How to set the NTP client on a Mikrotik router using the Terminal /system ntp client set enabled=yes primary-ntp=###.###.###.### secondary-ntp=###.###.###.### Change the ### for IP address’s Once done use the below to check if the settings has been applied /system ntp client print Below are two IP addresess for NTP […]
This post shows how to find out what version of Centos you are running from the command line. tail /etc/redhat-release This will output the version in a simple format: Centos release 5.10 (Final)
This is the command to remove a folder/directory including its contents, use with caution as you wont get an “are you sure” prompt rm -rf example In the above example it would delete a folder/directory called example. Just change that to your folder/directory name. The below code will do the […]
The below example shows a simple port forward that is forwarding TCP, Port 32400 (Plex) to the internal address 192.168.88.250 (Plex Media Server) This string is entered into the console. /ip firewall nat add action=dst-nat chain=dstnat disabled=no dst-port=32400 in-interface=ether1-gateway protocol=tcp to-addresses=192.168.88.250 to-ports=32400
If you have locked down the web management port to 1 IP address and you need to access it from a different IP you can telnet to the router and using the below commands remove the secured Ip address allowing access from the web gui from any IP. sys server […]
There seems to be a bug in the Draytek 2860 router, even though I had changed the management ports from the default 80 and 443 to 8080 and 8080. I was still unable to port forward any 443 traffic and would end up getting an 404 error page from the […]
This tcpdump command will grab the first 1024 bytes (vs. smaller 68 or so) and line buffer the output for all packets using port 80 (http) tcpdump -s 1024 -l -A port 80
When moving mailboxes from Exchange x to Exchange 2010 the bad item limit is set at max of 50, if you have a mailbox that has more bad items than that you can do the move request via the Exchange Management Shell using the below command New-MoveRequest -Identity ‘Alias […]
We use cookies to optimise our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.