will.brien + sysadmin + documentation   40

Compliance Forge
We take care of the tedious and time-consuming work that is associated with writing comprehensive cybersecurity documentation. By doing this, we offer a unique service to businesses - we can provide you with semi-customized IT security documentation, based on industry-recognized leading practices that include ISO, NIST, OWASP, CSA and others. This allows you to quickly obtain professionally-written IT security documentation and you have the ability to edit this documentation for your specific needs, since it comes in Microsoft Office formats. This is beyond buying an "IT security policy template" online - these products allow you to have the same level of professional quality documentation that you would expect from hiring an IT security consultant to write it for you. Please take a few minutes and look at the examples to see for yourself!

Our comprehensive written information security documentation includes the policies and standards that businesses need to meet common information security requirements, such as PCI DSS, HIPAA, FACTA, GLBA, as well as unique requirements like FedRAMP and NIST 800-171 compliance. We've been doing this since 2005, so we have a long track record of successfully writing IT security policies and other compliance-related documentation, such as risk assessments, vulnerability assessments and audit templates. Everything we do centers around providing your company a solid set of cybersecurity policies and standards to use as a foundation to build from!
sysadmin  documentation  reference  work  government 
april 2018 by will.brien
Home · jay0lee/GAM Wiki · GitHub
GAM is a command line tool that allows administrators to manage many aspects of their Google Apps Account. This page provides simple instructions for downloading, installing and starting to use GAM.

GAM requires Google Apps Business, Education, Partner or Government Edition. Google Apps Free Edition has limited API support and not all GAM commands work.

While many GAM functions do not require domain administrative privileges, the setup does.
google  sysadmin  windows  documentation 
september 2017 by will.brien
Running commands - Ansible Tips and Tricks
Limit to one or more hosts

This is required when one wants to run a playbook against a host group, but only against one or more members of that group.

Limit to one host

ansible-playbook playbooks/PLAYBOOK_NAME.yml --limit "host1"

Limit to multiple hosts

ansible-playbook playbooks/PLAYBOOK_NAME.yml --limit "host1,host2"

Negated limit. NOTE: Single quotes MUST be used to prevent bash interpolation.

ansible-playbook playbooks/PLAYBOOK_NAME.yml --limit 'all:!host1'

Limit to host group

ansible-playbook playbooks/PLAYBOOK_NAME.yml --limit 'group1'

Limiting Tasks with Tags

Limit to all tags matching install

ansible-playbook playbooks/PLAYBOOK_NAME.yml --tags 'install'
ansible  documentation  reference  cli  sysadmin  python 
june 2017 by will.brien
Install Dropbox In An Entirely Text-Based Linux Environment - The Unofficial Dropbox Wiki
dropboxd will create a ~/Dropbox folder and start synchronizing it after this step! Go to the URL given; you should see a success message at the top of your screen.

NOTE: If you want to change the account it is linked to, unlink it from the first account, then kill the running dropbox process, start it up again (with “~/.dropbox-dist/dropboxd &”) and obtain the new host_id with dbreadconfig.py . If you don’t restart the dropbox client, it will give the same host_id (which for some reason cause me to be unable to change the account it is linked to).
linux  dropbox  cli  documentation  sysadmin 
june 2017 by will.brien
Adamj Clean-WSUS - Script Center - Spiceworks
This is the last WSUS Script you will ever need. It has the capacity to remove all drivers from the database, remove declined updates, decline superseded updates, run the SQL database maintenance, remove synchronization logs, and finally run the server cleanup wizard.
windows  sysadmin  work  documentation 
april 2017 by will.brien
Squid access.log - info on errors, status, etc.
Native Format (emulate_httpd_log off)
Timestamp Elapsed Client Action/Code Size Method URI Ident Hierarchy/From Content

Common Format (emulate_httpd_log on)
Client Ident - [Timestamp1] "Method URI" Type Size
linux  ubuntu  sysadmin  firewall  squid  proxy  documentation 
july 2010 by will.brien
Ringing multiple phones with one extensions | FreePBX
Set up a follow me on each extension you want to monitor and send the calls to both the monitored phone and the admin's phone. If necessary, tag the CID so the admin knows who the call is going to.
asterisk  voip  telephony  linux  sysadmin  tutorials  documentation 
april 2010 by will.brien
How to Remove XP AntiSpyware
AntiSpyware XP was the problem that prompted my friend to call, and it was the most hostile, insidious, and difficult-to-kill malware I've ever seen. It looked completely authentic and felt impossible to stop. Masquerading as a spyware killer itself, in the system tray, its icon was an almost perfect replica of the Windows Security Center icon. When you tried to visit a web site in Internet Explorer or do much of anything, XP AntiSpyware launched, and its window looked just like Windows Security Center. Once launched, it would start scanning your PC automatically, and tell you, in alarming red pop-ups, that dozens of files were infected and that you should delete them. There was no quit, there was no uninstallation available in Add/Remove Programs, and all the program's options in its Settings area were grayed out/disabled.
windows  sysadmin  antivirus  documentation  tutorials 
april 2010 by will.brien
Ipkall - Configuration | trixbox
First, set up your account at http://www.ipkall.com/ :

Account type: IAX
IAX User Name: ipkall
IAX Proxy: your.asterisk.box <-- Can be dyndns (probably ip will do)
Email Address: *****
Password: youripkallpassword
Seconds to Ring before Hang Up: 120

Second, setup new IAX Trunk @ FreePBX :

Under Outgoing Settings:
Trunk Name : Washington <--- Can be anything, but not ipkall

Under Incoming Settings:
USER Context: ipkall

USER Details:
insecure=very
type=user
context=from-trunk
auth=plaintext
secret=youripkallpassword

Third, setup Incoming Route:

DID Number: 1XXXXXXXXXX <---your ipkall number
Set Destination: Choose your extension

Reload!

That's it!
asterisk  voip  sip  iax  telephony  linux  sysadmin  tutorials  documentation 
april 2010 by will.brien
PiaF to Avaya IP Office 403 via H.323 - PBX in a Flash Forum
In my searching I found very little information on H.323, so I thought I would post what worked for me.

Goal: Connect PiaF to 3 different Avaya IP Office 403 units.
Problem: The 403's only support H.323, not SIP or IAX.

From a default PiaF install (used the 1.5 Beta for driver issues) I only had to do five things.

1. Edit ooh323.conf
2. Add trunks
3. Add outbound routes
4. Add new VoIP line in 403 units
5. Add short code in 403 units
asterisk  voip  h.323  telephony  linux  sysadmin  tutorials  documentation 
april 2010 by will.brien
OpenH323 - PBX in a Flash Forum
I'm fairly certain that H323 is installed on Piaf by standard. but to check, do the following.

cd /usr/src/asterisk-addons
make clean
make
make menuselect ; check H323 channel driver is enabled.
make
make install

You will need a copy of the h323 conf file, usually on a bare asterisk install you would simple do make samples, don't do it here, because it will overwrite all sorts of stuff in /etc/asterisk you don't want overwriting.

It should then be a question of configuring the h323 file to suit your carrier.
asterisk  voip  h.323  telephony  linux  sysadmin  tutorials  documentation 
april 2010 by will.brien
debian_asterisk_freepbx_script [Core Networks]
The script has been updated with the latest Asterisk versions (1.4) and now has some basic error checking for when the script is interrupted. There should be no need for manual workarounds with the new script. If it is interrupted, simply restart the script and it should recover.

*
took all the suggestions from those listed below and incorporated them into the script
*
Fixed a few typos
*
fixed dependencies with Dahdi hardware

This script will download and install Asterisk, freePBX on a debian system (currently Lenny 5.0). Have a look at the script, you will need to make sure that the versions of Asterisk listed in the script are current. If you dont change them, the script will still work, you just wont have the most recent version of Asterisk installed.

The goal was to make this as easy as possible with the least amount of user interaction.

Enjoy!
asterisk  voip  sip  telephony  linux  sysadmin  tutorials  documentation  scripts 
march 2010 by will.brien
CentOS 5 and Asterisk 1.4.x installation - voip-info.org
For reasons detailed elsewhere, you're best not using a GUI, so do the installation from the command line ('linux-text' at the GRUB prompt). When you select the packages, the only one you need is 'server'. Disk partitioning, networking etc. is all entirely up to you!

At your first login, you'll be presented with a simple administration screen. Disable SELinux and (for now) the firewall.
asterisk  voip  sip  telephony  linux  sysadmin  tutorials  documentation  xen 
december 2009 by will.brien
Compiling ztdummy on Xen - VPSLink Wiki
Make sure to setup the Xen kernel sources according to the instructions in the Installing Kernel Headers at VPSLink guide.
asterisk  voip  sip  telephony  linux  sysadmin  tutorials  documentation  xen 
december 2009 by will.brien
Asterisk in a Xen domU with ztdummy | Vancouver Linux Users Group
The problem with ztdummy under Xen is that it expects to have access to the rtc (real time clock) on x86/x86_64 systems, but that is not the case in a Xen domU. The fix is to comment out the #define USE_RTC statements in ztdummy.c so that ztdummy uses the kernel timer.

While googling I saw references to checking the HZ setting in the kernel (mine claims 250HZ in the kernel .config) and adjusting the #define ZAPTEL_RATE 1000 in ztdummy.c accordingly, however when I changed it to 250 asterisk's menu audio played back four times too quickly. Switching ZAPTEL_RATE back to 1000 solved this problem and the interactive voice menus played at the correct speed.

I wasn't quite finished. With ztdummy loaded my moh became very garbled whereas before it had played properly. Switching asterisk moh from mpg123 to files (in /etc/asterisk/musiconhold.conf) and my mp3s to 8kHz 8bit mono wav files fixed moh.

I now have Asterisk with MeetMe and moh working properly in my Xen domU.
asterisk  voip  sip  telephony  linux  sysadmin  tutorials  documentation  xen 
december 2009 by will.brien
Home of The Irish Reporting And Information Security Service
Welcome to the Irish Reporting and Information Security Service. IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland. We provide a range of services and information that you can use to better protect your information systems and to make the Irish Internet space a safer environment for all.

Our goal is to provide a range of high quality information security based services to aid Irish based organisations and citizens to better secure their information technology facilities and services in accordance with industry recognised standards and compliance requirements, to provide high quality research services on current and potential information security threats, to provide information security prevention, response and mitigation strategies and to become a recognised centre of information security excellence for national and international organisations to refer to.
ireland  security  sysadmin  organisations  networking  documentation  work 
october 2009 by will.brien
Handle VoIP Traffic with the PIX Firewall  [Cisco PIX 500 Series Security Appliances] - Cisco Systems
In this sample configuration, a PIX Firewall is configured in order to allow the traversal of two different Voice over IP (VoIP) protocols—H.323, and Session Initiation Protocol (SIP). Due to the fact that VoIP protocols are made up of signaling and IP address/port combinations, there are a number of issues with VoIP and Network Address Translations (NAT). The PIX Firewall fixup protocol addresses these issues.
sysadmin  reference  voip  cisco  pix  firewall  sip  documentation 
january 2009 by will.brien
IPtables Examples
These rulesets are in iptables-save format. I have written some simple documentation of the iptables-save format. I use this format for several reasons: it ensures there are no other rules in iptables, it loads faster, it avoids the possibility of a race condition that most iptables scripts have (although the race window would be about 1ms for most rulesets).
sysadmin  reference  faq  linux  security  networking  firewall  documentation  iptables 
december 2008 by will.brien
Configuring Squid on Linux to authenticate with Active Directory
This document describes how to configure Squid to authenticate with a Windows Active Directory and only allow Internet Access to users that are members of a particular Windows security/domain group.
sysadmin  linux  ubuntu  networking  ldap  proxy  documentation  squid 
december 2008 by will.brien
Postfix - Virtual Domain Hosting HOWTO
This document gives an overview of how Postfix can be used for hosting multiple Internet domains, both for final delivery on the machine itself and for the purpose of forwarding to destinations elsewhere. The text not only describes delivery mechanisms that are built into Postfix, but also gives pointers for using non-Postfix mail delivery software.
linux  ubuntu  sysadmin  reference  email  smtp  documentation 
august 2008 by will.brien
LDP's Advanced Bash-Scripting Guide
This tutorial assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction . . . all the while sneaking in little snippets of UNIX® wisdom and lore.
reference  programming  linux  unix  tutorials  cli  documentation  sysadmin  scripts 
april 2008 by will.brien
How-To: Image Windows XP with Ghost and Sysprep at Hisham’s Blog
Quick pointers on sysprep, but not an end-all guide... Vernalex is a PITA to look around but is more comprehensive. Still, good site.
windows  sysadmin  sysprep  software  utilities  drivers  reference  documentation  backup 
february 2008 by will.brien
Microsoft Small Business Server - Frequently Asked Questions
Welcome to Smallbizserver.Net. Numerous articles and howto's assist you in installing and maintaining Smallbusiness Server 2000 and 2003. There is a discussion forum where you can post questions, we will try to answer asap.
faq  windows  documentation  reference  sysadmin  networking  exchange  work 
december 2007 by will.brien
Unlocking Windows NT/2000/2003 Domain Controllers
Note: If you are trying to fix a server, please READ THIS ENTIRE PAGE and MAKE SURE YOU UNDERSTAND IT before touching the server.
tutorials  documentation  security  windows  sysadmin  utilities 
november 2007 by will.brien
Asterisk Nat Port Forwarding - voip-info.org
Forwarding ports 10000:20000 to the internal Asterisk server...? Okaaaaaaaaay.
asterisk  voip  documentation  networking  sysadmin  firewall 
april 2007 by will.brien
Windows 2000 Server Resource Kit
An HTML Help version of the Server Resource Kit print books. Use these online books to find the same detailed information about Windows 2000 that is found in the print versions. Search across all of the books to find the most pertinent information to comp
windows  sysadmin  documentation  certification 
august 2005 by will.brien
NetSweeper PIX Integration
How to integrate the Cisco PIX with the web-filtering software NetSweeper
documentation  firewall  cisco  sysadmin 
august 2005 by will.brien
Rosetta Stone for Unix
A Sysadmin's Unixersal Translator (ROSETTA STONE) OR "What do they call that in this world?"
documentation  linux  openbsd  unix  utilities  sysadmin  reference 
august 2005 by will.brien
Nortel: Meridian systems - Call Presentation to queue
Hi, I have just moved onto a new option 81 and have a problem with the call presentation, On the old system the headset would beep 5 times then return to queue if the agent did not manually pick up the call, On the new one I only receive a single beep, Th
programming  faq  documentation  telephony  sysadmin 
july 2005 by will.brien
Nortel: Meridian systems - Phone Not Ringning (sic)
Help! , just a quick ? , i have phones that use headset and in order for them to work the recv needs to be off the hook , the phone beeps when there's a call coming through , in a noisy enviroment it cant be heard , any way of getting the phone to still r
programming  faq  documentation  telephony  sysadmin 
july 2005 by will.brien
Nortel: Meridian systems FAQ - Tek-Tips
This is a short introduction into programming a Meridian PBX. The Meridian PBX's software divides information into LOADS. Each Load has a specific function for example. LD 20 is where you can print information about phones. The loads range from LD 01 - LD
programming  faq  documentation  telephony  sysadmin 
july 2005 by will.brien
The Art of System Administration
Main Entry: troubleshooter

1. a skilled worker employed to locate trouble and make repairs in machinery and technical equipment
2. an expert in resolving diplomatic or political disputes : a mediator of disputes that are at an impasse
3. a person skilled at solving or anticipating problems or difficulties

This is a fitting definition of a system administrator - making repairs, dealing with people, and trying to anticipate as well as prevent problems.
sysadmin  documentation  reference  work 
may 2005 by will.brien
Debian: Apt-Pinning for Beginners
Do you run Debian? Have you ever gotten annoyed at how Debian Stable always seems to be out of date?
debian  software  sysadmin  tutorials  linux  documentation 
april 2005 by will.brien
Cisco Secure PIX Firewall 6.x and Cisco VPN Client 3.5 for Windows with Microsoft Windows 2000 and 2003 IAS RADIUS Authentication [Cisco PIX 500 Series Security Appliances]
This sample configuration shows how to configure Cisco VPN Client version 3.5 for Windows and the Cisco Secure PIX Firewall for use with Microsoft Windows 2000 and 2003 Internet Authentication Service (IAS) RADIUS Server
firewall  security  sysadmin  documentation  tutorials  cisco 
april 2005 by will.brien
Troubleshooting the PIX to Pass Data Traffic on an Established IPSec Tunnel [IPSec Negotiation/IKE Protocols]
This document addresses and provides a solution to the problem of why a successfully established IPSec tunnel from a Cisco VPN Client to a PIX is unable to pass data.
firewall  security  sysadmin  documentation  tutorials  cisco 
april 2005 by will.brien
Advanced Bash-Scripting Guide
This tutorial assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction . . . all the while sneaking in little nuggets of UNIX® wisdom and lore. It serves as a textbook, a manual for self-study, and a reference and source of knowledge on shell scripting techniques. The exercises and heavily-commented examples invite active reader participation, under the premise that the only way to really learn scripting is to write scripts.

This book is suitable for classroom use as a general introduction to programming concepts.
documentation  reference  sysadmin  scripts  linux  unix  cli 
april 2005 by will.brien

Copy this bookmark:



description:


tags: