Aide-mémoire des équivalences entre bougies d’allumage

Modèle HusqvarnaRemplace les modèlesTaille de la clé à bougie (mm)
HQT-1Champion RCJ7Y, NGK BPMR7A, Bosch WSR7F, Brisk PR17YC, Torch L7RTC19
HQT-2Champion RCJ6Y, NGK BPMR8A, Bosch WSR5F, Brisk PR15YC, Torch L8RTC19
HQT-3NGK CMR6H, Bosch USR7AC, Brisk TR15C16
HQT-4Champion RY4C, NGK CMR6A, Brisk SR15C, Torch AC6RA16
HQT-5Champion RZ7C, NGK CMR7H, Bosch USR4AC, Brisk TR14C, Torch CMR7H16
HQT-6Champion RJ19LM, NGK BR2LM, Bosch WR11E0, Brisk JR19, Briggs & Stratton 992302, Kawasaki E 9207 02055, Torch BR2LM21
HQT-7Champion RN9YC, NGK BPR6ES, Bosch WR7DC, Brisk LR15YC, Honda 98079-55871, Kawasaki E 9207 02077, Torch F6RTC21
HQT-8NGK CMR5H, Brisk TR17C16
HQT-9Champion RC12YC, NGK BCPR5ES, Bosch FR8DC, Brisk DR17YC, Briggs & Stratton 792015/992304/692720, Kohler 1213202, Torch K5RTC16
HQT-10Champion RDJ8J, NGK BMR6F, Brisk UR17, Torch N6RC16

Informations non contractuelles, à faire vérifier par un professionnel.

Source

Installer Transmission sur OMV5

Install transmission

sudo apt-get install transmission-cli transmission-common transmission-daemon

Configure

There are many settings which can be configured. This how-to focus on tweaking the default configuration file for use with Debian/Ubuntu server. transmission-daemon will start automatically each time you start your server, with the settings defined in /var/lib/transmission-daemon/info/settings.json

Make sure the Transmission daemon is not running when changing the config file otherwise your changes will be over written.

sudo service transmission-daemon stop
edit /var/lib/transmission-daemon/info/settings.json
sudo nano /var/lib/transmission-daemon/info/settings.json

Watch dir
"watch-dir": "/srv/dev-disk-by-label-ssd/transmission/aux_aguets",
"watch-dir-enabled": true,

Username and Password

The default web/rpc-username and password is “transmission

Change if increased security is required

Change it to whatever you want (any password will work). After next restart the password will be rewritten in SHA1 encrypted format for security reasons.

"rpc-password": "{62b16db87b89a91dd49a5110a7cafc06d20eb4f2wtK6kqPj",
"rpc-username": "transmission",

Whitelist
This must be changed for remote access. rpc-whitelist defines access to transmission. Localhost (127.0.0.1) is defined by default. I added ,192.268.*.* to allow any machine on my LAN access.

"rpc-whitelist": "127.0.0.1,192.168.*.*",

“umask” parameter
You will also have to set the “umask” parameter in Transmission’s settings file to “2” (default is 18) for the account user to have full access to files/folders created by Transmission.

"umask": 2,

Transmission Restart
After configuration change, restart transmission

sudo service transmission-daemon start

Default File Directory
Place a torrent file in this directory for automatic file download

/var/lib/transmission-daemon/downloads/

Configure Users and Permissions
It is recommended that Transmission runs under it’s own username for security reasons. This creates a few issues with file and folder access by Transmission as well as your account (let us assume it is user). Add the username user to the group debian-transmission:

sudo usermod -a -G debian-transmission user

NOTE: Change “user” to you own Ubuntu user login name.

NOTE: When adding a user to a new group, the user must log out and log back in for it to take affect. A reboot will also accomplish this.

Starting and Stopping Transmission Daemon
After install Transmission, the daemon will be started automatically (but not accessible yet). You can start and stop Transmission daemon using the following commands

sudo service transmission-daemon start
sudo service transmission-daemon stop
sudo service transmission-daemon reload

Note:Restarting (or reloading) Transmission daemon can be tricky. Restarting the the daemon (while it is already running) would rewrite the Transmission settings files to its original state. In other words, restarting the Transmission daemon would reset all the custom settings you saved.

Bash Aliases
Create shortcuts add the following bash aliases to /home/user/.bash_aliases

sudo nano /home/user/.bash_aliases
alias t-start='sudo service transmission-daemon start'
alias t-stop='sudo service transmission-daemon stop'
alias t-reload='sudo service transmission-daemon reload'
alias t-list='transmission-remote -n 'transmission:transmission' -l'
alias t-basicstats='transmission-remote -n 'transmission:transmission' -st'
alias t-fullstats='transmission-remote -n 'transmission:transmission' -si'

source /home/user/.bash_aliases

Example

user@SVR:~$ t-list

will run

transmission-remote -n 'transmission:transmission' -l

Web Interface
With your browser you can now add torrents, download and seed. You can also configure many transmission settings.

http://server-ip:9091

Port Forward

If you port says “closed” you will need to configure your internet router to forward the correct port to your Transmission server/client. Google “How to port forward”

If you don’t use “Port Forward” another option is “UPnP”. Once again this depends on you internet router setup.

Command Line Interface
With a headless server full control of Transmission requires CLI

Transmission Create
Create a torrent file with transmission CLI. Torrent files can be generated from either a single file or directories. The example below is a directory example

transmission-create -o /var/lib/transmission-daemon/downloads/files.torrent -c "My comments" -t udp://tracker.openbittorrent.com:80 -t udp://open.demonii.com:1337 -t udp://tracker.coppersurfer.tk:6969 -t udp://tracker.leechers-paradise.org:6969 ~/torrent/complete/
-o /var/lib/transmission-daemon/downloads/files.torrent

New torrent name and where to store the torrent

-c “My comments”

Any comments to be attached to the file

-t udp://tracker.openbittorrent.com:80

-t udp://open.demonii.com:1337

-t udp://tracker.coppersurfer.tk:6969

-t udp://tracker.leechers-paradise.org:6969

Trackers for the torrents, more than one tracker is recommended in case one or more goes down.

~/torrent/complete/

Directory to be made into a torrent. If a single file is required use this format “/var/lib/transmission-daemon/downloads/MyFile.txt”

For more information about “transmission-create”

transmission-create -h

Add a Torrent
To add a torrent to the daemon, use this command:

transmission-remote -a [path to file].torrent
transmission-remote -n 'transmission:transmission' -a /var/lib/transmission-daemon/downloads/files.torrent 

Torrent Information
Display information about torrent’s being downloaded

List all torrents
Note Authentication is required

transmission-remote -n 'username:password' -l
transmission-remote -n 'transmission:transmission' -l 

Basic Stats All Torrents

transmission-remote -n 'transmission:transmission' -st
transmission-remote -n 'transmission:transmission' -q

Sources :
https://tweenpath.net/installing-transmission-torrent-client-debian/
https://www.unixmen.com/transmission-daemon-setting-transmission-web-debian/

Finstere Flure

Règles en français

Se connecter à un fournisseur VPN


There are easy ways to connect to your VPN from Ubuntu. A lot of VPNs provide excellent Linux clients. Even if they don’t, you can use the Network Manager applet to set up a VPN connection. However, if you want to connect without a GUI or you want your connection to run automatically as a service for all users, those options won’t really work.

Most of the best VPN services are built on OpenVPN. OpenVPN is a free and open-source VPN server that you can actually use to set up your own VPN. There’s no need to do that, though. You only need the client part of OpenVPN.

When you install OpenVPN on Ubuntu, you also get the client. You can use the OpenVPN client to connect to any OpenVPN server, regardless of the VPN service or whether they have a GUI client or not. OpenVPN is a service, so it can run on startup on your computer, which means you don’t have to remember to start it up, and you won’t have to configure the connection separately for every user.
Install OpenVPN

Before you can connect to your VPN service, you need to install OpenVPN on Ubuntu. It’s available right in the repositories, so use apt to get that.

sudo apt install openvpn

You can also install Openvpn from your package manager, regardless of the distro you are using.
Download Your VPN Configuration

Most VPN providers have available configurations for OpenVPN. Check to see if your VPN provider supports OpenVPN (it probably does) and look around for their configuration files.

VPN Provider Downloads

They may have a page dedicated to providing them, or they might just have a big “.zip” package with all of their available configurations. Either way, you can download what you want or need. If they are individual files, they’re usually named after the server location, and they end in the “.ovpn” extension.
Copy the Configuration

Once you have your file or archive, you’ll need to place it in OpenVPN’s directory. If you need to extract the files from a zip file, do that first.

unzip openvpn.zip

Copy the file to the OpenVPN directory and rename it “openvpn.conf.”

sudo cp ~/Downloads/OpenVPN/’Northeast US.ovpn’ /etc/openvpn/openvpn.conf

Your path and file name will be different. The examples here are made up, but a lot of VPNs use a structure like the examples.
Automatic Login

It sort of defeats the purpose of having OpenVPN start automatically if you need to enter your username and password every time you connect. Thankfully, OpenVPN supports automatic login with a file.

OpenVPN Configuration

Open “/etc/openvpn/openvpn.conf” with sudo. Look for a line that contains “auth-user-pass.” It’ll probably be sitting there alone with nothing else on the line. After it, add “auth.txt” on the same line. Save the file and close it.

Create a new file in “/etc/openvpn” called “auth.txt.” On the first line of the file, place your username. Include your password on the second line. There is no need for anything else in the file. Save and close it.
Restart and Test

That’s all you need to do to connect to your VPN. Restart the OpenVPN service for the changes to take effect.

OpenVPN Service Running

sudo systemctl restart openvpn

To make sure that OpenVPN starts up every time you start your computer, enable it with systemd. It is probably already enabled, but it’s not a bad idea to double-check.

sudo systemctl enable openvpn

DNS Leak Test Result

Finally, test out your VPN connection with dnsleaktest.com. When you arrive at the site, you should see the IP address and location of your VPN. Click on the button below to run the extended test and see that no DNS information is leaking out.

Majuscules accentuées : un aide-mémoire

Tableau de Combinaisons de Touches
Lettres à saisirCombinaison de touchesLettres à saisirCombinaison de touches
ÁALT 0193ÍALT 0205
ÂALT 0194ÌALT 0204
ÀALT 0192ÎALT 0206
ÄALT 0196ÏALT 0207
æALT 0230ÔALT 0212
ÆALT 0198ÖALT 0214
ÇALT 0199ŒALT 0140
ÉALT 0201œALT 0156
ÈALT 0200ÚALT 0218
ÊALT 0202ÙALT 0217
ËALT 0203ÛALT 0219
ÜALT 0220

Horaires des déchèteries du Pays Solesmois

Pour un accès facilité aux informations car j’ai toujours du mal à les trouver en ligne quand j’en ai besoin. Attention, ces horaires changent régulièrement.

JoursSolesmesBermerain
LUNDI13H30-18H13H30-17H
MARDI8H30-12H / 13H30-18HFERMÉE
MERCREDI8H30-12H / 13H30-18H8H30-12H / 13H30-17H
JEUDI8H30-12H / 13H30-18HFERMÉE
VENDREDI8H30-18H13H30-17H
SAMEDI8H30-18H8H30-12H / 13H30-17H
DIMANCHEFERMÉEFERMÉE
« jusqu’au 31/10/2024 »

Source : SIAVED


Mise à jour : 07/07/2024

Vérifier que les requêtes DNS sont protégées par DNSSEC

Après avoir configuré un serveur DNS, par exemple Cloudflare ou Quad9, il est possible de vérifier si les connections sont bien protégées en se rendant à cette adresse :

Lire la suite : Vérifier que les requêtes DNS sont protégées par DNSSEC

https://dnscheck.tools/

Supermodel Stitches – Tension.

Calculer une somme de contrôle facilement sous Windows avec OpenHashTab

https://github.com/namazso/OpenHashTab/releases

À propos

OpenHashTab est une extension qui permet de calculer et vérifier les sommes de contrôle de vos fichiers.

Caractéristiques

  • 28 algorithmes supportés
  • Calculs à haute performance
  • Intégration parfaite au menu contextuel de Windows avec une entrée nommée « Sommes »
  • Support des chemins longs
  • Multilingue
  • Vérification des hashes avec VirusTotal par un bouton
  • Comparaison possible avec un fichier de hash (supportés : hex hash next to file, sortie *sum (hex or base64), corz .hash, SFV)
  • Export du hash vers un fichier ou le presse-papier (supportés : *sum, corz .hash, SFV)
  • Menu contextuel optionnel
  • Associations de fichiers

System requirements

  • Windows 7 ou plus récent (x86 / x64 / ARM64)
  • 1 GB RAM ou plus

Usage

Most of the actions should be obvious. Some not-so-obvious features are listed here:

  • You can select multiple files or folders, all files will be hashed, directories traversed
  • Double click hash to copy it
  • Double click name or algorithm to copy the line in sumfile format
  • Right click for popup menu: copy hash, copy filename, copy line, copy everything
  • The counters next to the status text is in the format (match/mismatch/nothing to check against/error)
  • Columns sort lexographically, except the hash column which sorts by match type
  • Selecting the tab on a sumfile will interpret it as such and hash the files listed in it.
  • If a hashed file has a sumfile with same filename plus one of the recognized sumfile extensions and the option for it is enabled, the file hash is checked against it.

Algorithmes

  • CRC32, CRC64 (xz)
  • xxHash (XXH32, XXH64)
  • xxHash3 (64 et 128 bit)
  • MD4, MD5
  • RipeMD160
  • Blake2sp
  • SHA-1
  • SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512)
  • SHA-3 (SHA3-224, SHA3-256, SHA3-384, SHA3-512)
  • BLAKE3 (256 bit, 512 bit)
  • KangarooTwelve (264 bit, 256 bit, 512 bit)
  • ParallelHash128 (264 bit) et ParallelHash256 (528 bit)
  • Streebog (GOST R 34.11-12) (256 bit, 512 bit)

Les meilleures images pour Atomic Pi

http://ehxz.tk/atomicpi
https://www.digital-loggers.com/downloads/index.html#API_IMAGES