Przeglądaj źródła

Refactor and fix some links

HON95 3 lat temu
rodzic
commit
191977a870

+ 2 - 2
config/linux-server/applications.md

@@ -168,7 +168,7 @@ An NTP client and server. By design more accurate than e.g. ntpd and systemd-tim
 ### Cloudflare
 ### Cloudflare
 
 
 - Cloudflare does not allow limiting the scope for API keys to specific subdomains, so the key will have access to the whole domain (based on how it's registered).
 - Cloudflare does not allow limiting the scope for API keys to specific subdomains, so the key will have access to the whole domain (based on how it's registered).
-- Use e.g. [cloudflare-ddns-updater.sh](https://github.com/HON95/scripts/tree/master/server/linux/cloudflare).
+- Use e.g. [cloudflare-ddns-updater.sh](https://github.com/HON95/scripts/tree/master/cloudflare).
 
 
 ## Fail2ban
 ## Fail2ban
 
 
@@ -196,7 +196,7 @@ This setup requires pubkey plus MFA (if configured) plus password.
     AuthenticationMethods publickey,keyboard-interactive
     AuthenticationMethods publickey,keyboard-interactive
     ```
     ```
 - Restart `sshd` and check that you can login with pubkey and MFA now.
 - Restart `sshd` and check that you can login with pubkey and MFA now.
-- (Optional) Add my [google-auth-config-prompter.sh](https://github.com/HON95/scripts/blob/master/server/linux/general/google-auth-config-prompter.sh) profile script to `/etc/profile.d/` to ask user to configure Google Auth on login.
+- (Optional) Add my [google-auth-config-prompter.sh](https://github.com/HON95/scripts/blob/master/login/google-auth-config-prompter.sh) profile script to `/etc/profile.d/` to ask user to configure Google Auth on login.
 - To allow a group to use only pubkey (no password or OTP):
 - To allow a group to use only pubkey (no password or OTP):
     - In `/etc/ssh/sshd_config`, add `Match Group no-mfa` containing `AuthenticationMethods publickey` (indented) at the bottom.
     - In `/etc/ssh/sshd_config`, add `Match Group no-mfa` containing `AuthenticationMethods publickey` (indented) at the bottom.
     - Add the system group `no-mfa` and add special users to it.
     - Add the system group `no-mfa` and add special users to it.

+ 3 - 3
config/linux-server/debian.md

@@ -194,7 +194,7 @@ This is used by default and is the simplest to use for simple setups.
 
 
 This is the systemd way of doing it and is recommended for more advanced setups as ifupdown is riddled with legacy/compatibility crap.
 This is the systemd way of doing it and is recommended for more advanced setups as ifupdown is riddled with legacy/compatibility crap.
 
 
-1. Add a simple network config: Create `/etc/systemd/network/lan.network` based on [main.network](https://github.com/HON95/configs/blob/master/networkd/main.network).
+1. Add a simple network config: Create `/etc/systemd/network/lan.network` based on [main.network](https://github.com/HON95/configs/blob/master/systemd-network/main.network).
 1. Disable/remove the ifupdown config: `mv /etc/network/interfaces /etc/network/interfaces.old`
 1. Disable/remove the ifupdown config: `mv /etc/network/interfaces /etc/network/interfaces.old`
 1. Enable the service: `systemctl enable --now systemd-networkd`
 1. Enable the service: `systemctl enable --now systemd-networkd`
 1. Purge `ifupdown` and `ifupdown2`.
 1. Purge `ifupdown` and `ifupdown2`.
@@ -213,7 +213,7 @@ Prevent enabled (and potentially untrusted) interfaces from accepting router adv
 
 
 1. Install `apt install iptables iptables-persistent netfilter-persistent`
 1. Install `apt install iptables iptables-persistent netfilter-persistent`
     - Don't save the current rules when it asks.
     - Don't save the current rules when it asks.
-1. Manually add IPTables rules or make [a simple iptables script](https://github.com/HON95/scripts/blob/master/linux/iptables/iptables.sh) or something.
+1. Manually add IPTables rules or make [a simple iptables script](https://github.com/HON95/scripts/blob/master/iptables/iptables.sh) or something.
 1. Open a new SSH session and make sure you can still log in without closing the current one.
 1. Open a new SSH session and make sure you can still log in without closing the current one.
 1. Note: If you flush the firewall and reconfigure it, remember to restart services modifying it (like libvirt, Docker, Fail2Ban).
 1. Note: If you flush the firewall and reconfigure it, remember to restart services modifying it (like libvirt, Docker, Fail2Ban).
 
 
@@ -304,7 +304,7 @@ Everything here is optional.
     - Run: `lynis audit system`
     - Run: `lynis audit system`
 - MOTD:
 - MOTD:
     - Clear `/etc/motd`, `/etc/issue` and `/etc/issue.net`.
     - Clear `/etc/motd`, `/etc/issue` and `/etc/issue.net`.
-    - Download [dmotd.sh](https://github.com/HON95/scripts/blob/master/linux/login/dmotd.sh) to `/etc/profile.d/`.
+    - Download [dmotd.sh](https://github.com/HON95/scripts/blob/master/login/dmotd.sh) to `/etc/profile.d/`.
     - Install the dependencies: `neofetch lolcat`
     - Install the dependencies: `neofetch lolcat`
     - Add an ASCII art (or Unicode art) logo to `/etc/logo`, using e.g. [TAAG](http://patorjk.com/software/taag/).
     - Add an ASCII art (or Unicode art) logo to `/etc/logo`, using e.g. [TAAG](http://patorjk.com/software/taag/).
     - (Optional) Add a MOTD to `/etc/motd`.
     - (Optional) Add a MOTD to `/etc/motd`.

+ 4 - 2
config/media/video-processing.md

@@ -6,10 +6,12 @@ breadcrumbs:
 ---
 ---
 {% include header.md %}
 {% include header.md %}
 
 
-_See the other pages in this category._
-
 ## General
 ## General
 
 
+- Copy files from memory card (lol):
+    - Mount the card: `sudo mount /dev/mmcblk0p1 /mnt/lol0`
+    - Copy over the files: `rsync -a --progress /mnt/lol0/DCIM/100GOPRO/*.MP4 ~/Desktop/GoPro-2021-jul-ned`
+    - Unmount the card: `sudo umount /mnt/lol0`
 - Show media info about some media file: `mediainfo <file>` (requires `mediainfo`)
 - Show media info about some media file: `mediainfo <file>` (requires `mediainfo`)
 
 
 {% include footer.md %}
 {% include footer.md %}

+ 0 - 2
config/media/video-ripping.md

@@ -6,8 +6,6 @@ breadcrumbs:
 ---
 ---
 {% include header.md %}
 {% include header.md %}
 
 
-_See the other pages in this category._
-
 ## Rip DVDs (Linux)
 ## Rip DVDs (Linux)
 
 
 CDs and DVDs use 2048 byte sectors and may have both unintentional and intentional data errors.
 CDs and DVDs use 2048 byte sectors and may have both unintentional and intentional data errors.

+ 0 - 2
config/media/video-streaming.md

@@ -6,8 +6,6 @@ breadcrumbs:
 ---
 ---
 {% include header.md %}
 {% include header.md %}
 
 
-_See the other pages in this category._
-
 ## General
 ## General
 
 
 - Resources:
 - Resources:

+ 1 - 1
config/pc/arch-i3.md

@@ -208,7 +208,7 @@ For Arch with LUKS encrypted root (and boot), using the i3 (gaps) window manager
 1. Setup firewall (IPTables):
 1. Setup firewall (IPTables):
     1. Install IPTables: `sudo pacman -S iptables`
     1. Install IPTables: `sudo pacman -S iptables`
     1. Enable the IPTables services: `sudo systemctl enable --now iptables.service ip6tables.service`
     1. Enable the IPTables services: `sudo systemctl enable --now iptables.service ip6tables.service`
-    1. Download my IPTables script (or do it yourself): `curl https://raw.githubusercontent.com/HON95/scripts/master/linux/iptables/iptables.sh -o /etc/iptables/config.sh`
+    1. Download my IPTables script (or do it yourself): `curl https://raw.githubusercontent.com/HON95/scripts/master/iptables/iptables.sh -o /etc/iptables/config.sh`
     1. Make it executable: `chmod +x /etc/iptables/config.sh`
     1. Make it executable: `chmod +x /etc/iptables/config.sh`
     1. Modify it.
     1. Modify it.
     1. Run it: `/etc/iptables/config.sh`
     1. Run it: `/etc/iptables/config.sh`

+ 2 - 2
config/pc/kubuntu.md

@@ -40,8 +40,8 @@ breadcrumbs:
 1. Setup firewall:
 1. Setup firewall:
     - Remove other firewalls: `sudo apt purge ufw firewalld`
     - Remove other firewalls: `sudo apt purge ufw firewalld`
     - Install IPTables stuff: `sudo apt install iptables iptables-persistent netfilter-persistent`
     - Install IPTables stuff: `sudo apt install iptables iptables-persistent netfilter-persistent`
-    - (Alternative 1) Create an IPTables script (e.g. [iptables.sh](https://github.com/HON95/scripts/blob/master/linux/iptables/iptables.sh)).
-    - (Alternative 2) Run my preset (basics only, no SSH etc.): `curl https://raw.githubusercontent.com/HON95/scripts/master/linux/iptables/iptables.sh | sudo bash`
+    - (Alternative 1) Create an IPTables script (e.g. [iptables.sh](https://github.com/HON95/scripts/blob/master/iptables/iptables.sh)).
+    - (Alternative 2) Run my preset (basics only, no SSH etc.): `curl https://raw.githubusercontent.com/HON95/scripts/master/iptables/iptables.sh | sudo bash`
 
 
 ### Extra
 ### Extra
 
 

+ 1 - 1
config/pc/manjaro-kde.md

@@ -44,7 +44,7 @@ Nothing special.
 1. Setup firewall:
 1. Setup firewall:
     - Install IPTables: `sudo pacman -S iptables`
     - Install IPTables: `sudo pacman -S iptables`
     - Enable the IPTables services: `sudo systemctl enable iptables.service ip6tables.service`
     - Enable the IPTables services: `sudo systemctl enable iptables.service ip6tables.service`
-    - Download my IPTables script: `wget https://raw.githubusercontent.com/HON95/scripts/master/linux/iptables/iptables.sh -O /etc/iptables/config.sh`
+    - Download my IPTables script: `wget https://raw.githubusercontent.com/HON95/scripts/master/iptables/iptables.sh -O /etc/iptables/config.sh`
     - Make it executable: `chmod +x /etc/iptables/config.sh`
     - Make it executable: `chmod +x /etc/iptables/config.sh`
     - Modify it.
     - Modify it.
     - Run it: `/etc/iptables/config.sh`
     - Run it: `/etc/iptables/config.sh`