Архив рубрики: OpenSUSE

Заметки про OpenSUSE

Remove password prompt in virt-manager

Solution 1

When you start virt-manager as a regular user, you may still be asked for the root password, even when you have setup the correct unix socket permissions (notification: “system policy prevents management of local virtualized systems”). This is because older versions of libvirt were using PolicyKit by default. Disable the use of PolicyKit by editing /etc/libvirt/libvirtd.conf. Uncomment the following options and change them to none :

 

Solution 2

Добавить пользователя в группу libvirt, чтобы не требовались root-права при запуске.

OpenSUSE Internet connection sharing

Internet connection sharing

Prologue

This guide assumes you have already set up your network cards with ip addresses, if you have not do this first in the YaST -> Network Devices -> Network Settings — > network card module, a good static IP for your internal NIC would be 192.168.0.254

IP forwarding

You will not be able to perform this step if you are using Network Manager and not Ifup.

Open YaST -> Network Devices -> Network Settings -> Routing and check the box marked Enable IP Forwarding

Click Finish

Select the external and internal interfaces

Open YaST — > Security & Users — > Firewall

In the Interfaces section:

Select the network card that you connect to the internet through, click change and set it to External Zone

Select the network card that is connected to the other machine(s) on your internal network that you want to share the internet to and set it to Internal Zone

Enable masquerading

Still in the Firewall YaST Module locate the Masquerading section.

Check the box labelled Masquerade Networks

Click Next and Finish

 

KVM: Starting / Stopping Guest Operating Systems With virsh Command

The virsh command can be used to mange local or remote guest operating systems. The program can be used to create, pause, and shutdown domains. It can also be used to list current domains.

List Running VMS

Type the following command:

Sample outputs:

Shut Down A Guest

Rebooting A Guest

Forcefully Stop A Guest

Force a guest to stop with the virsh command if it is not responding or crashed

Get Information About Guest

Sample outputs:

Sample Outputs:

Файлам 644 папкам 755

Перемещаемся в верхнюю директорию.
Для директорий 755 (Каждый пользователь имеет право читать и запускать на выполнение; владелец может редактировать)

Для файлов (Все пользователи имеют право чтения; владелец может редактировать)

Mount QCOW2

# Загружаем модуль ядра Network Block Device

# «Подключаем» образ к устройству /dev/nbd0.

# Ищем разделы на устройстве.

# Здесь ты можешь делать с разделами /dev/mapper/ndb0p* что угодно: монтировать, форматировать и т.п.
# Например открыть Dolphin
# ReadOnly вариант подключения:

##############################################################
# Убираем девайсы разделов.

# Выключаем qemu-nbd.

No sound thinkpad e540

Information about sound system:

su alsa-info.sh

Solution

Just in case anyone else encounters this same problem, the solution is to create the following file «/etc/modprobe.d/alsa.conf» with the contents:

Spice USB

First of all do this:

and all is OK. I’ve got USB flash disk and USB-COM cabel in my guest Windows 7 x64. And little more.
For disable asking root password for low level USB device access I made little changes in file
/usb/share/polkit-1/actions/org.spice-spice.lowlevelusbaccess.policy.
Before changes I had follow

After I have

Look man polkit for these options.
And now I have no need root password for USB redirection.

Wireshark

#Просмотр порта
tcp.port eq 1735
#Только HTTP Post
http.request.method == «POST»
#Оба вместе
tcp.port eq 1735 and http.request.method == «POST»

Show only SMTP (port 25) and ICMP traffic:



Show only traffic in the LAN (192.168.x.x), between workstations and servers — no Internet:



TCP buffer full — Source is instructing Destination to stop sending data



Filter on Windows — Filter out noise, while watching Windows Client — DC exchanges



Sasser worm: —What sasser really did—



Match packets containing the (arbitrary) 3-byte sequence 0x81, 0x60, 0x03 at the beginning of the UDP payload, skipping the 8-byte UDP header. Note that the values for the byte sequence implicitly are in hexadecimal only. (Useful for matching homegrown packet protocols.)



The «slice» feature is also useful to filter on the vendor identifier part (OUI) of the MAC address, see the Ethernet page for details. Thus you may restrict the display to only packets from a specific device manufacturer. E.g. for DELL machines only:



It is also possible to search for characters appearing anywhere in a field or protocol by using the matches operator.

Match packets that contains the 3-byte sequence 0x81, 0x60, 0x03 anywhere in the UDP header or payload:



Match packets where SIP To-header contains the string «a1762» anywhere in the header:



The matches operator makes it possible to search for text in string fields and byte sequences using a regular expression, using Perl regular expression syntax. Note: Wireshark needs to be built with libpcre in order to be able to use the matches operator.

Match HTTP requests where the last characters in the uri are the characters «gl=se»:



Note: The $ character is a PCRE punctuation character that matches the end of a string, in this case the end of http.request.uri field.

Filter by a protocol ( e.g. SIP ) and filter out unwanted IPs:

[ Feel free to contribute more ]

BASH

  1. To recursively give directories read&execute privileges:
    find /path/to/base/dir -type d -exec chmod 755 {} +
  2. To recursively give files read privileges:
    find /path/to/base/dir -type f -exec chmod 644 {} +
  3. Delete broken symlinks:
    find -L /etc/ssl/certs -type l -delete
  4. REMOVE FILES 3DAYS OLD
    find /u1/database/prod/arch -type f -mtime +3 -exec rm {} \;
  5. WGETPROXY
    wget —no-host-lookup —proxy=on 192.168.202.1:3128 —proxy-user=blablabla —proxy-passwd=blablabla
  6. TOPMEM