Friday, November 15, 2024

How to install fish shell and oh my post them

 See link youtube https://www.youtube.com/watch?v=NRGzYzgWFwM

open Terminal

sudo apt install fish -y

chsh -s /usr/bin/fish

sudo wget https://github.com/JanDeDobbeleer/oh-my-posh/releases/latest/download/posh-linux-amd64 -o /usr/local/bin/oh-my-posh

sudo rm /usr/local/bin/oh-my-posh

sudo mv posh-linux-amd64 /usr/local/bin/oh-my-posh

sudo chmod +x /usr/local/bin/oh-my-posh

vim ~/.config/fish/config.fish

#add below to file config.fish

oh-my-posh init fish --config $HOME/.poshthemes/montys.omp.json | source

Download font

mkdir -p $HOME/.local/share/fonts

wget https://github.com/ryanoasis/nerd-fonts/releases/download/v3.2.1/FiraCode.zip -O $HOME/Downloads/firacode.zip

unzip $HOME/Downloads/firacode.zip -d $HOME/.local/share/fonts

fc-cache -f -v

run Tweaks



open teminal



mkdir ~/.poshthemes

wget https://github.com/JanDeDobbeleer/oh-my-posh/releases/latest/download/themes.zip -O ~/.poshthemes/themes.zip

unzip ~/.poshthemes/themes.zip -d ~/.poshthemes
chmod  u+rw ~/.poshthemes/*.json
bash -c "$(wget -qO- https://git.io/vQgMr)"
shoose : Everforest Dark Hard

bash -c "$(wget -qO- https://git.io/vQgMr)"

shoose : Everforest Light Hard

finish logout ubuntu

Monday, November 4, 2024

Create certificate with openssl command to install on IIS (windows 2019)

 Create certificate with openssl command to install IIS

#Create csr and praivatekey

openssl genrsa -out faxconkey.key 2048

chmod a-w faxconkey.key

openssl req -out faxconcsr.csr -key faxconkey.key -new -sha256

#copy file .csr and .key to windows server for gen file cert

open browser http://servertest/certsrv/

login: user Administrator domain

passwd:

-> Request certificate

-> Advanced certificate request

-> open file .csr with notepad and copy text file on .csr to generate cer

-> Certificate template : Web Server

-> Submit

-> Download file certificate

-> Convert .cer to .pfx

c:\Program Files\OpenSSL-Win64\bin>openssl pkcs12 -export -in D:\Certificate\test\faxconcer.cer -inkey D:\Certificate\test\faxconKey.key -out D:\Certificate\test\certificate-faxcon.pfx

Enter passwd key:

-> Install file .pfx to IIS server by import



Sunday, October 20, 2024

Fix issue window server 2019 shutdown automatice when running 1-2 hour.

 fix by activate windows use free lic 6 time with in 3 year.


Run Powershell with Administrato and run command

dism /Online /Get-TargetEditions

dism /online /Set-Edition:ServerStandard /ProductKey:N69G4-B89J2-4G8F4-WWYCC-J464C /AcceptEula

Reboot system.

Saturday, September 14, 2024

Create self certificate on Centos 5.3 (Mail Server)

Reference Website: isp mailserver with virtual users domains postfix dovecot mysql centos5.0

-----------------------------------------

mkdir -p /etc/postfix/ssl/certificate

cd /etc/postfix/ssl/certificate

openssl genrsa -des3 -rand /etc/hosts -out smtpd.key 1024

chmod 600 smtpd.key

openssl req -new -key smtpd.key -out smtpd.csr

openssl x509 -req -days 365 -in smtpd.csr -signkey smtpd.key -out smtpd.crt

openssl rsa -in smtpd.key -out smtpd.key.unencrypted

mv -f smtpd.key.unencrypted smtpd.key

openssl req -new -x509 -extensions v3_ca -keyout cakey.pem -out cacert.pem -days 365

-----------------------------------------

Check certificate

openssl x509 -in cacert.pem -text -noout


Tuesday, September 10, 2024

Mount cifs centos 7.9 server - windows share file

run command: 

sudo mount -t cifs -o username=shareusername,password=sharepassword //server/share /mnt


Ref: mount cifs

Thursday, May 9, 2024

Activate windows 11 to permanent

 ref: Activate windows 10-11

Activating Windows Pro Permanently

Note: This method requires you to have a Microsoft account connected! This is the method most people may use as this one activates it PERMANENT.

  1. Press + R to open the Run menu.
  2. Enter 'powershell' in the box of the Run menu.
  3. Press Ctrl + Shift + Enter.
  4. In the PowerShell window, enter the following command and press Enterirm https://massgrave.dev/get | iex
  5. Wait until the windows for the activation tool pops up.
  6. Choose the option for HWID Activation by pressing the key associated with it.
  7. Wait until it completes. It might give an SKU value error, but it will complete successfully. If it doesn't try again a few times and it should work.
Check windows license
slmgr /dlv
slmgr /dli




Wednesday, February 21, 2024

การเพิ่ม Mouse Huawei CD20 ใน Ubuntu 22.04

 1. แก้ไขไฟล์ Bluetooth

sudo vim /etc/bluetooth/main.conf

ControllerMode = dual
ControllerMode = le -> แบบนี้ก็แอดเมาส์ได้แต่ มันจะเลื่อนเมาส์ช้ากว่า dual

2. Restart service Bluetooth

sudo systemctl restart bluetooth.service

check bluetooth status

sudo systemctl status bluetooth.service

3. Add mouse

3.1 command

sudo bluetoothctl

- devices  -> ดูอุปกรณ์

- scan on/off

- trust DD:FD:66:FB:6D:E9 -> mac address mouse

- connect DD:FD:66:FB:6D:E9

- pair DD:FD:66:FB:6D:E9

** ขั้นตอนนี้ให้กดเมาส์แชร์ไฟสีแดงไว้ ไม่งั้นจะเชื่อมต่อไม่ได้



Thursday, February 8, 2024

How to access Remote Desktop RDP openSUSE

Refferen from https://drive.google.com/file/d/1iAW0FSXUsTIwjEMI3lg_7EbCYCaQabbN/view 

1) Run the following command to install xfce if not installed (if installed already nothing will happen):

	sudo zypper install -t pattern xfce

2) Install and enable XRDP
	sudo zypper install xrdp xorgxrdp
	sudo systemctl enable xrdp
	sudo systemctl start xrdp

3) If your OS firewall is running. Allow RDP (TCP port 3389) through the firewall:
	sudo systemctl status firewalld
	sudo firewall-cmd --permanent --zone=public --add-port=3389/tcp
	sudo firewall-cmd --reload

** ถ้าเครื่องใช้ KDE, Gnome Desktop ไม่ต้องรันก็ได้
4) Set your user to use XFCE for RDP
	echo "xfce4-session" > /home/YOUR_USERNAME/.xsession

Friday, January 19, 2024

How to generate CSR on windows server 2019

Check Certificate with command : curl

example: curl -vk https://www.gowabi.com

* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384

* ALPN, server accepted to use h2

* Server certificate:

subject: C=US; ST=California; L=San Francisco; O=Cloudflare, Inc.; CN=sni.cloudflaressl.com

*  start date: Apr 15 00:00:00 2023 GMT

*  expire date: Apr 14 23:59:59 2024 GMT

*  issuer: C=US; O=Cloudflare, Inc.; CN=Cloudflare Inc ECC CA-3

ขั้นตอน

1. ต้อง Gen file CSR เป็น Text File ก่อน แล้วเอา CSR.txt ส่งต่อให้หน่วยงานที่ดูแล ไปต่อ Certificate

2. จากนั้นนำใบ Certificate ที่ไปต่อ (ต้องซื้อ) นั้นมาติดตั้งในเครื่อง Server

ขั้นตอนการดำเนินการ

1. learning center / install ssl certificate on windows server 2019 and iis

2. ssl certificate -> MMC



Friday, November 3, 2023

OpenSuse command

 OpenSuse command line

1.Network Interface

IP STATIC

vim /etc/sysconfig/network/ifcfg-eth0

//start ----------------

BOOTPROTO='static'

STARTMODE='hotplug'

ZONE='public'

IPADDR='192.168.1.102'

NETMASK='255.255.255.0'

//End ----------------

vim /etc/sysconfig/network/config ->DNS

NETCONFIG_DNS_STATIC_SERVERS="" -> Add IP DNS -> NETCONFIG_DNS_STATIC_SERVERS="192.168.1.1"

Restart service Network

wicked ifdown eth0

wicked ifup eth0

or use this command 

systemctl restart wickedd.service

systemctl status wickedd.service

ip addr -> check IP Address

ip route -> check IP Route

vim /etc/hostname -> hostname

abc.linux.com

2. Enable service sshd

systemctl enable sshd

systemctl start sshd

Edit vim /etc/ssh/sshd_config

//Start-------

#$OpenBSD: sshd_config,v 1.103 2018/04/09 20:41:22 tj Exp $

# This is the sshd server system-wide configuration file.  See

# sshd_config(5) for more information.

# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin

# The strategy used for options in the default sshd_config shipped with

# OpenSSH is to specify options with their default value where

# possible, but leave them commented.  Uncommented options override the

# default value.

Port xxxxx

#AddressFamily any

#ListenAddress 0.0.0.0

#ListenAddress ::

#HostKey /etc/ssh/ssh_host_rsa_key

#HostKey /etc/ssh/ssh_host_ecdsa_key

#HostKey /etc/ssh/ssh_host_ed25519_key

# Ciphers and keying

#RekeyLimit default none

# Logging

SyslogFacility AUTH

LogLevel INFO

# Authentication:

#LoginGraceTime 2m

PermitRootLogin no

#StrictModes yes

MaxAuthTries 3 

#MaxSessions 10

#PubkeyAuthentication yes

# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2

# but this is overridden so installations will only check .ssh/authorized_keys

AuthorizedKeysFile .ssh/authorized_keys

#AuthorizedPrincipalsFile none

#AuthorizedKeysCommand none

#AuthorizedKeysCommandUser nobody

# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts

#HostbasedAuthentication no

# Change to yes if you don't trust ~/.ssh/known_hosts for

# HostbasedAuthentication

#IgnoreUserKnownHosts no

# Don't read the user's ~/.rhosts and ~/.shosts files

#IgnoreRhosts yes

# To disable tunneled clear text passwords, change to no here!

PasswordAuthentication yes

PermitEmptyPasswords no

AllowUsers username

# Change to no to disable s/key passwords

#ChallengeResponseAuthentication yes

# Kerberos options

#KerberosAuthentication no

#KerberosOrLocalPasswd yes

#KerberosTicketCleanup yes

#KerberosGetAFSToken no

# GSSAPI options

#GSSAPIAuthentication no

#GSSAPICleanupCredentials yes

#GSSAPIStrictAcceptorCheck yes

#GSSAPIKeyExchange no

# Set this to 'yes' to enable PAM authentication, account processing,

# and session processing. If this is enabled, PAM authentication will

# be allowed through the ChallengeResponseAuthentication and

# PasswordAuthentication.  Depending on your PAM configuration,

# PAM authentication via ChallengeResponseAuthentication may bypass

# the setting of "PermitRootLogin without-password".

# If you just want the PAM account and session checks to run without

# PAM authentication, then enable this but set PasswordAuthentication

# and ChallengeResponseAuthentication to 'no'.

UsePAM yes

#AllowAgentForwarding yes

#AllowTcpForwarding yes

#GatewayPorts no

X11Forwarding yes

#X11DisplayOffset 10

#X11UseLocalhost yes

#PermitTTY yes

#PrintMotd yes

#PrintLastLog yes

#TCPKeepAlive yes

#PermitUserEnvironment no

#Compression delayed

#ClientAliveInterval 0

#ClientAliveCountMax 3

#UseDNS no

#PidFile /run/sshd.pid

#MaxStartups 10:30:100

#PermitTunnel no

#ChrootDirectory none

#VersionAddendum none

# no default banner path

#Banner none

# override default of no subsystems

Subsystem sftp /usr/lib/ssh/sftp-server

# This enables accepting locale enviroment variables LC_* LANG, see sshd_config(5).

AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES

AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT

AcceptEnv LC_IDENTIFICATION LC_ALL

# Example of overriding settings on a per-user basis

#Match User anoncvs

# X11Forwarding no

# AllowTcpForwarding no

# PermitTTY no

# ForceCommand cvs server

//End--------

3. ifconfig

zypper install net-tools-deprecated

4. Enable firewalld

sudo systemctl enable firewalld
sudo systemctl start firewalld
sudo firewall-cmd --get-zones

5. Check license

SUSEConnect -s

6. Check OS version

lsb_release -a

cat /etc/SuSE-release

cat /etc/os-release

7. Check update

Update the package repositories: sudo zypper ref

Check for available updates: sudo zypper lu

To install updates: sudo zypper up

Link firewall-cmd command

Link Firewall-cmd