conf:
use strict;

# a minimalistic configuration file for amavisd-new with all necessary settings
#
#   see amavisd.conf-default for a list of all variables with their defaults;
#   see amavisd.conf-sample for a traditional-style commented file;
#   for more details see documentation in INSTALL, README_FILES/*
#   and at http://www.ijs.si/software/amavisd/amavisd-new-docs.html


# COMMONLY ADJUSTED SETTINGS:

# @bypass_virus_checks_maps = (1);  # uncomment to DI…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:55 +0000</pubDate>
        </item>
        <item>
            <title>postgrey</title>
            <link>https://www.hackerbruecke.net/linux/email/greylisting/postgrey?rev=1493136147&amp;do=diff</link>
            <description>Greylisting

For a overview what greylisting does, have a look at www.greylisting.org/ 



There are several greylisting daemons for Postfix available. I stick to David Schweikert&#039;s Postgrey or to Lionel Bouton&#039;s SQLgrey in combination with it&#039;s web-interface http://www.vanheusden.com/sgwi/



Postgrey

Postgrey greylisting daemon</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 16:02:27 +0000</pubDate>
        </item>
        <item>
            <title>fully_encrypted_debian</title>
            <link>https://www.hackerbruecke.net/linux/fully_encrypted_debian?rev=1506205530&amp;do=diff</link>
            <description>Full disk encryption with LUKS (inklusive /boot)

Referenzen:

	*  &lt;http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/&gt;
	*  &lt;http://www.pavelkogan.com/2015/01/25/linux-mint-encryption/&gt;
	*  &lt;https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system&gt;
	*  &lt;http://www.schmidp.com/2014/12/12/full-disk-encryption-with-grub-2-+-luks-+-lvm-+-swraid-on-debian/&gt;
	*  &lt;https://unix.stackexchange.com/questions/160504/lvm-ontop-of-luks-using-grub&gt;
	*  &lt;https://systemausfall.org/w…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 23 Sep 2017 22:25:30 +0000</pubDate>
        </item>
        <item>
            <title>sasl</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/sasl?rev=1493132202&amp;do=diff</link>
            <description>SASL

A very conveniant way of configuring the Simple Authentication and Security Layer (SASL) is to use the Pluggable Authentication Modules (PAM), since it can use diffrent authentication sources like ldap or /etc/passwd - thus SASL is everything but simple</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:42 +0000</pubDate>
        </item>
        <item>
            <title>ca</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ca/ca?rev=1293466844&amp;do=diff</link>
            <description>Certificate Authority

generate certificate and key-files using e.g. one of the follwing

	*  simple OpenSSL CA
	*  Tiny CA
	*  phpki CA




trusting your Certificate Authority

Ensure there&#039;s only one CA certificate in the file from your CA. Normally there is, but ocassionally several are stored in the same file. To list the number of certificates in a file, use the command below. If you get an answer of more than one, then see the section on multiple certificates in one file. The command to ch…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>relayhost</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/relayhost?rev=1493132193&amp;do=diff</link>
            <description>Postfix configuration for a relayhost (MX) / Anti-SPAM-/UCE-settings

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


 used Ports:
  10023/tcp: postgrey
10024/tcp: amavisd-new
10025/tcp: policyd-weight</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:33 +0000</pubDate>
        </item>
        <item>
            <title>dokuwiki</title>
            <link>https://www.hackerbruecke.net/wiki/dokuwiki?rev=1684170792&amp;do=diff</link>
            <description>DokuWiki

wiki:dokuwiki DokuWiki is a simple to use and highly versatile Open Source wiki software that doesn&#039;t require a database. It is loved by users for its clean and readable syntax. The ease of maintenance, backup and integration makes it an administrator&#039;s favorite. Built in</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 15 May 2023 17:13:12 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/apache2/config?rev=1293466841&amp;do=diff</link>
            <description>Apache

SSL (https)

A special thing for getting Apache2 starting withaut user-interaction is also to store a decrypted key, since without Apache will ask at every start for the password...

mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem
openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apache2/private/station7_decrypted-key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>ssh-smtp-tunnel</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/ssh-smtp-tunnel?rev=1493132228&amp;do=diff</link>
            <description>SMTP-over-SSH-Tunnel

Um zwei SMTP-Server (z.B. Mailserver im Heim-Netz zu Mailgateway bei Provider/Hoster) sicher miteinander zu verbinden, gibt es verschiedene Möglichkeiten.




OpenVPN-Tunnel

Eine Möglichkeit ist, ein OpenVPN-Tunnel zwischen beiden Servern.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:08 +0000</pubDate>
        </item>
        <item>
            <title>erweiterung_mit_bilder-galerie_erstellen</title>
            <link>https://www.hackerbruecke.net/libreoffice/erweiterung_mit_bilder-galerie_erstellen?rev=1421404054&amp;do=diff</link>
            <description>LibreOffice Bilder-Galerie als Erweiterung erstellen

	*  Bilder in eine neue, leere Galerie einfügen:

Zuerst muss ein „Neues Thema“ in der Galerie angelegt werden. Dann müssen die einzelen Bilder mit gedrückter Maustaste in die leere Galerie gezogen werden. Mit einem Klick der rechten Maustaste können die Eigenschaften des nun in der Galerie befindlichen Zeichnungsobjekts angepasst werden.
Ebenso können die Eigenschaften der galerie mit einem Klick der rechten Maustaste im linken Fenster auf d…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 16 Jan 2015 10:27:34 +0000</pubDate>
        </item>
        <item>
            <title>welcome</title>
            <link>https://www.hackerbruecke.net/wiki/welcome?rev=1684170792&amp;do=diff</link>
            <description>Welcome to your new DokuWiki

Congratulations, your wiki is now up and running. Here are a few more tips to get you started.

Enjoy your work with DokuWiki,

-- the developers

Create your first pages

Your wiki needs to have a start page. As long as it doesn&#039;t exist, this link will be red:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 15 May 2023 17:13:12 +0000</pubDate>
        </item>
        <item>
            <title>gnarwl</title>
            <link>https://www.hackerbruecke.net/linux/email/gnarwl?rev=1493131823&amp;do=diff</link>
            <description>Gnarwl

Download GNARWL software from &lt;http://www.home.unix-ag.org/patrick/index.php?gnarwl&gt; and download package named gnarwl-3.3.tgz 




Compile GNARWL for LDAP vacations
# tar xzvf gnarwl-3.3.tgz
# cd gnarwl-3.3
# ./configure
# make
# make install
# make perm
Adjust File /usr/local/etc/gnarwl.conf
map_sender $sender
map_receiver $recepient
map_subject $subject
map_field $fullname cn
map_field $deputy mail
server localhost
port 389
scope sub
login cn=admin,dc=example,dc=org
password IveGotASe…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:50:23 +0000</pubDate>
        </item>
        <item>
            <title>reset_admin_password</title>
            <link>https://www.hackerbruecke.net/typo3/reset_admin_password?rev=1408706946&amp;do=diff</link>
            <description>Typo3 Admin-Passwort zurücksetzen

	*  In der Datenbank direkt:


UPDATE be_users SET password=md5(&#039;neues_Passwort&#039;) WHERE username = &#039;admin&#039;;


	*  Über das Typo3-Install-Tool:
		*  Im Root-Verzeichnis der Typo3-Instanz das Install-Tool aktivieren:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 22 Aug 2014 11:29:06 +0000</pubDate>
        </item>
        <item>
            <title>tipps</title>
            <link>https://www.hackerbruecke.net/linux/ssh/tipps?rev=1493132416&amp;do=diff</link>
            <description>SSH Tipps

SSH-Key auf entferntem Server einspielen


ssh-copy-id root@HOSTNAME
root@HOSTNAME&#039;s password: 
Now try logging into the machine, with &quot;ssh &#039;root@HOSTNAME&#039;&quot;, and check in:

  ~/.ssh/authorized_keys

to make sure we haven&#039;t added extra keys that you weren&#039;t expecting.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:00:16 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/php/config?rev=1293466843&amp;do=diff</link>
            <description>PHP5 configuration for GOsa and eGroupWare

eGroupWare

When I added about 250 users to a group in GOsa or in eGroupWare, I encountered the following problem with (open)SUSE 10.2, which I did not encounter with SUSE 10.0: 

station7: suhosin[373]: ALERT - configured request variable limit exceeded - dropped variable \
&#039;account_user[]&#039; (attacker &#039;172.16.130.9&#039;, file &#039;/srv/www/htdocs/egroupware/index.php&#039;)</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>sign</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim/sign?rev=1493132019&amp;do=diff</link>
            <description>Domain Key Identified Mail outbound - ORIGINATING - signieren

DKIM basiert auf asymetrischer Verschlüsselung mit public- und private-Key.

Das Key-Paar wird mit folgender Syntax erzeugt: 



amavisd genrsa &lt;Dateiname&gt; [Anzahl der Bits für den Schlüssel]</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:39 +0000</pubDate>
        </item>
        <item>
            <title>start</title>
            <link>https://www.hackerbruecke.net/start?rev=1712424404&amp;do=diff</link>
            <description>hackerbruecke.net

[Hackerbrücke mit Christoph]

Warum Hackerbücke?

Die Hackerbrücke ist für mich Symbol und Inbegriff meines Einstiegs in die Computerwelt. Schon 1984 faszinierten mich Erhard Thomas&#039; (a.k.a. n0by) Glossen „Die Hackerbrücke“ in der Zeitschrift „DOS International</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 17:26:44 +0000</pubDate>
        </item>
        <item>
            <title>dnssec</title>
            <link>https://www.hackerbruecke.net/linux/dnssec?rev=1713236436&amp;do=diff</link>
            <description>DNSsec mit Bind9

Standards für die „Domain Name System Security Extensions (DNSSEC)“: RFC 4033, RFC 4034, RFC 4035, RFC 5011 und RFC 5155.





Entropie zur Schlüsselgenerierung

Um genügend Entropie für die Erzeugung der Schlüssel zur Verfügung zu haben, sollte z.B.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 16 Apr 2024 03:00:36 +0000</pubDate>
        </item>
        <item>
            <title>syntax</title>
            <link>https://www.hackerbruecke.net/wiki/syntax?rev=1712421931&amp;do=diff</link>
            <description>Formatting Syntax

DokuWiki supports some simple markup language, which tries to make the datafiles to be as readable as possible. This page contains all possible syntax you may use when editing the pages. Simply have a look at the source of this page by pressing</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:45:31 +0000</pubDate>
        </item>
        <item>
            <title>desktop</title>
            <link>https://www.hackerbruecke.net/linux/debian/desktop?rev=1493131583&amp;do=diff</link>
            <description>2013-12-27




fuer Desktops zusaetzlich:



kde-full
lightdm-kde-greeter
alsamixergui
amarok
audacity
audacity-data
bc
chromium-browser / chromium
chromium-browser-l10n / chromium-l10n
chromium-codecs-ffmpeg-extra 
cifs-utils
clusterssh
cryptsetup
cryptsetup-bin
cups
cups-browsed
cups-bsd
cups-client
cups-common
cups-daemon
cups-filters
cups-ppdc
dnsmasq
duplicity
ethtool
fuse
gnupg
gnupg-agent
gnupg2
gpgsm
gpgv
hplip
hplip-data
hplip-gui
htop
ifupdown / ifupdown-scripts-zg2
keepassx
kgpg
libre…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:23 +0000</pubDate>
        </item>
        <item>
            <title>cpan2rpm</title>
            <link>https://www.hackerbruecke.net/linux/commserv/other/cpan2rpm?rev=1293466841&amp;do=diff</link>
            <description>cpan2rpm

At &lt;http://sourceforge.net/project/showfiles.php?group_id=74018&gt; you can download a RPM-builder for CPAN-Perl-modules.


The man-page stats: 

cpan2rpm [options] &lt;distribution&gt;

The syntax for cpan2rpm requires a single distribution name, which can take one of four different forms:

	*  a CPAN module name (e.g. XML::Simple) - When a module name is passed, the script will ``walk&#039;&#039; search.cpan.org to     determine the latest distribution. If an exact match is not found, the CPAN module i…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/config?rev=1408135491&amp;do=diff</link>
            <description>Squid configuration

*/etc/squid/squid.conf:
icp_port 0
htcp_port 0
hierarchy_stoplist cgi-bin ?
cache_swap_low  90
cache_swap_high 95
maximum_object_size 4096 KB
ipcache_size 1024
ipcache_low  90
ipcache_high 95
fqdncache_size 1024
cache_access_log /var/log/squid/access.log
cache_dir ufs /var/cache/squid 240000 32 256
cache_log /var/log/squid/cache.log
cache_mem 3000 MB
cache_store_log /var/log/squid/store.log
emulate_httpd_log off
mime_table /etc/squid/mime.conf
log_mime_hdrs off
useragent_log…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:44:51 +0000</pubDate>
        </item>
        <item>
            <title>sarg</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/sarg?rev=1408135580&amp;do=diff</link>
            <description>SARG

/etc/crontab:
### SQUID-Monitoring via Sarg:
00 06-19/1 * * *        root    /usr/local/chhaas-skripts/sarg-reports.sh today &gt; /dev/nul
00 00 * * *     root    /usr/local/chhaas-skripts/sarg-reports.sh daily &gt; /dev/nul
00 01 * * 1     root    /usr/local/chhaas-skripts/sarg-reports.sh weekly &gt; /dev/nul
30 02 1 * *     root    /usr/local/chhaas-skripts/sarg-reports.sh monthly &gt; /dev/nul</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:46:20 +0000</pubDate>
        </item>
        <item>
            <title>sieve</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/sieve?rev=1493131976&amp;do=diff</link>
            <description>Sieve

	*  &lt;http://sieve.info/&gt;
	*  &lt;http://en.wikipedia.org/wiki/Sieve_%28mail_filtering_language%29&gt;
	*  &lt;http://de.wikipedia.org/wiki/Sieve&gt;
	*  &lt;http://www.uni-koeln.de/rrzk/mail/software/sieve/sieve.html&gt;

Sieve and SSL / TLS

timsieved allows for SSL on connect (like https, imaps, or pop3s), only STARTTLS.

So you have to wrap it in an stunnel (www.stunnel.org), which is a another story ...

Have a look at this: &lt;http://lists.horde.org/archives/ingo/Week-of-Mon-20050704/000872.html&gt;

Testi…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:56 +0000</pubDate>
        </item>
        <item>
            <title>verify</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/dkim/verify?rev=1493132031&amp;do=diff</link>
            <description>Domain Key Identified Mail inbound verifizieren


vim /etc/amavis/conf.d/50-user



# DKIM-Ueberpruefung:
$enable_dkim_verification = 1;
$allowed_added_header_fields{lc(&#039;Authentication-Results&#039;)} = 1;



service amavis restart


AMaViS kann nun mit Hilfe des Public-Keys der in der</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:53:51 +0000</pubDate>
        </item>
        <item>
            <title>vmware</title>
            <link>https://www.hackerbruecke.net/endian/vmware?rev=1293466840&amp;do=diff</link>
            <description>Endian Firewall 2.12 Community Edition VMware-image

Thanks to Peter Warasin and Raphael Vallazza from endian, I put together some minimal docu for the VMware-image.


Standard users and passwords:

	*  Web-interface: admin, pwd.: endian
	*  Console: root, pwd: endian</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:40 +0000</pubDate>
        </item>
        <item>
            <title>commserv</title>
            <link>https://www.hackerbruecke.net/linux/commserv?rev=1493132445&amp;do=diff</link>
            <description>This documentation is work in progress, no liability for correctness can be given!  




Communications-Server

Motivation

Because I had to look for a log time around the Internet, asking a lot of questions on mailing-lists, reading books and talking to friends for configuring my commserv, thus having quite a bit of hassle getting things working, I&#039;d like give my experiences back to the comunity.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:00:45 +0000</pubDate>
        </item>
        <item>
            <title>lvm_backup</title>
            <link>https://www.hackerbruecke.net/linux/duplicity/lvm_backup?rev=1493131687&amp;do=diff</link>
            <description>LVM-Backup mit Duplicity

Tim Riemenschneider

&lt;http://duplicity.nongnu.org/contrib/tmpback&gt;


#!/bin/sh

# The Archive is encrypted with this (since it is transfered to FTP)
export PASSPHRASE=&quot;foo&quot;
# The FTP-password (not exposed at cmdline
export FTP_PASSWORD=&quot;bar&quot;

# Do a fullbackup weekly
OPTIONS=&quot;--full-if-older-than 14D&quot;
KEEPFULLS=5

# Where to backup to
TARGETBASE=ftp://user@server/backups/
#TARGETBASE=file:///tmp/test

function create_mysql_snap
{
/usr/bin/mysql --defaults-extra-file=/et…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:48:07 +0000</pubDate>
        </item>
        <item>
            <title>lightsquid</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/lightsquid?rev=1408135540&amp;do=diff</link>
            <description>Lightsquid-Tool

your access.log look slightly different from standart. may be you use CUSTOM log record. at and of standart record in you log you has addition field  look like:

[User-Agent: TMhtload/1.32.00.1008\r\nAccept: */*\r\nHost: cm-t.activeupdate.trendmi</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:45:40 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/config?rev=1493131953&amp;do=diff</link>
            <description>Cyrus imapd / popd



&lt;http://www.opensuse.org&gt;Modify /etc/cyrus.conf to:


START {
  recover       cmd=&quot;ctl_cyrusdb -r&quot;
  deliver       cmd=&quot;ctl_deliver -r&quot;
}

SERVICES {
  imap          cmd=&quot;imapd&quot; listen=&quot;imap&quot; prefork=0
  #  imaps                cmd=&quot;imapd -s&quot; listen=&quot;imaps&quot; prefork=0
  pop3          cmd=&quot;pop3d&quot; listen=&quot;pop3&quot; prefork=0
  #  pop3s                cmd=&quot;pop3d -s&quot; listen=&quot;pop3s&quot; prefork=0
  sieve         cmd=&quot;timsieved&quot; listen=&quot;sieve&quot; prefork=2
  # entry must be the same as in th…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:33 +0000</pubDate>
        </item>
        <item>
            <title>cyrus_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/cyrus_secure?rev=1493131964&amp;do=diff</link>
            <description>TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s)

TLS

Modify / append the TLS-settings in /etc/imap.conf:
#--- SSL/TLS setting ---#
tls_ca_path: /etc/ssl/certs
tls_ca_file: /etc/ssl/certs/ca_cert.pem
tls_cert_file: /etc/ssl/certs/station7_cert.pem
tls_key_file: /etc/ssl/private/station7_key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:44 +0000</pubDate>
        </item>
        <item>
            <title>smtp-authentication</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/smtp-authentication?rev=1493132210&amp;do=diff</link>
            <description>SMTPd- / SMTP-authentication

SMTPd-authentication

SASL must be configured! 

in /etc/postfix/main.cf:
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_recipient_restrictions = ... permit_sasl_authenticated</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:50 +0000</pubDate>
        </item>
        <item>
            <title>temper1</title>
            <link>https://www.hackerbruecke.net/linux/monitoring/icinga/hardware/temper1?rev=1493132385&amp;do=diff</link>
            <description>Temperaturmessungen mit dem TEMPer1 USB sensor

Vor einiger Zeit begann ich zuhause mir einen kleinen Serverraum einzurichten - mein Datenklo ;-).

In diesem Serverraum sollte natürlich auch die Raumtemperatur mit Icinga oder Nagios überwacht werden. - Natürlich gibt es verschiedene quasi out-of-the-box Lösungen, wie z.B.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:59:45 +0000</pubDate>
        </item>
    </channel>
</rss>
