We are going to achieve 2 things here.
1. Install the OpenVZ OS
2. Install Ruby 1.8
3. Install the OpenVZ Web Panel

Install the OpenVZ OS

1. Get the ISO from https://download.openvz.org/virtuozzo/releases/7.0/x86_64/iso/
2. Install it as usual

Install Ruby 1.8

[[email protected]]#command curl -sSL https://rvm.io/mpapis.asc | gpg2 --import -
[[email protected]]#\curl -sSL https://get.rvm.io | bash -s stable

Logout or restart ssh session

[[email protected]]#rvm install 1.8.7

Install the OpenVZ Web Panel

1. SSH to OpenVZ
2. Download OpenVZ Web Panel from github then unzip it

[[email protected] ~]# wget https://github.com/sibprogrammer/owp/archive/master.zip
[[email protected] ~]# unzip master.zip

3. Install the script and ruby dependencies

[[email protected] ~]# cd owp-master/installer/
[[email protected] installer]# chmod 777 ai.sh
[[email protected] installer]# ./ai.sh

4. Access the Web Panel
login with admin/admin

Streisand sets up a new server running L2TP/IPsec, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, a Tor bridge, and WireGuard. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.

The problem with Streisand though is the install is amazingly complicated using ansible from your local system to a cloud provider using API calls and if you are not in a shop that uses this technology it can be difficult to get working correctly

Method 1
Below script is an automated bash script to enable streisand vpn server to your traditional VPS

Method 2
Installing Streisand from Mac OS to Ubuntu 16.04 VPS. I will be executing the ansible playbook from my Mac OS Sierra (with homebrew)

Install git
brew install git

Install pip
sudo easy_install pip
sudo pip install pycurl

Homebrew library fix
echo '/usr/local/lib/python2.7/site-packages' > ~/Library/Python/2.7/lib/python/site-packages/homebrew.pth

Install Ansible (via pip)
sudo pip install ansible markupsafe

Clone the Streisand repository and enter the directory.
git clone https://github.com/jlund/streisand.git && cd streisand

Edit the inventory file and uncomment the final two lines. Replace the sample IP with the address (or addresses) of the servers you wish to configure.
nano inventory
[streisand-host] ansible_user=root

Execute script
ansible-playbook playbooks/streisand.yml --ask-pass


The VPN You Should Be Using


Incoming search terms:

  • ansible wireguard

HP Procurve
Download latest firmware from https://h10145.www1.hpe.com/support/SupportLookUp.aspx
ProCurve Switch 2510B-24#copy flash tftp Q_11_07.swi (make a firmware backup to TFTP server)
ProCurve Switch 2510B-24#copy tftp flash Q_11_73.swi primary (download new firmware and overwrite primary storage)
ProCurve Switch 2510B-24#boot system flash primary (optional, to switch to primary image)

3COM (4500G)
<4500>delete /unreserved s3p01_00.web
<4500>delete /unreserved s3n03_01_00s56p01.app
<4500>tftp get s3q05_02_00s168p20.app
<4500>tftp get s3r05_06.btm

Next step is to configure which files will be used by the switch on the next boot.
<4500>boot-loader file flash:/s3q05_02_00s168p20.app
<4500>bootrom update file flash:/s3r05_06.btm

Incoming search terms:

  • https://h10145 www1 hpe com/support/SupportLookUp aspx

This post shows how to configure a TACACS+ server for system authentication in Juniper SRX with open source tac_plus software.

Brocade IronStack configuration
aaa authentication web-server default local
aaa authentication login default tacacs+ enable local
aaa authentication login privilege-mode
aaa accounting commands 0 default start-stop tacacs+
aaa accounting exec default start-stop tacacs+
aaa accounting system default start-stop tacacs+
tacacs-server host
tacacs-server host
tacacs-server key NASKEYHERE
tacacs-server timeout 10
ip tacacs source-interface ve 998

reference: http://www1.brocade.com/downloads/documents/html_product_manuals/FI_ICX6650_07500_SCG/wwhelp/wwhimpl/common/html/wwhelp.htm#context=Security-converted&file=FI_Security.03.6.html

Re-post from LYN forum. Credit to ansonlos.

After much try and error and research, I’ve managed to get pfSense to work with UniFi’s IPv6 allocation. For a bit of a background, I’m running the latest release of pfSense i.e. 2.2.1 and also I got this to work with my office’s UniFi which is on Biz 10.

I’d just like to share my settings here to benefit those who might want to get IPv6 to work for their pfSense box.

1. Under “System -> Advanced -> Networking”, make sure “Allow IPv6” is checked. Then go to “Interfaces”, click on “WAN”. Under IPv6 Configuration Type, choose “DHCP6”. MTU should be 1492.

2. Under DHCP6 client configuration section, put a tick mark on “Request a IPv6 prefix/information through the IPv4 connectivity link”. In the drop down list for DHCPv6 Prefix Delegation size, choose “56”. (I have no idea why this is the case, but the allocated subnet for both the PPPoE and LAN are actually 64. I’ve tried choosing 64 here, but it doesn’t work. Maybe 56 is for a Biz account. If 56 doesn’t work for you, try choosing 64 especially if you’re on home UniFi account.)

Also, put a tick mark for “Send an IPv6 prefix hint to indicate the desired prefix size for delegation”. Click on “Save”.

3. Now, go to “Interfaces”, click on “LAN”. Under IPv6 Configuration Type, choose “Track Interface”. Type 1492 for MTU.

4. Under Track IPv6 Interface section, ensure IPv6 Interface “WAN” is selected and as for IPv6 Prefix ID, just type 0 (zero) here.

5. Under Private networks section, ensure “Block Bogons networks” is unchecked. Then, click “Save”.


6. Finally, I’ve read that IPv6 requires ICMP to work. So under Firewall -> Rules, I’ve also created a rule to allow ICMP IPv6 traffic for both WAN and LAN.

I’m not entirely certain what the security implications are with the above settings to the firewall, so please be forewarned.

With the above settings, I’m able to get IPv6 addresses for PPPoE and LAN interfaces for pfSense and also devices connected to the LAN. Hope this helps those who are using pfSense.

Incoming search terms:

  • pfsense pppoev6
  • https://yandex ru/clck/jsredir?from=yandex ru;search;web;;&text=&etext=1822 ziP4QCuojp0RXafp26cUt4vv1aHqWQLnSXgV9veJH3vfQMqZSDXCKQrUmh89lFgc 6ccf22220d89eda062a4b1bfdfd759c1ef57a910&uuid=&state=_BLhILn4SxNIvvL0W45KSic66uCIg23qh8iRG98qeIXme
  • https://yandex ru/clck/jsredir?from=yandex ru;search;web;;&text=&etext=1839 AKdGkbUvdPdyspMZW9X40g-sYab7Pfkw8odYtynuashfQ0r5hEZrJpOvq4taqYk3 1fe33720b39846b9c9b5a345624345e54348196f&uuid=&state=_BLhILn4SxNIvvL0W45KSic66uCIg23qh8iRG98qeIXme
  • unifi pfsense

SanDisk Mobile Ultra Micro SDHC
Screen Shot 2014-12-14 at 11.36.02 PM

SanDisk Ultra Micro SDHC
Screen Shot 2014-12-14 at 11.36.25 PM

There’s no differences in term of performance or physical appearance. I found this solid answer:

I rang Technical Support at SanDisk to ask what’s the difference between “Mobile Ultra” and “Ultra”

“Mobile Ultra” and “Ultra” are the same card, the name difference was just for marketing purposes, to show people the card could be used in mobiles. However the plan backfired and people thought they couldn’t use “Mobile Ultra” in their camera, so the name was dropped.

To decipher the codes such as SDSDQUA-032G-U46A:
SDSD=sd card
Q =class 4 (black) available in 2,4,8,16,32GB
QY =class 6 “Ultra” (red & grey) available in 4GB (8,16,32gb discontinued but still on sale)
QUA=class 10 “Ultra” 8,16,32=SDHC 64=SDXC* (UHS-I = UHS class 1 = 10mb/s #)
QUI=class 10 “Ultra” apparently “designed for cameras” and NOT the same card (black packaging)
-U46=EU [email protected]
-A11=US [email protected]
-FFP=Amazon frustration free [email protected]
A=picture of android on package

* Compatible devices only
# If used in a non UHS-I compliant phone, it will revert to class 10
@ If it doesn’t have a code at the end, it’s not covered by SanDisk warranty


Incoming search terms:

  • gladht5


I have 4 dhcp server (in 2 failover cluster) running in Windows Server 2012 R2 with Mac filter enabled.


Failover cluster will not synchronize Mac filter database, for adding new record we have to do it manually in all dhcp server.


PowerShell script to add Mac filter to multiple server

$mac = Read-Host 'ENTER MAC ADDRESS'
$des = Read-Host 'ENTER DESCRIPTION'
Add-DhcpServerv4Filter -List Allow -MacAddress $mac -Description $des -ComputerName dhcp01.domain.local -Verbose
Add-DhcpServerv4Filter -List Allow -MacAddress $mac -Description $des -ComputerName dhcp02.domain.local -Verbose
Add-DhcpServerv4Filter -List Allow -MacAddress $mac -Description $des -ComputerName dhcp03.domain.local -Verbose
Add-DhcpServerv4Filter -List Allow -MacAddress $mac -Description $des -ComputerName dhcp04.domain.local -Verbose

In Windows Server 2012, Microsoft added DHCP failover feature. However, this feature will not replicate MAC filter lists (Allow/Deny). Below script is to synchronize DHCP MAC filter database. Link to original post: http://sysadminreference.blogspot.com/2014/02/dhcp-fail-over-service-do-not.html

Paste below script in Powershell ISE

$MasterServerHostname = "MasterDHCPFQDN";

# Get the LOCAL filters from localhost
$lfilters = Get-DhcpServerv4Filter

# Get the REMOTE filters from $MasterServerHostname
$rfilters = invoke-command -computername $MasterServerHostname { Get-DhcpServerv4Filter }

# Delete the local Filter Set
#ForEach ($filter in $rfilters) {
# Remove-DhcpServerv4Filter -MacAddress $filter.MacAddress

# Import the new Filter Set
ForEach ($filter in $rfilters) {
write-host $filter.List
write-host $filter.MacAddress;
write-host $filter.Description
Add-DhcpServerv4Filter -List $filter.List -Force -MacAddress $filter.MacAddress -Description $filter.Description

Script to check number of MAC address record, to ensure all DHCP servers having the same number (optional)

del C:\MAC\LocalMacList.txt
Get-DhcpServerv4Filter -List Allow &gt; C:\MAC\LocalMacList.txt
Get-Content C:\MAC\LocalMacList.txt | Measure-Object

avh-x5650bt_rc_rd_ri_green_left_b2When I received my Pioneer AVH-X5650BT 2DIN player, I was struggling to play any video files from any media. In the product manual it provide very brief information on the supported video format. I am very frustrated when I always get “unplayable file” error message. I’m surprised that actually there’re few limitations and requirements for the player to recognized the video files.

Rule of Thumb

  • Maximum height cannot exceed 404pixels or else you will get “resolution not supported”.
  • Some user reported maximum resolution is 720×576. I haven’t tried this.
  • Maximum total bitrate must not exceed 1000kbps.
  • Avoid underscore in filename.

Converting your video files

Download DivX video converter and install it.
Load your video files that need to be converted, and select “HD 720p” profile.
divx profile
Modify resolution, click maintain aspect ratio and adjust the height to 404.
Keep an eye to the Total bitrate, make sure it does not exceed 1000kbps. You can tune the value by adjusting the video bitrate.
divx profile2

Save Presets so that you can load the profile in the future.
divx profile3



Feel free to share your setting or anything that can improve this post.

From the Owner Manual
div5 div1 div div2 div3 div4

Download AVH-X5650BT, AVH-X4650DVD, AVH-X2650BT & AVH-X1650DVD User Manual

Incoming search terms:

  • https://advanxer com/blog/2014/01/playing-videos-in-your-pioneer-2014-head-unit/
  • pioneer car dvd player supported video formats
  • divx converter for pioneer
  • pioneer car dvd player usb video format
  • pioneer video converter
  • pioneer unplayable file usb
  • how to play video on pioneer avh from usb
  • divx converter for pioneer dvd
  • pioneer car dvd player video format
  • pioneer video format converter
  • pioneer usb video format
  • pioneer video resolution not supported
  • pioneer avh video format
  • Pioneer video format
  • pioneer dvd player supported video formats