Squid Web Cache wiki April 15, 2023, 3:21 p.m.

This wiki is dedicated to hosting Squid Web Cache documentation, including the FAQ, KnowledgeBase articles, ConfigExamples, and the development RoadMap

documentation squid

We need to talk: Can we standardize NO_PROXY? Oct. 21, 2021, 1:44 p.m.

Fast forward to today, we can see that how these proxy server variables are handled varies, depending on what language or tool you are using.

documentation proxy

OpenSSL Quick Reference Guide Sept. 18, 2019, 3:07 p.m.

OpenSSL is an open-source command line tool that is commonly used to generate private keys, create CSRs, install your SSL/TLS certificate, and identify certificate information. We designed this quick reference guide to help you understand the most common OpenSSL commands and how to use them.

certificates security documentation

Self updating OSMC Distribution Sept. 10, 2019, 11:22 a.m.

Here is a small tutorial on how to get OSMC / linux self-updating.

tutorial linux documentation

Run a command before & after ubuntu apt upgrade & unattended-upgrades Sept. 10, 2019, 11:21 a.m.

There are three hooks you can use for this:

  • DPkg::Pre-Invoke is run once, before all the package manipulation sequences in one apt invocation
  • DPkg::Pre-Install-Pkgs is also run once, before the package manipulation sequences, after the Pre-Invoke hook, and with a list of all the packages which will be installed
  • DPkg::Post-Invoke is run once, after the package manipulation sequences.
linux documentation

APT Configuration Sept. 10, 2019, 11:20 a.m.

/etc/apt/apt.conf is the main configuration file shared by all the tools in the APT suite of tools, though it is by no means the only place options can be set. The suite also shares a common command line parser to provide a uniform environment.

linux documentation

OpenVPN Access Server: Authentication options and command line configuration Sept. 5, 2019, 11:48 a.m.

In the Admin UI under “Authentication" it is possible to select one of 4 methods for authenticating user credentials; LOCAL, PAM, RADIUS or RADIUS. This can be done by changing the configuration key auth.module.type. This configuration key is not optional and is by default set to PAM. With LDAP and RADIUS additional settings are required to be able to authenticate users, for example which server to contact and any required shared secret code to be able to access the external authentication backend.

security documentation openvpn networking

Automatic Updates Aug. 29, 2019, 5:23 p.m.

The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates. To configure unattended-upgrades, edit /etc/apt/apt.conf.d/50unattended-upgrades. To enable automatic updates, edit /etc/apt/apt.conf.d/20auto-upgrades.

documentation sysadmin ubuntu

Logging Cheat-Sheets Aug. 29, 2019, 5:21 p.m.

In looking into compromised systems, often what is needed by incident responders and investigators is not enabled or configured when it comes to logging.  To help get system logs properly Enabled and Configured, below are some cheat sheets to help you do logging well and so the needed data we all need is there when we look.

documentation sysadmin tips

UniFi Controller API Aug. 16, 2019, 9:23 p.m.

Documentation of API endpoints on the UniFi controller software. This is a reverse engineering project that is based on browser captures, jar dumps, and reviewing other software that has been written to work with the controller. It's received minimal testing.

ubiquiti documentation api

User Rights Assignment Oct. 31, 2017, 8:19 a.m.

User rights govern the methods by which a user can log on to a system. User rights are applied at the local computer level, and they allow users to perform tasks on a computer or in a domain. User rights include logon rights and permissions. Logon rights control who is authorized to log on to a computer and how they can log on. User rights permissions control access to computer and domain resources, and they can override permissions that have been set on specific objects. User rights are managed in Group Policy under the User Rights Assignment item.

documentation windows security

TechNet Library Home Oct. 30, 2017, 4:13 p.m.

The TechNet Library contains technical documentation for IT professionals using Microsoft products, tools, and technologies.

microsoft windows documentation

Windows Protocols Oct. 30, 2017, 4:11 p.m.

The Windows Protocols documentation contains detailed technical specifications for Microsoft protocols that are implemented and used by Windows to interoperate or communicate with other Microsoft products. It also contains technical specifications for extensions to industry-standard and other published protocols that are used by Windows. In addition, the documentation includes a set of companion technology overview and reference documents that supplement the technical specifications with conceptual background, overviews of inter-protocol relationships and interactions, and technical reference information.

microsoft documentation

[MS-GPAC]: Group Policy: Audit Configuration Extension Oct. 16, 2017, 1:56 p.m.

Documentation for Group Policy: Audit Configuration Extension, which provides a mechanism for an administrator to control audit policies on clients.

active directory documentation group policy windows

Python strftime reference May 20, 2017, 8:39 p.m.

Python's strftime directives, built automatically from the Python strftime docs.

documentation cheatsheet python

AWS Service Actions and Condition Context Keys for Use in IAM Policies May 18, 2017, 4:19 p.m.

Each AWS service can provide actions and condition context keys for use in IAM policies. Not all API actions defined by a service can be used in an IAM policy, and a service might define some permissions that don't directly correspond to an API action. Use this list to determine which actions can be used as permissions in an IAM policy.

documentation aws

Cat-v.org Random Contrarian Insurgent Organization March 22, 2017, 2:21 p.m.

Cat-v.org hosts a series of sites dedicated to diverse subjects that share an idiosyncratic intellectual perspective, questioning orthodoxy and fomenting elitism and high standards in topics from software design to politics, passing by art and journalism and anything else interesting.

Other than total and complete world domination, the overriding goal is to encourage and stimulate critical and independent thinking.

documentation quotes programming internet

BookStack Dec. 11, 2016, 10:40 p.m.

BookStack is a simple, self-hosted, easy-to-use platform for organising and storing information.

documentation sysadmin server tools