Soluții

Setting up a Telegram bot

Setting up a Telegram bot allows you to send real-time notifications, automate tasks, and integrate with other systems. It’s easy to use, cost-effective, and provides secure communication. Bots are great for things like system alerts, user engagement, and simple automations, all within the familiar Telegram interface.

[mai mult...]

How to manually delete temporary files on macOS

Software generates temporary files for short-term data storage. Deleting these files can optimize disk space and system performance.

1. Open Finder

2. Go to the Library folder, which is hidden by default

3. Navigate to the following directories and delete temporary files:

/Library/Caches

/Users/YourUserName/Library/Caches

[mai mult...]

Cum creați și utilizați legături simbolice pe Linux

Legăturile simbolice sunt, practic, comenzi rapide avansate. Un link simbolic pe care îl creați va părea a fi același cu fișierul sau folderul original către care indică, chiar dacă este doar un link.De exemplu, să presupunem că aveți un program care are nevoie de fișierele sale stocate la /home/user/.program. Dar doriți să stocați acele fișiere pe o altă partiție, care este montată la /mnt/partition.

Puteți muta directorul .program în /mnt/partition/.program și apoi creați o legătură simbolică la /home/user/.program care să indice către /mnt/partition/.program. Programul va încerca să acceseze folderul său la /home/user/.program, iar sistemul de operare îl va redirecționa către /mnt/partition/.program.

Acest lucru este complet transparent pentru sistemul de operare și pentru programele pe care le utilizați. Dacă navigați la directorul /home/user/.program într-un manager de fișiere, acesta va părea că conține fișierele din /mnt/partition/.program.Pe lângă „legăturile simbolice”, cunoscute și sub denumirea de „legături soft”, puteți crea în schimb o „legatură rigidă”. O legătură simbolică sau soft indică o cale în sistemul de fișiere.

De exemplu, să presupunem că aveți un link simbolic (sau „soft”) de la /home/examplefile care indică către /var/examplefile. Dacă mutați fișierul la /var/examplefile, linkul de la /home/examplefile va fi întrerupt. Cu toate acestea, dacă creați o „legatură rigidă”, aceasta va indica de fapt către inodul subiacent al sistemului de fișiere. Deci, dacă ați creat un link hard din /home/examplefile care indică către /var/examplefile și ulterior mutați /var/examplefile, linkul de la /home/examplefile va indica în continuare fișierul, indiferent unde l-ați mutat. Hard link-ul funcționează la un nivel inferior.

[mai mult...]

Create an inbound ICMP rule with Firewall – Windows

This type of rule allows ICMP requests and responses to be received by devices on the network. To create an inbound ICMP rule:

  1. Open the Windows Firewall with Advanced Security console
  2. In the navigation pane, select Inbound Rules
  3. Select Action, and then select New rule
  4. On the Rule Type page of the New Inbound Rule Wizard, select Custom, and then select Next
  5. On the Program page, select All programs, and then select Next
  6. On the Protocol and Ports page, select ICMPv4 or ICMPv6 from the Protocol type list. If you use both IPv4 and IPv6 on your network, you must create a separate ICMP rule for each
  7. Select Customize
  8. In the Customize ICMP Settings dialog box, do one of the following:
    • To allow all ICMP network traffic, select All ICMP types, and then select OK
    • To select one of the predefined ICMP types, select Specific ICMP types, and then select each type in the list that you want to allow. Select OK
    • To select an ICMP type that does not appear in the list, select Specific ICMP types, select the Type number from the list, select the Code number from the list, select Add, and then select the newly created entry from the list. Select OK
  9. Select Next
  10. On the Scope page, you can specify that the rule applies only to network traffic to or from the IP addresses entered on this page. Configure as appropriate for your design, and then select Next
  11. On the Action page, select Allow the connection, and then select Next
  12. On the Profile page, select the network location types to which this rule applies, and then select Next
  13. On the Name page, type a name and description for your rule, and then select Finish.
[mai mult...]

Create inbound & outbound port rule in Firewall – Windows

This type of rule allows any program that listens on a specified TCP or UDP port to receive network traffic sent to that port. To create an inbound port rule:

  1. Open the Windows Firewall with Advanced Security console
  2. In the navigation pane, select Inbound Rules
  3. Select Action, and then select New rule
  4. On the Rule Type page of the New Inbound Rule Wizard, select Custom, and then select Next

Although you can create rules by selecting Program or Port, those choices limit the number of pages presented by the wizard. If you select Custom, you see all of the pages, and have the most flexibility in creating your rules.

  • On the Program page, select All programs, and then select Next

This type of rule is often combined with a program or service rule. If you combine the rule types, you get a firewall rule that limits traffic to a specified port and allows the traffic only when the specified program is running. The specified program cannot receive network traffic on other ports, and other programs cannot receive network traffic on the specified port.

  1. On the Protocol and Ports page, select the protocol type that you want to allow. To restrict the rule to a specified port number, you must select either TCP or UDP. Because this is an incoming rule, you typically configure only the local port number If you select another protocol, then only packets whose protocol field in the IP header match this rule are permitted through the firewall.
    To select a protocol by its number, select Custom from the list, and then type the number in the Protocol number box.
    When you have configured the protocols and ports, select Next.
  2. On the Scope page, you can specify that the rule applies only to network traffic to or from the IP addresses entered on this page. Configure as appropriate for your design, and then select Next
  3. On the Action page, select Allow the connection, and then select Next
  4. On the Profile page, select the network location types to which this rule applies, and then select Next

If this GPO is targeted at server computers running Windows Server 2008 that never move, consider modifying the rules to apply to all network location type profiles. This prevents an unexpected change in the applied rules if the network location type changes due to the installation of a new network card or the disconnection of an existing network card’s cable. A disconnected network card is automatically assigned to the Public network location type.

  1. On the Name page, type a name and description for your rule, and then select Finish

Create an outbound port rule

By default, Windows Firewall allows all outbound network traffic, unless it matches a rule that prohibits the traffic. This type of rule blocks any outbound network traffic that matches the specified TCP or UDP port numbers. To create an outbound port rule:

  1. Open the Windows Firewall with Advanced Security console
  2. In the navigation pane, select Outbound Rules
  3. Select Action, and then select New rule
  4. On the Rule Type page of the New Outbound Rule wizard, select Custom, and then select Next

Although you can create rules by selecting Program or Port, those choices limit the number of pages presented by the wizard. If you select Custom, you see all of the pages, and have the most flexibility in creating your rules.

  1. On the Program page, select All programs, and then select Next
  2. On the Protocol and Ports page, select the protocol type that you want to block. To restrict the rule to a specified port number, you must select either TCP or UDP. Because this rule is an outbound rule, you typically configure only the remote port number If you select another protocol, then only packets whose protocol field in the IP header matches this rule are blocked by Windows Defender Firewall. Network traffic for protocols is allowed as long as other rules that match don’t block it. To select a protocol by its number, select Custom from the list, and then type the number in the Protocol number box. When you’ve configured the protocols and ports, select Next
  3. On the Scope page, you can specify that the rule applies only to network traffic to or from the IP addresses entered on this page. Configure as appropriate for your design, and then select Next
  4. On the Action page, select Block the connection, and then select Next
  5. On the Profile page, select the network location types to which this rule applies, and then select Next
  6. On the Name page, type a name and description for your rule, and then select Finish.
[mai mult...]