Everywhere
  • Everywhere
  • Articles
  • Pages
  • Forum
  • Files
  • More Options
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  • Login
  • Register
  • Search
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. ISeeT Forums
  2. Members
  3. ISeeTWizard
  • Sidebar
  • Sidebar

Posts by ISeeTWizard

  • Technik - Wir bauen einen Firmenrechner

    • ISeeTWizard
    • October 26, 2025 at 2:24 PM

    Da dieses YouTube Video auf Deutsch ist wird der Begleittext in der selben Sprache sein.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Dieses Video ist zwar mittlerweile etwas älter am man kann es immer noch als Beispiel nehmen wie man einen Rechner zusammenbaut.

  • Windows Basis Kurs - 003 - Der Windows Explorer - Aufzucht und Hege

    • ISeeTWizard
    • October 26, 2025 at 2:24 PM

    Da dieses YouTube Video auf Deutsch ist wird der Begleittext in der selben Sprache sein.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Weiter geht's im dritten Teil mit dem Windows Explorer.

    Hier gehen wir im Detail auf den Windows Explorer ein. Aber Achtung - hier in diesem Video handelt es sich noch um den Windows 10 Explorer. Der unter Windows 11 sieht wesentlich anders aus und wird noch mal in einem weiteren Video thematisiert.

  • Windows Basis Kurs - 002 - Windows 10 Zusatz Tools

    • ISeeTWizard
    • October 26, 2025 at 2:23 PM

    Da dieses YouTube Video auf Deutsch ist wird der Begleittext in der selben Sprache sein.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Hier zeige ich euch einige sehr nützliche Tools die wir früher oder später in anderen Videos sehen werden.

    Hier gibt es nur eine schnelle grobe Übersicht.

    Microsoft PowerToys

    GitHub - microsoft/PowerToys: Microsoft PowerToys is a collection of utilities that help you customize Windows and streamline everyday tasks
    Microsoft PowerToys is a collection of utilities that help you customize Windows and streamline everyday tasks - microsoft/PowerToys
    github.com

    Remove Empty Directories

    Remove Empty Directories
    Download Remove Empty Directories for free. RED searches and deletes empty directories recursively below a given start folder and shows the result in a well…
    sourceforge.net

    Jam Software Tree Size Free

    TreeSize – Official Download
    TreeSize is a disk space analyzer for Windows with customizable file search and several exporting and reporting possibilities. Download for free today!
    www.jam-software.com

    Advanced Renamer
    Download for Windows and Mac - Advanced Renamer

    Amok Exif Sorter
    https://www.amok.am/en/freeware/amok_exif_sorter/download

    FreeFileSync

    FreeFileSync
    Download FreeFileSync 14.5. FreeFileSync is a free open source data backup software that helps you synchronize files and folders on Windows, Linux and macOS.
    freefilesync.org

    BleachBit
    Download BleachBit for Windows | BleachBit

    Speccy
    https://www.ccleaner.com/de-de/speccy
    WICHTIG: CCLEANER selbst NICHT benutzen!!!! NEVER!!! NIEMALS!!!

    Bulk Crap Uninstaller
    https://www.bcuninstaller.com

    Notepad++
    Downloads | Notepad++

  • Windows Basis Kurs - 001 - Grundwissen

    • ISeeTWizard
    • October 26, 2025 at 2:22 PM

    Da dieses YouTube Video auf Deutsch ist wird der Begleittext in der selben Sprache sein

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Hier geht es nur um Grundwissen zu Windows.

    Das Video ist hauptsächlich für Personen die quasi 0 Ahnung respektive Erfahrung mit Windows hatten gedacht. Es wird auch nichts in extremen Details gezeigt da dieses in getrennten Videos später hinzukommen wird.

  • Technik - Windows 11 auf unsupporteter Hardware mit dem mediacreationtool.bat Script

    • ISeeTWizard
    • October 26, 2025 at 2:20 PM

    Da dieses YouTube Video auf Deutsch ist wird der Begleittext in der selben Sprache sein.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Damit Ihr das ganze nachvollziehen könnt hier noch der Link zum Tool auf GitHub: https://github.com/AveYo/MediaCreationTool.bat

  • 2025-09-08 - #Brutus 1:27 - #Technikmuseum #Sinsheim & #Speyer #2025 - #ISeeT #TV

    • ISeeTWizard
    • October 26, 2025 at 2:19 PM

    I bought during my visit in the museums a brick construction site and I recorded myself during the construction of my Brutus car 🙂

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

  • 2025-09-03 - #PowerShell - #Personalized #Profile 2025 - #ISeeT #TV

    • ISeeTWizard
    • October 26, 2025 at 2:19 PM

    A small refreshed video for 2025 about creating a new personalised profile for PowerShell.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

  • Taunus Wunderland (Germany) 2024

    • ISeeTWizard
    • October 26, 2025 at 2:17 PM

    We visited Taunus Wunderland in Germany on 02/09/2024 and we got very disappointed. We even got stuck in a game (flight simulator) as most of the park is very very old (and just oh sorry for the longer wait for quiting the game pff...). The new part of the Parc has a great roller coaster but only for thin people - never had that issue in any other park. Also many things (shops, games, etc) were closed and no ambient audio. As the school in Germany already started when we went to the park not many people were present and so no waiting time...

    PS: after reviewing the video I saw that portrait photos didn‘t take over the effects of my landscape photos very well and so got to much cropped - for the next video I now know it and won‘t do the same mistake

    Here the link to the park on my project Parcum

    In resume: DON'T WASTE YOUR MONEY ON THIS PARC - THEY EVEN LET REMOVE GOOGLE RATINGS IF THEY ARE BAD

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

  • Mainz (Germany) 2024

    • ISeeTWizard
    • October 26, 2025 at 2:15 PM

    We visited Mainz (Germany) on 01.09.2024.

    Here are some impressions of our visit without interrupting bla bla bla.

    In general we can say: A city to visit - it's simply great.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

  • 2025-09-01 - #Belgium - #Blankenberge & #Brugge #2025 - #Photo #Slideshow - #ISeeT #TV on #Tour

    • ISeeTWizard
    • October 26, 2025 at 2:15 PM

    On 01.09.2025 we went on a day trip to Blankenberge and Brugge. Here are our photos from there (so also some photos from us are included).

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

  • 2025-09-07 - #Germany - #Sinsheim & #Speyer #2025 - #Photo #Slideshow - #ISeeT #TV on #Tour

    • ISeeTWizard
    • October 26, 2025 at 2:14 PM

    On 07.09.2025 we went on a day trip to check the Technology Museums in Sinsheim and Speyer (Germany) and here are our photos (without filtering out the photos where we are present on it).

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

  • IP Rating - Ingress Protection - IPxya

    • ISeeTWizard
    • October 26, 2025 at 2:13 PM

    Most of the time you can find devices with IP65 certified but also sometimes there is a letter at the end.
    As I had search often to know what means what I've done now this table here:

    No.

    Solids (1st Digit)

    Liquids (2nd Digit)

    0

    no protection

    no protection

    1

    Protection from objects > 50mm
    like a hand

    Protection from vertically
    dripping water

    2

    Protection from objects > 12mm
    like a finger

    Protection from dripping water
    when tilted to 15°

    3

    Protection from objects > 2,5mm
    like a cable

    Protection from spraying water
    up to 60° from its normal position

    4

    Protection from objects > 1mm
    like a nail or wire

    Protection from splashing water
    from any direction

    5

    Dust protected
    resistant to incidental dust

    Protection from water jets
    from any direction

    6

    Dust tight
    no ingress of dust

    Water resistant against powerful jets

    7


    Protection from immersion
    up to 1m for a limited time

    8


    Protection from continous immersion
    beyond 1m

    9


    Protection from close-range high presure
    water jets


    Optional letters at the end

    Letter

    Meaning

    D

    Wire

    F

    Oil Resistant

    H

    High Voltage Apparatus

    M

    Device is in motion

    S

    Device is standing still

    W

    Certain weather conditions

  • Security Incident Cheat Sheet

    • ISeeTWizard
    • October 26, 2025 at 2:11 PM

    In case of a data breach, ransomware attack or similar there are some steps to follow

    Step 1

    A cyber attack can certainly be classified as a disaster scenario and a clear mind is needed to navigate to a solution. Oncey you and your team adopt a problem solving attitude you will be able to respond to the breach in a logical and organized way.

    The main point is "DON'T PANIC"


    Step 2

    If a cyber attacker demands a ransom it may be tempting and easier to pay it to regain control of your network but oftem times it may lead to future attacks so "DO NOT PAY A RANSOM".

    I would say just pay a ransom if there is no other way to recovery your data but if you don't have any secured backup I have no pity for you!

    You could also invest in an Endpoint Detection and Response solution that can stop ransomware before it can be executed.


    Step 3

    Now it's time to form a response team as to address any damage caused by the cyber attack you will need a capable and experienced response team. You team should be comprised of IT staff members either contracted or in-house who will investigate the attack and work to resolve it.

    HR should be included if your employees haved been impacted by the attack. Public Relations representatives should be included to best explain the attack to your customers. Always includ legal counsel since breaches can have a number of legal implications.


    Step 4

    So let's see your backup which is hopefully available and undamaged from the attack (that is why offline backups are often very important). If this is the case switch to them immediately. The biggest reason this step fails is because it is often forgoten to test the data restoration process.

    If you don't have any backup solution like I wrote I have no pity for you! Avoid switching off all your servers and workstations even if it's a good temptation but this won't stop or fix your damage.

    Step 5

    If your organization is hit with a cyber breach, it is imperative that you minimize the number of affected systems. You will need to isolate where the breach occurred and stop it from infecting other systems. Once the breach has been suspended you response team can test other portions of the network to see if they have been compromised as well.


    Step 6

    Now it is time to investigate. Upon investigation you may find that the damage affects numerous portions of your organization. HR response team members will need to be address any impact on your employees. If your customers or the public were affected PR staff will need to control the damage done to your reputation. The attack may even cause legal ramifications and as such your business's lawyers may need to be involved.


    Step 7

    After all that you should also contact your clients. The PR memebrs on your response team need to reach out to call clients who have been impacted by the breach as soon as possible. For security purposes your clients may need to change their passwords and/or PIN numbers if their private information was compromized.


    Step 8

    As your response team is investigating the attack ensure that they are documenting both their process and their findings. From this evidence you will be able to ascertain the vulnerability that allowed the attack to be successful and thus fortify it going forward.


    Step 9

    As last step I think it's sure that you are looking to prevent future attacks.

    If your team is unable to effectively secure your organization's IT you may need to partner with an outside cyber security company. Outsourcing your cyber security needs to an Managed Security Services Provider (MSSP) can be cheaper and the are often more effective than most IT teams.

  • Types of Authentication

    • ISeeTWizard
    • October 26, 2025 at 2:10 PM

    In IT there are so many authentication options. Here are the 10 commonly used ones.

    Authentication

    Description

    Password-Based

    Users enter a username and password.

    Two-Factor (2FA)

    Combines a password with a second factor like a mobile code or app.
    I just can recommend to add this to your accounts if possible.

    Multi-Factor (MFA)

    USes multiple factors, such as a password, a smartphone and biometrics.

    Biometric

    Uses unique biological characteristics like fingerprints, facial recognition or iris scans.

    Token-Based

    Users posess a physical device (token) that generates a code.
    Luxtrust in Luxembourg removed this one for banking systems as it is to unsecure.

    Certificate-Based

    Digital certificates authenticate users - often used in enterprise environments.

    Single Sign-On (SSC)

    Allows users to log in once and gain access to multiple systems without re-authenticating

    Smart Card

    Users authenticate by inserting a smart card into a reader and entering a PIN.

    OAuth/OpenID Connect

    USers authenticate via third party services (like Facebook or Google) to access different services.

    Behavioral

    Analyzes patterns un user behaviour (like typing speed, mouse mouvements and so on) to authenticate users.
    This is often used on sites to avoid sign in tries with a bot.

  • Data Recovery with ddrescue

    • ISeeTWizard
    • October 26, 2025 at 2:09 PM

    We once had an issue to recover data from a broken disk. Under Windows the disk was directly "attacked" and so directly the control over it was lost.

    Same was with Windows PE Boot Sticks to recover data.

    So the only option left was Linux and here is how we did.


    First you need some tools you can download from the links below:

    http://www.system-rescue-cd.org/Download
    https://rufus.ie or https://www.balena.io/etcher


    1. Put the ISO on an USB Stick with Rufus (preferred) or Etcher
    2. Boot from Stick (deactivate Secure Boot) without connecting any external device (makes it easier to find the correct devices later)
    3. During the Boot process choose the default option (the first from the 2 options)
    4. When the boot process is finished you may want to change your keyboard layout. You can do this with the setkmap tool.
      Simply type setkmap at the prompt and then choose your keyboard layout from the list (fr_CH as example) and click OK.
    5. You can also start a graphical interface with startx but this is not needed to recover data. Within the graphical interface you can use FireFox, Partition Manager or FeatherPad (TextEditor)
    6. Connect your source drive (the defective one) and search for this device with
      ls -la /dev/sdc (where sdc may vary depending on what dev your device was mapped – so it could be sdc / sdd / sde etc.)
      If you have chosen the wrong one you’ll get an error saying that no such file or directory was found.
      PS: With lsblk you should be able to see what disk is mounted under what /dev/
    7. Now you can mount this device to check where the data is:

      • First create a folder in the mnt folder - do this with the following commands
        cd / (to get to the root folder)
        cd mnt (change directory to /mnt)
        mkdir source (take source as name as this is easier to find yourself back)


      • After creating the directory we can now mount the device (stay within the mnt folder)
        mount /dev/sdc2 ./source or mount /dev/sdc2 /mnt/source
        We use the number 2 as most of the time there are more partition created under Windows and 1 would be the hidden boot partition and 2 the first data partition
        That is also why we first mount the device to see if we are on the correct partition.


      • You can list what’s on your disk with (always while staying in mnt folder)
        ls -l ./source or ls -l /mnt/source


      • If you are on the wrong partition you have to unmount the device and restart with point b
        umount /mnt/source (for unmounting the source device)


      • if you can't mount due to an unclean NTFS file system you may try this (example):
        sudo ntfsfix /dev/sdc2
        sudo mount -o rw /dev/sdc2 /mnt/source


    8. When you have your source device you connect your destination device to copy the data too. Important here is that you use a device formatted with NTFS as we are going to first create an image of the source disk on that disk which will be more than 4GB (FAT32 only supports files of max 4GB).
      Also here you have to do the same as for the source drive, just name the folder destination (point 7 and :smiling_face_with_sunglasses: and as it is a NTFS partition the normal mount wouldn’t work so you have to take
      ntfs-3g to mount the device
      ntfs-3g /dev/sdd2 ./destination
    9. When your destination disk is mounted switch to that folder so that you are in /mnt/destination
      This is important for the following command as we want to create a map file directly on that disk to be able to resume the recovery in case of a crash
    10. For the recovery process we are going to use ddrescue. Here are some switches that may be needed:
      -f force
      -d direct disk access (slower but doesn’t use the kernel cache)
      with that method you can sometimes even recover more data as with the normal method
      not every system is supporting this
      -r3 retry 3 times (you can change the numer)
      -N skip the trimming phase
      We are using the following command for the first run (here we are recovering the most readable data)
      ddrescue -d /mnt/source /mnt/destination/data.img mapfile
      with that we copy the sdc2 partition in an data.img file on the destination disk and the mapfile is used if the recover crashes or so to not start from scrap.
      Also the mapfile is used for the second scan. Without switches we simply copy the data and when a sector has issues with reading ddrescue is skippin it and continuing with the next one without any retries.
      Now with the second scan we are going to use the -r switch to recover even more data. It is important to use the same mapfile as before
      ddrescue -d -r3 /mnt/source /mnt/destination/data.img mapfile
      You could also use this command directly but depending on the disk state you may lose all the data.
    11. After the copy is finished (about 10 hours for 1TB disk) you have an entire img file of your source disk.
      Here you may want to copy it as when you are going to mount this file you are going to make changes on it.
    12. Create an olddisk folder under /mnt
      mkdir olddisk (when you are under the mnt folder)
    13. Now mount the image file an create the folder for the recovered data
      mount /mnt/destination/data.img /mnt/olddisk
      mkdir /mnt/destination/recovery
    14. Than copy the data to the destination disk in a new folder
      cp -R /mnt/olddisk/ /mnt/destination/recovery/
      Pay attention that this also takes hours
    15. When all the data is copied you can unmount all the devices
      umount /mnt/olddisk
      umount /mnt/destination
      umount /mnt/source
    16. Now shutdown the computer
      shutdown -h now
    17. Check on a Windows PC if you have access to the data

    I hope this can help you if you ever have such an issue. I also had a personal SSD that wasn't accessible over Windows anymore but mounting it over an USB adapter on my Synology NAS, which is also Linux, helped me out and I could recover the data. It wasn't important data, as I have backups for everything, but I spend during some days collecting different download etc. for a project and so I didn't need to redownload everything lol 🙂 And there was an old Windows 95 game I patched to make it run on Windows 10 🙂

    PS: If I ever make a video I gonna attach it - maybe you can leave a comment and tell me if you want a how to video from me.

  • What OS can be installed on what Apple device (external link)

    • ISeeTWizard
    • October 26, 2025 at 2:05 PM

    If you ever had this question here is a link with the answer to it 😉

    Mac OS Compatibility Guide by Mac Model
    eshop.macsales.com

    Pay attention that this is an external link and that I'm not affiliated to it.

  • Docker package installation & get your user IDs

    • ISeeTWizard
    • October 26, 2025 at 2:04 PM

    Synology DSM is actually based on a simple Linux system and therefore the standard commands can be used there. That's why you can easily get the IDs you will need for many containers thanks to the easy command named ID.

    Attention: The video is still in german

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

  • Watchtower

    • ISeeTWizard
    • October 26, 2025 at 2:03 PM

    Attention: The video is still in german

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Bash
    docker run -d --name=watchtower \
    -v /volume1/docker/docker.sock:/var/run/docker.sock \
    --restart=always \
    containrrr/watchtower --cleanup --include-stopped --include-restarting --interval 21600

    Watchtower updates your containers automatically without asking. For some, this is very useful, but for others who have to work with a container all the time, less so.

    That's why there is also an option to always run Watchtower manually instead of automatically. You can find all of these options in the documentation.

    Here is an example of a manual update of Calibre:

    Bash
    docker run --rm \
    -v /volume1/docker/docker.sock:/var/run/docker.sock \
    containrrr/watchtower \
    --run-once calibre

    docker run --rm creates the Watchtower container, runs it and when it is finished, it is automatically deleted.


    Create symbolic link for docker.sock

    Bash
    ln -s /var/run/docker.sock /volume1/docker/docker.sock

    I am creating this symbolic link because I was having problems with some containers accessing docker.sock. When I linked them like this, those containers no longer had any problems and ran perfectly.

    Used Links

    Watchtower Documentation

  • Kavita

    • ISeeTWizard
    • October 26, 2025 at 2:00 PM

    Kavita is a comic book reader - the whole thing is kept relatively simple and clean. I had a few problems but these are explained in the video.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Bash
    docker run -d --name=kavita \
    -p 5000:5000 \
    -e PUID=1038 \
    -e PGID=100 \
    -v /volume1/docker/Kavita:/kavita/config \
    -v /volume1/Comics:/manga \
    --restart always \
    kizaing/kavita

    SMTP Server

    Bash
    docker run --name kavita-email -p 5003:5003 
    -e SMTP_HOST="smtp.office365.com" 
    -e SMTP_PORT="587" 
    -e SMTP_USER="frank@datateam.lu" 
    -e SMTP_PASS="xyungelöst" 
    -e SEND_ADDR="frank@datateam.lu" 
    -e DISP_NAME="Frank Schroeder (Anime)" 
    -d kizaing/kavitaemail:latest

    Remember that this is just an example and my password is not included - so the whole thing as it is will be useless for you but simply a small suggestion as to how you could solve it.

    As an additional tool, I can recommend the Comictagger to tag the comics correctly.
    I didn't show or explain this in the video as it is actually very self-explanatory.

    Used Links

    Random Number (for a port number by random generator)

  • your_spotify

    • ISeeTWizard
    • October 26, 2025 at 1:58 PM

    your_spotify is a web app that shows you statistics about your Spotify usage.

    You can find out more in the video.

    The installation takes place in 3 steps:

    • Database
    • Server
    • Web Client

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Bash
    docker run -d --name mongo \
    -v /volume1/docker/your_spotify_db:/data/db \
    --restart always \
    mongo:4.4.13

    With Synology you should be careful to use a 4.4.x version of the Mongo DB because 5.x is not compatible with the CPU of the device (maybe with newer devices this isn't the case anymore).

    Bash
    docker run -d --name=your_spotify_server \
    --link mongo \
    -p 33424:8080 \
    -e API_ENDPOINT= https://dyndnsserverdomain/api  \
    -e CLIENT_ENDPOINT= https://dyndnsserverdomain  \
    -e SPOTIFY_PUBLIC=eurepublicid \
    -e SPOTIFY_SECRET=eurepublicidsecret \
    -e CORS=all \
    --restart always \
    yooooomi/your_spotify_server

    ou must fill in the API and CLIENT endpoint according to your settings.

    In the same way, you must take your Spotify PUBLIC and SECRET data from your developer account. Links to this are a little further down.

    When filling in the data in the configuration on the Spotify page, it is important to fill in the correct redirect URI.

    Code
     https://dyndnsserverdomain/api/oauth/spotify/callback 
    Bash
    docker run -d --name=your_spotify_client \
    -p 17812:3000 \
    -e API_ENDPOINT= https://dyndnsserverdomain/api  \
    yooooomi/your_spotify_client

    Please make sure to fill in your API endpoint correctly here too.

    nginx
    server {
        listen 443 ssl;
        listen [::]:443 ssl;
    
        server_name spotify.*;
    
        include /config/nginx/ssl.conf;
    
        client_max_body_size 0;
    
        # enable for ldap auth, fill in ldap details in ldap.conf
        #include /config/nginx/ldap.conf;
    
        # enable for Authelia
        #include /config/nginx/authelia-server.conf;
    
    
        location /api/ {
            # enable the next two lines for http auth
            auth_basic "Restricted";
            auth_basic_user_file /config/nginx/.htpasswd;
    
            # enable the next two lines for ldap auth
            #auth_request /auth;
            #error_page 401 =200 /ldaplogin;
    
            # enable for Authelia
            #include /config/nginx/authelia-location.conf;
    
            include /config/nginx/proxy.conf;
            include /config/nginx/resolver.conf;
            proxy_pass  http://192.168.178.20:33424/; 
        }
    
        location / {
            # enable the next two lines for http auth
            #auth_basic "Restricted";
            #auth_basic_user_file /config/nginx/.htpasswd;
    
            # enable the next two lines for ldap auth
            #auth_request /auth;
            #error_page 401 =200 /ldaplogin;
    
            # enable for Authelia
            #include /config/nginx/authelia-location.conf;
    
            include /config/nginx/proxy.conf;
            include /config/nginx/resolver.conf;
            set $upstream_app holodeck;
            set $upstream_port 17812;
            set $upstream_proto http;
            proxy_pass $upstream_proto://$upstream_app:$upstream_port;        
            #proxy_pass  http://192.168.178.20:17812/; 
        }
    }
    Display More

    SWAG example conf file for your_spotify.


    Used Links

    TZ - Timezone

    Random Number (for a port number by random generator)

    your_spotify @GitHub

    Spotify Developer Dashboard (an application must be created here to get an API key)

    Spotify Account Privacy (to request the past history)

  • SWAG - Secure Web Application Gateway

    • ISeeTWizard
    • October 26, 2025 at 1:55 PM

    SWAG is a reverse proxy software based on NGINX. I tried to do the same with Traefik but I failed - even if it worked somehow, many pages simply had missing information and were therefore useless.
    SWAG has a lot of ready-made configuration files for frequently used programs integrated and is therefore very easy to use.
    You can also have SSL certificates created automatically by Let's Encrypt and fail2ban is also on board.

    However, there is a big problem on a Synology, namely ports 80 and 443. Although the DSM software runs on a different port, these two ports were blocked and redirected.

    To get around this, there is a small script that I am giving you here. This is run via an SSH session and unlocks ports 80 and 443 again.

    There are a lot of instructions on the internet about this but I found a script on Github that worked for me - a lot of things hadn't worked before. As always, I put the link below in the list of used links.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Bash
    #! /bin/bash
    
    # NEWLY ADDED BACKUP FUNCTIONALITY IS NOT FULLY TESTED YET, USE WITH CARE, ESPECIALLY DELETION
    # Developed for DSM 6 - 7.0.1. Not tested on other versions.
    # Steps to install
    # Save this script in one of your shares
    # Edit it according to your requirements
    # Backup /usr/syno/share/nginx/ as follows:
    # # cd /usr/syno/share/
    # # tar cvf ~/nginx.tar nginx
    # Run this script as root
    # Reboot and ensure everything is still working
    # If not, restore the backup and post a comment on this script's gist page
    # If it did, schedule it to run as root at boot
    #   through Control Panel -> Task Scheduler
    
    HTTP_PORT=81
    HTTPS_PORT=444
    
    BACKUP_FILES=true # change to false to disable backups
    BACKUP_DIR=/volume1/apps/free_ports/backup
    DELETE_OLD_BACKUPS=false # change to true to automatically delete old backups.
    KEEP_BACKUP_DAYS=30
    
    DATE=$(date +%Y-%m-%d-%H-%M-%S)
    CURRENT_BACKUP_DIR="$BACKUP_DIR/$DATE"
    
    if [ "$BACKUP_FILES" == "true" ]; then
      mkdir -p "$CURRENT_BACKUP_DIR"
      cp /usr/syno/share/nginx/*.mustache "$CURRENT_BACKUP_DIR"
    fi
    
    if [ "$DELETE_OLD_BACKUPS" == "true" ]; then
      find "$BACKUP_DIR/" -type d -mtime +$KEEP_BACKUP_DAYS -exec rm -r {} \;
    fi
    
    sed -i "s/^\([ \t]\+listen[ \t]\+[]:[]*\)80\([^0-9]\)/\1$HTTP_PORT\2/" /usr/syno/share/nginx/*.mustache
    sed -i "s/^\([ \t]\+listen[ \t]\+[]:[]*\)443\([^0-9]\)/\1$HTTPS_PORT\2/" /usr/syno/share/nginx/*.mustache
    
    if which synoservicecfg; then
      synoservicecfg --restart nginx
    else
      synosystemctl restart nginx
    fi
    
    echo "Made these changes:"
    
    diff /usr/syno/share/nginx/ $CURRENT_BACKUP_DIR 2>&1 | tee $CURRENT_BACKUP_DIR/changes.log
    Display More

    To run the script, please change to the directory where you created it and run it as follows:

    Code
    sudo ./free_ports.sh

    Why this script? Well, as I said, it works, and above all it creates a backup of all changed files and tells you at the end what it has changed.

    You can also decide which port should be used instead of 80 and 443 to then free them up.

    It is best to save this script in a share under the name free_ports.sh, for example, and run it in an SSH session (don't forget sudo).

    I use Bitvise, for example, as an SSH client under Windows - but there are countless others.

    The script is supposed to always run at startup - but I haven't had to do that yet (my server restarts every day overnight - so it shuts down for 6 hours a night).

    Bash
    docker run -d \
      --name=swag \
      --cap-add=NET_ADMIN \
      -e PUID=1027 \
      -e PGID=100 \
      -e TZ=Europe/Luxembourg \
      -e URL=my.ddns.server \
      -e VALIDATION=http \
      -e EMAIL=euremailadresse \  
      -e SUBDOMAINS=heimdall, \
      -p 443:443 \
      -p 80:80 \
      -v /volume1/docker/Swag:/config \
      --restart unless-stopped \
      linuxserver/swag
    Display More

    Please remember to enter your DynDNS domain or similar under URL as well as a correct email address. Also always enter the correct IDs for folder rights.

    To create a .htpasswd file, use the following command:

    Code
    sudo htpasswd -c /volume1/docker/Swag/nginx/.htpasswd newuser


    Or for an additional user:

    Code
    sudo htpasswd /volume1/docker/Swag/nginx/.htpasswd newuser2

    Used Links

    TZ - Timezone

    Random Number (for a port number by random generator)

    SWAG @DockerHub

    Free_Ports Script @GitHub

    Bitvise SSH Client

    SWAG Reverse Proxy Configurations @GitHub (read the readme.md on this page!)

  • Heimdall

    • ISeeTWizard
    • October 26, 2025 at 1:52 PM

    Attention: This video is still in german

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Bash
    docker run -d \
      --name=heimdall \
      -e PUID=1027 \
      -e PGID=100 \
      -e TZ=Europe/Luxembourg \
      -p 40979:80 \
      -p 9039:443 \
      -v /volume1/docker/Heimdall:/config \
      --restart always \
      lscr.io/linuxserver/heimdall

    I used Flame at the time and was looking for a better alternative and I think I found it in Heimdall 🙂


    Used Links

    TZ - Timezone

    Random Number (for a port number by random generator)

    Heimdall

    Heimdall @LinuxServer.io

    Heimdall @GitHub

  • Calibre

    • ISeeTWizard
    • October 26, 2025 at 1:50 PM

    Attention: The video is still in german

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Bash
    docker run -d --name=calibre \
    -p 20118:8080 \
    -p 43797:8081 \
    -e PUID=1027 \
    -e PGID=100 \
    -e TZ=Europe/Luxembourg \
    -e PASSWORD=calibrepw \
    -v /volume1/docker/Calibre:/config \
    -v /volume1/E-Books.local:/e-books \
    -v /volume1/SSL:/SSL:ro \
    --restart always \
    lscr.io/linuxserver/calibre
    Display More

    Please remember to write your own password instead of calibrepw. The default login user is abc. Also make sure you use your own user ID and not the one I give as an example here.

    Calibre is a free software package for processing, converting and managing e-books for Linux, macOS and Windows.


    UsedLinks

    TZ - Timezone

    Random Number (for a port number by random generator)

    Documentation for the Calibre Docker Container

    Calibre

  • Calibre Web

    • ISeeTWizard
    • October 26, 2025 at 1:48 PM

    Attention: The video is still in german

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Bash
    docker run -d --name=calibre-web \
    -p 8083:8083 \
    -e PUID=1027 \
    -e PGID=100 \
    -e TZ=Europe/Luxembourg \
    -e DOCKER_MODS=linuxserver/calibre-web:calibre \
    -e OAUTHLIB_RELAX_TOKEN_SCOPE=1 \
    -v /volume1/docker/CalibreWeb:/config \
    -v /volume1/E-Books.local:/e-books \
    -v /volume1/SSL:/SSL:ro \
    --restart always \
    lscr.io/linuxserver/calibre-web
    Display More

    Default user: admin
    Default password: admin123

    Calibre-Web is a web interface for Calibre that allows you to manage your e-book collection.

    You can browse through your books, read them directly from the browser or on one of your devices, ideally


    Used Links

    TZ - Timezone

    Random Number (for a port number by random generator)

    Calibre-Web @LinuxServer.io

    Calibre-Web @GitHub

  • Statement from that time about my YouTube Videos & SSL

    • ISeeTWizard
    • October 26, 2025 at 1:47 PM

    Attention: The video is still in german

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Today there is a small statement about my videos because some of the comments made me very upset and angry.

    I also talk about SSL and the end is not the end because I had to add something lol 🙂


    Used Links

    SSL Converter (Site often slow - so please be patient 🙂 )

    Docker Images - Examples

Did you know…?

“And when you want something, all the universe conspires in helping you achieve it.”

Paulo Coelho

“Life does not have to be perfect to be wonderful.”

Annette Funicello

“Once you face your fear, nothing is ever as hard as you think.”

Olivia Newton-John

“Tomorrow is a new day. You shall begin it serenely and with too high a spirit to be encumbered with your old nonsense.”

Ralph Waldo Emerson

“Find out who you are and do it on purpose.”

Dolly Parton

“Let us make our future now, and let us make our dreams tomorrow’s reality.”

Malala Yousafzai

“It is never too late to be what you might have been.”

George Elliot

“You can’t help what you feel, but you can help how you behave.”

Margaret Atwood

“Life is very interesting…in the end, some of your greatest pains become your greatest strengths.”

Drew Barrymore

“Always go with your passions. Never ask yourself if it’s realistic or not.”

Deepak Chopra

“You may not control all the events that happen to you, but you can decide not to be reduced by them.”

Maya Angelou

“The biggest adventure you can take is to live the life of your dreams.”

Oprah Winfrey

“Failure is a great teacher and, if you are open to it, every mistake has a lesson to offer.”

Oprah Winfrey

“Living might mean taking chances, but they’re worth taking.”

Lee Ann Womack

“For me, becoming isn’t about arriving somewhere or achieving a certain aim. I see it instead as forward motion, a means of evolving, a way to reach continuously toward a better self. The journey doesn’t end.”

Michelle Obama

“The future belongs to those who believe in the beauty of their dreams.”

Eleanor Roosevelt

“Success is stumbling from failure to failure with no loss of enthusiasm.”

Winston Churchill

“You don’t always need a plan. Sometimes you just need to breathe, trust, let go and see what happens.”

Mandy Hale

“I’m not going to continue knocking on that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

W.P. Kinsella

“It’s amazing how a little tomorrow can make up for a whole lot of yesterday.”

John Guare

“I may not have gone where I intended to go, but I think I have ended up where I needed to be.”

Douglas Adams

“If you live long enough, you’ll make mistakes. But if you learn from them, you’ll be a better person.”

Bill Clinton

“We are here to add what we can to life, not to get what we can from life.”

William Osler

“No need to hurry. No need to sparkle. No need to be anybody but oneself.”

Virginia Woolf

“Before anything else, preparation is the key to success.”

Alexander Graham Bell

“Life is like riding a bicycle. To keep your balance, you must keep moving.”

Albert Einstein

“Be persistent and never give up hope.”

George Lucas

“Life is what happens to you when you are busy making other plans.”

John Lennon

“The great courageous act that we must all do is to have the courage to step out of our history and past so that we can live our dreams.”

Oprah Winfrey

“Some people want it to happen, some wish it would happen, others make it happen.”

Michael Jordan

“You will face many defeats in life, but never let yourself be defeated.”

Maya Angelou

“Don’t judge each day by the harvest you reap but by the seeds that you plant.”

Robert Louis Stevenson

“There is no passion to be found playing small—in settling for a life that is less than the one you are capable of living.”

Nelson Mandela

“The art of life is to know how to enjoy a little and to endure very much.”

William Hazlitt

“It is better to fail in originality than to succeed in imitation.”

Herman Melville

“The only thing we have to fear is fear itself.”

Franklin D. Roosevelt

“Live in the sunshine, swim the sea, drink the wild air.”

Ralph Waldo Emerson

“We have to dare to be ourselves, however frightening or strange that self may prove to be.”

May Sarton

“Good friends, good books, and a sleepy conscience: This is the ideal life.”

Mark Twain

“It does not matter how slowly you go, as long as you do not stop.”

Confucius

“Dream big and dare to fail.”

Norman Vaughan

“Everything you can imagine is real.”

Pablo Picasso

“You have to believe in yourself when no one else does.”

Serena Williams

“Yesterday is but today’s memory and tomorrow is today’s dream.”

Khalil Gibran

You cannot change what you refuse to confront.

“Life is a daring adventure or it is nothing at all.”

Helen Keller

“The new dawn blooms as we free it. For there is always light if only we’re brave enough to see it, if only we’re brave enough to be it.”

Amanda Gorman

“We must let go of the life we have planned, so as to accept the one that is waiting for us.”

Joseph Campbell

“There are so many great things in life; why dwell on negativity?”

Zendaya

“The fear of death follows from the fear of life. A man who lives fully is prepared to die at any time.”

Mark Twain

“You can be everything. You can be the infinite amount of things that people are.”

Kesha

“Always remember that you are absolutely unique. Just like everyone else.”

Margaret Mead

“Don’t take yourself too seriously. Know when to laugh at yourself, and find a way to laugh at obstacles that inevitably present themselves.”

Halle Bailey

“Get busy living or get busy dying.”

Stephen King

“To succeed in life, you need three things: a wishbone, a backbone, and a funnybone.”

Reba McEntire

“There are no regrets in life. Just lessons.”

Jennifer Aniston

“If you don’t like the road you’re walking, start paving another one.”

Dolly Parton

“For the great doesn’t happen through impulse alone, and is a succession of little things that are brought together.”

Vincent Van Gogh

“Keep smiling, because life is a beautiful thing and there’s so much to smile about.”

Marilyn Monroe

“Dreaming, after all, is a form of planning.”

Gloria Steinem

“There’s love enough in this world for everybody, if people will just look.”

Kurt Vonnegut

“Don’t worry about failure, you only have to be right once.”

Drew Houston

“Life has no limitations, except the ones you make.”

Les Brown

“Just when you think it can’t get any worse, it can. And just when you think it can’t get any better, it can.”

Nicholas Sparks

“Dreams do not come true just because you dream them. It’s hard work that makes things happen. It’s hard work that creates change.”

Shonda Rhimes

“I’m not going to continue knocking that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

Ava DuVernay

“Be where you are; otherwise you will miss your life.”

Buddha

“My wish for you is that you continue. Continue to be who you are, to astonish a mean world with your acts of kindness.”

Maya Angelou

“In three words I can sum up everything I’ve learned about life: It goes on.”

Robert Frost

“Be yourself; everyone else is already taken.”

Oscar Wilde

“There is no perfection, only life.”

Milan Kundera

“Ambition is the path to success. Persistence is the vehicle you arrive in.”

Bill Bradley

“When I let go of what I am, I become what I might be.”

Lao Tzu

“Always do your best. What you plant now, you will harvest later.”

Og Mandino

“Nothing is impossible. The word itself says ‘I’m possible!’”

Audrey Hepburn

“Next time, ask ‘What’s the worst that will happen?’ Then push yourself a little further than you dare.”

Audre Lorde

“We pass through this world but once.”

Stephen Jay Gould

“When you have a dream, you’ve got to grab it and never let go.”

Carol Burnett

“One of the deep secrets of life is that all that is really worth doing is what we do for others.”

Lewis Carroll

“Life isn’t about finding yourself. Life is about creating yourself.”

George Bernard Shaw

“I believe that if you’ll just stand up and go, life will open up for you. Something just motivates you to keep moving.”

Tina Turner

“Spread love everywhere you go. Let no one ever come without leaving happier.”

Mother Teresa

“The purpose of life is to live it, to taste experience to the utmost, to reach out eagerly and without fear for newer and richer experience.”

Eleanor Roosevelt

“The world you desire can be won. It exists... it is real... it is possible... it’s yours.”

Ayn Rand

“All dreams are within reach. All you have to do is keep moving towards them.”

Viola Davis

“Never let the fear of striking out keep you from playing the game.”

Babe Ruth

“Be sure you put your feet in the right place, then stand firm.”

Abraham Lincoln

“Do one thing every day that scares you.”

Eleanor Roosevelt

“Keep your face towards the sunshine and shadows will fall behind you.”

Walt Whitman

“The future is not something we enter. The future is something we create.”

Leonard I. Sweet

“You only live once, but if you do it right, once is enough.”

Mae West

“Whatever we are, whatever we make of ourselves, is all we will ever have—and that, in its profound simplicity, is the meaning of life.”

Philip Appleman

“The future belongs to those who prepare for it today.”

Malcolm X

“Coming together is a beginning; keeping together is progress; working together is success.”

Henry Ford

“It is during our darkest moments that we must focus to see the light.”

Aristotle

“The simple things are also the most extraordinary things, and only the wise can see them.”

Paulo Coelho

“Life is made of ever so many partings welded together.”

Charles Dickens

“If you don’t have any shadows, you’re not in the light.”

Lady Gaga

“It is better to be hated for what you are than to be loved for what you are not.”

Andre Gide

“If you have knowledge, let others light their candles in it.”

Margaret Fuller

“We make a living by what we get, but we make a life by what we give.”

Winston Churchill

  1. Privacy Policy
  2. Contact
  3. Legal Notice
Powered by WoltLab Suite™
Style: Ambience by cls-design
Stylename
Ambience
Manufacturer
cls-design
Licence
Commercial styles
Help
Supportforum
Visit cls-design