How to set up your own Arma Reforger Conflict server on Windows.
How to set up a Conflict Server in Arma Reforger using the dedicated server component.
How to set up a Conflict Server in Arma Reforger using the dedicated server component.
Assuming your grub is installed correctly you need to re-generate its configuration. In a terminal, the steps to do this are as follows. You need to mount the partition in a chroot. This can be done quickly when using a Linux Mint live DVD. Escalate your shell to root because you will need root privileges … Read more
The ZSH shell is a very customizable shell to use, and a good alternative to bash. There are a few associated files that can be used to personalize your ZSH shell. The ~/.zlogin file is read when a user logs into a Linux account. This can be used to run commands when a terminal is … Read more
This is my very old .fvwm2rc I used to use. This should be very useful for anyone who is interested in using this very old desktop environment. ~/.fvwm2rc1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 … Read more
Some very useful bash shell tips for using the Linux shell in 2022. These are the best way to use the shell quickly and efficiently.
This iptables config will map the 10.8.0.0 IP address to the 54.66.223.254 IP address range to enable the OpenVPN deamon to function. This is what I used when I was using OpenVPN to connect securely to a remote Amazon instance for access to a Linux virtual machine. # Generated by iptables-save v1.4.21 on Sun Feb … Read more
Linux configuration files Here are a few useful Linux configuration files to get your installation setup and working just fine. ~/.vimrc. This is to setup the VIM editor and make it easier to use for the average Linux user. " ~/.vimrc (configuration file for vim only) " skeletons function! SKEL_spec() 0r /usr/share/vim/current/skeletons/skeleton.spec language time en_US … Read more
To setup an SSH login on your Linux machine that does not require a password and uses SSH host keys instead, follow this simple guide. Firstly, generate a set of keys for your SSH login. ubuntu ~/Documents $ ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/home/ubuntu/.ssh/id_rsa): /home/ubuntu/Documents/id_rsa Enter … Read more
Private Internet Access with OpenVPN.
This guide I just used used allows a Linux user to disable the password and enable SSH keys to manage logins to an SSH server. http://lani78.com/2008/08/08/generate-a-ssh-key-and-disable-password-authentication-on-ubuntu-server/. This is very useful, you can access your machine remotely and without requiring the user to remember a complex password. if you are on Windows, the Bitvise SSH client … Read more
This is a working PPTP configuration I used to connect two Mikrotik routers together using a PPTP configuration on a local LAN. # jan/01/2002 01:56:00 by RouterOS 6.2 # software id = 8HHI-TYLD # /interface bridge add admin-mac=D4:CA:6D:31:02:53 auto-mac=no l2mtu=1598 name=bridge-local \ protocol-mode=rstp /interface wireless set 0 band=2ghz-b/g/n channel-width=20/40mhz-ht-above disabled=no distance=\ indoors l2mtu=2290 mode=ap-bridge ssid=MikroTik-310257 … Read more
Securing your Linux computer with iptables is a great way to make sure that you are safer from Internet attacks. The iptables(8) system is the built in firewall for a Linux system. This makes it very easy to secure your computer. Before you change any settings, backup your iptables configuration. iptables-save > backup.confiptables-save > backup.conf … Read more
The MyUnity configuration tool is a useful utility to configure the Unity desktop the way you wish. The utility may be installed on Ubuntu by typing sudo apt-get install myunity, then run myunity to load the application and configure away. With additions like this, that really should be integrated into the system settings control panel, … Read more