<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.hackerbruecke.net/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>hackerbruecke.net</title>
        <description>Christophs outsourced brain</description>
        <link>https://www.hackerbruecke.net/</link>
        <lastBuildDate>Sun, 12 Apr 2026 12:00:41 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.hackerbruecke.net/_media/wiki/favicon.ico</url>
            <title>hackerbruecke.net</title>
            <link>https://www.hackerbruecke.net/</link>
        </image>
        <item>
            <title>amavisd</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/amavisd?rev=1493132275&amp;do=diff</link>
            <description>AmaVisd-new

/etc/amavis/amavisd.conf:
use strict;

# a minimalistic configuration file for amavisd-new with all necessary settings
#
#   see amavisd.conf-default for a list of all variables with their defaults;
#   see amavisd.conf-sample for a traditional-style commented file;
#   for more details see documentation in INSTALL, README_FILES/*
#   and at http://www.ijs.si/software/amavisd/amavisd-new-docs.html


# COMMONLY ADJUSTED SETTINGS:

# @bypass_virus_checks_maps = (1);  # uncomment to DI…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:55 +0000</pubDate>
        </item>
        <item>
            <title>packliste</title>
            <link>https://www.hackerbruecke.net/packliste?rev=1712491047&amp;do=diff</link>
            <description>Packliste

Liste der zu erledigenden Dinge, zum Packen und Tipps für die Teilnahme an einem Kongress, einer Konferenz oder einer anderen Veranstaltung, wie den Chemnitzer Linux Tagen (CLT), oder der Gulasch Programmiernacht (GPN) in Karlsruhe.

❤️ Danke ✨

Diese Packliste basiert ursprünglich auf der Liste von CongressChecklist von MacLemon, Vienna/Austria</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 07 Apr 2024 11:57:27 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/egroupware/config?rev=1293466841&amp;do=diff</link>
            <description>eGroupWare Version 1.4.001

pre-requisites:

	*  required PHP version 4.3+ (recommended 5+)
	*  php.ini: safe_mode = Off
	*  php.ini: magic_quotes_runtime = Off
	*  php.ini: register_globals = Off
	*  php.ini: memory_limit &gt;= 16M
	*  php.ini: max_execution_time &gt;= 30</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>slapd_conf</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/slapd_conf?rev=1293466843&amp;do=diff</link>
            <description>/etc/openldap/slapd.conf

&lt;http://www.stanford.edu/services/directory/openldap/configuration/bdb-config.html&gt;




# The database configuration parameters must appear *after* the &quot;database&quot;
# directive, as DB_CONFIG files are &#039;per backend&#039;.
dbconfig set_cachesize  4 0 1
dbconfig set_lg_regionmax 262144
dbconfig set_lg_bsize 2097152
dbconfig set_lg_dir /var/log
# Automatically remove log files that are no longer needed.
dbconfig set_flags DB_LOG_AUTOREMOVE
# 
# Setting set_tas_spins reduces resour…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>relayhost</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/relayhost?rev=1493132193&amp;do=diff</link>
            <description>Postfix configuration for a relayhost (MX) / Anti-SPAM-/UCE-settings

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


 used Ports:
  10023/tcp: postgrey
10024/tcp: amavisd-new
10025/tcp: policyd-weight</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:33 +0000</pubDate>
        </item>
        <item>
            <title>door-access</title>
            <link>https://www.hackerbruecke.net/homeautomation/door-access?rev=1420660646&amp;do=diff</link>
            <description>Tür-Zutrittskontrolle

Am Anfang stand der Wunsch unserer grossen Tochter einen sicheren Zutritt ins Haus nach der Schule zu ermmöglichen. Sollte Sie den „Schlüssel“ verlieren, sollte dieser mit einfachen Mittel sperrbar und durch ein kostengünstiges Nachfolge-Exemplar ersetzt werden können.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 07 Jan 2015 19:57:26 +0000</pubDate>
        </item>
        <item>
            <title>openssl_ca</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ca/openssl_ca?rev=1293466844&amp;do=diff</link>
            <description>simple OpenSSL Certficate Authority

Create Certificate Authority
station7:/etc # station7:/usr/share/ssl/misc # ./CA.sh -newca
CA certificate filename (or enter to create)

Making CA certificate ...
Generating a 1024 bit RSA private key
.....++++++
.....................................++++++
writing new private key to &#039;./demoCA/private/./cakey.pem&#039;
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-----
You are about to be asked to enter information that will be incorporated
into your c…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:44 +0000</pubDate>
        </item>
        <item>
            <title>ldap_secure</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/ldap_secure?rev=1293466843&amp;do=diff</link>
            <description>TLS and LDAP over SSL (ldaps)

Modifying /etc/openldap/ldap.conf

Modify / append the TLS-settings:
#--- SSL/TLS setting ---#
TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
TLS_CACERT /etc/ssl/certs/ca_cert.pem
TLS_CERT /etc/ssl/certs/station7_cert.pem
TLS_KEY /etc/ssl/private/station7_key.pem
TLS_REQCERT demand</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config?rev=1712422579&amp;do=diff</link>
            <description>Postfix

smtpd (smtp + daemon) = server = Postfix receives mail from a client 

smtp = client = Postfix sends mail to another mailserver 


Edit /etc/postfix/main.cf
queue_directory = /var/spool/postfix
command_directory = /usr/sbin
daemon_directory = /usr/libexec/postfix
mail_owner = postfix
smtpd_banner = mail.example.org
myhostname = mail.example.org
myorigin = example.org
mydestination = mail.example.org
mynetworks = 127.0.0.0/8, 10.0.0.0/8
alias_maps = hash:/etc/aliases, ldap:virtualaliases…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:56:19 +0000</pubDate>
        </item>
        <item>
            <title>cookie-banner</title>
            <link>https://www.hackerbruecke.net/datenschutz/cookie-banner?rev=1578085923&amp;do=diff</link>
            <description>Rechtskonforme Cookie-Banner zu implementieren ist nicht einfach. Denn nach Ansicht des LfDI-BW benötigen Cookies, die ein Nutzertracking über Seiten- und Gerätegrenzen hinweg ermöglichen die:

	*  aktive,
	*  ausdrückliche,
	*  informierte,
	*</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 03 Jan 2020 21:12:03 +0000</pubDate>
        </item>
        <item>
            <title>syntax</title>
            <link>https://www.hackerbruecke.net/wiki/syntax?rev=1712421931&amp;do=diff</link>
            <description>Formatting Syntax

DokuWiki supports some simple markup language, which tries to make the datafiles to be as readable as possible. This page contains all possible syntax you may use when editing the pages. Simply have a look at the source of this page by pressing</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 16:45:31 +0000</pubDate>
        </item>
        <item>
            <title>spamassassin</title>
            <link>https://www.hackerbruecke.net/linux/email/spamassassin/spamassassin?rev=1493132319&amp;do=diff</link>
            <description>SpamAssassin

SA-config-genarator: &lt;http://www.yrex.com/spam/spamconfig.php&gt; 


/etc/mail/spamassassin/local.cf:
# SpamAssassin config file for version 3.x
# NOTE: NOT COMPATIBLE WITH VERSIONS 2.5 or 2.6
# See http://www.yrex.com/spam/spamconfig25.php for earlier versions
# Generated by http://www.yrex.com/spam/spamconfig.php (version 1.50)

# How many hits before a message is considered spam.
required_score           5.0

# Encapsulate spam in an attachment (0=no, 1=yes, 2=safe)
report_safe    …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:39 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/commserv/apache2/config?rev=1293466841&amp;do=diff</link>
            <description>Apache

SSL (https)

A special thing for getting Apache2 starting withaut user-interaction is also to store a decrypted key, since without Apache will ask at every start for the password...

mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem
openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apache2/private/station7_decrypted-key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:41 +0000</pubDate>
        </item>
        <item>
            <title>config_test</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/config_test?rev=1493132127&amp;do=diff</link>
            <description>Postfix-Konfiguration testen

Die Postfix-Konfigurtation sollte auf alle fälle vor der Produktivnahme ausgiebig getestet und das Verhalten beobachtet werden!




Test von main.cf und master.cf

Test der Datei- und Verzeichnisrechte, sowie die Syntax von main.cf und master.cf von Postfix:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:55:27 +0000</pubDate>
        </item>
        <item>
            <title>temper1</title>
            <link>https://www.hackerbruecke.net/linux/monitoring/icinga/hardware/temper1?rev=1493132385&amp;do=diff</link>
            <description>Temperaturmessungen mit dem TEMPer1 USB sensor

Vor einiger Zeit begann ich zuhause mir einen kleinen Serverraum einzurichten - mein Datenklo ;-).

In diesem Serverraum sollte natürlich auch die Raumtemperatur mit Icinga oder Nagios überwacht werden. - Natürlich gibt es verschiedene quasi out-of-the-box Lösungen, wie z.B.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:59:45 +0000</pubDate>
        </item>
        <item>
            <title>fully_encrypted_debian</title>
            <link>https://www.hackerbruecke.net/linux/fully_encrypted_debian?rev=1506205530&amp;do=diff</link>
            <description>Full disk encryption with LUKS (inklusive /boot)

Referenzen:

	*  &lt;http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/&gt;
	*  &lt;http://www.pavelkogan.com/2015/01/25/linux-mint-encryption/&gt;
	*  &lt;https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system&gt;
	*  &lt;http://www.schmidp.com/2014/12/12/full-disk-encryption-with-grub-2-+-luks-+-lvm-+-swraid-on-debian/&gt;
	*  &lt;https://unix.stackexchange.com/questions/160504/lvm-ontop-of-luks-using-grub&gt;
	*  &lt;https://systemausfall.org/w…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 23 Sep 2017 22:25:30 +0000</pubDate>
        </item>
        <item>
            <title>postgrey</title>
            <link>https://www.hackerbruecke.net/linux/email/greylisting/postgrey?rev=1493136147&amp;do=diff</link>
            <description>Greylisting

For a overview what greylisting does, have a look at www.greylisting.org/ 



There are several greylisting daemons for Postfix available. I stick to David Schweikert&#039;s Postgrey or to Lionel Bouton&#039;s SQLgrey in combination with it&#039;s web-interface http://www.vanheusden.com/sgwi/



Postgrey

Postgrey greylisting daemon</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 16:02:27 +0000</pubDate>
        </item>
        <item>
            <title>config</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/config?rev=1493131953&amp;do=diff</link>
            <description>Cyrus imapd / popd



&lt;http://www.opensuse.org&gt;Modify /etc/cyrus.conf to:


START {
  recover       cmd=&quot;ctl_cyrusdb -r&quot;
  deliver       cmd=&quot;ctl_deliver -r&quot;
}

SERVICES {
  imap          cmd=&quot;imapd&quot; listen=&quot;imap&quot; prefork=0
  #  imaps                cmd=&quot;imapd -s&quot; listen=&quot;imaps&quot; prefork=0
  pop3          cmd=&quot;pop3d&quot; listen=&quot;pop3&quot; prefork=0
  #  pop3s                cmd=&quot;pop3d -s&quot; listen=&quot;pop3s&quot; prefork=0
  sieve         cmd=&quot;timsieved&quot; listen=&quot;sieve&quot; prefork=2
  # entry must be the same as in th…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:33 +0000</pubDate>
        </item>
        <item>
            <title>postfix_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/postfix_secure?rev=1493132183&amp;do=diff</link>
            <description>Postfix with TLS and SSL (smtps)

Use a portscanner like „nmap“:
station7:/etc/init.d # nmap localhost | grep smtp
25/tcp   open  smtp


-&gt; smtp is only running at port 25!



TLS

Modify the TLS-settings in /etc/postfix/main.cf
#--- SSL/TLS setting ---#
smtpd_client_restrictions= permit_tls_clientcerts, permit_sasl_authenticated
smtpd_recipient_restrictions =
  permit_mynetworks,
  permit_sasl_authenticated,
  permit_tls_clientcerts,
  reject_unauth_destination,
  check_sender_access hash:/etc/…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:23 +0000</pubDate>
        </item>
        <item>
            <title>sasl</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/sasl?rev=1493132202&amp;do=diff</link>
            <description>SASL

A very conveniant way of configuring the Simple Authentication and Security Layer (SASL) is to use the Pluggable Authentication Modules (PAM), since it can use diffrent authentication sources like ldap or /etc/passwd - thus SASL is everything but simple</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:42 +0000</pubDate>
        </item>
        <item>
            <title>hardware</title>
            <link>https://www.hackerbruecke.net/linux/debian/hardware?rev=1493131617&amp;do=diff</link>
            <description>2014-06-17



zuerst „Debian OS-Basis-Installation auf Blech“ durchfuehren!!!

zusaetzlich „auf dem Blech“:



### Proxy der UKBW fuer die Installations-Shellsitzung setzen:
export http_proxy=&quot;http://proxy01.ukbw.de:3128/&quot;
### LiHAS GPG-Key importieren:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:46:57 +0000</pubDate>
        </item>
        <item>
            <title>spf</title>
            <link>https://www.hackerbruecke.net/linux/email/spf?rev=1713236572&amp;do=diff</link>
            <description>SPF

Standards für das „Sender Policy Framework (SPF)“: RFC 7208 und RFC 7372


v	SPF-Version
	Kennzeichen das einen TXT-Eintrag als SPF-Eintrag identifiziert.
	z.B. v=spf1 

Mechanismen (immer am Ende des Eintrags aufführen!)
a:	DNS-A-Eintrag
	z.B. a:example.com

ptr:	DNS-PTR-Eintrag (reverse Zone)
	z.B. ptr:example.com

all	alle zur Domain gehörigen Hostst
	z.B. -all

mx:	abweichender Mailexchanger
	z.B. mx:mail.example-abc.com

ip4:	Angabe einer oder mehrerer IPv4-Adressen
	z.B. ip4:192.100.1…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 16 Apr 2024 03:02:52 +0000</pubDate>
        </item>
        <item>
            <title>smtp-authentication</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/smtp-authentication?rev=1493132210&amp;do=diff</link>
            <description>SMTPd- / SMTP-authentication

SMTPd-authentication

SASL must be configured! 

in /etc/postfix/main.cf:
smtpd_sasl_auth_enable = yes
smtpd_sasl_security_options = noanonymous
broken_sasl_auth_clients = yes
smtpd_recipient_restrictions = ... permit_sasl_authenticated</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:50 +0000</pubDate>
        </item>
        <item>
            <title>commserv</title>
            <link>https://www.hackerbruecke.net/linux/commserv?rev=1493132445&amp;do=diff</link>
            <description>This documentation is work in progress, no liability for correctness can be given!  




Communications-Server

Motivation

Because I had to look for a log time around the Internet, asking a lot of questions on mailing-lists, reading books and talking to friends for configuring my commserv, thus having quite a bit of hassle getting things working, I&#039;d like give my experiences back to the comunity.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:00:45 +0000</pubDate>
        </item>
        <item>
            <title>dmarc</title>
            <link>https://www.hackerbruecke.net/linux/email/dmarc?rev=1713236674&amp;do=diff</link>
            <description>DMARC

Standards für „Domain-based Message Authentication, Reporting and Conformance (DMARC)“: RFC 7489




DMARC dient dem Reporting von E-Mail-Kommunikation und ist eine ergänzende Maßnahme zu den Verfahren DKIM und SPF. Im Folgenden sind die gängigen Tags aufgeführt, die in DMARC (TXT)-Records verwendet werden:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 16 Apr 2024 03:04:34 +0000</pubDate>
        </item>
        <item>
            <title>gosa_secure</title>
            <link>https://www.hackerbruecke.net/linux/commserv/gosa/gosa_secure?rev=1293466843&amp;do=diff</link>
            <description>force GOsa using ldaps

Change the server-configuration in the „location“-section of /etc/gosa.conf from:
server=&quot;ldap://localhost:389&quot;
to:
server=&quot;ldaps://localhost:636&quot;
tls=&quot;true&quot;
&lt;referral url=&quot;ldaps://localhost:636/dc=example,dc=com&quot;
 admin=&quot;cn=ldapadmin,dc=example,dc=com&quot;
 password=&quot;verysecretpassword&quot;
/&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>pam</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/pam?rev=1293466843&amp;do=diff</link>
            <description>/etc/ldap.conf (for PAM)
#
# This is the configuration file for the LDAP nameservice
# switch library, the LDAP PAM module and the shadow package.
#

# Your LDAP server. Must be resolvable without using LDAP.
host	127.0.0.1

# The distinguished name of the search base.
base	dc=example,dc=com

# The LDAP version to use (defaults to 3
# if supported by client library)
ldap_version	3

# Hash password locally; required for University of
# Michigan LDAP server, and works with Netscape
# Directory Ser…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>cyrus_secure</title>
            <link>https://www.hackerbruecke.net/linux/email/cyrus/cyrus_secure?rev=1493131964&amp;do=diff</link>
            <description>TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s)

TLS

Modify / append the TLS-settings in /etc/imap.conf:
#--- SSL/TLS setting ---#
tls_ca_path: /etc/ssl/certs
tls_ca_file: /etc/ssl/certs/ca_cert.pem
tls_cert_file: /etc/ssl/certs/station7_cert.pem
tls_key_file: /etc/ssl/private/station7_key.pem</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:52:44 +0000</pubDate>
        </item>
        <item>
            <title>ssh-smtp-tunnel</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/ssh-smtp-tunnel?rev=1493132228&amp;do=diff</link>
            <description>SMTP-over-SSH-Tunnel

Um zwei SMTP-Server (z.B. Mailserver im Heim-Netz zu Mailgateway bei Provider/Hoster) sicher miteinander zu verbinden, gibt es verschiedene Möglichkeiten.




OpenVPN-Tunnel

Eine Möglichkeit ist, ein OpenVPN-Tunnel zwischen beiden Servern.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:08 +0000</pubDate>
        </item>
        <item>
            <title>tipps</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/tipps?rev=1493132245&amp;do=diff</link>
            <description>Postfix Tipps und Tricks




Mails aus Mailqueue löschen

alle Mails des Benutzers station7@example.com aus der Mailqueue löschen:


mail:~# mailq | tail -n +2 | grep -v &#039;^ *(&#039; | awk  &#039;BEGIN { RS = &quot;&quot; } { if ($7 == &quot;station7@example.com&quot;) print $1 }&#039; | tr -d &#039;*!&#039; | postsuper -d -</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:57:25 +0000</pubDate>
        </item>
        <item>
            <title>start</title>
            <link>https://www.hackerbruecke.net/start?rev=1712424404&amp;do=diff</link>
            <description>hackerbruecke.net

[Hackerbrücke mit Christoph]

Warum Hackerbücke?

Die Hackerbrücke ist für mich Symbol und Inbegriff meines Einstiegs in die Computerwelt. Schon 1984 faszinierten mich Erhard Thomas&#039; (a.k.a. n0by) Glossen „Die Hackerbrücke“ in der Zeitschrift „DOS International</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 06 Apr 2024 17:26:44 +0000</pubDate>
        </item>
        <item>
            <title>brandmelder</title>
            <link>https://www.hackerbruecke.net/homeautomation/brandmelder?rev=1420307195&amp;do=diff</link>
            <description>Brandmelder pimpen

	*  &lt;http://ccblog.de/tag/cs2105go-m12/&gt;
	*  &lt;http://www.wikidorf.de/reintechnisch/Inhalt/RauchmelderExperimente&gt;
	*  &lt;http://www.instructables.com/id/Modify-a-6-EUR-smoke-detector-for-use-with-microco/all/?lang=de&gt;
	*  &lt;http://complexit.se/publications/Network.based.smoke.alarm-using.Arduino.and.iPhone.pdf&gt;





&lt;- zurück</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 03 Jan 2015 17:46:35 +0000</pubDate>
        </item>
        <item>
            <title>dnssec</title>
            <link>https://www.hackerbruecke.net/linux/dnssec?rev=1713236436&amp;do=diff</link>
            <description>DNSsec mit Bind9

Standards für die „Domain Name System Security Extensions (DNSSEC)“: RFC 4033, RFC 4034, RFC 4035, RFC 5011 und RFC 5155.





Entropie zur Schlüsselgenerierung

Um genügend Entropie für die Erzeugung der Schlüssel zur Verfügung zu haben, sollte z.B.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 16 Apr 2024 03:00:36 +0000</pubDate>
        </item>
        <item>
            <title>dokuwiki</title>
            <link>https://www.hackerbruecke.net/wiki/dokuwiki?rev=1684170792&amp;do=diff</link>
            <description>DokuWiki

wiki:dokuwiki DokuWiki is a simple to use and highly versatile Open Source wiki software that doesn&#039;t require a database. It is loved by users for its clean and readable syntax. The ease of maintenance, backup and integration makes it an administrator&#039;s favorite. Built in</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 15 May 2023 17:13:12 +0000</pubDate>
        </item>
        <item>
            <title>tipps</title>
            <link>https://www.hackerbruecke.net/linux/sed/tipps?rev=1493132406&amp;do=diff</link>
            <description>SED-Tipps

Kommentare mit # und Leerzeilen herausfiltern:

sed -e &#039;/^#/d&#039; -e &#039;/^$/d&#039;



Kommentar entfernen, bei dem ausschliesslich Leerzeichen oder Tabulatoren vor der Raute stehen:

sed -e &#039;/^*#/d&#039; -e &#039;/^$/d&#039; Eingabe-Datei &gt; Ausgabedatei



Löschen aller Zeilen, die höchstens Leerzeichen beinhalten:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 15:00:06 +0000</pubDate>
        </item>
        <item>
            <title>ldap_conf</title>
            <link>https://www.hackerbruecke.net/linux/commserv/ldap/ldap_conf?rev=1293466843&amp;do=diff</link>
            <description>/etc/openldap/ldap.conf
#
# LDAP Defaults
#

# See ldap.conf(5) for details
# This file should be world readable but not world writable.

# 21.07.2006, chhaas
BASE	dc=example,dc=com
URI	ldap://127.0.0.1
###
#SIZELIMIT	12
#TIMELIMIT	15
#DEREF		never

#--- SSL/TLS setting ---#
TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+SSLv2:+EXP
#TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
TLS_CACERT /etc/ssl/certs/ca_cert.pem
TLS_CERT /etc/ssl/certs/station7_cert.pem
TLS_KEY /e…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 27 Dec 2010 16:20:43 +0000</pubDate>
        </item>
        <item>
            <title>lightsquid</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/lightsquid?rev=1408135540&amp;do=diff</link>
            <description>Lightsquid-Tool

your access.log look slightly different from standart. may be you use CUSTOM log record. at and of standart record in you log you has addition field  look like:

[User-Agent: TMhtload/1.32.00.1008\r\nAccept: */*\r\nHost: cm-t.activeupdate.trendmi</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:45:40 +0000</pubDate>
        </item>
        <item>
            <title>sarg</title>
            <link>https://www.hackerbruecke.net/linux/commserv/squid/sarg?rev=1408135580&amp;do=diff</link>
            <description>SARG

/etc/crontab:
### SQUID-Monitoring via Sarg:
00 06-19/1 * * *        root    /usr/local/chhaas-skripts/sarg-reports.sh today &gt; /dev/nul
00 00 * * *     root    /usr/local/chhaas-skripts/sarg-reports.sh daily &gt; /dev/nul
00 01 * * 1     root    /usr/local/chhaas-skripts/sarg-reports.sh weekly &gt; /dev/nul
30 02 1 * *     root    /usr/local/chhaas-skripts/sarg-reports.sh monthly &gt; /dev/nul</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 15 Aug 2014 20:46:20 +0000</pubDate>
        </item>
        <item>
            <title>spf</title>
            <link>https://www.hackerbruecke.net/linux/email/amavisd/spf?rev=1493132219&amp;do=diff</link>
            <description>Postfix und das Sender Policy Framework (SPF)

Das Sender Policy Framework - früher auch Sender Permitted From genannt -, soll das Fälschen des email-Absenders in einer E-Mail auf SMTP-Ebene erschweren.



Mithilfe eines SPF-Generators, z.B. &lt;http://spfwizard.com/&gt; oder</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:56:59 +0000</pubDate>
        </item>
        <item>
            <title>monitoring</title>
            <link>https://www.hackerbruecke.net/linux/email/monitoring/monitoring?rev=1493132284&amp;do=diff</link>
            <description>Monitoring

email-monitoring

	*  create „/var/lib/rrd“

Mailgraph

mailgraph is a very simple mail statistics RRDtool frontend for Postfix that produces daily, weekly, monthly and yearly graphs of received/sent and bounced/rejected mail (SMTP traffic).</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:58:04 +0000</pubDate>
        </item>
        <item>
            <title>ldap</title>
            <link>https://www.hackerbruecke.net/linux/email/postfix/ldap?rev=1493132150&amp;do=diff</link>
            <description>using LDAP

/etc/postfix/ldap-aliases.cf:
server_host= ldaps://localhost:636
server_port= 636
start_tls = no
tls_ca_cert_file = /etc/ssl/postfix/certs/ca_cert.pem
tls_ca_cert_dir = /etc/ssl/postfix/certs/
tls_cert = /etc/ssl/postfix/certs/station7_cert.pem
tls_key = /etc/ssl/postfix/private/station7_key.pem
#tls_random_file = dev:/dev/urandom
tls_cipher_suite = ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP
version= 3
bind= no
timeout= 120
search_base= dc=example,dc=com
query_filter = (&amp;(object…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 25 Apr 2017 14:55:50 +0000</pubDate>
        </item>
    </channel>
</rss>
