How To Reset a Webmin Password on FreeBSD
1 2 3 4 |
# /usr/local/lib/webmin/changepass.pl usage: changepass.pl {config-dir} {login} {password} # /usr/local/lib/webmin/changepass.pl /usr/local/etc/webmin admin mypassword |
1 2 3 4 |
# /usr/local/lib/webmin/changepass.pl usage: changepass.pl {config-dir} {login} {password} # /usr/local/lib/webmin/changepass.pl /usr/local/etc/webmin admin mypassword |
Just 1601 lines of code including lots of blank lines and comments, 1155 lines with no comments or blank lines. Oh, that is to completely wrap the ezjail-admin command with a friendly Perl API that supports easy fail-over/migration of jails. In just 2 days… 99 bottles of beer, anyone?
Simply specify one or more ListenAddress directives… Edit “/etc/ssh/sshd_config” and add one line per desired IP address: [code] ListenAddress 10.1.1.7 ListenAddress 172.16.1.82 ListenAddress 192.168.1.146 [/code] Then run “/etc/rc.d/sshd restart”.
Connect the two servers using a serial null modem cable. This example assumes the first serial port (i.e. uart0 or COM1:). On host you want to login TO: Edit /etc/ttys to add the following: [code]ttyu0 "/usr/libexec/getty std.9600" vt100 on insecure[/code] Then run “kill -HUP 1” as root. On host you want to login FROM: Add […]
Just wrapped up a new script to automate the administration of FreeBSD ez-jails, very pleased. Very crude, but effective. I want to look into the Provision::Unix::VirtualOS CPAN module, but so far, my own abstraction seems to work just fine. Agenda for Wednesday’s 9am call is ready and the YouCake project plan has been updated. Whew! […]
[code] # filter blank lines grep -hv "^$" * # filter blank lines and comments grep -hv ‘^#’ * | grep -hv "^$" # filter blank lines, and comments, then count number of lines grep -hv ‘^#’ * | grep -hv "^$" | wc -l [/code] Note – using FreeBSD’s version of grep. The “-h” […]
Deep into configuring second server for YouCake. Jeremy has allowed me to set it up my way, and has also approved the removal of various bloat modules like virtualmin from the production process. Have had to join Twitter just to keep up with the Jones. YUK! Now have accounts for both Wyzaerd and PainMinder So […]
If you want to install a port and portaudit reports vulnerabilities for this port, you can bypass portaudit by using make -DDISABLE_VULNERABILITIES: [code] cd /usr/ports/graphics/gd make -DDISABLE_VULNERABILITIES [/code] For upgrading ports on FreeBSD, you can you use portupgrade. In case that portupgrade tells that it cannot continue because the port has a vulnerability reported by portaudit, […]
USE_NONDEFAULT_X11BASE=1
[code] portsnap fetch portsnap extract portsnap update [/code]