Setting up Conky on Ubuntu 16.04LTS for the Clevo P751DM2-G
System Information:
We extract this with inxi:
installation:
sudo apt-get install inxi
| /* | |
| Koi-Koi Traditional User Styles | |
| version 20210107 | |
| readme https://forum.boardgamearena.com/viewtopic.php?f=78&t=14148 | |
| by Matt Sephton | |
| https://boardgamearena.com/player?id=85048132 | |
| https://twitter.com/gingerbeardman |
| "use strict"; | |
| function on_new_sub(name, text) | |
| { | |
| if(text == null || text == "") | |
| return; | |
| var newtext = ""; | |
| for(var i = 0; i < text.length; i += 1) | |
| { | |
| var c = text[i]; |
| #! /usr/local/bin/ruby | |
| #********************************************* | |
| # Ruby script to calculate a simple regression curve. | |
| # : y = a + b * ln(x) | |
| # : 連立方程式を ガウスの消去法で解く方法 | |
| #********************************************* | |
| # | |
| class Array | |
| def reg_curve_ln(y) | |
| # 以下の場合は例外スロー |
Setting up Conky on Ubuntu 16.04LTS for the Clevo P751DM2-G
System Information:
We extract this with inxi:
installation:
sudo apt-get install inxi
| # fail2ban filter configuration for nginx, by Sander | |
| # 1) Catch WordPress related requests (we don't have WordPress on this server) | |
| # 2) Catch requests for certain scripts we don't host | |
| # 3) Catch script requests we don't host | |
| # 4) Catch referer spam | |
| [Definition] | |
| failregex = ^<HOST> .* "(GET|POST|HEAD) /+(?i)(wp(-|/)|xmlrpc\.php|\?author=1) | |
| ^<HOST> .* "(GET|POST|HEAD|PROPFIND) /+(?i)(a2billing|admin|apache|axis|blog|cfide|cgi|cms|config|etc|\.git|hnap|inc|jenkins|jmx-|joomla|lib|linuxsucks|msd|muieblackcat|mysql|myadmin|n0w|owa-autodiscover|pbxip|php|pma|recordings|sap|sdk|script|service|shell|sqlite|vmskdl44rededd|vtigercrm|w00tw00t|webdav|websql|wordpress|xampp|xxbb) |
| { | |
| "desc": "kanji frequency for NHK News Web Easy, 1855 articles from 2014-12-02 to 2016-07-15", | |
| "source": "https://gist.github.com/adrian17/836b97ee5740b20e63edbe35251d6bc1", | |
| "label": "easy news", | |
| "total": 158118, | |
| "list": [ | |
| [ | |
| "人", | |
| 5093 | |
| ], |
| #!/bin/bash | |
| # === INFO === | |
| # NoVPN | |
| # Description: Bypass VPN tunnel for applications run through this tool. | |
| VERSION="3.0.0" | |
| # Author: KrisWebDev | |
| # Requirements: Linux with kernel > 2.6.4 (released in 2008). | |
| # This version is tested on Ubuntu 14.04 and 19.10 with bash. | |
| # Main dependencies are automatically installed. |
| # Source: | |
| # https://www.cloudflare.com/ips | |
| # https://support.cloudflare.com/hc/en-us/articles/200169166-How-do-I-whitelist-CloudFlare-s-IP-addresses-in-iptables- | |
| for i in `curl https://www.cloudflare.com/ips-v4`; do iptables -I INPUT -p tcp -m multiport --dports http,https -s $i -j ACCEPT; done | |
| for i in `curl https://www.cloudflare.com/ips-v6`; do ip6tables -I INPUT -p tcp -m multiport --dports http,https -s $i -j ACCEPT; done | |
| # Avoid racking up billing/attacks | |
| # WARNING: If you get attacked and CloudFlare drops you, your site(s) will be unreachable. | |
| iptables -A INPUT -p tcp -m multiport --dports http,https -j DROP |
| # | |
| # Auth filter /etc/fail2ban/filter.d/nginx-auth.conf: | |
| # | |
| # Blocks IPs that makes too much accesses to the server | |
| # | |
| [Definition] | |
| failregex = ^<HOST> -.*"(GET|POST).*HTTP.*" | |
| ignoreregex = |