Sec&Stuff&Others

My Tech Note's

TextBelt A free, open source API for outgoing texts.

TextBelt

A free, open source API for outgoing texts.

Maintained by Ian Webster. Open source on github.

TextBelt is a REST API that sends outgoing SMS. It is available as a public service or as an internally self-hosted server.

Textbelt uses carrier-specific gateways to deliver your text messages for free, and without ads. The service is fairly reliable and has sent over 1 million texts.

Send a text with a simple POST request:

 

Simple PHP contact form with Google reCaptcha

So, *everyone* needs a simple form to send emails, via PHP, but we also need a protection agains bots/spammers.
This is code that i’v grabbed from codeforgeek and improved since the original had a few errors that made it impossible to run/work/send email.

It uses Google reCaptcha and you need to register you site/domain on it and grab the site key and the secret key.

The form already has twitter bootstrap classes… but you can remove them! :)

The form.php – at the begin
<?php
	$to      = '[email protected]';
	$subject = 'Support Message';

	// keys from Google reCaptcha https://www.google.com/recaptcha/admin
	$sitekey = 'recaptcha_site_key';
	$secretkey = 'recaptcha_secret_key';

	$alert = '';
	if ($_SERVER['REQUEST_METHOD'] == 'POST')
	{
		$email;$message;$captcha;
		if(isset($_POST['email']))
        			$email=$_POST['email'];
		        if(isset($_POST['message']))
        			$message=$_POST['message'];
			if(isset($_POST['g-recaptcha-response']))
        		$captcha=$_POST['g-recaptcha-response'];

	        	if(!$captcha)
        		$alert = '<div class="alert alert-warning" role="alert">Please wait until the captcha protection give you a check mark.</div>';

        	$response=json_decode(file_get_contents("https://www.google.com/recaptcha/api/siteverify?secret='.$secretkey.'&response=".$captcha."&remoteip=".$_SERVER['REMOTE_ADDR']));

		if($response->success==false)
		{
			/* lets set the error message for the alert... */
			if ($alert=='')
				$alert = '<div class="alert alert-danger" role="alert">Some how you have been detected has a spammer.</div>';
        	}
		else
		{
			/* the email to you */
			$headers = 'From: '.$to.'' . "\r\n" .
                	'Reply-To: '.$email.'' . "\r\n" .
                	'X-Mailer: PHP/' . phpversion();
            		mail($to, $subject, $message, $headers);
			/* the copy of the email to the *client* */
			$headers = 'From: '.$email.'' . "\r\n" .
				'Reply-To: '.$to.'' . "\r\n" .
				'X-Mailer: PHP/' . phpversion();
			mail($email, 'COPY - '. $subject, $message, $headers);
			/* lets set the success message for the alert... */
			$alert = '<div class="alert alert-success" role="alert">Your email has been sent.</div>';
        	}
	}
?>
The html form
<?=$alert?>
<form id="comment_form" action="" method="post">
	<input name="email" type="email" placeholder="Type your email" size="40" class="form-control" value="<[email protected]$email?>" ><br><br>
	<textarea name="message" rows="8" cols="39" class="form-control"  placeholder="Your message to us..." ><[email protected]$message?></textarea><br>
	<div class="g-recaptcha" data-sitekey="<?=$sitekey?>"></div><br>
	<input type="submit" name="submit" value="Send message" class="btn btn-default"><br>
</form>

Some where at the bottom/footer…

<script src='https://www.google.com/recaptcha/api.js'></script>

 

Hope it helps anyone! :)

Esoterica – acesso externo ao MySQL em alojamentos partilhados

Em ‘tuguês…
básicamente é o seguinte:

Boa tarde,

Informamos que o acesso externo ao MySQL em alojamentos partilhados Esoterica encontra-se bloqueado por questões de segurança.

A gestão da base de dados deverá ser efectuado através do phpMyAdmin disponível no painel de controlo da sua conta de alojamento.

Se necessitar de esclarecimentos adicionais não hesite em contactar-nos.

Cumprimentos,

Setting up my MOTD on a Ubuntu 14.04.3 LTS

Some of my servers have a fancy motd…
I like them… unfortunately my new server didn’t had it.

I had to run

apt-get install landscape-common
dpkg-reconfigure landscape-common

On dkpg-reconfigure I’v selected Run sysinfo on every login.

Welcome to Ubuntu 14.04.3 LTS (GNU/Linux 3.13.0-63-generic x86_64)

* Documentation: https://help.ubuntu.com/
You have new mail.
Last login: Fri Oct 23 10:28:37 2015 from es2-84-XXX-XXX-XXX.netvisao.pt

System information as of Fri Oct 23 10:28:59 CEST 2015

System load: 0.06 Processes: 245
Usage of /: 81.9% of 411.33GB Users logged in: 1
Memory usage: 9% IP address for em0: 195.154.XXX.XXX
Swap usage: 0%

Graph this data and manage this system at:
https://landscape.canonical.com/
[email protected]:~$

To have the number of updates/security updates we need to run the following apt-get command….

sudo apt-get install update-notifier-common

This way we will see also

20 packages can be updated.
8 updates are security updates.

11354348_10153193542464733_1315224652_n

Compile iDeviceRestore on Linux

This is a guide to compiling iDeviceRestore by @p0sixninja on debian linux. It has been tested on Ubuntu 12.04 (and even the raspberry pi on raspbian!) and is working.

  1. Do any required upgrades on apt.
    sudo apt-get update
    sudo apt-get upgrade
    
  2. First, we need to get the dependencies
    sudo apt-get install build-essential automake cmake \
    libreadline6 autotools-dev libcurl4-openssl-dev autoconf \
    libplist1 libplist-utils libplist-dev libplist++-dev \
    libzip-dev git curl libgnutls-dev libreadline-dev libusb-dev \
    libtool libusb-1.0-0-dev libusbmuxd-dev libglib2.0-dev libimobiledevice-dev
    
  3. Install libirecovery
    mkdir ~/idevicerestore
    cd ~/idevicerestore
    git clone http://git.sukimashita.com/libirecovery.git
    cd libirecovery
    ./autogen.sh
    make && sudo make install
    
  4. Finally to get idevicerestore
    cd ~/idevicerestore
    git clone git://github.com/tcf38012/idevicerestore.git
    cd idevicerestore
    ./autogen.sh
    make && sudo make install
    sudo ldconfig
    
  5. Also, you might want iDeviceactivate, to activate after you have restored
    cd ~/idevicerestore
    git clone http://github.com/posixninja/ideviceactivate.git
    cd ideviceactivate
    make
    

 

soure

Using raspberrypi as a DLNA Media Server

I have a  Samsung TV. So the whole explanation below is based on this TV. I guess that it will also work for the other TV’s.

The solution given below is done with MediaTomb DLNA server.

$ sudo apt-get install mediatomb

$ vim /etc/mediatomb/config.xml

remove the comment tags around the <custom-http-headers> section and make that section look like this:

<custom-http-headers>
<add header=”transferMode.dlna.org: Streaming”/>
<add header=”contentFeatures.dlna.org: DLNA.ORG_OP=01;DLNA.ORG_CI=0;DLNA.ORG_FLAGS=017000 00000000000000000000000000″/>
</custom-http-headers>

Under <mappings>, add

<map from=”avi” to=”video/mpeg”/>

<map from=”mkv” to=”video/mpeg”/>

save and close config.xml and restart mediatomb

$ vim /etc/default/mediatomb

Add additional option

OPTIONS=” –port 49152 “

$ /etc/init.d/mediatomb restart

And now, open with firefox http://ip_raspberrypi:49152 and tell it where to start looking for files.

NGINX Plus Release 6 with Enhanced Load Balancing, High Availability, and Monitoring Features

Well!
I can’t afford a NGINX Plus yet! :)
I might need to have one in one year of thing work out like I want!

NGINX Plus looks hot!

demo-nginx-1024x708

New “Least Time” Load-Balancing Algorithm

R6Blogvisual-01-1024x590

Full-Featured TCP Load Balancing

R6Blogvisual-02-1024x361

High Availability

R6Blogvisual-03-1024x468

source

Howto make tunnel with iproute

Machine A has ip address 192.168.56.101
Machine B has ip address 192.168.56.102

You can call your tunnel whatever you like and i will  call for example tl0.

Machine A

ip tunnel add tl0 mode ipip remote 192.168.56.102 local 192.168.56.101
ip link set tl0 up
ip addr add 10.10.10.1/24 dev tl0

Machine B

ip tunnel add tl0 mode ipip remote 192.168.56.101 local 192.168.56.102
ip link set tl0 up
ip addr add 10.10.10.2/24 dev tl0

On machine A

[email protected]:~# ping 10.10.10.2
PING 10.10.10.2 (10.10.10.2) 56(84) bytes of data.
64 bytes from 10.10.10.2: icmp_req=1 ttl=62 time=0.403 ms
64 bytes from 10.10.10.2: icmp_req=2 ttl=62 time=0.397 ms
^C
— 10.10.10.2 ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 999ms
rtt min/avg/max/mdev = 0.397/0.400/0.403/0.003 ms

[email protected]:~# ping 10.10.10.1
PING 10.10.10.1 (10.10.10.1) 56(84) bytes of data.
64 bytes from 10.10.10.1: icmp_req=1 ttl=62 time=0.403 ms
64 bytes from 10.10.10.1: icmp_req=2 ttl=62 time=0.397 ms
^C
— 10.10.10.1 ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 999ms
rtt min/avg/max/mdev = 0.397/0.400/0.403/0.003 ms

and its works, but insecure 🙁

« Older posts

© 2020 Sec&Stuff&Others

Theme by Anders NorenUp ↑