Selaa lähdekoodia

Refactor and fix some links

HON95 3 vuotta sitten
vanhempi
commit
191977a870

+ 2 - 2
config/linux-server/applications.md

@@ -168,7 +168,7 @@ An NTP client and server. By design more accurate than e.g. ntpd and systemd-tim
 ### Cloudflare
 
 - Cloudflare does not allow limiting the scope for API keys to specific subdomains, so the key will have access to the whole domain (based on how it's registered).
-- Use e.g. [cloudflare-ddns-updater.sh](https://github.com/HON95/scripts/tree/master/server/linux/cloudflare).
+- Use e.g. [cloudflare-ddns-updater.sh](https://github.com/HON95/scripts/tree/master/cloudflare).
 
 ## Fail2ban
 
@@ -196,7 +196,7 @@ This setup requires pubkey plus MFA (if configured) plus password.
     AuthenticationMethods publickey,keyboard-interactive
     ```
 - Restart `sshd` and check that you can login with pubkey and MFA now.
-- (Optional) Add my [google-auth-config-prompter.sh](https://github.com/HON95/scripts/blob/master/server/linux/general/google-auth-config-prompter.sh) profile script to `/etc/profile.d/` to ask user to configure Google Auth on login.
+- (Optional) Add my [google-auth-config-prompter.sh](https://github.com/HON95/scripts/blob/master/login/google-auth-config-prompter.sh) profile script to `/etc/profile.d/` to ask user to configure Google Auth on login.
 - To allow a group to use only pubkey (no password or OTP):
     - In `/etc/ssh/sshd_config`, add `Match Group no-mfa` containing `AuthenticationMethods publickey` (indented) at the bottom.
     - Add the system group `no-mfa` and add special users to it.

+ 3 - 3
config/linux-server/debian.md

@@ -194,7 +194,7 @@ This is used by default and is the simplest to use for simple setups.
 
 This is the systemd way of doing it and is recommended for more advanced setups as ifupdown is riddled with legacy/compatibility crap.
 
-1. Add a simple network config: Create `/etc/systemd/network/lan.network` based on [main.network](https://github.com/HON95/configs/blob/master/networkd/main.network).
+1. Add a simple network config: Create `/etc/systemd/network/lan.network` based on [main.network](https://github.com/HON95/configs/blob/master/systemd-network/main.network).
 1. Disable/remove the ifupdown config: `mv /etc/network/interfaces /etc/network/interfaces.old`
 1. Enable the service: `systemctl enable --now systemd-networkd`
 1. Purge `ifupdown` and `ifupdown2`.
@@ -213,7 +213,7 @@ Prevent enabled (and potentially untrusted) interfaces from accepting router adv
 
 1. Install `apt install iptables iptables-persistent netfilter-persistent`
     - Don't save the current rules when it asks.
-1. Manually add IPTables rules or make [a simple iptables script](https://github.com/HON95/scripts/blob/master/linux/iptables/iptables.sh) or something.
+1. Manually add IPTables rules or make [a simple iptables script](https://github.com/HON95/scripts/blob/master/iptables/iptables.sh) or something.
 1. Open a new SSH session and make sure you can still log in without closing the current one.
 1. Note: If you flush the firewall and reconfigure it, remember to restart services modifying it (like libvirt, Docker, Fail2Ban).
 
@@ -304,7 +304,7 @@ Everything here is optional.
     - Run: `lynis audit system`
 - MOTD:
     - Clear `/etc/motd`, `/etc/issue` and `/etc/issue.net`.
-    - Download [dmotd.sh](https://github.com/HON95/scripts/blob/master/linux/login/dmotd.sh) to `/etc/profile.d/`.
+    - Download [dmotd.sh](https://github.com/HON95/scripts/blob/master/login/dmotd.sh) to `/etc/profile.d/`.
     - Install the dependencies: `neofetch lolcat`
     - Add an ASCII art (or Unicode art) logo to `/etc/logo`, using e.g. [TAAG](http://patorjk.com/software/taag/).
     - (Optional) Add a MOTD to `/etc/motd`.

+ 4 - 2
config/media/video-processing.md

@@ -6,10 +6,12 @@ breadcrumbs:
 ---
 {% include header.md %}
 
-_See the other pages in this category._
-
 ## General
 
+- Copy files from memory card (lol):
+    - Mount the card: `sudo mount /dev/mmcblk0p1 /mnt/lol0`
+    - Copy over the files: `rsync -a --progress /mnt/lol0/DCIM/100GOPRO/*.MP4 ~/Desktop/GoPro-2021-jul-ned`
+    - Unmount the card: `sudo umount /mnt/lol0`
 - Show media info about some media file: `mediainfo <file>` (requires `mediainfo`)
 
 {% include footer.md %}

+ 0 - 2
config/media/video-ripping.md

@@ -6,8 +6,6 @@ breadcrumbs:
 ---
 {% include header.md %}
 
-_See the other pages in this category._
-
 ## Rip DVDs (Linux)
 
 CDs and DVDs use 2048 byte sectors and may have both unintentional and intentional data errors.

+ 0 - 2
config/media/video-streaming.md

@@ -6,8 +6,6 @@ breadcrumbs:
 ---
 {% include header.md %}
 
-_See the other pages in this category._
-
 ## General
 
 - Resources:

+ 1 - 1
config/pc/arch-i3.md

@@ -208,7 +208,7 @@ For Arch with LUKS encrypted root (and boot), using the i3 (gaps) window manager
 1. Setup firewall (IPTables):
     1. Install IPTables: `sudo pacman -S iptables`
     1. Enable the IPTables services: `sudo systemctl enable --now iptables.service ip6tables.service`
-    1. Download my IPTables script (or do it yourself): `curl https://raw.githubusercontent.com/HON95/scripts/master/linux/iptables/iptables.sh -o /etc/iptables/config.sh`
+    1. Download my IPTables script (or do it yourself): `curl https://raw.githubusercontent.com/HON95/scripts/master/iptables/iptables.sh -o /etc/iptables/config.sh`
     1. Make it executable: `chmod +x /etc/iptables/config.sh`
     1. Modify it.
     1. Run it: `/etc/iptables/config.sh`

+ 2 - 2
config/pc/kubuntu.md

@@ -40,8 +40,8 @@ breadcrumbs:
 1. Setup firewall:
     - Remove other firewalls: `sudo apt purge ufw firewalld`
     - Install IPTables stuff: `sudo apt install iptables iptables-persistent netfilter-persistent`
-    - (Alternative 1) Create an IPTables script (e.g. [iptables.sh](https://github.com/HON95/scripts/blob/master/linux/iptables/iptables.sh)).
-    - (Alternative 2) Run my preset (basics only, no SSH etc.): `curl https://raw.githubusercontent.com/HON95/scripts/master/linux/iptables/iptables.sh | sudo bash`
+    - (Alternative 1) Create an IPTables script (e.g. [iptables.sh](https://github.com/HON95/scripts/blob/master/iptables/iptables.sh)).
+    - (Alternative 2) Run my preset (basics only, no SSH etc.): `curl https://raw.githubusercontent.com/HON95/scripts/master/iptables/iptables.sh | sudo bash`
 
 ### Extra
 

+ 1 - 1
config/pc/manjaro-kde.md

@@ -44,7 +44,7 @@ Nothing special.
 1. Setup firewall:
     - Install IPTables: `sudo pacman -S iptables`
     - Enable the IPTables services: `sudo systemctl enable iptables.service ip6tables.service`
-    - Download my IPTables script: `wget https://raw.githubusercontent.com/HON95/scripts/master/linux/iptables/iptables.sh -O /etc/iptables/config.sh`
+    - Download my IPTables script: `wget https://raw.githubusercontent.com/HON95/scripts/master/iptables/iptables.sh -O /etc/iptables/config.sh`
     - Make it executable: `chmod +x /etc/iptables/config.sh`
     - Modify it.
     - Run it: `/etc/iptables/config.sh`