Installing the Netlist for ABillS

On the test, I install the Netlist module for ABillS in Ubuntu Server.

We import the tables into the database:

mysql -D abills --default-character-set=utf8 < /usr/abills/db/Netlist.sql

Open the billing configuration file:

nano /usr/abills/libexec/config.pl

Make sure that the module is activated:

@MODULES = (
          'Netlist'
          );

Install nmap and Perl module for it:

sudo apt-get install nmap
sudo cpanm Nmap::Parser

Let’s see where nmap is located:

which nmap

Open the billing configuration file again:

sudo nano /usr/abills/libexec/config.pl

Let’s specify the path to nmap:

$conf{'NMAP_LOCATION'}="/usr/bin/nmap";

Add to sudoers:

echo 'www-data ALL=(ALL) NOPASSWD: /usr/bin/nmap' >> /etc/sudoers.d/abills_sudoers

After installation, the module will be available in the menu /Settings/Netlist

How to delete profile bigmir)net

On the test, I delete the profile from bigmir.net and I will describe the deletion process:

1) We will enter the profile https://passport.bigmir.net using your login and password.

2) In the profile settings on the right, select “Delete profile” and enter twice the password to confirm the deletion.
Direct link to delete – https://passport.bigmir.net/remove/

After that, all profile data will be deleted after 14 days, during which it can be restored.

If sites have been added to the http://top.bigmir.net/global/ rating, they must be deleted before deleting the profile.

Solution of error “ERROR 1221 (HY000): Incorrect usage of DB GRANT and GLOBAL PRIVILEGES”

I once ran a SQL query:

GRANT REPLICATION SLAVE ON TESTDATABASE.* TO "replication"@"192.168.1.9" IDENTIFIED BY "password";

And I found the following error:

ERROR 1221 (HY000): Incorrect usage of DB GRANT and GLOBAL PRIVILEGES

Since the REPLICATION SLAVE privileges are global and can not be assigned to a particular database, they must be specified globally in the query, so the SQL query should look like this:

GRANT REPLICATION SLAVE ON *.* TO "replication"@"192.168.1.9" IDENTIFIED BY "password";

After that, the query succeeded:

Query OK, 0 rows affected, 1 warning (0,01 sec)

The Asus router reboot script

On old router firmware Asus often noticed that the web interface is not fully open, not all the menus are displayed, so it can not be configured accordingly and can not be restarted if remote access is also available, since the reset button is not displayed.
So he took the Asus RT-N12E router, ran the Wireshark sniffer, opened the web interface of the router and pressed the reboot button.
In the intercepted packets, you could see that the Reboot.asp file is being rebooted in the root directory.

This resulted in a script for rebooting Asus routers:

#!/bin/sh
ROUTER_IP="192.168.1.1"
USERNAME="admin"
PASSWORD="admin"

# exit if router is down
ping -q -c 1 "$ROUTER_IP" > /dev/null || exit

curl --basic --user "$USERNAME:$PASSWORD" -A "Mozilla/4.73 [en] (X11; U; Linux 2.2.15 i686)" --refer "http://$ROUTER_IP" "$ROUTER_IP/Reboot.asp"

The contents of the script will be placed in a new file, for example, using the nano editor (“CTRL+X” to exit and “y” to save the changes):

nano file.sh

Let’s make it executable:

chmod 777 file.sh

After this, we execute:

./file.sh

You can also manually open the link http://192.168.1.1/Reboot.asp in the browser if you need to reboot the router once.

Configuring Automatic Calls in Asterisk

Asterisk can automatically make a call if you put a .call file in the (default) /var/spool/asterisk/outgoing/ directory. If the date of the file change is greater than the current one, the call will be made on or after this time.

For automatic calls, the pbx_spool.so module must be loaded, it must be registered in modules.conf or autoload=yes must be specified.

Continue reading “Configuring Automatic Calls in Asterisk”

How to remove “Proudly powered by WordPress”

To remove the inscription «Proudly powered by WordPress», which is usually displayed at the bottom of each page, you need to edit the footer.php file of the active theme (for example, if the twentyfifteen theme is active, then /wp-content/themes/twentyfifteen/footer.php).

Namely, clear the content between the following tags:

<div class="site-info">
...clear what's here...
</div><!-- .site-info -->

Also noticed that if you use Jetpack with infinite scrolling, then it adds its footer, to open it you will open the file /wp-content/plugins/jetpack/modules/infinite-scroll/infinity.php and delete the line:

<?php echo $credits; ?>

The AMP plug-in’s footer is here – /wp-content/plugins/amp/templates/footer.php.

After updating the theme or Jetpack may have to repeat.

Done.

Installing oVirt

oVirt — virtualization management system.

On the test, I will install oVirt in CentOS 7.

First of all, let’s add an official repository:

yum install http://resources.ovirt.org/pub/yum-repo/ovirt-release42.rpm

Update the packages:

yum update

It is desirable to reboot the system if the kernel was updated:

reboot

Install the oVirt Engine and all dependencies:

yum install ovirt-engine

This completes the installation of the oVirt Engine and you can proceed to setup by following the on-screen instructions:

engine-setup

By the end of the configuration, access information will be displayed and the oVirt panel can be opened in the browser https://example.com/ovirt-engine.

Installing Nessus on Linux

Nessus – vulnerability scanner in Linux.

Go to the official website http://www.tenable.com/products/nessus/select-your-operating-system and download Nessus for the operating system that you have installed.

Switch to the root user:
su

Run the installation of the downloaded file, for example:

dpkg -i Nessus-7.0.2-debian6_amd64.deb

Run Nessus:

/etc/init.d/nessusd start

After that, you can open Nessus in the browser by clicking https://IP:8834/

For further work, you need to register with https://www.tenable.com/products/nessus/activation-code.