Scanning QR-code on GNU/Linux

Zbar and imagemagick need to be installed which usually can be found in the repositories or on their websites http://zbar.sourceforge.net/ and http://www.imagemagick.org/

Make a photo of the qr-code with a program like cheese. Open the photo with a program like shotwell. Open a terminal an type in:

import :- | zbarimg :-

A cross-hair will appear with which you can select the qr-code. As a result an url/bitcoinaddress will be returned.

 

source: https://www.reddit.com/r/Bitcoin/comments/1rsujs/scan_qr_codes_on_your_screen_with_imagemagick_and/

Soto Ayam

Print Recipe
Soto Ayam
Course Main Dish
Cuisine Indisch
Prep Time 15 minutes
Cook Time 1 hour
Servings
people
Ingredients
Bumbu
Stock
Condiments to taste
Course Main Dish
Cuisine Indisch
Prep Time 15 minutes
Cook Time 1 hour
Servings
people
Ingredients
Bumbu
Stock
Condiments to taste
Instructions
Bumbu
  1. Add all ingredients in a food processor and whiz until it becomes a smooth paste, the bumbu. Set the instant pot on saute mode and saute the bumbu in some coconut oil until fragrant. Press cancel to stop the saute mode of the instant pot.
Stock
  1. Add the water to the fragrant bumbu and stir well. Add the rest of the stock ingredients. Set the instant pot on soup mode and let it cook on high pressure for 30 minutes. Press cancel when the cooking time has passed and let the pressure release in a natural way (about 15 minutes).
Serve
  1. Put the condiments in a soup bowl and pour the stock including some chicken. Serve with some sambal (chili paste) to taste.
Share this Recipe
 

Ratatouille

Print Recipe
Ratatouille
Course Main Dish
Servings
people
Ingredients
Course Main Dish
Servings
people
Ingredients
Instructions
  1. Set your instant pot on saute and melt the beef tallow. Saute the onions. Add the ginger, garlic and chili. Brown the ground beef. Press cancel/keep warm on your instant pot
  2. Add to taste: salt and pepper italian style: oregano basel indian style: turmeric paprika-powder or your own fantasy
  3. stir in the mushrooms, bell pepper, zucchini, aubergine/eggplant and bone broth.
  4. Close your instant pot and set to seal. Pressure cook on manual with high pressure for 5 minutes. Quick release pressure and serve.
Share this Recipe
 

Left overs? Great as a filling for your breakfast omelette!

Tweaking fail2ban

logo fail2ban.org
http://www.fail2ban.org

 

 

 

 

 

 

 

 

After downloading and installing fail2ban stable from the fail2ban website it is time to tweak it’s behavior. First of all I checked some settings that weren’t set by default like the recidive filter. IP’s that are banned again will be banned for a longer period of time. So enable the recidive filter in the /etc/fail2ban/jail.local  and change the find and ban time to your liking. There is one condition that the bantime and  the findtime of the recidive filter is bigger than your ‘normal’ settings. My filters have a bantime and a findtime of a day. The bantime and findtime of my recidive filter are set to a week and two days. So if you  banned again in the last two days you will be banned for a week. For that to work you have to change the dbpurge setting in /etc/fail2ban/fail2ban.conf to keep the data around long enough to meet the demands of your recidive findtime setting. I set mine to 2.5 days just to be sure. Remember set your own ip addresses to ignore and to restart fail2ban after changing your settings to let them take effect.

Next stop was the sshd filter. I use a key based authentication on my ssh server as most do. Therefore the default regex in the sshd filter doesn’t catch every attempt to logon so I added a few of my own. A very handy tool is fail2ban-regex. First I use it to catch the lines that were missed with the print-all-missed option. You will see all the lines missed by the filter and with some extra grepping show only the lines containing an IP address.

sudo fail2ban-regex --print-all-missed /var/log/auth.log /etc/fail2ban/filter.d/sshd.conf|grep -E "([0-9]{1,3}[\.]){3}[0-9]{1,3}"

Now you can see the lines for which you can make an extra rule in your filter if you want to catch them. Here are the ones I added myself.

 ^%(__prefix_line)sReceived disconnect from <HOST>: 11: \[preauth\]\s*$
 ^%(__prefix_line)sDisconnecting: Too many authentication failures for invalid user \w+ from <HOST> port \d+ ssh2 \[preauth\]\s*$
 ^%(__prefix_line)sDisconnecting: Too many authentication failures for root from <HOST> port \d+ ssh2 \[preauth\]\s*$
 ^%(__prefix_line)sConnection closed by <HOST> \[preauth\]\s*$
 ^%(__prefix_line)sReceived disconnect from <HOST>: 11: Bye Bye \[preauth\]\s*$
 ^%(__prefix_line)sDid not receive identification string from <HOST>\s*$
 ^%(__prefix_line)sReceived disconnect from <HOST>: 11: disconnected by user\s*$
 ^%(__prefix_line)sBad protocol version identification '.*' from <HOST> port \d+\s*$
 ^%(__prefix_line)sReceived disconnect from <HOST>: 11: disconnected by user \[preauth\]\s*$

From time to time I check if foes use some “new” tricks to catch.