#config server firewall
Explore tagged Tumblr posts
codeonedigest · 2 years ago
Text
Create Spring Cloud Configuration Server | Setup Eureka Service Discovery Registry Server
Full Video Link https://youtu.be/Exoy4ZNAO9Y Hello friends, new #video on #springcloud #configserver #eureka #servicediscovery setup is published on #codeonedigest #youtube channel. @java #java #aws #awscloud @awscloud @AWSCloudIndia #sal
In this video we will learn how to create spring cloud configuration server and eureka service registry server step by step in spring boot framework. Service registry will be use for service discovery. Configuration server is used to store application configuration in central storage. Application, microservices connect configuration server to fetch respective configuration from central…
Tumblr media
View On WordPress
0 notes
nixcraft · 6 months ago
Text
Linux host firewall:
nftables - low-level way to manage the firewall on modern distros. It is a replacement for iptables
iptables- legacy firewall
East to use fronted - manage your nftables or iptables using GUI, CLI, or web fronted. Typical examples are ufw, gufw, Guarddog, FWBuilder, firewalld, firewall-config, etc. Both nftables & IPtables are part of Netfilter. For most users, choosing fronted, such as ufw command or firewalld is recommended.
OR
32 notes · View notes
config-nilesh · 2 months ago
Text
Professional web maintenance and support services
Professional Web Maintenance and Support Services by Config Infotech
Having a website in today's fast-paced online world is only the first step. For your website to stay secure, efficient, and user-friendly, regular maintenance and support services are essential. Config Infotech offers professional web maintenance and support services that make your website work like a well-oiled machine, delivering a great user experience while safeguarding it from security attacks and technical issues.
Why Web Support and Maintenance Services Are Important
A website is not an upfront investment. Similar to any office or store, it needs routine maintenance to work at its best. Companies that do not invest in website maintenance are likely to experience sluggish speed, security holes, outdated material, and user dissatisfaction, leading to lost clients and decreased credibility.
Config Infotech realizes the importance of ongoing website maintenance and provides extensive services to keep your website updated, secure, and optimized.
Our Web Maintenance and Support Services
Config Infotech offers a variety of web maintenance and support services to suit businesses of all sizes. Our services are as follows:
Website Security and Monitoring
Cyber attacks pose a significant threat to businesses globally. Our website security and surveillance services protect your website from hackers, malware, and other cyber attacks. We use firewall security, malware scan, updates of SSL certificates, and periodic security scans to keep your website secure.
Periodic Patches and Updates
Old software and plugins can cause vulnerabilities and compatibility problems. Config Infotech sees that your website's CMS (Content Management System), plugins, themes, and frameworks are updated periodically, making it secure and optimized for performance.
Performance Optimization
Slow-loading websites drive users away. Our team optimizes your website’s speed by implementing cache management, image compression, database optimization, and content delivery network (CDN) integration to enhance performance and provide a seamless user experience.
Bug Fixes and Troubleshooting
Technical problems can occur unexpectedly, and your website may not work. We offer 24/7 technical assistance to detect and correct bugs, faulty links, and functionality flaws, making sure your website functions perfectly at all times.
Content Updates and Management
Maintaining your website with new and relevant content is crucial to keep visitors interested and enhance SEO rankings. Config Infotech provides content updates, such as blog posts, product descriptions, images, and videos, to keep your website dynamic and informative.
Backup and Disaster Recovery
Loss of data can be catastrophic for any company. Our automated backup tools make sure your website's data is safely backed up and can be restored rapidly in the event of server crashes, cyber attacks, or deletions by mistake.
SEO Maintenance and Analytics
Search engine algorithms are in a continuous state of change, which means regular SEO optimization is essential. We offer SEO audits, keyword revisions, meta tag improvements, and performance metrics to keep your site optimally ranked by search engines and driving more organic search traffic.
Mobile and Cross-Browser Compatibility
With increasing users browsing websites on mobile devices, mobile-friendliness is a must. We test and optimize your website for mobile responsiveness and cross-browser compatibility to ensure a smooth experience on all devices and browsers.
E-commerce Maintenance
For companies operating online shops, website downtime or technical glitches can result in lost sales. Our maintenance services for e-commerce involve payment gateway maintenance, inventory control, order processing assistance, and security measures to facilitate easy transactions and customer satisfaction.
Custom Support Plans
Each enterprise has its own specific website maintenance requirements. At Config Infotech, we provide customized maintenance plans as per your specific needs, making maintenance affordable and effective for your site.
Benefits of Choosing Config Infotech for Web Maintenance
Partnering with Config Infotech for web maintenance and support services offers several advantages:
Enhanced Security: Our proactive approach to cybersecurity helps safeguard your website from threats.
Improved Performance: Regular optimizations ensure faster loading speeds and better user experiences.
SEO and Ranking Improvements: Ongoing maintenance helps your website maintain or improve its search engine rankings.
Cost-Effective Solutions: Maintaining websites on a regular basis avoids costly repairs down the road.
24/7 Technical Support: Our professionals work 24 hours a day to solve any issue related to websites.
Tailored Maintenance Plans: We provide adjustable plans to suit companies of different sizes and budgets.
Why Invest in Professional Web Maintenance?
Most businesses do not realize the significance of consistent website maintenance until they experience critical issues. Spending money on professional web maintenance services offers long-term advantages, including:
Increased Customer Retention: An up-to-date website maintains visitors interested and promotes repeat visits.
Better Conversions: An efficient and well-functioning website makes users more trusting, resulting in increased conversions.
Less Downtime: Frequent checkups and updates prevent sudden downtime, enabling business continuity.
Improved Brand Image: A professionally managed website gives an impression of credibility and professionalism.
Start with Config Infotech Today
Your website is the online face of your business, and its smooth running is a must for success. With Config Infotech's expert web maintenance and support services, you can concentrate on expanding your business while we take care of the technicalities.
Don't let website problems hold you back. Call Config Infotech today to find out more about our maintenance packages and how we can assist in keeping your website secure, fast, and current!
0 notes
rwahowa · 4 months ago
Text
Debian 12 initial server setup on a VPS/Cloud server
Tumblr media
After deploying your Debian 12 server on your cloud provider, here are some extra steps you should take to secure your Debian 12 server. Here are some VPS providers we recommend. https://youtu.be/bHAavM_019o The video above follows the steps on this page , to set up a Debian 12 server from Vultr Cloud. Get $300 Credit from Vultr Cloud
Prerequisites
- Deploy a Debian 12 server. - On Windows, download and install Git. You'll use Git Bash to log into your server and carry out these steps. - On Mac or Linux, use your terminal to follow along.
1 SSH into server
Open Git Bash on Windows. Open Terminal on Mac/ Linux. SSH into your new server using the details provided by your cloud provider. Enter the correct user and IP, then enter your password. ssh root@my-server-ip After logging in successfully, update the server and install certain useful apps (they are probably already installed). apt update && apt upgrade -y apt install vim curl wget sudo htop -y
2 Create admin user
Using the root user is not recommended, you should create a new sudo user on Debian. In the commands below, Change the username as needed. adduser yournewuser #After the above user is created, add him to the sudo group usermod -aG sudo yournewuser After creating the user and adding them to the sudoers group, test it. Open a new terminal window, log in and try to update the server. if you are requested for a password, enter your user's password. If the command runs successfully, then your admin user is set and ready. sudo apt update && sudo apt upgrade -y
3 Set up SSH Key authentication for your new user
Logging in with an SSH key is favored over using a password. Step 1: generate SSH key This step is done on your local computer (not on the server). You can change details for the folder name and ssh key name as you see fit. # Create a directory for your key mkdir -p ~/.ssh/mykeys # Generate the keys ssh-keygen -t ed25519 -f ~/.ssh/mykeys/my-ssh-key1 Note that next time if you create another key, you must give it a different name, eg my-ssh-key2. Now that you have your private and public key generated, let's add them to your server. Step 2: copy public key to your server This step is still on your local computer. Run the following. Replace all the details as needed. You will need to enter the user's password. # ssh-copy-id   -i   ~/path-to-public-key   user@host ssh-copy-id   -i  ~/.ssh/mykeys/my-ssh-key1.pub   yournewuser@your-server-ip If you experience any errors in this part, leave a comment below. Step 3: log in with the SSH key Test that your new admin user can log into your Debian 12 server. Replace the details as needed. ssh  yournewuser@server_ip   -i   ~/.ssh/path-to-private-key Step 4: Disable root user login and Password Authentication The Root user should not be able to SSH into the server, and only key based authentication should be used. echo -e "PermitRootLogin nonPasswordAuthentication no" | sudo tee /etc/ssh/sshd_config.d/mycustom.conf > /dev/null && sudo systemctl restart ssh To explain the above command, we are creating our custom ssh config file (mycustom.conf) inside /etc/ssh/sshd_config.d/ . Then in it, we are adding the rules to disable password authentication and root login. And finally restarting the ssh server. Certain cloud providers also create a config file in the /etc/ssh/sshd_config.d/ directory, check if there are other files in there, confirm the content and delete or move the configs to your custom ssh config file. If you are on Vultr cloud or Hetzner or DigitalOcean run this to disable the 50-cloud-init.conf ssh config file: sudo mv /etc/ssh/sshd_config.d/50-cloud-init.conf /etc/ssh/sshd_config.d/50-cloud-init Test it by opening a new terminal, then try logging in as root and also try logging in the new user via a password. If it all fails, you are good to go.
4 Firewall setup - UFW
UFW is an easier interface for managing your Firewall rules on Debian and Ubuntu, Install UFW, activate it, enable default rules and enable various services #Install UFW sudo apt install ufw #Enable it. Type y to accept when prompted sudo ufw enable #Allow SSH HTTP and HTTPS access sudo ufw allow ssh && sudo ufw allow http && sudo ufw allow https If you want to allow a specific port, you can do: sudo ufw allow 7000 sudo ufw allow 7000/tcp #To delete the rule above sudo ufw delete allow 7000 To learn more about UFW, feel free to search online. Here's a quick UFW tutorial that might help get you to understand how to perform certain tasks.
5 Change SSH Port
Before changing the port, ensure you add your intended SSH port to the firewall. Assuming your new SSH port is 7020, allow it on the firewall: sudo ufw allow 7020/tcp To change the SSH port, we'll append the Port number to the custom ssh config file we created above in Step 4 of the SSH key authentication setup. echo "Port 7020" | sudo tee -a /etc/ssh/sshd_config.d/mycustom.conf > /dev/null && sudo systemctl restart ssh In a new terminal/Git Bash window, try to log in with the new port as follows: ssh yournewuser@your-server-ip -i  ~/.ssh/mykeys/my-ssh-key1  -p 7020��  #ssh  user@server_ip   -i   ~/.ssh/path-to-private-key  -p 7020   If you are able to log in, then that’s perfect. Your server's SSH port has been changed successfully.
6 Create a swap file
Feel free to edit this as much as you need to. The provided command will create a swap file of 2G. You can also change all instances of the name, debianswapfile to any other name you prefer. sudo fallocate -l 2G /debianswapfile ; sudo chmod 600 /debianswapfile ; sudo mkswap /debianswapfile && sudo swapon /debianswapfile ; sudo sed -i '$a/debianswapfile swap swap defaults 0 0' /etc/fstab
7 Change Server Hostname (Optional)
If your server will also be running a mail server, then this step is important, if not you can skip it. Change your mail server to a fully qualified domain and add the name to your etc/hosts file #Replace subdomain.example.com with your hostname sudo hostnamectl set-hostname subdomain.example.com #Edit etc/hosts with your hostname and IP. replace 192.168.1.10 with your IP echo "192.168.1.10 subdomain.example.com subdomain" | sudo tee -a /etc/hosts > /dev/null
8 Setup Automatic Updates
You can set up Unattended Upgrades #Install unattended upgrades sudo apt install unattended-upgrades apt-listchanges -y # Enable unattended upgrades sudo dpkg-reconfigure --priority=low unattended-upgrades # Edit the unattended upgrades file sudo vi /etc/apt/apt.conf.d/50unattended-upgrades In the open file, uncomment the types of updates you want to be updated , for example you can make it look like this : Unattended-Upgrade::Origins-Pattern { ......... "origin=Debian,codename=${distro_codename}-updates"; "origin=Debian,codename=${distro_codename}-proposed-updates"; "origin=Debian,codename=${distro_codename},label=Debian"; "origin=Debian,codename=${distro_codename},label=Debian-Security"; "origin=Debian,codename=${distro_codename}-security,label=Debian-Security"; .......... }; Restart and dry run unattended upgrades sudo systemctl restart unattended-upgrades.service sudo unattended-upgrades --dry-run --debug auto-update 3rd party repositories The format for Debian repo updates in the etc/apt/apt.conf.d/50unattended-upgrades file is as follows "origin=Debian,codename=${distro_codename},label=Debian"; So to update third party repos you need to figure out details for the repo as follows # See the list of all repos ls -l /var/lib/apt/lists/ # Then check details for a specific repo( eg apt.hestiacp.com_dists_bookworm_InRelease) sudo cat /var/lib/apt/lists/apt.hestiacp.com_dists_bookworm_InRelease # Just the upper part is what interests us eg : Origin: apt.hestiacp.com Label: apt repository Suite: bookworm Codename: bookworm NotAutomatic: no ButAutomaticUpgrades: no Components: main # Then replace these details in "origin=Debian,codename=${distro_codename},label=Debian"; # And add the new line in etc/apt/apt.conf.d/50unattended-upgrades "origin=apt.hestiacp.com,codename=${distro_codename},label=apt repository"; There you go. This should cover Debian 12 initial server set up on any VPS or cloud server in a production environment. Additional steps you should look into: - Install and set up Fail2ban - Install and set up crowdsec - Enable your app or website on Cloudflare - Enabling your Cloud provider's firewall, if they have one.
Bonus commands
Delete a user sudo deluser yournewuser sudo deluser --remove-home yournewuser Read the full article
0 notes
techtired · 9 months ago
Text
How to Prevent IP Leaks on the Internet
Tumblr media
Protecting your online identity is as important as keeping your documents safe. Your internet connection has a unique address issued by your internet service provider, which you must protect while surfing online. These days, IP leaks are on the rise, which highlights the importance of preventing it. According to the sources, in the fourth quarter of 2023, over eight million records were exposed to malicious hands due to data leaks, and IP leaks are one major part of this process. So now, you must know why protecting IP and deploying methods to prevent leaks is crucial. In this guide, we will learn the best-proven strategies to prevent IP leaks and what measures one should take while using the Internet. But before that, let’s explore IP leaks further. What is an IP leak? An IP leak happens when your true IP address is exposed despite using a service like a VPN, which is supposed to protect it by masking it with a different one. While there can be several reasons for this, one strong reason is the VPN service's low reliability and cheap firewall protections. Often, we think free VPNs are enough and paid VPNs are scams, which is entirely false. Cheap VPNs will only connect you to a cheap server that does not have any level of security, pass your data through unsecured tunnels, and, worst, create and store logs to earn money. This is why I suggested using a robust and reliable VPN like Surfshark. You can try it yourself—download Surfshark here and get started. It offers many features and geo locations and is cost-effective. 5 Ways to Prevent IP leaks on the Internet 1. Disable WebRTC in Your Browser To prevent WebRTC leaks, you can disable WebRTC in your browser settings. While this may limit some functionalities, paying for increased privacy is a small price. For example, you can disable WebRTC in Firefox by typing about: config in the address bar and searching for media—peer connection. You are enabled and setting it to false. Chrome users can install browser extensions like “WebRTC Network Limiter” (an official extension by Google)  or “WebRTC Leak Prevent” to block WebRTC leaks. 2. Disable IPv6 If your VPN does not support IPv6, consider turning off IPv6 on your device to prevent leaks. On Windows, you can do this by going to the network adapter settings, finding the properties for your connection, and unchecking the box for IPv6. Similar steps can be followed in the network settings on macOS and Linux. If you are using a VPN service that does not support IPv6, you should immediately disable IPv6 on your device and system to avoid IP leaks. On Windows, this is relatively easy; all you have to do is go to network adapter settings in the property section and untick the box for IPv6. On MacOS, head over to network network settings. Click on details. Now click on the TCP/IP tab, and in the DHCP option, select the Link-local only option. If you need an easier way, open the terminal and type in the following code: networksetup -setv6off Wi-Fi That’s all you need to do to turn off IPv6. 3. Enable Your VPN’s Kill Switch Most VPNs have a kill switch feature that instantly disconnects your system from the internet if the VPN app is abruptly shut down due to glitches or any other reason. This further helps to protect your internet activity, making it challenging to leak your original IP address. While most VPNs have this feature, the free ones do not. If you use a Windows system, there’s a step-by-step guide on enabling the built-in killswitch. You can follow it and allow this feature on Windows. However, if you are a Mac user, do not worry, as a programmer develops an open-source kill switch feature. You can install it by visiting this site: https://vpn-kill-switch.com/. Then, you can follow the process and enable killswitch on your MacOS device. 4. Use a Secure Browser Consider using browsers that prioritize privacy, such as Tor Browser, which routes your traffic through the Tor network, adding multiple layers of encryption. While it may be slower, the Tor Browser offers enhanced protection against IP leaks. These are the five most secure browsers available for free: Brave Firefox Tor browser DuckDuckGo Opera While this may not be the best prevention method, a secure web browser is a part of the process. 5. Avoid Using Public Wi-Fi Without a VPN Cybersecurity attacks happen the most on publicly accessible networks that do not have any level of security. If you are sitting in a cafe or a food court and using the free WiFi, use a robust VPN provider. Otherwise, it would be best to stick to your mobile carrier for internet accessibility while away from home. Your smartphone and laptop store all the essential information; giving it to an intruder isn’t a good idea. Conclusion IP leaks are a significant threat to your online identity, which can be safeguarded with the right tools and practices. To protect your IP address from being leaked, you need to understand the basics of what causes IP leaks. In this article, we have shared the best strategies to prevent IP leaks, including disabling WebRTC and IPv6, enabling killswitch, and using a secure browser. Lastly, you must ensure you do not connect to unknown networks like public WiFis in cafes or anywhere else. Read the full article
0 notes
removemalware · 9 months ago
Text
Tumblr media
https://www.fiverr.com/emonbd/fix-deceptive-site-ahead-and-wordpress-malware-removal
When Google shows a Deceptive Site Ahead warning to your website visitors, it means they think your website might be harmful due to malware, phishing, malicious codes, and other security risks. This alarming message can scare away your visitors and make your site look untrustworthy.
If your site has been hacked, or infected with malware, phishing, or malicious codes I'm here to help you recover it.
Malware Cleaning:
Full Vulnerability Scan
Recover Hacked Website
Remove Redirect Malicious Code
Japanese Keyword Hack
Japanese SEO spam
Pharma Hack Removal
Clean Malware, Backdoor From Website or Hosting Server
Remove Blacklist & Red Warning from your site
Warning Removal:
Deceptive site ahead
Deceptive content
Suspicious site
Phishing pages
The site ahead contains malware
The site ahead contains harmful programs
Visiting this website may harm your compute
Blacklist Removal:
Google, McAfee, Yandex, Bing
Security Firewall:
Install and Configuration Security Plugin
Hide WP-Admin Login URL
Disable PHP/Shell Execution Uploads
Protect wp-config
Protect .htaccess
Disable Directory Browsing
Restrict All Access To wp-Includes
Restrict Direct Access To Plugins/Themes
0 notes
jcmarchi · 11 months ago
Text
10 Best Network Monitoring Tools (June 2024)
New Post has been published on https://thedigitalinsider.com/10-best-network-monitoring-tools-june-2024/
10 Best Network Monitoring Tools (June 2024)
Effective network monitoring is crucial for maintaining the performance and reliability of today’s complex IT environments. With the right tools, network administrators can proactively identify and resolve issues before they impact end-users. In this blog post, we’ll explore some of the best network monitoring solutions available, including both cloud-based platforms and open-source options.
Auvik is a cloud-based network monitoring and management platform designed to give IT teams full visibility and control over their networks. It automates many complex and time-consuming network management tasks, allowing administrators to work more efficiently. By providing real-time network mapping, detailed device information, and intelligent alerts, Auvik enables IT professionals to proactively monitor network health and quickly troubleshoot issues.
One of Auvik’s standout capabilities is its ability to automatically discover and inventory all devices on the network within minutes of deployment. It creates dynamic, interactive topology maps that visualize physical and logical connections between devices. Auvik also provides in-depth traffic analysis to easily identify who is on the network, what they are doing, and where their traffic is going. With features like automated config backups and an intuitive dashboard to access key network data from anywhere, Auvik is a comprehensive tool to streamline network management.
Key features of Auvik include:
Automated network discovery and inventory that provides a complete view of all network devices
Dynamic network mapping to visualize physical and logical network topology
Intelligent network traffic analysis to monitor bandwidth usage and identify traffic patterns
Automated configuration backups and easy restore to quickly recover from network issues
Extensive integrations with popular IT platforms and a powerful API to build custom workflows
Visit Auvik →
SolarWinds is a leading provider of powerful and affordable IT management software. Their flagship product for network monitoring is called Network Performance Monitor (NPM). NPM is designed to provide comprehensive network monitoring capabilities that allow IT professionals to quickly detect, diagnose, and resolve network performance issues and outages.
SolarWinds NPM can automatically discover network devices and start monitoring them within hours of deployment. It provides real-time visibility into the health and performance of routers, switches, firewalls, load balancers, wireless access points, and any other SNMP-enabled devices. NPM uses a web-based interface with customizable dashboards, views, and charts to present critical performance metrics at a glance. It also includes advanced alerting capabilities to notify administrators of issues before they impact end-users.
In addition to NPM, SolarWinds offers several other tools that extend its network monitoring capabilities. NetFlow Traffic Analyzer provides detailed visibility into bandwidth usage by application, protocol, and IP address group. Network Configuration Manager automates network configuration and change management. IP Address Manager streamlines IP address management with integrated DHCP and DNS servers. Taken together, these tools provide a comprehensive and scalable network monitoring solution.
Key features of SolarWinds network monitoring tools include:
Automated network discovery and mapping to quickly inventory devices and visualize topology
Customizable dashboards, views, and reports to present key performance metrics and health data
Over 1200 pre-built templates for monitoring Cisco, HP, Dell, Juniper, and other network device vendors
Advanced alerting with dynamic baseline thresholds and dependencies to reduce false alarms
PerfStack performance analysis dashboard for easy cross-stack data correlation and root cause identification
Visit SolarWinds →
LogicMonitor
LogicMonitor is a SaaS-based infrastructure monitoring platform that provides unified visibility into complex and hybrid IT environments. It offers comprehensive monitoring capabilities across networks, servers, cloud resources, applications, and more. By collecting metrics, logs, and traces through an agentless collector architecture, LogicMonitor delivers real-time insights into the health and performance of the entire technology stack.
One of LogicMonitor’s key strengths is its ability to automatically discover and monitor devices within minutes of deployment. It creates dynamic topology maps to visualize relationships between critical resources. LogicMonitor also leverages AI and machine learning for advanced capabilities like anomaly detection, forecasting, and intelligent alerting. With customizable dashboards, pre-configured alert thresholds, and extensive integrations, LogicMonitor optimizes digital experiences while consolidating tools and reducing operational overhead.
Key features of LogicMonitor include:
Automated discovery and monitoring of devices, cloud resources, and applications
Dynamic topology mapping to visualize relationships and dependencies
AI-driven insights for anomaly detection, forecasting, and smart alerting
Customizable dashboards and reporting for tailored views of key metrics
Extensive integrations with 2000+ technologies and open API for custom data sources
Visit LogicMonitor →
Nagios
Nagios is a powerful open-source IT infrastructure monitoring tool that enables organizations to identify and resolve problems before they impact critical business processes. Originally developed under the name NetSaint in 1999, Nagios has evolved to become one of the most widely used monitoring platforms, with thousands of projects and plugins extending its core functionality. Nagios runs natively on Linux and other Unix-like systems but can also be deployed on Windows using virtualization.
At its core, Nagios is designed to monitor hosts, services, and network devices. It uses a server-client architecture where plugins run on remote hosts to collect data and send it back to the Nagios server for processing. When issues are detected, Nagios can send alerts via email, SMS, or other notification channels to IT staff, allowing them to quickly respond to outages or performance problems. Nagios also provides a web-based interface for viewing monitoring status, generating reports, and managing configuration.
Beyond its core monitoring engine, the Nagios ecosystem includes several other tools to extend its capabilities. Nagios XI provides an enterprise-grade web interface, advanced visualizations, and features like capacity planning and audit logging. Nagios Fusion allows centralized viewing of multiple Nagios instances. Nagios Log Server enables log monitoring and analysis, while Nagios Network Analyzer provides NetFlow-based traffic analysis.
Key features of Nagios include:
Comprehensive monitoring of IT infrastructure components including servers, network devices, applications, and services
Flexible, plugin-based architecture that allows monitoring of virtually any resource
Centralized view of monitoring status via web interface with user-specific views and dashboards
Proactive alerting via multiple channels to ensure rapid response to issues
Extensible ecosystem with add-ons for log monitoring, network analysis, configuration management, and more
Visit Nagios →
Zabbix
Zabbix is a mature and feature-rich open-source network monitoring solution designed for monitoring the availability and performance of IT infrastructure components including servers, network devices, virtual machines and cloud services. It provides a centralized monitoring system that enables real-time monitoring of thousands of metrics collected from servers, network devices and applications.
One of Zabbix’s key strengths is its flexibility and extensibility. It can monitor a wide range of devices and systems using multiple methods including Zabbix agent, SNMP, IPMI, JMX and custom checks. Zabbix also provides powerful data visualization capabilities including custom graphs, network maps, dashboards and reports. With features like anomaly detection, predictive analytics and auto-discovery of devices, Zabbix helps IT teams proactively monitor their infrastructure and quickly troubleshoot issues.
Key features of Zabbix include:
Distributed monitoring with support for remote Zabbix proxies for monitoring across multiple locations
Agentless monitoring using multiple protocols including SNMP, IPMI, JMX, SSH and Telnet
Powerful data visualization with custom graphs, network maps, dashboards and slideshows
Flexible alerting with customizable escalation scenarios and multiple notification channels
Auto-discovery for automatic registration of new devices and application of appropriate monitoring templates
Visit Zabbix →
Datadog is a comprehensive cloud-based monitoring and analytics platform designed to provide real-time visibility into modern IT environments. It enables organizations to monitor their entire infrastructure, including servers, databases, applications, network devices, and cloud services. By collecting, searching, and analyzing metrics, traces, and logs across fully distributed architectures, Datadog empowers IT teams to proactively detect and resolve performance issues before they impact end-users.
Datadog supports over 600 technologies and services out-of-the-box. This allows seamless data collection from various sources, providing a holistic view of the IT ecosystem. Datadog also offers customizable dashboards, intelligent alerts, and collaboration features, enabling teams to efficiently monitor, troubleshoot, and optimize their systems. With its scalable architecture and flexible deployment options, Datadog caters to businesses of all sizes, from startups to large enterprises.
Key features of Datadog include:
Real-time monitoring of servers, containers, databases, and cloud services, with auto-discovery and detailed performance metrics
End-to-end tracing of requests across distributed systems, identifying bottlenecks and optimizing application performance
Centralized log collection, indexing, and analysis, with powerful search and filtering capabilities 
Visibility into network traffic, analyzing communication between services, containers, and cloud environments 
Customizable dashboards for visualizing key metrics in real-time
Visit Datadog →
AdRem NetCrunch is a comprehensive network monitoring and management solution designed to provide real-time visibility into IT infrastructure. It offers a wide range of features to streamline network monitoring, including auto-discovery of devices, performance monitoring, customizable dashboards, and an intuitive alerting system. NetCrunch runs on Windows and provides an agentless approach to monitoring, making it easy to deploy and scale.
NetCrunch automatically discovers and maps network devices, creating a dynamic, interactive network atlas. This allows IT teams to visualize their network topology, identify dependencies, and quickly locate the root cause of issues. NetCrunch supports monitoring of various devices and systems, including servers, network devices, applications, virtual environments, and cloud services.
Key features of AdRem NetCrunch:
Agentless monitoring using protocols like SNMP, WMI, and SSH
Automatic network discovery and interactive topology mapping
Customizable dashboards and alerts for tailored network insights
Supports monitoring of servers, network devices, VMs, and cloud services
Extensive reporting and integration with IT management platforms
Visit NetCrunch →
Observium is an open-source network monitoring and management platform that offers auto-discovery capabilities to automatically detect and monitor devices on the network, including servers, switches, routers, and more. Observium supports a wide range of device types and operating systems, such as Cisco, Windows, Linux, HP, Juniper, Dell, and others.
Observium boasts a user-friendly web interface, which presents network data through customizable dashboards, graphs, and reports. It collects data using SNMP and stores it using RRD (Round-Robin Database), enabling efficient storage and retrieval of historical performance metrics. Observium also provides alerting features to notify administrators of potential issues or performance degradations.
Key features of Observium:
Automatic discovery of network devices for easy setup and monitoring
Support for a wide range of device types and operating systems
Customizable dashboards and graphs for data visualization
Alerting system to notify administrators of potential issues
Scalable architecture to monitor large and complex network environments
Visit Observium →
Domotz is a comprehensive cloud-based network monitoring and management software designed for MSPs, IT professionals, and enterprises. It provides real-time visibility and control over IT infrastructure, enabling users to work more efficiently, increase productivity, and resolve issues faster. Domotz offers a user-friendly interface and automated features such as network discovery, topology mapping, and device inventory.
Domotz can monitor a wide range of devices, including servers, workstations, printers, routers, switches, firewalls, and IoT devices, regardless of the manufacturer. It supports various monitoring protocols like SNMP, WMI, and SSH. Domotz also provides secure remote access to devices for troubleshooting, as well as network configuration management with backup and restore capabilities.
Key features of Domotz:
Automated network discovery, inventory, and topology mapping
Supports monitoring of diverse devices across multiple sites and networks
Secure remote access for troubleshooting and issue resolution
Network configuration management with backup, restore and change alerts
Intuitive web-based interface with customizable dashboards and reporting
Visit Domotz →
AKIPS
AKIPS is a powerful and scalable network monitoring software designed to provide comprehensive visibility into large enterprise network infrastructures. It offers a fully-featured, fast, and cost-effective solution for monitoring network performance, enabling network engineers to proactively identify and resolve issues before they impact business operations. AKIPS can monitor over one million interfaces and 500,000 flows per second from a single server, making it one of the most scalable network monitoring tools on the market.
One of the standout features of AKIPS is its ability to provide real-time insights and historical data down to one-minute granularity for up to three years. This allows network administrators to quickly identify the root cause of issues and make informed decisions. AKIPS also offers automated device discovery, adaptive polling, syslog and SNMP trap management, NetFlow analysis, and configuration management capabilities, providing a comprehensive toolkit for network monitoring and management.
Key one-line features of AKIPS:
Scalable architecture monitoring over 1 million interfaces from a single server
Real-time insights and 3 years of historical data at 1-minute granularity
Automated network discovery and adaptive polling optimizing SNMP traffic
Advanced syslog, SNMP trap management and alerting for proactive issue detection
NetFlow analysis with up to 500k flows/sec and configuration management tools
Visit AKIPS →
The Bottom Line
Choosing the right network monitoring tool is essential for keeping your IT infrastructure running smoothly. Whether you opt for a comprehensive cloud-based platform, a flexible open-source solution, or a combination of tools, having real-time visibility into your network’s performance is crucial. Consider your organization’s specific needs, budget, and existing IT ecosystem when selecting a monitoring solution. By implementing the right tool or combination of tools, you can proactively identify and resolve issues, optimize network performance, and ensure a seamless experience for your end-users.
0 notes
algoentremanos · 11 months ago
Text
Cómo bloquear bots, SPAM y tráfico malicioso con el firewall CSF y LFD
Cómo bloquear bots, SPAM y tráfico malicioso con el firewall CSF y LFD #RockyLinux #CSFFirewall #Bots #Spam
CSF o Config Server Firewall, es una de las opciones más sencillas que puedes instalar en tu servidor VPS para mejorar la seguridad de tu instalación web. Es un firewall sencillo de configurar (o por lo menos más sencillo que firewalld, fail2ban), pero eso no quita para que haya que prestar un poco de atención a varios parámetros menos conocidos de su configuración para mejorar la seguridad del…
Tumblr media
View On WordPress
0 notes
Text
how to config softether vpn for trove
🔒🌍✨ Ganhe 3 Meses de VPN GRÁTIS - Acesso à Internet Seguro e Privado em Todo o Mundo! Clique Aqui ✨🌍🔒
how to config softether vpn for trove
Instalação VPN SoftEther
O SoftEther VPN é uma ferramenta poderosa e versátil que permite criar uma conexão segura e privada através de uma rede pública, como a internet. A instalação do SoftEther VPN é relativamente simples e pode ser feita em diversos sistemas operacionais, como Windows, Linux, Mac OS e até mesmo em dispositivos móveis.
Para instalar o SoftEther VPN, o primeiro passo é acessar o site oficial do projeto e baixar o instalador correspondente à plataforma que você está utilizando. Após o download, execute o instalador e siga as instruções do assistente de instalação. É importante ler atentamente cada etapa do processo para garantir que a instalação seja realizada corretamente.
Durante a instalação, você terá a opção de instalar diferentes componentes do SoftEther VPN, como o servidor VPN, cliente VPN, gerenciador de VPN e ferramentas de administração. Você pode escolher quais componentes deseja instalar de acordo com as suas necessidades.
Após a conclusão da instalação, você poderá configurar e utilizar o SoftEther VPN para proteger a sua conexão e navegar de forma segura na internet. Além disso, o SoftEther VPN oferece recursos avançados, como a capacidade de contornar restrições geográficas e acessar conteúdos bloqueados em determinadas regiões.
Em resumo, a instalação do SoftEther VPN é uma ótima maneira de garantir a segurança e privacidade dos seus dados enquanto navega na internet. Experimente o SoftEther VPN e descubra os benefícios de uma conexão VPN de alta qualidade.
Configuração passo a passo SoftEther
O SoftEther é uma solução de software de código aberto que permite a criação de uma rede privada virtual (VPN) de forma simples e eficaz. Neste artigo, vamos abordar a configuração passo a passo do SoftEther para que você possa utilizar essa ferramenta de forma segura e confiável.
Passo 1: O primeiro passo é baixar o software SoftEther no site oficial e instalar no seu dispositivo. Siga as instruções de instalação e conclua o processo com êxito.
Passo 2: Após a instalação, abra o programa e clique em "Virtual Hub" para criar uma nova conexão. Insira um nome para o hub e configure as demais opções de acordo com suas preferências.
Passo 3: Em seguida, clique em "Virtual NAT and Virtual DHCP Server" para configurar as definições de rede. Aqui, você poderá definir o endereço IP e as configurações de roteamento da sua VPN.
Passo 4: Agora, vá para a opção "Security Settings" e defina as políticas de segurança da sua rede virtual. Você poderá configurar firewalls, criptografia e outras medidas de proteção.
Passo 5: Por fim, conecte-se à sua VPN SoftEther utilizando as credenciais definidas durante a configuração. Certifique-se de testar a conexão e verificar se tudo está funcionando corretamente.
Seguindo esses passos, você poderá configurar o SoftEther de forma adequada e desfrutar de uma conexão segura e privada para suas necessidades online. Lembre-se sempre de manter o software atualizado e tomar medidas de segurança adicionais para proteger seus dados.
Trove VPN SoftEther
O Trove VPN SoftEther é uma ferramenta de software que permite aos utilizadores navegarem na internet de forma segura e anónima. Esta VPN utiliza o protocolo SoftEther, que é conhecido pela sua capacidade de fornecer uma ligação segura e rápida.
Uma das principais vantagens do Trove VPN SoftEther é a sua facilidade de utilização. Com apenas alguns cliques, os utilizadores podem estabelecer uma ligação VPN e proteger os seus dados de possíveis ciberataques. Além disso, esta VPN oferece uma vasta gama de servidores em diferentes localizações em todo o mundo, permitindo aos utilizadores contornar restrições geográficas e aceder a conteúdos bloqueados.
A segurança é outra prioridade do Trove VPN SoftEther. Utilizando encriptação avançada, esta VPN garante que todas as informações dos utilizadores permanecem privadas e seguras. Deste modo, os utilizadores podem navegar na internet sem se preocuparem com a sua privacidade ou segurança online.
Para além disso, o Trove VPN SoftEther oferece velocidades de ligação impressionantes, permitindo streaming de vídeo sem interrupções e download de ficheiros de forma rápida e eficiente. Com a sua interface intuitiva e funcionalidades avançadas, esta VPN é uma excelente escolha para quem valoriza a segurança e anonimato online.
Em resumo, o Trove VPN SoftEther é uma ferramenta fiável e eficaz para proteger a sua privacidade online e contornar restrições geográficas. Com um desempenho sólido e uma vasta gama de funcionalidades, esta VPN é uma excelente opção para quem procura uma forma segura de navegar na internet.
Tutorial completo SoftEther VPN
SoftEther VPN é uma poderosa e versátil solução de software que oferece uma conexão VPN segura e eficiente. Neste tutorial completo, vamos explicar passo a passo como configurar e utilizar o SoftEther VPN para proteger a sua privacidade online e navegar de forma anônima na internet.
O primeiro passo é baixar e instalar o SoftEther VPN no seu dispositivo. Você pode encontrar o software gratuitamente no site oficial e seguir as instruções de instalação. Após a instalação, abra o programa e comece a configurar a sua conexão VPN.
No SoftEther VPN, você tem a opção de escolher entre diferentes protocolos de segurança, como o OpenVPN, L2TP/IPsec, ou SSTP. Selecione o protocolo que melhor se adequa às suas necessidades e configure as suas preferências de conexão.
Em seguida, você pode adicionar servidores VPN para se conectar. O SoftEther VPN suporta uma ampla variedade de servidores em todo o mundo, permitindo que você escolha a localização que deseja para navegar na internet anonimamente.
Por fim, conecte-se ao servidor VPN escolhido e desfrute de uma conexão segura e protegida contra hackers e cibercriminosos. O SoftEther VPN oferece um alto nível de criptografia para garantir a segurança dos seus dados enquanto você navega na web.
Com este tutorial completo, você estará pronto para utilizar o SoftEther VPN e desfrutar de uma conexão VPN segura e eficiente. Proteja a sua privacidade online e navegue com tranquilidade com o SoftEther VPN.
Configurações avançadas SoftEther VPN
SoftEther VPN é uma poderosa solução de software que oferece uma ampla gama de recursos avançados para usuários que desejam personalizar suas configurações de VPN. Com o SoftEther VPN, é possível ajustar uma variedade de configurações avançadas para atender às necessidades específicas de cada usuário.
Uma das principais vantagens do SoftEther VPN é a sua capacidade de suportar múltiplos protocolos de VPN, como SSL VPN, L2TP/IPsec, OpenVPN e Microsoft SSTP. Isso permite aos usuários escolher o protocolo mais adequado para suas necessidades de segurança e desempenho.
Além disso, o SoftEther VPN oferece uma série de opções avançadas de criptografia, permitindo aos usuários ajustar o nível de segurança da sua conexão VPN de acordo com suas preferências. Os usuários podem escolher entre uma variedade de algoritmos de criptografia, como AES e RSA, e ajustar outras configurações de segurança, como o tamanho da chave e o método de autenticação.
Outro recurso avançado do SoftEther VPN é a capacidade de configurar túneis VPN em cascata, o que permite aos usuários encadear várias conexões VPN para aumentar ainda mais a segurança e o anonimato da sua conexão. Essa funcionalidade é especialmente útil para usuários que desejam navegar na internet de forma mais privada e segura.
Em resumo, o SoftEther VPN oferece uma ampla gama de configurações avançadas que permitem aos usuários personalizar sua experiência de VPN de acordo com suas necessidades individuais. Com suporte a múltiplos protocolos, opções avançadas de criptografia e a capacidade de configurar túneis VPN em cascata, o SoftEther VPN é uma excelente escolha para usuários que buscam o máximo controle sobre sua conexão VPN.
0 notes
howprivatearevpnservices · 1 year ago
Text
do i need vpn to connect to aws
🔒🌍✨ Get 3 Months FREE VPN - Secure & Private Internet Access Worldwide! Click Here ✨🌍🔒
do i need vpn to connect to aws
VPN necessity for AWS connection
In the digital landscape, where security breaches and data privacy concerns loom large, the importance of Virtual Private Networks (VPNs) cannot be overstated, especially when it comes to connecting to Amazon Web Services (AWS). AWS is a powerhouse in the realm of cloud computing, offering a plethora of services to individuals and businesses alike. However, the convenience of accessing AWS remotely also brings forth potential security risks.
VPNs serve as a safeguard by encrypting the data transmitted between the user's device and the AWS servers. This encryption creates a secure tunnel through which data travels, making it nearly impossible for unauthorized parties to intercept or decipher. By utilizing a VPN, users can ensure that sensitive information, such as login credentials, financial data, and proprietary information, remains protected from prying eyes.
Moreover, VPNs add an extra layer of anonymity to the connection process. When connecting to AWS through a VPN, the user's true IP address is masked, making it difficult for hackers or malicious entities to track their online activities. This anonymity is crucial, especially for businesses handling confidential information or conducting sensitive operations on the AWS platform.
Additionally, VPNs can help users bypass geo-restrictions or access limitations imposed by certain regions or network policies. This flexibility enables businesses to seamlessly connect to AWS from any location, ensuring uninterrupted access to essential services and resources.
In essence, VPNs are not just a luxury but a necessity for anyone looking to establish a secure and reliable connection to AWS. By encrypting data, enhancing anonymity, and providing geo-spoofing capabilities, VPNs play a vital role in safeguarding sensitive information and preserving the integrity of AWS connections.
AWS security protocols
Amazon Web Services (AWS) offers a robust set of security protocols to protect its users' data and applications in the cloud. These security measures are designed to ensure that sensitive information remains confidential, that systems are protected against cyber threats, and that data integrity is maintained.
One of the key security protocols offered by AWS is Identity and Access Management (IAM). IAM allows users to control access to AWS services and resources securely. Through IAM, users can create and manage user accounts, assign permissions, and set up multi-factor authentication to add an extra layer of security.
Another vital security protocol provided by AWS is encryption. AWS offers various encryption tools to protect data both in-transit and at-rest. Users can encrypt data using AWS Key Management Service (KMS) to ensure that their information remains secure even if unauthorized access occurs.
AWS also offers network security protocols to safeguard data as it travels between servers and users. Virtual Private Clouds (VPCs) allow users to isolate their resources on a private network and control inbound and outbound traffic. Additionally, AWS offers firewalls, security groups, and access control lists to protect against malicious attacks.
Furthermore, AWS provides monitoring and logging tools to help users track and analyze security events. Services like AWS CloudTrail and AWS Config allow users to monitor activity, track changes, and identify potential security issues in real-time.
Overall, AWS security protocols offer a comprehensive approach to securing data and applications in the cloud, providing users with the tools and resources needed to protect their information effectively.
VPN advantages in AWS connectivity
Title: Harnessing VPN for Enhanced AWS Connectivity: Advantages Unveiled
In the ever-evolving landscape of cloud computing, Amazon Web Services (AWS) stands tall as a powerhouse, empowering businesses with unparalleled scalability and flexibility. However, to fully leverage the potential of AWS, establishing a robust and secure connectivity infrastructure is paramount. This is where Virtual Private Networks (VPNs) emerge as indispensable tools, offering a myriad of advantages in AWS connectivity.
First and foremost, VPNs provide a secure conduit for data transmission between on-premises networks and AWS environments. By encrypting data traffic, VPNs shield sensitive information from unauthorized access and interception, ensuring confidentiality and integrity. This security layer is crucial for compliance adherence and safeguarding against cyber threats, bolstering the trustworthiness of AWS deployments.
Moreover, VPNs facilitate seamless integration and extension of on-premises networks into AWS Virtual Private Clouds (VPCs). Through VPN connections, organizations can establish private and direct links, enabling fluid communication between disparate network environments. This capability streamlines hybrid cloud architectures, allowing for efficient resource utilization and workload distribution across on-premises infrastructure and AWS cloud instances.
Additionally, VPNs offer cost-effective connectivity solutions compared to dedicated leased lines or direct connect services. By leveraging existing internet connections, organizations can establish VPN tunnels without significant capital expenditure, thereby optimizing operational expenses while maintaining high-performance connectivity to AWS resources.
Furthermore, VPNs enhance accessibility by enabling secure remote access to AWS resources for authorized users. Whether accessing corporate applications or managing cloud infrastructure, VPNs provide a secure gateway for remote workers, fostering collaboration and productivity without compromising security protocols.
In conclusion, the advantages of VPNs in AWS connectivity are undeniable. From ensuring data security and compliance to facilitating seamless integration and cost efficiency, VPNs play a pivotal role in unlocking the full potential of AWS environments, empowering businesses to thrive in the digital age.
Secure AWS access without VPN
Securing AWS access without using a Virtual Private Network (VPN) is a practice gaining popularity among organizations as they look for innovative ways to enable secure remote access to their cloud infrastructure.
One effective method to achieve secure AWS access without a VPN is by implementing identity and access management (IAM) policies. By defining specific permissions and roles, organizations can ensure that only authorized individuals have access to the resources they need. This helps in reducing the attack surface and enhancing overall security.
Another approach is the use of bastion hosts or jump servers. These are specially configured instances that act as an intermediary between the user and the target instance in AWS. By accessing the bastion host first, users can then connect to other instances within the cloud environment, adding an extra layer of security to the access process.
Implementing multi-factor authentication (MFA) is also crucial in ensuring secure access to AWS resources. By requiring users to provide an additional form of verification, such as a one-time code sent to their mobile device, organizations can significantly reduce the risk of unauthorized access even if credentials are compromised.
Furthermore, leveraging AWS services like AWS Web Application Firewall (WAF) and AWS Shield can help protect against common web exploits and Distributed Denial of Service (DDoS) attacks, further enhancing the security of AWS access without relying on a VPN.
In conclusion, by adopting a combination of IAM policies, bastion hosts, MFA, and AWS security services, organizations can effectively secure AWS access without the need for a VPN, ensuring a robust and streamlined remote access solution for their cloud infrastructure.
VPN considerations for AWS usage
When utilizing Amazon Web Services (AWS), there are several important considerations to keep in mind when it comes to Virtual Private Networks (VPNs). Implementing a VPN for AWS can enhance security, privacy, and connectivity for your cloud resources.
One key consideration is to choose the right VPN protocol. AWS supports various VPN protocols such as OpenVPN, IPsec, and SSL VPN. It is essential to select a protocol that aligns with your security requirements and is compatible with AWS services.
Another crucial factor is the scalability of the VPN solution. As your AWS environment grows, your VPN should be able to scale accordingly to accommodate increased traffic and resource demands. AWS offers managed VPN services that can automatically scale based on your needs.
Additionally, the geographical distribution of your AWS resources and users should influence your VPN deployment. Selecting the appropriate VPN gateway locations can help optimize performance and reduce latency for users accessing AWS resources from different regions.
Security is paramount when it comes to VPN usage in AWS. Ensure that your VPN configuration follows AWS security best practices, such as using strong encryption, multi-factor authentication, and regularly updating security policies.
Lastly, consider the cost implications of implementing a VPN for AWS. Evaluate the pricing models of different VPN solutions, including data transfer costs, gateway fees, and any additional charges for advanced features.
By carefully considering these factors, you can effectively leverage VPN technology in AWS to enhance the security, connectivity, and efficiency of your cloud infrastructure.
0 notes
doineedavpnfortorbrowser · 1 year ago
Text
can t add vpn ubuntu
🔒🌍✨ Get 3 Months FREE VPN - Secure & Private Internet Access Worldwide! Click Here ✨🌍🔒
can t add vpn ubuntu
VPN installation Ubuntu
Title: How to Install and Set Up a VPN on Ubuntu: A Step-by-Step Guide
In today's digital age, protecting your online privacy and security is paramount. One effective way to achieve this is by using a Virtual Private Network (VPN). VPNs encrypt your internet connection, making it virtually impossible for hackers, ISPs, or government agencies to intercept your data. If you're a Ubuntu user, setting up a VPN is a straightforward process. Here's a step-by-step guide to help you get started:
Choose a VPN Provider: Before you begin, select a reliable VPN provider that offers compatibility with Ubuntu. Look for providers that offer strong encryption, a no-logs policy, and servers in your desired locations.
Install OpenVPN: Ubuntu supports OpenVPN, one of the most secure VPN protocols available. To install OpenVPN, open the terminal and enter the following command:
sudo apt-get install openvpn
Download Configuration Files: Once OpenVPN is installed, you'll need to download the configuration files from your VPN provider's website. These files contain information about the VPN servers and protocols.
Configure OpenVPN: Move the downloaded configuration files to the appropriate directory (/etc/openvpn/). You can do this using the terminal or file manager. Then, rename the files with a .conf extension.
Connect to the VPN: With the configuration files in place, you can now connect to the VPN. Open the terminal and enter the following command:
sudo openvpn --config /etc/openvpn/your_config_file.conf
Replace "your_config_file.conf" with the name of your configuration file.
Verify the Connection: Once connected, verify that your VPN connection is active by visiting a website like https://whatismyip.com. It should display the IP address of the VPN server, not your actual IP address.
That's it! You've successfully installed and set up a VPN on your Ubuntu system. Remember to disconnect from the VPN when you're not using it to maximize your internet speed and privacy. With your VPN up and running, you can browse the web with confidence, knowing that your online activities are secure and private.
Troubleshoot VPN Ubuntu
If you are encountering issues with your VPN setup on Ubuntu, here are some troubleshooting steps to help resolve the issues and get your VPN connection up and running smoothly.
Check your internet connection: Before troubleshooting the VPN, ensure that your internet connection is stable and working correctly. A slow or unstable internet connection can affect the VPN connection.
Verify VPN settings: Double-check the VPN settings, including the server address, authentication credentials, and VPN protocol. Ensure that the settings are correctly configured to establish a secure connection.
Restart VPN service: Sometimes, restarting the VPN service can resolve connectivity issues. You can do this by restarting the network manager service using the command: sudo service network-manager restart
Firewall settings: In some cases, firewall settings may block the VPN connection. Disable the firewall temporarily to check if it is the cause of the issue.
Update VPN client: Make sure that your VPN client software is up to date. Outdated software may have bugs or compatibility issues that can cause connection problems.
DNS settings: Incorrect DNS settings can also affect the VPN connection. Configure the DNS settings to use the VPN provider's DNS servers for better connectivity.
Contact VPN provider: If the issue persists, contact your VPN provider for further assistance. They may provide specific troubleshooting steps or settings tailored to their service.
By following these troubleshooting steps, you can identify and resolve common VPN issues on Ubuntu, ensuring a secure and reliable connection for your online activities.
VPN configuration Ubuntu
Configuring a Virtual Private Network (VPN) on Ubuntu can help enhance your online privacy and security. A VPN creates a secure encrypted connection between your device and the internet, ensuring that your data remains protected from potential cyber threats and prying eyes.
To configure a VPN on Ubuntu, you can follow these simple steps:
Select a VPN service provider: Choose a reliable VPN service provider that meets your specific needs in terms of security features, server locations, and speed.
Install the VPN software: Most VPN providers offer easy-to-use software that can be downloaded from their website. Follow the instructions to install the software on your Ubuntu system.
Configure the VPN connection: Launch the VPN software and enter your login credentials provided by the VPN service. You may need to select a server location to connect to.
Adjust the VPN settings: Depending on your preferences, you can customize the VPN settings such as protocol selection, kill switch, DNS leak protection, and auto-connect options.
Test the VPN connection: Ensure that the VPN is working correctly by visiting a website to check if your IP address reflects the VPN server location.
By configuring a VPN on Ubuntu, you can browse the internet anonymously, access geo-restricted content, and secure your data while using public Wi-Fi networks. Remember to keep your VPN software updated to benefit from the latest security enhancements and enjoy a safer online experience.
Ubuntu VPN setup errors
Setting up a VPN on Ubuntu can sometimes be a challenging task, especially when encountering errors along the way. Common VPN setup errors on Ubuntu may include issues with connection establishment, authentication failures, or DNS resolution problems.
One of the most frequent errors encountered when setting up a VPN on Ubuntu is related to connection failures. This can happen due to misconfigurations in the VPN settings, incorrect authentication credentials, or network restrictions. To troubleshoot this issue, it is recommended to double-check the connection settings, ensure the VPN server is reachable, and verify the authentication details provided.
Authentication failures are another common issue that users may face when configuring a VPN on Ubuntu. This error usually occurs when the provided username or password is incorrect, or when the authentication method used by the VPN server is not supported by the client. To resolve this error, users should verify their credentials, check for any special characters that may cause issues, and make sure the authentication method matches the one required by the VPN server.
DNS resolution problems can also arise during VPN setup on Ubuntu, causing issues with accessing websites or services through the VPN connection. This error can be resolved by configuring the correct DNS servers in the network settings or by adjusting the DNS settings provided by the VPN server.
In conclusion, setting up a VPN on Ubuntu may result in various errors that can be resolved with proper troubleshooting steps. By identifying and addressing common VPN setup errors, Ubuntu users can ensure a secure and reliable VPN connection for their online activities.
Fix VPN connection Ubuntu
When using a Virtual Private Network (VPN) on your Ubuntu system, you may encounter issues with the connection that can disrupt your online activities. If you are facing difficulties with your VPN connection on Ubuntu, there are several troubleshooting steps you can take to resolve the issue.
Firstly, ensure that your VPN service is compatible with Ubuntu and that you have entered the correct connection details. Incorrect server information or authentication settings can cause connection failures. Double-check your username, password, and server address to ensure they are accurate.
If you are still experiencing connection problems, try switching to a different VPN protocol. Ubuntu supports various VPN protocols such as OpenVPN, L2TP/IPsec, and PPTP. Experimenting with different protocols can help you identify if the issue lies with a specific protocol.
Another common fix for VPN connection issues on Ubuntu is to restart the networking service. You can do this by opening a terminal and entering the command: sudo service network-manager restart. This will refresh the network settings and may establish a stable VPN connection.
Additionally, updating your Ubuntu system and the VPN client software to the latest versions can address compatibility issues and security vulnerabilities that could be affecting the VPN connection.
If none of the above solutions resolve your VPN connection problem, consider reaching out to your VPN service provider for further assistance. They may provide specific troubleshooting steps or insights tailored to their service.
By following these troubleshooting steps, you can effectively diagnose and fix VPN connection issues on Ubuntu, ensuring a secure and seamless online experience.
0 notes
ms-demeanor · 1 day ago
Text
We have these firewalls. Firewalls have licenses that expire.
We have an RMM (Remote Monitoring and Management), a documentation platform, and a PSA (professional services automation tool). All of these are owned by the same umbrella corporation and should (in theory) communicate with each other.
Your RMM should install an agent on the devices that gathers information and helps you to manage the device; the RMM sends data to the configurations in the PSA, and in our case the documentation platform syncs with either the PSA or the RMM to update the info in the configurations in the documentation platform.
In my experience, managing firewalls as an MSP works best when you've got a multi-tenant management platform that lets you access basic features and enable licenses and do updates on all your devices from one platform. For many nice firewalls, that's a free feature of the device. You can enroll them in the management platform for free.
Not with fucking fortigates. If you want to manage fortigates you need to have a forticloud account that you authenticate to with a fortitoken - their very own special authenticator app and they won't let you use another authenticator - so that you can get your forticare subscriptions taken care of. They have a multitenant option called fortimanage but it's fuck off expensive; there are two options for multi tenant management that are less-than-fuck-off expensive but are still not free (the one we've considered has an annual cost that's about what I take home every two weeks). Fortigates can fortifuckthemselves.
So. To manage the fortigate without having to log into an individual forticloud account and use the business owner's specific fortitoken authentication, we remote into the server and manage the firewall from there.
This is, in industry terms, fucking stupid. (it's not completely fucking stupid but when you're managing three hundred fucking firewalls it sure isn't smart).
Anyway. You can avoid some of that pain in the ass by using your RMM to track network devices so that you can get real time data on how your network devices are doing without having to individually log in to each one. And as a bonus, you can have the RMM send data to the PSA so you don't even have to log in to the RMM to get basic specs, and information like the expiration date of a firewall license.
Because, let me be crystal fucking clear: I, as the procurement lead, should not be logging in to a client server to access their fucking firewall so that I can see when the license expires. This is WHOLLY ASIDE from the fact that our RMM and my PERSONAL COMPUTER THAT I WORK FROM BECAUSE I DO NOT HAVE A WORK MACHINE do not get along, and whenever I have to log in to a server my dyslexic ass to manually type our gibberish 32 character passwords and then connect MY PERSONAL MACHINE WITH NO ANTIVIRUS OR TRACKING SOFTWARE THAT I DO HACKER SHIT WITH to the client's server. I don't like doing this, I shouldn't be doing this, and when I have to do this it takes forever because I can't send paste as keystrokes I *KNOW* there is an option to send paste as keystrokes I have replicated this issue with three of my techs and in two support tickets with the vendor my computer hates the system, the system hates me, I have to type the fucking passwords and sure you could say "well just install the latest version of chrome and maybe that'll fix it" and I say again THIS IS MY PERSONAL MACHINE YOU ARE GETTING OPERA AT BEST AND THE ISSUE OCCURS IN OPERA CHROME EDGE BRAVE AND FIREFOX ON MY MACHINE.
So. It's a very good thing that there is an RMM Agent that gets installed on network equipment and updates information in our configurations on two separate platforms, right?
Well.
For one thing, I don't know why some clients have fortigates showing up in their network devices on the RMM and some don't.
In our documentation platform, I don't know why some fortigate configs are called "Fortigate FG60 Firewall Client" and some are called "FG60F-FW-CN." I don't know why our documentation platform has a search bar that isn't for search terms, it's for filters, so when you enter a term in the bar you aren't searching the whole config for that phrase you are filtering the tenant by five main fields so if "Fortigate" appears in the body text but not in the description, name, product number, or device type it won't show up when you "search" because you're not searching you're filtering.
And I don't know why our PSA, RMM, and documentation platform, which are all made by the same goddamned company, don't play nice with each other and will erase information that one populated to the other.
So. I have a client who, to my knowledge, has one fortigate that is expiring in June. I believe this is the case because I searched her tenant for "Fortigate" and found a device that was in service and had an expiration listed as June. To double check that this was correct-ish, I went to our RMM and looked up their site, and their site didn't list any firewalls in network devices, just a single switch. So I sent a quote for a one year renewal that the client approved yesterday.
APPARENTLY the client ALSO has a DIFFERENT firewall that is expiring today, so after work my coworker asks if I've got the order number for the firewall renewal and after much back and forth it turns out my boss ordered the renewal and the order is processing, and I'm like "Hey okay cool that we're renewing but it looks like you actually renewed two firewalls." And my boss is like "Yeah they have an FG60" and I'm like fuck, okay, fine, so I search the documentation platform and sure enough, there it is, an FG60 that expires today FUCK. I look at the config and hey that's not so bad, it's their backup, and I check with the vendor, even if the license expires they get firewall functionality and VPN functionality. Okay. And it's their backup, just in case of literal power outages. So I say "okay, I've got a quote out to them for the one that renews in June, I didn't even realize there was another one there, we need a naming convention that will ensure that these show up for any searches of fortigates" and my boss says "The date in the configuration is wrong, the other one expires today too."
So I sit there and I look at the configuration, and I look at the other configuration, and I look at our RMM, and I ask my boss "Did the date get entered manually and it was incorrect? Is it pulling this info from the RMM?"
And my boss says "The RMM and the documentation platform and the PSA sometimes overwrite each other and change the dates, but also sometimes people enter the number manually."
So I say "Okay, so just to clarify, the expiration dates listed in our documentation platform are inaccurate and the only way to check the expiration for fortigates is to log on to the server and connect to the firewall and view the expiration date on the firewall itself?"
And my boss says "Yep"
and I didn't say anything else because I came here because I don't know what else to say because *I DON'T KNOW HOW TO FIX THIS, I CAN'T MANAGE EXPIRATION DATES IF I CAN'T TRUST THEM TO BE DOCUMENTED IN OUR DOCUMENTATION SYSTEM THAT CONNECTS TO THE FUCKING DEVICE OR APPARENTLY SOMETIMES DOESN'T WHY AREN'T THESE THINGS IN THE FUCKING RMM*
My service manager is on my ass to close two tickets that are both low priority and high effort; finishing them means calling a vendor and going through a long diagnostic process and the clients are feeling no time pressure here and these tickets are very optional.
I asked if he could help me figure out how to get the time to do the tickets because I'm struggling to put time toward low priority tickets when high priority stuff keeps popping up.
"Just schedule yourself some time so that no one else can take your time," he said.
I then got pulled onto three high priority quotes that took me seven plus hours to complete and pushed back my two time sensitive high priority tickets from today so now I have to work late and do those, which means that I can't use after hours work for catching up on small tickets or for catching up on my trainee's work because this was his third day out sick with the flu.
I'm completely in charge of managing my own schedule and workload, except when I have absolutely no say whatsoever and need to take the hot potato that someone threw at my face.
(I am back up to 46 tickets in my personal queue after a relaxing week of under 30 for the first time since October).
848 notes · View notes
mathewwrites · 2 years ago
Text
How to Enhance Your Website Security
Tumblr media
A secure website is foundational to any successful online business. Protecting your site and visitors from threats requires implementing robust security provisions across infrastructure, software, and policies. This comprehensive guide covers proven methods to enhance overall website security. Consider having an expert Virginia web design company handle security configuration for you.
Leverage a Secure Hosting Infrastructure
Choose a hosting provider that offers state-of-the-art data centers featuring:
Multi-layered physical security such as biometric entry systems, cameras, staffed 24/7.
Redundant power supplies, environmental controls, and network links to prevent downtime.
Regular third-party penetration testing to expose vulnerabilities.
Compliance with security standards like ISO 27001, SOC 2, PCI DSS.
Install Trusted SSL Certificates
Install SSL certificates to enable HTTPS and encrypt all connections:
SSL activates the padlock and "https" in the URL, providing visual trust signals.
Encryption protects sensitive data transmitted between servers and visitors.
Choose Extended Validation Certificates for maximum browser verification.
Redirect all HTTP requests to HTTPS to mandate secure connections.
Harden Your Website Platform
Harden your website platform at the code level:
For WordPress sites, disable file editing in wp-config. Update to the latest PHP version. Limit available plugins/themes.
Apply the latest security patches and updates for CMS platforms and contributed plugins/themes which are common attack vectors.
Review and restrict file permissions to prevent malicious edits and injections.
Disable directory browsing to block access to backend file structures.
Implement reCAPTCHA on forms to prevent automated submissions/spam.
Secure Admin Access
Fortify your admin dashboard:
Use strong credentials and enable two-factor authentication.
Limit admin access only to IP addresses actually needed to manage the site.
Obscure the admin URL using renaming plugins to conceal it.
Install a firewall like Wordfence to block unauthorized intrusion attempts.
Carefully audit users with admin-level privileges and revoke any unnecessary.
Perform Vulnerability Scanning
Scan for vulnerabilities:
Use automated scanners like Acunetix to detect issues across infrastructure, web platforms, plugins etc.
Perform manual checks for any logic flaws in custom code.
Test password strength and exploit potential on all forms.
Check susceptibility to cross-site scripting, SQL injection and other common attack types.
Scan regularly after any major updates or changes.
Implement Strong Access Policies
Enforce stringent access policies:
Insist all employees use strong, unique passwords for every account and platform.
Require multi-factor authentication for any remote access to infrastructure or data.
Be vigilant regarding use of secure protocols like SFTP/SCP instead of FTP, and SSH instead of Telnet.
Train staff on common social engineering tactics like phishing to avoid breaches.
With constant threats, an intentional focus on security is required to protect your website and visitors. Follow best practices across infrastructure, software and access policies for robust protection.
0 notes
apkfanda · 2 years ago
Text
HTTP Custom - AIO Tunnel VPN
Tumblr media
HTTP Custom is a AIO (All in One) tunnel VPN client with custom HTTP request header to secure surfing 📢 PLEASE READ BEFORE YOU DOWNLOAD Note: - Can't disconnect vpn when it connecting, try use on/off data to force stop vpn. Feature: ✔️ Secure surfing using SSH and VPN ✔️ Custom request header ✔️ Free VPN server ✔️ DNS Changer ✔️ Share your SSH/VPN connection (Hotspot or USB Tethering) ✔️ Export config ✔️ No root needed Easy tool to modify requests and access blocked websites behind firewall with HTTP Custom. Get free unlimited vpn server without username, password, registration, and bandwidth limitation. Why HTTP Custom: ☑️ User friendly ☑️ Free unlimited vpn server ☑️ Custom HTTP request header ☑️ AIO (All in One VPN Client) ☑️ SSH & VPN support SNI (Server Name Indication) Permission: 🔘 Permission access photos, media and files Give permission HTTP Custom read & write config 🔘 Permission make and manage phone cells Give permission HTTP Custom to generate hwid and read isp card info 🔘 Permission access this device's location Give permission HTTP Custom to read ssid, only for OS >= 8 (Oreo) How to share connection tethering: ◾️ Start HTTP Custom until connected ◾️ Switch on hotspot/usb tethering ◾️ Check log it will show info tethering ip:port server as proxy, if not show default proxy for Hotspot 192.168.43.1 and USB Tether 192.168.42.129 port 7071 ◾️ Client connect to hotstpot and set proxy client like log info from HTTP Custom (you can see image on top how to setup proxy from android, if you use desktop please use proxifier then set type proxy as HTTPS in proxifier) Read the full article
0 notes
slickhunter33 · 4 years ago
Text
Free Cgi Software For Mac
Make my user profile visible to unregistered visitors? (Note that your username, published gallery and tutorial content are always visible.).
CGI Programming With Apache and Perl on Mac OS X
These instructions are for Apache 2.2, which comes already installed on new Macs. If for some reason you're using an older mac with Apache 1.3, click here for the old configuration instructions.
Autodesk Maya is a feature-rich CGI software designed for the Windows, Mac, and Linux operating systems. The CGI tools and features provided by this software are divided into five distinct categories i.e. Motion Graphics, 3D Animation, 3D Modeling, Dynamics and Effects, and 3D Rendering and Shading.
Commonly known as Maya, it can be the best VFX software for Mac, Windows and Linux. It is widely used in the production of movies, TV series, video games and other works. Coming with a rich array of features, this VFX software program is great for 3D modeling, animation, rendering, motion graphics and more.
You're going to need a text editor, both for editing the config files and for writing your CGI programs. You can get by with using TextEdit, Apple's free text editor. Or you may want to check out BBEdit or TextMate.
Who can see your website?
If you have a permanent, fixedIP address for your computer (e.g. your computer is in an office, or you have your own T1 line), your Apache server will be able to serve pages to anyone in the world*. If you have a transient IP address (e.g. you use a dialup modem, DSL modem or cable modem to connect to the internet), you can give people your temporary IP address and they can access yourpage using the IP address instead of a host name (e.g, http://209.189.198.102/)*.But when you logout, your server will obviously not be connected, and whenyou dial in again you'll probably have a different IP address.
Obviously for permanent web hosting, you should either get a fixed IPaddress (and your own domain name), or sign up with an ISP that can hostyour pages for you.
* Unless you're behind a firewall, and the firewall is not configured to allow web traffic through.
Programming Locally, then Uploading to the ISP
You may want to develop and debug your programs on your own computer, thenupload the final working versions to your ISP for permanent hosting. Since OS X is Unix, all of the programs shown in CGI Programming 101 should work seamlessly both on your Mac and on a remote Unix host/ISP.
Tumblr media
Configuring Apache on Mac OS X
You need to modify the Apache configuration file to tell it where yourpages are, and enable CGI programs. The config file is located in /etc/apache2/httpd.conf. If you have BBEdit, use 'Open File By Name' from the File menu to specify the path to the file to edit. If you're using TextEdit or TextMate, use File->Open and then type Command-Shift-G to show the 'Go to Folder' window, then enter /etc/apache2 in the input box.
You can also use the Terminal application, then type sudo pico /etc/apache2/httpd.conf to edit the file. You'll be moved to a text editor inside of Terminal. Use the arrow keys to move around. Help and instructions on the pico editor will appear along the bottom of the window. When you're done editing, use control-X to quit out of pico (you'll be asked if you want to save the file or not).)
Once you have the httpd.conf file in your editor, use Find (⌘-F) to find 'AddHandler'. Uncomment the cgi-script line (remove the '#' that appears before this text):
This causes any file with a .cgi extension to be processed as a CGI program.If you want to also have files with a .pl extension be processed as CGI programs, add the .pl extension on that same line:
Tumblr media Tumblr media
Also uncomment these two lines to allow for server-side includes:
Now save the configuration file. (If you're using BBEdit, you'll be prompted for your system administrator password; this is required since the config file is owned by the root user.)
Edit the User File
You also need to modify the configuration file for your userid. Follow the same process as before: File->open then Command-Shift-G to open /etc/apache2/users. Look for the conf file for your userid (e.g. if your username is 'ted' then the file is named 'ted.conf'.) Open the file.
First you'll need to change the Options line to add some more parameters:
Options specifies what options are available in this directory. The important ones here are Indexes, which enables server-side includes, and ExecCGI, which enables CGI programs in this directory.
Free Cgi Software Download
After the Options line, add the following DirectoryIndex line:
Save the file.
Start Apache
To restart Apache, go to the System Preferences panel and select the 'Sharing' icon:
Check 'Web Sharing' to start Apache. (You may have to click the lock in the lower left-hand corner to unlock the sharing panel and allow you to make changes.)
Once web sharing is on, the right side of the sharing panel will show you links to your mac's main web page (in the above example it's http://192.168.1.100/), as well as to your personal web area (your Sites folder). You can click on those links to confirm that Apache is running.
Tumblr media
Viewing Your Site
http://localhost/ is thehomepage for your site; it shows the index.html (or more specifically index.html.en) page located in the /Library/WebServer/Documents folder. You can change the location for the server-wide files by changing the DocumentRoot directive in the httpd.conf file.
For developing your own pages and CGI programs, you'll want to use the Sites folder in your home directory. You can view pages in the Sites folder by looking at http://localhost/~yourusername/ in your browser. For example, my short username is 'kira', so the URL to my pages is http://localhost/~kira/. This displays the index.html file located in /Users/yourusername/Sites/. The 'Sites' folder in your home directory is where you can put all of your HTML and CGI programs.
Writing Your CGI Programs
Now you're ready to write some CGI programs! Here's a simple one you can useto get started. You can write this in your choice of text or Perl editor:
Save the file in your Sites folder as 'first.cgi', then go to http://localhost/~yourusername/first.cgi to view it.
If you get an 'Internal Server Error', that probably means you need to fix the permissions on the file. Launch the Terminal app (its in Applications->Utilities), type cd Sites, then chmod 755 first.cgi. We'll look at this (and other debugging techniques) in Chapter 1 of the book.
Now you're ready to go to Chapter 1 and start learning CGI programming.
Free Cgi Software For Mac Os
Accessing the Unix Shell
Your Mac is built on Unix, so you can access the Unix Shell by launching the Terminal application (in Applications/Utilities). A new terminal window will appear and you'll be connected in your home directory. Type ls -l to see the contents of your home directory as it looks in Unix.
Cgi Free Download
Consult the Unix tutorial to learn more about working in the shell.
1 note · View note
muonlineprivate · 4 years ago
Text
MU-BLESS - SEASON 15 - FREE 98%, NO WS
SERVER MỚI NORIA AUTO RESET TRONG GAME Trang chủ: https://mu-bless.com/ Alphatest Game 10h00 - 01/09/2021 Open Chính thức 10h00 - 02/9/2021 THÔNG TIN SERVER OPEN GAME Hỗ trợ tân thủ Khi open : 400 lv - 5000 point - Free Zen ♥ Khái Quát Server: Season 6.15 là phiên bản được hoàn thành gần đây nhất của đội ngũ Team Việt. Sau một thời gian thử nghiệm, toàn bộ các chức năng mới đều được cập nhật và chỉnh sửa ổn định. Cụm máy chủ đầu tiên của Mu khoác lên mình bộ cánh mới với những tính năng vượt trội như sau: ♥ Hệ Thống Item CusTom+Pet: -Trải nghiệm mới lạ đẹp mắt -Skill Phong Phú,Nâng Cấp Pet Đa Dạng ♥ Hình Ảnh Đẹp Mắt Mượt Mà+Nhiệm Vụ Phong Phú: -Combo Skill đang dạng không giật lag -Event sự kiện liên tục không tạo cảm giác buồn chán ♥ Fix lỗi: • Fix nhiều lỗi tồn đọng ở các pb scf cũ: _Fix 1 số bug gây crash _Fix lỗi không thể auto khi nâng cấp skill lên master _Fix lỗi bùa master bị mất khi move map _Fix lỗi rương mở rộng mở lúc đc lúc ko • Fix 1 số lỗi huyền thoại của MU _Fix lỗi hp, damage vượt 65k _Fix lỗi đánh ko ra skill ở tất cả các class _ Ngũ tiễn ELF bắn luôn lên damage đều với cung _1 số vũ khí cấp cao bị mất damage _Skill kiếm lửa + bão điện của mg đc fix cộng hưởng dmg phép + có thêm 3% ra combo (x4 damage) _Skill hỗn loạn của DL đc fix hoàn toàn 100% (chỉ có tại vg) đánh nhanh gấp ~3 lần hỏa âm và damage to hơn • Với các fix trên các class đã có thể tìm lại vị thế của mình _Fix lỗi item từ event moss không có thuộc tính luck Tính năng bổ sung: _ Hệ thống mặt cười in game _Hệ thống danh hiệu in game _ Hệ thống cột máu (hp bar) _Hệ thống ủy thác online _Wing 2.5, Wing ss8 với config đầy đủ từng option _Add thêm 1 số option(số lần mix ở gscs cho guild vua, số lượng item rơi ra từ kundun, Antihack đi kèm _Chống hack đánh nhanh với cơ chế antihack từ server _Chống hack đánh trong thành + hack đánh khi chết _Chống hack nodelay các skill có delay (chém băng, dậm ngựa ...) _Mã hóa packet _Chống các loại hack gây crash, phá server v.... _GS nhận ip thực cho dù chạy qua firewall của 1 số nhà cung cấp
1 note · View note