Archive

Archives pour la catégorie ‘Logiciel’

SabNZBd Automation Support

17/03/2024 Comments off

To help connect SABnzbd to other utilities, some automation functions are available through the web-interface.

PLEASE NOTE: Starting with release 0.4.9 each API call must have the extra parameter « apikey=secret-key« .
The secret-key can be found in Config->General.

In the commands, substitute elements in <> by proper values.
Example: get an NZB from an indexer (using its full URL):

http://host:port/sabnzbd/api?mode=addurl&name=<url>&cat=linux&pp=3&script=None

Where <url> is the URL of the indexer. Please note that this URL requires proper quoting.
So:

http://indexer.org/get-nzb.php/123456

becomes

http%3A%2F%2Findexer.org%2Fget-nzb.php%2F123456

These commands give a one line response. Either « ok\n » or « error\n ».
Only the shutdown command will give no response. Lire la suite…

Categories: Logiciel Tags:

Disable creation of .AppleDouble files on Mac OS X

03/03/2024 Comments off

Given that Macs support multiple forks to files, the AppleDouble trick (._ files) try to preserve the data in those forks. So they are needed so that Mac OS X can perform operations on them.

However, most of the files are created when the same volume is mounted through AFP, not SMB/CIFS or NFS. In that case, the AFP server might have configuration options for dealing with the Apple Double files (see, for instance, this blog post).

In order to get rid of AppleDouble files, you can on a Mac the dot_clean command:

dot_clean --keep=dotbar /Volumes/mounted_smb_volume

where mounted_smb_volume would be the name of the mounted volume. Lire la suite…

Categories: Logiciel Tags: ,

par2 – PAR 2.0 compatible file verification and repair tool

02/03/2024 Comments off

Source: Ubuntu manuals

raring (1) par2.1.gz
Provided by: par2_0.4-11build1_i386 

NAME
par2 – PAR 2.0 compatible file verification and repair tool.

SYNOPSIS
 par2 c(reate) [options] <par2 file> [files]
 par2 v(erify) [options] <par2 file> [files]
 par2 r(epair) [options] <par2 file> [files]

Or:

par2create [options] <par2 file> [files]
 par2verify [options] <par2 file> [files]
 par2repair [options] <par2 file> [files]

DESCRIPTION

par2 is a program for creating and using PAR2 files to detect damage in
data files and repair them if necessary. It can be used with any kind
of file. Lire la suite…

Categories: Logiciel Tags:

Set Nemo as Default File Manager in Ubuntu

01/03/2024 Comments off

Nemo is a file manager application developed by Linux Mint team. It is a fork of Nautilus, the GNOME’s file manager. In the beginning, Nemo was just Nautilus 3.4 (Nautilus version which is forked to become Nemo) with different name.

With rapid development and improvement, Nemo now become a full-featured file manager with lots of features, more customizable, and looks beter (in my opinion) than its original (Nautilus).

shutter-2012-12-27-025056

Nemo is the default file manager in Linux Mint, to handle folder and also handle the desktop. You can also easily install Nemo in Ubuntu if you want which is just apt-get away using a PPA (read more: How to install Nemo in Ubuntu),

When you install Nemo in Ubuntu, it doesn’t set itself as the default file manager, Nautilus remains as the default one. If you want to integrate Nemo into Ubuntu system (as the default folder handler), you have to do it manually.

Here I want to share simple command to set Nemo as the default file manager in Ubuntu.

We will invoke the xdg-mime command from freedesktop.org, which is standard command and installed by default in most Linux distribution including Ubuntu. It can be use to set an application (*.desktop file) as the default file opening a certain file type(s) (mime-type). You can also use it to find out what application on your system to handle type(s) of file. Lire la suite…

Categories: Logiciel Tags:

System: fail2ban and iptables

26/02/2024 Comments off

source: http://www.the-art-of-web.com/system/fail2ban/

Around the beginning of 2005 we saw an increase in brute-force ssh attacks – people or robots trying different combinations of username and password to log into remote servers. A quick search on this topic returns many references to iptables and ipchains but noone really explained how they work.

Having just gone through this learning curve myself, and found a satisfactory solution in the fail2ban package, I’m going to try and explain how to achieve the simple goal of banning IP addresses that make repeated failed ssh login attempts.

If you want more technical information regarding firewalls and iptables in particular, see the References section at the bottom of this page. Lire la suite…