zeldor.biz

Linux, programming and more

Copyright © 2025
Log in

Quickshare methods

November 26, 2018 by Igor Drobot Leave a Comment

Sharing is caring. For this situations there are following command line methods to provide some data to be downloaded from everywhere.
On the most common linux systems is python preinstalled or is a part of the core system,
so the next two python-examples should work like a charm.
[Read more…]

Filed Under: Linux Tagged With: Linux, PHP, Python, python3

Introducing the BeagleBone

September 27, 2012 by Igor Drobot 4 Comments

The BeagleBone is the low-cost, high-expansion hardware-hacker focused BeagleBoard. It is a bare-bones BeagleBoard that acts as a USB or Ethernet connected expansion.
BeagleBone brings full-featured Linux to places it has never gone before.

Delicious facts about BeagleBone
AM3359 Processor btw. this is the Datasheet [Read more…]

Filed Under: Debian, DIY, Kernel, Linux, Networking Tagged With: Angstrom, BeagleBone, BeagleBone Debian, Debian, Fritzing, Hardware, Linux, minicom, OpenSource

Mail command

September 15, 2011 by Igor Drobot Leave a Comment

My tiny mail-command collection of the very important administrator mail command.
You can test E-Mail-Server create scripts with this useful command or send yourself some notifications.

The simplest one: [Read more…]

Filed Under: Linux, Mailing, Networking Tagged With: Debian, Linux, mail

Kernel modules

July 23, 2010 by Igor Drobot Leave a Comment

It’s sometimes useful to prevent some kernel modules from loading. This howto will show you how to do this. This is really easy to do, so if you want you can just skip to the end to see some examples.

Load manualy kernel modules:

1
modprobe ip_conntrack_ftp

modprobe ip_conntrack_ftp

List all loaded modules:

1
lsmod

lsmod

This option remove loaded module:

1
modprobe -r pcspkr

modprobe -r pcspkr

Creating a blacklist:

1
2
cat /etc/modprobe.d/blacklist-custom
blacklist pcspkr

cat /etc/modprobe.d/blacklist-custom blacklist pcspkr

Filed Under: Kernel, Linux Tagged With: Kernel Modules, Linux, LKM, modprobe

Persistent IPv6 Address

July 21, 2010 by Igor Drobot 1 Comment

I show you, how to add a secondary IPv6 Address to your existing one.
You need only to edit “vim /etc/network/interfaces” file and add the IPv6 networking configuration.

1
2
3
4
5
6
7
8
9
10
11
12
13
# The loopback network interface
auto lo
iface lo inet loopback
 
# The primary network interface
auto eth0
iface eth0 inet static
 address 10.1.100.4
 gateway 10.1.100.1
 netmask 255.255.255.0
 pre-up modprobe ipv6
 post-up ip addr add 2001:470:1f0b:1514::4/64 dev eth0 
 post-up ip route add default via 2001:470:1f0b:1514::1 dev eth0

# The loopback network interface auto lo iface lo inet loopback # The primary network interface auto eth0 iface eth0 inet static address 10.1.100.4 gateway 10.1.100.1 netmask 255.255.255.0 pre-up modprobe ipv6 post-up ip addr add 2001:470:1f0b:1514::4/64 dev eth0 post-up ip route add default via 2001:470:1f0b:1514::1 dev eth0

Another way to do the same:

1
2
3
4
5
6
pre-up modprobe ipv6
 
iface eth0 inet6 static
 address 2001:470:1f0b:1514::4
 netmask 64
 gateway 2001:470:1f0b:1514::1

pre-up modprobe ipv6 iface eth0 inet6 static address 2001:470:1f0b:1514::4 netmask 64 gateway 2001:470:1f0b:1514::1

Also you can put the ipv6 module in to “/etc/modules” instead of “pre-up modprobe ipv6”

Test it:

1
ping6 ipv6.google.com

ping6 ipv6.google.com

Some complexe example:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
# The loopback network interface
auto lo
iface lo inet loopback
 
# The primary network interface
allow-hotplug eth0
iface eth0 inet static
        address 188.40.116.234
        netmask 255.255.255.0
        network 188.40.116.0
        broadcast 188.40.116.255
        gateway 188.40.116.206
 
auto eth0:1
iface eth0:1 inet static
        address 192.168.2.70
        netmask 255.255.255.0
 
# IPv6 over tunnel-broker
auto he-ipv6
iface he-ipv6 inet6 v4tunnel
 endpoint   216.66.80.30
 ttl        255
 address    2001:470:1f0a:1604::2
 netmask    64
 mtu        1480
 post-up ip addr add 2001:470:1f0b:1604::1/64 dev eth0
 post-up ip route add ::/0 dev he-ipv6

# The loopback network interface auto lo iface lo inet loopback # The primary network interface allow-hotplug eth0 iface eth0 inet static address 188.40.116.234 netmask 255.255.255.0 network 188.40.116.0 broadcast 188.40.116.255 gateway 188.40.116.206 auto eth0:1 iface eth0:1 inet static address 192.168.2.70 netmask 255.255.255.0 # IPv6 over tunnel-broker auto he-ipv6 iface he-ipv6 inet6 v4tunnel endpoint 216.66.80.30 ttl 255 address 2001:470:1f0a:1604::2 netmask 64 mtu 1480 post-up ip addr add 2001:470:1f0b:1604::1/64 dev eth0 post-up ip route add ::/0 dev he-ipv6

Filed Under: Debian, IPv6, Linux, Networking Tagged With: Debian, interfaces, Ipv6, Linux, network, Ubuntu

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • Next Page »
Yeaaah Cookie! We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok