Everywhere
  • Everywhere
  • Articles
  • Pages
  • Forum
  • Files
  • More Options
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  • Login
  • Register
  • Search
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. ISeeT Forums
  2. Members
  3. ISeeTWizard
  • Sidebar
  • Sidebar

Posts by ISeeTWizard

  • CP/M

    • ISeeTWizard
    • October 26, 2025 at 11:03 AM

    CP/M 86


    released

    1982

    floppies

    onesided 5,25" floppies


    CP/M 86 was brought out by Digital Research for the Intel 8080 CPU.
    It was the following version of the CP/M standart OS.


    It’s an operating system for 8-bit computers. It looks rather like DOS to use (only not so user-friendly); this is hardly surprising because DOS was copied from CP/M in about 1980.
    CP/M comes/came in three main versions; 1.4, 2.2 and 3.1. v2.2 was the basis of MSDOS, while v3.1 evolved into DRDOS and OpenDOS / DR-DOS.

    There were also 8086 and 68000 versions of CP/M. CP/M-86 evolved into DOS Plus, Concurrent DOSand REAL/32.

    They sold 600.000 copies of the OS. CP/M stands for: Control Program for Microcomputers

    CP/M disc formats

    The disc format used is to some extent implementation dependent. CP/M has no standard system (like the DOS boot record) to store disc parameters on the disc. Some individual systems use their own boot records (eg Amstrad PCW) but in general the only way to determine a format is to use a program like DISKSTAT on the computer which generated the discs. The sectors of some discs may be software skewed – again, the best way to determine this is to examine the translation table on the source computer.


    The layout of a disc is:

    Zero or more reserved tracks;
    One or more data blocks, a multiple of 1k in size. The data blocks can span tracks and usually contain multiple sectors.
    Any spare sectors – ignored by CP/M.
    There is one directory (with a fixed size), which occupies one or more blocks at the start of the file space. The directory contains 32-byte entries.


    DOS Plus 1.2 does not understand floppies bigger than 360k, and the only hard drive partitions it supports are DOS-formatted ones smaller than 32Mb. So, if you want to install it on your hard drive you may well have to do some serious partitioning.
    It will boot in the Linux DOS emulator as long as you have two or fewer emulated hard drives. It will crash on booting if there are three or more.




    Year 2000


    8-bit systems

    CP/M 1.x

    The OS makes no use of dates and so is fully Year 2000 compliant. You will still need to check any applications you use.


    CP/M 2.x

    The original Digital Research CP/M 2 makes no use of dates. However, several third-party BDOSes have been produced, which behave like CP/M 2 but also include time and date functionality:


    Z80DOS

    Z80DOS itself is 2000 compliant. Its date utility (TIMEZD12.COM) will not display dates past 2000 correctly, but such dates can be entered.


    DOS+

    DOS+ itself is 2000 compliant. Its date utility (TIME.COM) will accept dates past 2000, if they are entered explicitly as four digits.


    P2DOS

    P2DOS is 2000 compliant, and it is supplied with an excellent date utility that is also 2000 compliant.
    NovaDOS and SUPRBDOS are derivatives of P2DOS and the P2DOS information also applies to them.


    CP/M 3.x (CP/M Plus)

    The CP/M Plus BDOS is 2000 compliant, but the utilities DATE, DIR and SHOW are not.


    16-bit systems

    BDOS 2.x (CP/M-86 v1.1)

    The BDOS itself includes no date functions. However, the BIOS displays the current date on the screen; Year 2000 patches for this are available at the Unofficial CP/M Website, DOWNLOAD >> CP/M-86 >> PATCHES


    BDOS 4.x (DOSPLUS; Personal CP/M-86 v2.0/2; CP/M-86 Plus)

    The BDOS itself is Year 2000 compliant. The PCP/M-86 v2.0/2 and CP/M-86 Plus utilities (DIR.CMD; SDIR.CMD; SHOW.CMD; DATE.CMD) will not allow entry or display of dates after 2000. The DOSPLUS equivalent (COMMAND.COM) will.

  • Linux Commands

    • ISeeTWizard
    • October 26, 2025 at 10:58 AM

    Here are some basic linux commands. Please be aware that depending on your distribution they might me slightly different or non existent.

    File and directory management

    command

    description

    ls

    list directory contents

    cd

    change directory

    pwd

    print working directory

    cp

    copy files and directories

    mv

    move or rename files and directories

    rm

    remove files or directories

    mkdir

    make directories

    rmdir

    remove empty directories

    touch

    change file timestamps or create empty files

    find

    search for files in a directory hierarchy

    locate

    find files by name

    tree

    display directories in a tree like format

    chmod

    change file permissions

    chown

    change file owner and group

    chgrp

    change group ownership

    stat

    display file or file system status


    File viewing and editing

    command

    description

    cat

    concatenate and display file content

    tac

    concatenate and display file content in reverse

    more

    view file content interactively (page by page)

    less

    view file content interactively (scrollable)

    head

    output the first part of a file

    tail

    output the last part of a file

    nano

    text editor in terminal

    vim or vi

    advanced text editor in terminal

    emacs

    text editor in terminal

    grep

    search text using patterns

    sed

    stream editor for filtering and transforming text

    awk

    pattern scanning and processing language

    cut

    remove sections from each line of files

    sort

    sort lines of text files

    uniq

    report or omit repeated lines


    Process Management

    command

    description

    ps

    report a snapshot of current processes

    top

    display linux tasks

    htop

    interactive process viewer (advanced top)

    kill

    send a terminate signal to a process

    killall

    terminate process by name

    bg

    resume a suspended background job

    fg

    bring a job to the foreground

    jobs

    list active jobs

    nice

    run a program with modified scheduling priority

    renice

    alter priority of running processes

    uptime

    show how long the system is up and running

    time

    measure program running time


    Disk management

    command

    description

    df

    report file system disk space usage

    du

    estimate file space usage

    fdisk

    partition table manipulator

    lsblk

    list information about block devices

    mount

    mount a file system

    umount

    unmount a file system

    parted

    partition table manipulator

    mkfs

    create a file system

    fsck

    file system consistency check and repair

    blkid

    locate/print block device attributes


    Networking

    command

    description

    ifconfig

    configure network interfaces

    ip

    show/manipulate routing, devices and tunnels

    ping

    send ICMP echo requests to network host

    netstat

    network statistics

    ss

    socket statistics

    traceroute

    trace the route packets take to a network host

    nslookup

    query internet name servers interactively

    dig

    DNS lookup utility

    wget

    non-interactive downloader

    curl

    transfer data with URLs

    scp

    secure copy files between hosts

    ssh

    secure shell for remote login

    ftp

    file transfer protocol client


    User and group management

    command

    description

    useradd

    add a user

    usermod

    modify a user

    userdel

    delete a user

    groupadd

    add a group

    groupdel

    delete a group

    passwd

    modify the user password

    chage

    change password expiry information

    whoami

    print the current logged in user

    who

    show who is logged in

    w

    show who is logged in and what they are doing

    id

    display the user and group id

    groups

    show the user's groups


    System information and monitoring

    command

    description

    uname

    print system information

    hostname

    show or set the system's hostname

    uptime

    how long the system has been running

    dmesg

    boot and system messages

    free

    display memory usage

    top

    display linux tasks

    vmstat

    report virtual memory statistics

    lscpu

    display information about the CPU architecture

    lsusb

    list USB devices

    lspci

    list PCI devices

    lshw

    list hardware configuration


    Archiving and compression

    command

    description

    tar

    archive files
    tar -czf test.tar.gz /directory/path/ → compress files using gzip
    tar -xzf test.tar.gz → extract gzipped tarball
    tar -cf test.tar → /directory/path → create a tarball
    tar -xf test.tar → extract tarball

    zip

    package and compress files into a ZIP archive

    unzip

    extract files from a ZIP archive

    gzip

    compress files using the gzip algorithm

    gunzip

    decompress files compressed with gzip

    bzip2

    compress files using the bzip2 algorithm

    bunzip2

    decompress files compressed with bzip2

    xz

    compress files using the xz algorithm

    unxz

    decompress files compressed with xz


    Package Management

    Debian based (like Ubuntu)

    command

    description

    apt-get

    APT package handling utility
    apt-get install packagename → install a package
    apt-get update → update package list
    apt-get upgrade → upgrade installed packages
    apt-get remove packagename → remove a package

    apt-cache

    query APT cache
    apt-cache search packagename → search for a package
    apt-cache show packagename → show package details


    Red Hat based (like Centos, Fedora)

    command

    description

    yum

    package manager for RPM based systems
    yum install packagename → install a package
    yum update → update installed package
    yum remove packagename → remove a package

    dnf

    next generation package manager (CentOS 8+, Fedora)
    dnf install packagename → install a package
    dnf update → update installed packages
    dnf remove packagename → remove a package


    General

    command

    description

    rpm

    RPM package manager
    rpm -i packagename.rpm → install an RPM package
    rpm -e packagename → remove an RPM package

    dpkg

    Debian package manager
    dpkg -i packagename.deb → install a Debian package
    dpkg -r packagename → remove a Debian package


    System services and daemon management

    command

    description

    systemctl

    control the systemd system and service manager
    systemctl start servicename → start a service
    systemctl stop servicename → stop a service
    systemctl restart servicename → restart a service
    systemctl enable servicename → enable a service to start on boot
    systemctl disable servicename → disable a service from starting on boot
    systemctl status servicename → check service status

    service

    older service management command (used in non systemd systems)
    service servicename start → start a service
    service servicename stop → stop a service
    service servicename restart → restart a service
    service servicename status → check service status


    Scheduling tasks

    command

    description

    cron

    daemon for running scheduled commands
    crontab -e → edit cron jobs for the current user
    crontab -l → list the current user's cron jobs
    crontab -r → remove the current user's cron jobs

    at

    run commands at a specified time
    at 06:00 → schedule a command to run at 6:00 o'clock

    batch

    run commands when the system load is low

    sleep

    delay for a specified time
    sleep 6s → sleep for 6 seconds


    File permissions and security

    command

    description

    chmod

    change file permissions

    chown

    change file owner and group

    chgrp

    change the group ownership of a file

    umask

    set default permissions for new files

    setfacl

    set file access control lists (ACL)

    getfacl

    get file access control lists

    sudo

    execute a command as another user (usually root)

    visudo

    edit the sudoers file safely

    passwd

    change a user's password

    sudoers

    manage sudo access for users

    gpasswd

    administer group password

    ss

    display socket statistics (for secure network connections)


    System backup and restore

    command

    description

    rsync

    remote file and directory synchronization
    rsync -avz source destination → synchronize files
    rsync -avz -e ssh source user@remote:/destination/ → sync over SSH

    cpio

    copy files to and from archives

    dd

    low-level copying and backup of entire filesystems
    dd if=/dev/sda of=/path/backup.img → backup a disk or partition
    dd if=/path/backup.img of=/dev/sda → restore a disk or partition


    System Diagnostics and Troubleshooting

    command

    description

    dmesg

    print the kernel ring buffer messages
    system boot and hardware related messages

    journalctl

    query and view logs from systemd's jourmal

    strace

    trace system calls and signals
    strace commandname → trace a command's system call

    lsof

    list open files
    lsof files → show processes using a specific file

    vmstat

    report virtual memory statistics

    iostat

    report CPU and I/O statistics

    mpstat

    report CPU usage statistics

    pidstat

    report statistics by process

    free

    display memory usage

    uptime

    how long the system has been running

    watch

    execute a program periodically - showing output
    watch -n 1 free → watch memory usage every second

    lshw

    list hardware configuration

    htop

    interactive process viewer

    netstat

    network statistics (replaced by ss)

    ss

    show socket statistics


    Networking & Remote Management

    command

    description

    ifconfig

    configure network interfaces (replaced by ip)

    ip

    a more modern alternative for managing network interfaces and routing
    ip addr → show ip addresses
    ip link → show or manipulate network interfaces
    ip route → show or manipulate routing tables

    ss

    show socket statistics

    nmap

    network exploration tool

    telnet

    user interface to the telnet protocol

    nc

    network utility for reading and writing from network connections
    netcat
    nc -l -p 1234 → listen on port 1234
    nc host port → connect to a host and port

    iptables

    administration tool for IPv4 packet filtering and NAT

    firewalld

    frontend for managing firewall rules (Fedora/CentOS)

    ufw

    uncomplicated firewall
    ufw enable → enable firewall
    ufw allow port → allow traffic on a specific port

    tcpdump

    command line packet analyzer

    curl

    transfer data from or to a server using various protocols

    wget

    download files from the web

    scp

    secure copy over SSH
    scp test.txt user@remotemachine:/path → copy file to remote machine

    rsync

    remote file and directory synchronization
    rsync -avz /path/ remotemachine:/path → sync directories between 2 machines


    Text Processing Utilities

    command

    description

    grep

    search for patterns within files
    grep 'pattern' file.txt → search for a pattern in a file
    grep -r 'pattern' /dirname/ → recursively search for a pattern

    sed

    stream editor for filtering and transforming text
    sed 's/old/ne/g' file.txt → replace old by new globally

    awk

    a powerful text processing language
    awk '{print $1} file.txt → print the first column of each line in a file

    cut

    remove sections from each line of a file
    cut -d ':' -f 1 /etc/passwd → print the first field of each line delimited by ":"

    sort

    sort lines of text files
    sort file.txt → sort file content in ascending order

    uniq

    report or omit repeated lines in a file
    sort file.txt | uniq → sort an remove duplicate lines

    tee

    read from standard input and write to standard output and files
    echo "text" | tee file.txt → write to file and show output on screen

    tr

    translate or delete characters
    echo "hello" | tr 'a-z' 'A-Z' → convert lowercase to upercase letters

    paste

    merge lines of files
    paste file1.txt file2.txt → combine lines of file1 and file2 side by side

    wc

    word, line, character and or byte count
    wc -l file.txt → count lines in a file
    wc -w file.txt → count words in a file


    System shutdown and reboot

    command

    description

    shutdown

    shut down a system
    shutdown -h now → immediately shut down the system
    shutdown -r now → immediately reboot the system
    shutdown -h +10 → shut down after 10 minutes

    reboot

    reboot the system

    halt

    halt the system immediately

    poweroff

    power off the system

    init

    change the runlevel (old-style system manager)
    init 0 → shutdown
    init 6 → reboot


    File system mounting and management

    command

    description

    mount

    mount a file system
    mount /dev/sda1 /mnt → mount partition to a directory

    umount

    umount a file system
    umount /mnt → unmount the file system mounted at /mnt

    fstab

    file system table
    configuration file for mounting file systems

    blkid

    display block device attributes

    fsck

    check and repair a file system
    fsck /dev/sda1 → check and repair /dev/sda1


    Filesystem permissions and security

    command

    description

    chmod

    change file permissions
    chmod 755 file.txt → give read write and execute permissions to owner
    and read/execute permissions to others

    chown

    change file owner and group
    chown user:group file.txt → change owner and group of a file

    chgrp

    change group ownership of a file
    chgrp group file.txt → change the group of a file

    umask

    set default permissions for new files
    umask 022 → set default permissions for newly created files to 755

    setfack

    set access control lists (ACL) for file permissions

    getfacl

    get access control lists (ACL) for file permissions


    Docker (containerization and orchestration)

    command

    description

    docker

    docker command line (CLI) for managing containers

    docker run image

    run a container from an image

    docker ps

    list running containers

    docker ps -a

    list all containers including stopped ones

    docker build -t imagename .

    build an image from a dockerfile

    docker exec -it container_id bash

    start an interactive bash shell inside a running container

    docker stop container_id

    stop a container

    docker rm container_id

    remove a container

    docker logs container_id

    view logs of a container

    dock images

    list available images

    docker rmi imagename

    remove an image

    docker network ls

    list docker networks

    docker-compose

    manage multi-container docker applications

    docker-compose up

    start up a multi-container environment

    docker compose down

    stop and remove containers created by docker-compose

    docker-compose logs

    view logs from containers managed by docker-compose


    Kubernetes (k8s) (containerization and orchestration)

    command

    description

    kubectl

    command line tool for interacting with Kubernetes clusters

    kubectl get pods

    list pods in the current namespace

    kubectl get nodes

    list nodes in the cluster

    kubectl get services

    list services in the cluster

    kubectl apply -f file.yaml

    apply configuration from a file

    kubectl create -f file.yaml

    create a resource from a file

    kubectl delete -f file.yaml

    delete a ressource defined in a file

    kubectl exec -it podname --bash

    execute a command inside a pod (ex. open a shell)

    kubectl logs podname

    view the logs of a pod

    kubectl describe pod podname

    get detailed information about a pod

    kubectl scale deployment deploymentname --replicas=number

    scale a deployment to the desired number of replicas

    kubectl rollout restart deployment deploymentname

    restart a deployment

    kubectl port-forward pod podname localport:remoteport

    forward a port from a pod to localhost


    Helm (containerization and orchestration)

    command

    description

    helm

    Kubernetes package manager for deploying applications

    helm install releasename chartname

    install a helm chart

    helm upgrade releasename chartname

    upgrade a helm release

    helm list

    list all helm releases

    helm delete releasename

    delete a helm release

    helm search chartname

    search for a helm chart


    Automation and configuration management

    Ansible

    command

    description

    ansible

    automation tool for configuration management

    ansible all -m ping

    ping all hosts defined in the inventory

    ansible-playbook playbook.yml

    run an ansible playbook

    ansible -m command -a 'command' host

    run a single command on a target host

    ansible-playbook --check playbook.yml

    dry run a playbook to see what would change

    ansible-playbook --limit host playbook.yml

    run a playbook on a specific host or group

    ansible-playbook --extra-vars "key=value"

    pass extra variables to a playbook


    Terraform

    command

    description

    terraform

    infrastructure as code tool for provisioning and managing cloud ressources

    terraform init

    initialize a working directory for terraform configuration

    terraform plan

    show an execution plan (what changes would be made)

    terraform apply

    apply the changes described in a terraform configuration

    terraform destroy

    destroy infrastructure created by terraform

    terraform validate

    validate the configuration files

    terraform show

    show the current state of the infrastructure


    Puppet

    command

    description

    puppet

    configuration management tool

    puppet apply manifest.pp

    apply a puppet manifest locally

    puppet agent ---test

    test the puppet agent

    puppet resource

    show the current state of resources
    (files, services, etc.)


    CI/CD tools and commands

    Jenkins

    command

    description

    jenkins

    continous integration tool

    java -jar jenkins.war

    start jenkins from a war file
    access jenkins trough http://localhost:8080 by default


    GitLab CI

    command

    description

    .gitlab-ci.yml

    configuration file for GitLab CI/CD pipelines

    gitlab-runner register

    register a new runner with GitLab

    gitlab-runner run

    run the Gitlab Runner to process jobs


    GitHub Actions

    command

    description

    Info

    GitHub Actions uses YAML configuration files
    typically located in .github/workflows/

    actions/checkout@v2

    checkout the repository code in your CI pipeline

    actions/setup-node@v2

    setup Node.JS for use in a pipeline

    docker/setup-buildx-action@v1

    set up docker buildx for building multi platform images


    Cloud Services

    AWS CLI (Amazon Web Services)

    command

    description

    aws

    command line tool for managing AWS services

    aws configure

    configure AWS CLI with your credentials

    aws s3 cp file.txt s3://bucketname/

    copy a file to an S3 bucket

    aws ec2 describe-instances

    descripe EC2 instances

    aws ec2 start-instances --instance-ids id

    start an EC2 instance

    aws ec2 stop-instances --instance-ids id

    stop an EC2 instance

    aws s3 sync

    sync directories with an S3 bucket


    Azure CLI (Microsoft)

    command

    description

    az

    command line tool for managing Azure services

    az login

    log in to your Azure account

    az vm list

    list all virtual machines

    az vm start --name vmname --resource-group resourcegroup

    start an Azure VM

    az storage blob upload

    upload files to an Azure blob storage

    az group create

    create a new resource group in Azure AD


    Google Cloud SDK

    command

    description

    gcloud

    command line tool for Google cloud platform

    gcloud auth login

    log in to Google cloud

    gcloud compute instances list

    list compute instances

    gcloud compute instances stop instancename

    stop a Google cloud VM instance

    gcloud ap browse

    open the current Google app engine application in a browser


    Logging and Monitoring


    Prometheus

    command

    description

    prometheus

    open source system monitoring and alerting toolkit
    start prometheus server (usually as a background service)

    prometheus --config.file=configfile

    start prometheus with a specific config file


    Grafana

    command

    description

    grafana-cli

    command line interface for managing Grafana plugins

    grafana-cli plugins install pluginname

    install a plugin in Grafana


    ELK Stack (Elasticsearch, Logstash, Kibana)

    command

    description

    elasticsearch

    search engine for logging and data analytics

    curl -XGET 'localhost:9200/_cluster/health?pretty'

    get cluster health status

    logstash

    server side data processing pipeline

    logstash -f configfile

    run logstash with the specified configuration file

    kibana

    web interface for visualizing Elasticsearch data
    Kibana is generally access through web on http://localhost:5601

  • Linux File System

    • ISeeTWizard
    • October 26, 2025 at 10:50 AM

    Every folder under Linux has it's meaning.

    Folder

    What it contains

    /bin

    Essential command binaries

    /boot

    System boot loader files

    /dev

    Device files

    /etc

    Host specific system wide configuration files

    /home

    User home directory

    /lib

    Shared library modules

    /media

    Media file such as DVD-ROM

    /mnt

    Temporary mounted filesystem

    /opt

    Add-on application software packages

    /proc

    Automatically generated file system
    Interface to kernel data structures

    /root

    Home directory for root user

    /run

    Runtime program data

    /sbin

    System binaries

    /srv

    Site specific data served by this system

    /sys

    Virtual directory providing information about the system

    /tmp

    Temporary files

    /usr

    Read-only user files
    Unix System Ressources

    /var

    Files that are expected to continuously change

  • Linux Cheatsheet (for beginners)

    • ISeeTWizard
    • October 26, 2025 at 10:49 AM


    Command

    Description

    ls

    lists contents of a directory just like dir under DOS

    cat

    concatenate and print files

    grep

    searches for specific results with pattern

    clear

    clear the terminal

    cd

    change directory

    pwd

    print the working directory

    mkdir

    creates (make) a directory

    rmdir

    delete (remove) a directory

    man

    prints the manual pages of a specific tool

    which

    returns the path to an executable

    find

    searches for files in a directory hierarchy

    locate

    searches for files in a system using a prebuilt database

    who / whoami

    display all logged in users / current user

    id

    returns user ID

    chmod

    changes permissions and mode flags of a file or directory

    uname

    prints operating system's name (unix name)

    ifconfig

    network interface configuration of the system

    ip

    display and configure network parameters

    sudo / su

    executes a command as a different user
    by default the superuser
    open a sessions a s superuser

    ps

    lists the running processes status

    kill

    sends a kill signal to a process

    head

    view the first lines of any text

    mv

    move files

    cp

    copy files

  • Nmap commands

    • ISeeTWizard
    • October 26, 2025 at 10:41 AM

    What it does

    Command

    Details

    Host Discovery

    nmap -sn target

    Disables port scanning and performs
    host discovery to identify live hosts

    Port Scanning

    nmap -p port_range target

    Scans specified ports or
    port ranges on the target

    Service Version Detection

    nmap -sV target

    Detects version of services
    running on open ports

    Operating System Detection

    nmap -O target

    Identifies the operating system
    of the target host

    Aggressive Scan

    nmap -A target

    Performs OS detection, version detection
    script scanning and traceroute

    UDP Scan

    nmap -sU -p port_range target

    Scans specified UDP ports on target

    TCP Connect Scan

    nmap -sT target

    Performs a TCP connect scan
    to determine if ports are open or closed

    SYN Scan

    nmap -sS target

    Performs a stealth SYN scan to identify
    open ports without completing the
    TCP handshake

    Firewall Evasion

    nmap -T"0-5" target

    Adjusts timing templates to evade
    firewalls and intrusion
    detection systems

    Scan from File

    nmap -iL input_file target

    Reads target hosts from a file and
    performs the scan

    Scan All Ports

    nmap -p target

    Scans all 65, 535 ports on
    the target

    Service Enumeration

    nmap --script script_name target

    Uses Nmap Scripting Engine (NES)
    scripts to enumerate services and
    gather additional information

    Scan Specific Ports

    nmap -p port1,port2 target

    Scans specific ports on the target

  • Subnet Mask Cheat Sheet

    • ISeeTWizard
    • October 26, 2025 at 10:37 AM


    Addresses

    Host

    Netmask

    Amount of a Class C

    /30

    4

    2

    255.255.255.252

    1/64

    /38

    8

    6

    255.255.255.248

    1/32

    /28

    16

    14

    255.255.255.240

    1/16

    /27

    32

    30

    255.255.255.224

    1/8

    /26

    64

    62

    255.255.255.192

    1/4

    /25

    128

    126

    255.255.255.128

    1/2

    /24

    256

    254

    255.255.255.0

    1

    /23

    512

    510

    255.255.254.0

    2

    /22

    1024

    1022

    255.255.252.0

    4

    /21

    2048

    2046

    255.255.248.0

    8

    /20

    4096

    4094

    255.255.240.0

    16

    /19

    8192

    8190

    255.255.224.0

    32

    /18

    16384

    16382

    255.255.192.0

    64

    /18

    32768

    32766

    255.255.128.0

    128

    /16

    65536

    65534

    255.255.0.0

    256

    Guide to sub-class C blocks

    Network #

    IP Range

    Broadcast

    .0

    .1 - .126

    .127

    .128

    .129 - .254

    .255

    /25 -- 2 Subnets -- 126 Hosts/Subnet

  • Reverse DNS

    • ISeeTWizard
    • October 26, 2025 at 10:29 AM

    If you ever needed a Machine Name for an IP Address you can simply try this PowerShell command (always run as administrator).

    Code
    $ComputerIPAddress = '10.10.10.10'
    [System.Net.Dns]::GetHostEntry($ComputerIPAddress).HostName


    There is an alternative to get more information while connection to the Active Directory (if available).

    Code
    import-module activedirectory
    $ComputerIPAddress = '10.10.10.10'
    Get-ADComputer -property * -filter { ipv4address -eq $ComputerIPAddress }
  • DNS commands

    • ISeeTWizard
    • October 26, 2025 at 10:28 AM

    Here are some useful commands regarding the DNS cache, resolve etc.


    Code
    #Display the DNS Cache
    ipconfig /displaydns
    
    #Empty the DNS Cache
    ipconfig /flushdns
    
    #Display DNS Cache (Powershell only)
    Get-DnsClientCache
    
    #Empty the DNS Cache (PowerShell only)
    Clear-DnsClientCache
    
    #Test a connection to a computer (ping like PowerShell command)
    Test-Connection ComputerName
    
    <# Provides information about network latency and network loss at intermediate hops between a source and destination. 
    This command sends multiple echo Request messages to each router between a source and destination, over a period of time, and then computes results based on the packets returned from each router. 
    Because this command displays the degree of packet loss at any given router or link, you can determine which routers or subnets might be having network problems. #>
    pathping ComputerName
    
    #Performs a DNS name query resolution for the specified name
    Resolve-DnsName ComputerName
    
    #Find DNS records for a specific computer
    nslookup -debug ComputerName
    Display More
  • Block IP trough Firewall

    • ISeeTWizard
    • October 26, 2025 at 10:25 AM

    I had recent attacks on my Linux server and so I was searching on how to add an IP drop with my firewall.

    On my Sites I have a security system that blocks already many things but unfortunately not all.

    And so here I show you an example on how to do it (at least how I did it).

    Code
    #add the ip 91.92.252.176 to the connection reject list
    firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="91.92.252.176" reject'
    
    #reload the firewall with the new settings
    firewall-cmd --reload
    
    #see the state of the firewall engine
    firewall-cmd --state
    
    #see the current settings
    firewall-cmd --list-all
    Display More


    Example - You want to add an IP that is already exisiting


    Reload firewall - if all is ok you'll get a success


    Checking the state will show you if it's running or it's stopped


    With list-all you gonna see the current settings - so also what is allowed (here logicaly obfuscated)

  • Type of Networks

    • ISeeTWizard
    • October 26, 2025 at 10:20 AM

    PAN

    Personal Area Network A personal area network (PAN) is a computer network for interconnecting electronic devices within an individual person's workspace. A PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants.

    LAN

    Local Area Network A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home.

    WLAN

    Wireless Local Area Network A wireless local area network (WLAN) is a network that transmits information using electromagnetic waves or light, allowing devices to connect to the internet or other devices without the need for physical cables. WLANs are commonly used for wireless internet access in homes, offices, and public places.

    CAN

    Campus Area Network A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. Most CANs connect to the public Internet.

    MAN

    Metropolitan Area Network A metropolitan area network (MAN) is a network that covers a smaller geographical area such as a city or a large college campus system. Good examples of MANs are the local telephone company and your local cable TV company. MANs are also widely used in large companies and in governments to interconnect their computers.

    WAN

    Wide Area Network A wide-area network (WAN) is the technology that connects your offices, data centers, cloud applications, and cloud storage together. It is called a wide-area network because it spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.

    SAN

    Storage Area Network A Storage Area Network (SAN) is a network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space.

    SANS

    System Area Network A system area network (SAN) is a group of devices that are linked by a high-speed, high-performance connection. A SAN connection uses Internet Protocol (IP) addresses, which are assigned by TCP/IP to each SAN network interface controller (NIC), to determine data routing.

    POLAN

    Passive Optical Local Area Network A Passive Optical Network (PON) utilizes fiber-optic technology to distribute data from one source to multiple endpoints. The term "passive" denotes the use of optical fiber cables linked to an unpowered splitter, which transmits data from the service provider's network to numerous customers.

    EPAN

    Enterprise Private Network An Enterprise Private Network (EPN) is a computer network built by a business to interconnect its various company sites such as production sites, offices, and shops. This private network allows companies to share resources and communicate effectively.

    VPN

    Virtual Private Network A VPN protects its users by encrypting their data and masking their IP addresses. This hides their browsing activity, identity, and location, allowing for greater privacy and autonomy. Anyone seeking a safer, freer, and more secure online experience could benefit from a VPN.

  • Best Network Security Solutions

    • ISeeTWizard
    • October 26, 2025 at 10:19 AM

    Virtual Private Network - VPN

    • NordVPN
    • ExpressVPN
    • Cisco AnyConnect
    • Juniper Networks VPN


    Cloud Based Security Brokers - CASB

    • Microsoft Cloud App Security
    • Bitglass Total Cloud Security
    • Netskope Security Cloud
    • McAfee MVISION Cloud


    Antivirus / Antimalware

    • Symantec Endpoint Protection
    • McAfee Endpoint Prtoection (now Trellix)
    • Kaspersky Endpoint Protection
    • ESET Endpoint Protection

    I personally recommend to just use the Microsoft Defender


    Endpoint Detection and Reponse (EDR)

    • CrowdStrike Falcon
    • SentinelOne
    • Carbon Black (part of VMWare)
    • Sophos Intercept X


    Firewalls

    • Cisco ASA with FirePOWER
    • Palo Alto Networks Next-Generation Firewalls
    • Fortinet FortiGate
    • Check Point Next Generation Firewall


    Identity and Access Management (IAM)

    • Okta
    • Microsoft Azure Active Directory
    • Duo Security (Cisco)
    • SailPoint IdentiIQ


    Intrusion Detection and Prevention Systems (IDPS)

    • Snort
    • Cisco Firepower
    • Palo Alto Networks Threat Prevention
    • Check Point SandBlast


    Security Information and Event Management (SIEM)

    • Splunk Enterprise Security
    • IBM QRadar
    • LogRhythm NextGen SIEM Platform
    • AlienVault USM (AT&T Cybersecurity)


    Secure Web Gateways (SWG)

    • Zscaler Internet Access
    • Symantec Web Security Service
    • McAfee Web Gateway
    • Forcepoint Web Security


    Network Access Control (NAC)

    • Cisco Identity Services Engine (ISE)
    • Aruba ClearPass
    • Forescout Counter ACT
    • Portnox CORE


    Email Security

    • Trustifi AI-Security
    • Barracuda Email Security Gateway
    • Proofpoint Email Protection
    • Mimecast Secure Email Gateway
    • Cisco Email Security


    Data Loss Prevention (DLP)

    • Symantec Data Loss Prevention
    • Digital Guardian
    • McAfee Total Protection for Data Loss Prevention
    • Forcepoint DLP
  • Diablo IV - Vessel of Hatred

    • ISeeTWizard
    • October 25, 2025 at 9:23 AM
    Rating
    4/5
    Good

    Ratings

    These ratings are my personal opinion - Your Opinion maybe different than mine!


    Graphics

    5 out of 5

    Difficulty

    4 out of 5

    Steam Deck

    4 out of 5

    ROG Ally - Bazzite

    4 out of 5


    Description

    Vessel of Hatred is a paid expansion for Diablo 4 that comes with new ways to play and new evils to vanquish. Players get to choose whether they want to continue playing the base game of Diablo 4 or purchase the expansion and experience its contents.

    EMBRACE THE SHADOWS!
    A new region of Hell is coming to Diablo IV on October 8 - 2024! Vessel of Hatred is the first expansion and next chapter of the genre-defining, award-winning series by Blizzard Entertainment. Pre-purchase now for immediate access to in-game rewards and prepare for the darkness that awaits you as the first expansion charges through the land of Sanctuary.

    NEW CLASS: SPRIRITBORN
    Ranked among the apex predators of the jungle, the Spiritborn is an entirely new class to the Diablo series. They are battle-hardened with mystical synergies that could only be awakened deep within the jungles of Nahantu. Become one of the Spiritborn and embrace the ethereal Spirits entwined with this ancient civilization.

    NEW REGION: NAHANTU
    Explore Nahantu, the new jungle region in Diablo IV full of secrets, dangerous new Dungeons, Strongholds, and ferocious demons from warring Tribes.

    CONTINUE THE CAMPAIGN
    Set immediately following the events of Diablo IV, Vessel of Hatred continues the dark story as you fight to save Neyrelle from Mephisto's tightening grip on her soul, still reeling from the choice she made to contain him. The search for Neyrelle takes you deep into the ancient jungle as she grapples with the imprisoned Prime Evil. Attempt to unravel Mephisto’s dark plot while new foes encircle your every move, planning your demise. The fate of Neyrelle’s soul - and her ability to stop this Prime Evil from destroying Sanctuary - rests in your hands.

    Never fight alone as new Mercenaries can join you on your quest to fight in the dense undergrowth of Nahantu and beyond. These powerful allies grow in power as they progress, and each are equipped with unique abilities to help you in combat.

    NEW GAME UPDATES
    Vessel of Hatred also has huge updates for all Diablo IV players with new class skills, paragon boards, legendary glyphs, dungeon types, Tree of Whispers activities, and more.

    A new co-op PvE mode where you work with your friends to complete objectives and slay the boss in a multi-level dungeon, while getting loot and rewards.

    My Opinion

    As I can't play daily it always take some time until I finish my test but what should I say? I simply love Diablo IV as I loved the Diablo games before.

    The new class is great as also the new area.

    The story continues which is great and it take several hours to finish it but there is such abrupt ending...
    I thought it would continue but it was the end and so we can say the next DLC will come with the continuing story...

    For end gaming content I'm not the one to ask - here you need to ask people that don't have any life and play daily for hours and hours.

    But I would always recommend this game 🙂


    Requirements


    Minimum

    Operating System (OS)

    Windows 10 64Bit (1909 or higher)

    Processor (CPU)

    Intel Core i5-2500K
    AMD FX 8350

    Memory (RAM)

    8 GB

    Graphics processing unit (GPU)

    Nvidia Geforce GTX 660
    Intel Arc A380
    AMD Radeon R9 280

    DirectX

    12

    Network

    Broadband internet connection

    Disk Space

    90 GB

    Additional Comment

    1080p native resolution
    720p rendered resolution
    low graphics settings
    30 FPS
    SSD required


    Recommended

    Operating System (OS)

    Windows 10 64Bit (1909 or higher)

    Processor (CPU)

    Intel Core i5-4670K
    AMD Ryzen 1300X

    Memory (RAM)

    16 GB

    Graphics processing unit (GPU)

    Nvidia GTX 970
    Intel Arc A750
    AMD Radeon RX 470

    DirectX

    12

    Network

    Broadband internet connection

    Disk Space

    90 GB

    Additional Comment

    1080p resolution
    medium graphics settings
    60 FPS
    SSD required


    Trailer etc.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.


    Related links (non affiliate!)

    Steam
    Blizzard
    Instant Gaming


    Photos / ScreenShots



  • Insecure vs Secure Ports

    • ISeeTWizard
    • October 25, 2025 at 9:18 AM

    There are some default Ports used when working on a network/server but most of these ports exists in a default way and a secure way. Here are some essential ports listed with it's default number and it's secured number.


    Insecure Port

    Protocol

    Description

    Secure Port

    Protocol

    Description

    21

    FTP

    File Transfer Protocol (FTP) sends the username and password using plaintext from the client to the server.

    22

    SFTP

    Uses encryption to protect the user credentials and packet of data being transferred.

    23

    Telnet

    All information to & from the host on a telnet connection is sent in plaintext & cand be intercepted by an attacker.

    22

    Secure Shell

    Secure Shell (SSH) on port 22 uses encryption to ensure that traffic between the host and terminal is not sent in plaintext format.

    25

    SMTP

    Simple Mail Transfer Protocol (SMTP) is the default for sending email messages. Since it is unencrypted, data contained within the emails could be discovered by network sniffing.

    587

    SMTP

    The secure alternative is to use port 587 for SMTP using Transport Layer Security (TLS) which will encrypt the data between the mail client and the mail server.

    37

    Time

    Time Protocol may be in use by legacy equipment and has mostly been replaced by using port 123 for Network Time Protocol (NTP).

    123

    NTP

    NTP on port 123 offers between errorhandling capabilities, which reduces the likelihood of unexpected errors.

    53

    DNS

    Domain Name Service (DNS) is still used widely.

    853

    DoT

    However using DNS over TLS (DoT) on port 853 protects DNS information from being modified in transit.

    80

    HTTP

    Hyper Text Transfer Protocol (HTTP) is the basis of nearly all web browser traffic on the internet. Information sent via HTTP is not encrypted and is susceptible to sniffing attacks.

    443

    HTTPS

    HTTPS using TLS encryption is preferred as it protects the data in transit between the server and the browser.

    143

    IMAP

    Internet Message Access Protocol (IMAP) is a protocol used for retrieving emails. IMAP traffic on port 142 is not encrypted and susceptible to network sniffing.

    993

    IMAP

    The secure alterative is to use port 993 for IMAP which adds SSL/TLS security to encrypt the data between the mail client and the mail server.

    445

    SMB

    Server Message Block (SMB) is used by many versions of Windows for accessing files over the network. Files are transmitted unencrypted.

    2049

    NFS

    Network File System (NFS). Although NDS can use encryption it is recommended that NFS not be allowed through firewalls either.

    389

    LDAP

    Lightweight Directory Access Portocol (LDAP) is used to communicate directory information from servers to clients. Since LDAP is not encrpyted it is susceptible to sniffing and manipulation attacks.

    636

    LDAPS

    Lightweight Directory Access Portocol Secure (LDAPS) adds SSL/TLS LDAPS Security to protect the information while it is in transit.

  • 9 Essential Network Protocols

    • ISeeTWizard
    • October 25, 2025 at 9:17 AM

    Within the network there are many different protocols.

    9 of them are more than essential.


    Short Name

    Long Name

    Description

    HTTP

    Hypertext Transfer Protocol

    This is how web pages are requested and delivered on the internet.

    HTTPS

    Hypertext Transfer Protocol Secure

    It's like HTTP but with added security for safer data transfer.

    FTP

    File Transfer Protocol

    It's used to send and receive files over the internet.

    TCP

    Transmission Control Protocol

    It ensures that data sent over the internet arrives intact.

    IP

    Internet Protocol

    It provides addresses for devices on the internet.

    UDP

    User Datagram Protocol

    It's like TCP but faster and less concerned with data integrity.

    SMTP

    Simple Mail Transfer Protocol

    It's used for sending emails between servers.

    SSH

    Secure Shell

    It's a secure way to access and control remote computers.

    IMAP

    Internet Message Access Protocol

    Allow users to access email messages stored on a remote mail server.

  • The OSI Model with possible protocols

    • ISeeTWizard
    • October 25, 2025 at 9:14 AM

    No.

    Layer

    Description

    Device

    Implementations
    Protocols

    7

    Application

    Provides services directly to user applications.
    Identifies communication partners, identifies quality of service, considers user authentication and privacy and determines if adequate ressources are present.

    Gateway

    SMB
    HTTP
    SMTP
    FTP
    SNMP
    Telnet
    AppleTalk

    6

    Presentation

    Performs data transformations and services including formatting, compression and encryption services to provide a common interface for user applications.

    Gateway
    Redirectors

    HTTP
    FTP
    Telnet
    SMTP
    AFP
    TDI

    5

    Session

    Establishes, manages and terminates connections between applications at each end.
    Allows 2 applications to communicate over a network by opening a sessions and synchronizing the involved computers.

    Gateway

    NetBEUI
    TCP
    UDP
    SPX

    4

    Transport

    Provides transparent transfer of data between end systems by insulating layers 5-7 from complexities of layers 1-3.
    Responsible for end to end error recovery and flow control and ensures complete data transfer.

    Gateway

    IP
    IPX
    NWLink
    NetBEUI

    3

    Network

    Establishes, maintains and terminates network connections.
    Handles traffic management including addressing, routing, switching, forwarding, local paths and virtual circuits, error handling, congestion control and packet sequencing.

    Router
    Brouter

    IP
    IPX
    NWLink
    NetBEUI

    2

    Data Link

    Divided into two sub-layers:
    The Media Access Control (MAC) sub layer controls how a networked computer gains access to the data and permission to transmit it
    The Logical Link Control (LLC) sub layer controls frame synchronization, flow control and error checking.

    Switch
    Bridge
    Router

    Ethernet
    PPP
    HDLC

    1

    Physical

    Controls transmission of the bit stream data over the physical medium.
    Standards for this layer address transmission at the electrical and menchanical level including signal voltage swing, voltage duration, etc.

    Multiplexer
    Repeater

    Ethernet
    Token Ring
    FDDI

  • The OSI Layer and its possible attacks

    • ISeeTWizard
    • October 25, 2025 at 9:12 AM

    The OSI Layer should be commonly known in the world of ICT but did you know what attack targets what layer?

    Here a table to clarify this...


    LayersAttacks
    7ApplicationExploit
    6PresentationPhishing
    5SessionHijacking
    XSS Attacks / Sessions Side Jacking / Malware
    4TransportReconnaissance / DoS (Denial-of-Service)
    TCP Session Hijack / Fraggle / Syn Flood / Land Attacks
    3NetworkMan in the Middle
    Smurf Attack / Ping of Death / Teardrop
    2Data LinkSpoofing
    MAC Spoofing / MAC Flooding / VLAN Hopping
    1PhysicalSniffing
  • What is/means ICT?

    • ISeeTWizard
    • October 24, 2025 at 2:09 PM

    Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage and audiovisual, that enable users to access, store, transmit, understand and manipulate information.

    ICT is also used to refer to the convergence of audiovisuals and telephone networks with computer networks through a single cabling or link system. There are large economic incentives to merge the telephone networks with the computer network system using a single unified system of cabling, signal distribution, and management. ICT is an umbrella term that includes any communication device, encompassing radio, television, cell phones, computer and network hardware, satellite systems and so on, as well as the various services and appliances with them such as video conferencing and distance learning. ICT also includes analog technology, such as paper communication, and any mode that transmits communication.

    ICT is a broad subject and the concepts are evolving. It covers any product that will store, retrieve, manipulate, process, transmit, or receive information electronically in a digital form (e.g., personal computers including smartphones, digital television, email, or robots). Skills Framework for the Information Age is one of many models for describing and managing competencies for ICT professionals in the 21st century.

Did you know…?

“Dreams do not come true just because you dream them. It’s hard work that makes things happen. It’s hard work that creates change.”

Shonda Rhimes

“There is no passion to be found playing small—in settling for a life that is less than the one you are capable of living.”

Nelson Mandela

“The future belongs to those who believe in the beauty of their dreams.”

Eleanor Roosevelt

“Life is a daring adventure or it is nothing at all.”

Helen Keller

“We have to dare to be ourselves, however frightening or strange that self may prove to be.”

May Sarton

“The new dawn blooms as we free it. For there is always light if only we’re brave enough to see it, if only we’re brave enough to be it.”

Amanda Gorman

“Living might mean taking chances, but they’re worth taking.”

Lee Ann Womack

“I may not have gone where I intended to go, but I think I have ended up where I needed to be.”

Douglas Adams

“Tomorrow is a new day. You shall begin it serenely and with too high a spirit to be encumbered with your old nonsense.”

Ralph Waldo Emerson

“Life is like riding a bicycle. To keep your balance, you must keep moving.”

Albert Einstein

“Find out who you are and do it on purpose.”

Dolly Parton

“It does not matter how slowly you go, as long as you do not stop.”

Confucius

“Before anything else, preparation is the key to success.”

Alexander Graham Bell

“Life is made of ever so many partings welded together.”

Charles Dickens

“Failure is a great teacher and, if you are open to it, every mistake has a lesson to offer.”

Oprah Winfrey

“Some people want it to happen, some wish it would happen, others make it happen.”

Michael Jordan

“It is never too late to be what you might have been.”

George Elliot

“Next time, ask ‘What’s the worst that will happen?’ Then push yourself a little further than you dare.”

Audre Lorde

“I’m not going to continue knocking that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

Ava DuVernay

“The only thing we have to fear is fear itself.”

Franklin D. Roosevelt

“For me, becoming isn’t about arriving somewhere or achieving a certain aim. I see it instead as forward motion, a means of evolving, a way to reach continuously toward a better self. The journey doesn’t end.”

Michelle Obama

“The world you desire can be won. It exists... it is real... it is possible... it’s yours.”

Ayn Rand

“We must let go of the life we have planned, so as to accept the one that is waiting for us.”

Joseph Campbell

“One of the deep secrets of life is that all that is really worth doing is what we do for others.”

Lewis Carroll

“It is better to fail in originality than to succeed in imitation.”

Herman Melville

“No need to hurry. No need to sparkle. No need to be anybody but oneself.”

Virginia Woolf

“Always go with your passions. Never ask yourself if it’s realistic or not.”

Deepak Chopra

“The purpose of life is to live it, to taste experience to the utmost, to reach out eagerly and without fear for newer and richer experience.”

Eleanor Roosevelt

“Be persistent and never give up hope.”

George Lucas

You cannot change what you refuse to confront.

“To succeed in life, you need three things: a wishbone, a backbone, and a funnybone.”

Reba McEntire

“Once you face your fear, nothing is ever as hard as you think.”

Olivia Newton-John

“Spread love everywhere you go. Let no one ever come without leaving happier.”

Mother Teresa

“The biggest adventure you can take is to live the life of your dreams.”

Oprah Winfrey

“You don’t always need a plan. Sometimes you just need to breathe, trust, let go and see what happens.”

Mandy Hale

“If you don’t have any shadows, you’re not in the light.”

Lady Gaga

“Ambition is the path to success. Persistence is the vehicle you arrive in.”

Bill Bradley

“Everything you can imagine is real.”

Pablo Picasso

“The great courageous act that we must all do is to have the courage to step out of our history and past so that we can live our dreams.”

Oprah Winfrey

“When you have a dream, you’ve got to grab it and never let go.”

Carol Burnett

“Yesterday is but today’s memory and tomorrow is today’s dream.”

Khalil Gibran

“If you don’t like the road you’re walking, start paving another one.”

Dolly Parton

“The simple things are also the most extraordinary things, and only the wise can see them.”

Paulo Coelho

“Coming together is a beginning; keeping together is progress; working together is success.”

Henry Ford

“My wish for you is that you continue. Continue to be who you are, to astonish a mean world with your acts of kindness.”

Maya Angelou

“Be yourself; everyone else is already taken.”

Oscar Wilde

“Life has no limitations, except the ones you make.”

Les Brown

“And when you want something, all the universe conspires in helping you achieve it.”

Paulo Coelho

“The fear of death follows from the fear of life. A man who lives fully is prepared to die at any time.”

Mark Twain

“Keep smiling, because life is a beautiful thing and there’s so much to smile about.”

Marilyn Monroe

“You will face many defeats in life, but never let yourself be defeated.”

Maya Angelou

“Let us make our future now, and let us make our dreams tomorrow’s reality.”

Malala Yousafzai

“Dreaming, after all, is a form of planning.”

Gloria Steinem

“Life is very interesting…in the end, some of your greatest pains become your greatest strengths.”

Drew Barrymore

“We are here to add what we can to life, not to get what we can from life.”

William Osler

“Don’t judge each day by the harvest you reap but by the seeds that you plant.”

Robert Louis Stevenson

“Be sure you put your feet in the right place, then stand firm.”

Abraham Lincoln

“I’m not going to continue knocking on that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

W.P. Kinsella

“The future is not something we enter. The future is something we create.”

Leonard I. Sweet

“It’s amazing how a little tomorrow can make up for a whole lot of yesterday.”

John Guare

“Get busy living or get busy dying.”

Stephen King

“Never let the fear of striking out keep you from playing the game.”

Babe Ruth

“Nothing is impossible. The word itself says ‘I’m possible!’”

Audrey Hepburn

“All dreams are within reach. All you have to do is keep moving towards them.”

Viola Davis

“In three words I can sum up everything I’ve learned about life: It goes on.”

Robert Frost

“There are no regrets in life. Just lessons.”

Jennifer Aniston

“Don’t worry about failure, you only have to be right once.”

Drew Houston

“Life does not have to be perfect to be wonderful.”

Annette Funicello

“Dream big and dare to fail.”

Norman Vaughan

“Keep your face towards the sunshine and shadows will fall behind you.”

Walt Whitman

“You may not control all the events that happen to you, but you can decide not to be reduced by them.”

Maya Angelou

“There is no perfection, only life.”

Milan Kundera

“The future belongs to those who prepare for it today.”

Malcolm X

“Life is what happens to you when you are busy making other plans.”

John Lennon

“Success is stumbling from failure to failure with no loss of enthusiasm.”

Winston Churchill

“We pass through this world but once.”

Stephen Jay Gould

“I believe that if you’ll just stand up and go, life will open up for you. Something just motivates you to keep moving.”

Tina Turner

“Live in the sunshine, swim the sea, drink the wild air.”

Ralph Waldo Emerson

“You can be everything. You can be the infinite amount of things that people are.”

Kesha

“It is better to be hated for what you are than to be loved for what you are not.”

Andre Gide

“Just when you think it can’t get any worse, it can. And just when you think it can’t get any better, it can.”

Nicholas Sparks

“It is during our darkest moments that we must focus to see the light.”

Aristotle

“If you live long enough, you’ll make mistakes. But if you learn from them, you’ll be a better person.”

Bill Clinton

“Always do your best. What you plant now, you will harvest later.”

Og Mandino

“Always remember that you are absolutely unique. Just like everyone else.”

Margaret Mead

“The art of life is to know how to enjoy a little and to endure very much.”

William Hazlitt

“Don’t take yourself too seriously. Know when to laugh at yourself, and find a way to laugh at obstacles that inevitably present themselves.”

Halle Bailey

“You have to believe in yourself when no one else does.”

Serena Williams

“When I let go of what I am, I become what I might be.”

Lao Tzu

“You can’t help what you feel, but you can help how you behave.”

Margaret Atwood

“Be where you are; otherwise you will miss your life.”

Buddha

“For the great doesn’t happen through impulse alone, and is a succession of little things that are brought together.”

Vincent Van Gogh

“Good friends, good books, and a sleepy conscience: This is the ideal life.”

Mark Twain

“Life isn’t about finding yourself. Life is about creating yourself.”

George Bernard Shaw

“We make a living by what we get, but we make a life by what we give.”

Winston Churchill

“If you have knowledge, let others light their candles in it.”

Margaret Fuller

“There are so many great things in life; why dwell on negativity?”

Zendaya

“You only live once, but if you do it right, once is enough.”

Mae West

“There’s love enough in this world for everybody, if people will just look.”

Kurt Vonnegut

“Whatever we are, whatever we make of ourselves, is all we will ever have—and that, in its profound simplicity, is the meaning of life.”

Philip Appleman

“Do one thing every day that scares you.”

Eleanor Roosevelt

  1. Privacy Policy
  2. Contact
  3. Legal Notice
Powered by WoltLab Suite™
Style: Ambience by cls-design
Stylename
Ambience
Manufacturer
cls-design
Licence
Commercial styles
Help
Supportforum
Visit cls-design