Find malware on your web server/shared hosting

Some of my client websites get hacked. Some shared hosting providers provide some virus scanning tools, but it’s not always enough and what about those who even don’t provide malware scanning. Hopefully they provide SSH access and AI-BOLIT can be used. It’s a free website virus and malware scanner for websites.
Just download it, unzip and upload to your desired host. Copy it into the root directory of your website.
Last run it
php ai-bolit.php --mode=2
or not paranoid/normal mode
php ai-bolit.php


Switch from netctl to NetworkManager on Arch Linux

On my notebook I finally decided to try NetworkManager with its applet

After installing. I had to check status of some networking services and disable them.

systemctl status dhcpcd.service
sudo systemctl stop netctl.service
sudo systemctl stop netctl-ifplugd@eth0.service
sudo systemctl status netctl-ifplugd@eth0.service
sudo systemctl stop netctl-auto@wlan0.service

And then wait for the magic after starting NetworkManager
sudo systemctl start NetworkManager.service

network manager applet

I should have searched for a how to video on YouTube and could save some debugging time with journalctl -f 🙂 After setup I found

Google Play Music desktop player MPRIS media keys for Linux

I finally nailed it 😀
dbus-send --print-reply /org/mpris/MediaPlayer2 org.mpris.MediaPlayer2.Player.PlayPause

dbus-send --print-reply /org/mpris/MediaPlayer2 org.mpris.MediaPlayer2.Player.Next

Also added to my Awesome window manager config

Monitor progress of cp, mv, gzip, mysql and CLI commands

To monitor progress of an ongoing copy or mysql dump import you might try progress CLI tool. Track progress of commands like cp, mv, dd, tar, cat, rsync, grep, fgrep, egrep, cut, sort, md5sum, sha1sum, sha224sum, sha256sum, sha384sum, sha512sum, adb, gzip, gunzip, bzip2, bunzip2, xz, unxz, lzma, unlzma, 7z, 7za, zcat, bzcat, lzcat, split, gpg, etc.

Access NVR from the internet with Mikrotik port forwarding

I had to set up access to a Hikvision NVR on local network. Port forward from the public IP of ISP was done. My job was setting port forwarding on Mikrotik router which was connected to the NVR.

It was a lot of hours wasted until I figured it out from lots of forum reading and YouTube videos watching 😀

/ip firewall filter
add action=dst-nat chain=dstnat dst-address= dst-port=58000 \
    protocol=tcp to-addresses= to-ports=8000
add action=dst-nat chain=dstnat dst-address= dst-port=56911 \
    log=yes protocol=tcp to-addresses= to-ports=6911

The dst-address had to be the IP address of the router from the WAN side. Check in Quick Set

Mikrotik NAT port fowarding