Everywhere
  • Everywhere
  • Articles
  • Pages
  • Forum
  • Files
  • More Options
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  • Login
  • Register
  • Search
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. Dashboard
  2. Members
    1. Recent Activity
    2. Users Online
    3. Staff
    4. Search Members
  3. Forum
  4. Downloads
  5. ISeeT Main Site
  1. ISeeT Forums
  2. Members
  3. ISeeTWizard
  • Sidebar
  • Sidebar

Posts by ISeeTWizard

  • Restore missing default power plan

    • ISeeTWizard
    • October 26, 2025 at 12:32 PM

    Sometimes there are missing options for the power plan especially on laptops.

    Here are some options to restore them.

    PowerShell
    (Power saver)
    powercfg -duplicatescheme a1841308-3541-4fab-bc81-f71556f20b4a
    
    (Balanced)
    powercfg -duplicatescheme 381b4222-f694-41f0-9685-ff5bb260df2e
    
    (High Performance)
    powercfg -duplicatescheme 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
    
    (Ultimate Performance - Windows 10 build 17101 and later)
    powercfg -duplicatescheme e9a42b02-d5df-448d-aa00-03f14749eb61
    Display More
  • Camera Basics

    • ISeeTWizard
    • October 26, 2025 at 12:30 PM

    Sensor Size

    The crop Factor represents the difference in size between a 35mm film frame and the sensor of your camera.

    In digital photography, the crop factor, format factor, or focal length multiplier of an image sensor format is the ratio of the dimensions of a camera's imaging area compared to a reference format; most often, this term is applied to digital cameras, relative to 35 mm film format as a reference. In the case of digital cameras, the imaging device would be a digital image sensor. The most commonly used definition of crop factor is the ratio of a 35 mm frame's diagonal (43.3 mm) to the diagonal of the image sensor in question; that is, CF = diag35mm / diagsensor
    Given the same 3:2 aspect ratio as 35mm's 36 mm × 24 mm area, this is equivalent to the ratio of heights or ratio of widths; the ratio of sensor areas is the square of the crop factor.

    Wikipedia


    Depth of field

    Shallow D.O.F.
    f/2.8
    Here the center, as example a person, is in focus. The left and right side is out of focus.


    Deep D.O.F.
    f/16
    Here you can say that everything is in focus.


    Exposure Interval

    Short Intervals like 1/4000 freezes the motion

    Long Intervals like a second will blur the subject in movement


    Exposure

    The exposure can be set from -3 up to +3.
    Normally 0 is just right but if you want it brighter you can go up to +3 and of course if you want darker you can go down step by step to -3.

    It all depends what kind of photo you want to take.


    Shutter Speed

    If you set a slow shutter speed like 30, 15, 8, 2 or 1 second a tripod is recommended.
    You use that for night or low light photos as example as also for long exposures or a blur motion

    If you than swap over to 1/30, 1/50 second handheld is OK.
    You use this on sunny days, family shots or outdoor photos.

    And than you have 1/100, 1/250, 1/100 for less light scenes.
    This is used for shorter exposure and to freeze actions.


    ISO

    In resume you can say to use low ISO in good lightning and high ISO in bad lightning.

    As example on a sunny day without clouds you can use ISO 100. When some clouds are coming you can move up to 400. If now there is no sun but just clouds you need to swap to 800 and on heavy clouds even up to 1600. At night with only the moonlight available maybe 6400 is good.
    These are just examples - you need to find out yourself what is best for your actual case of course.


    Aperture

    The aperture is mostly given in f/2.0 up to f/8.0 (f/8.0 is not the max - you can even have/use f/22 - I just mention the commonly used values).
    f/2.0 is an open aperture and here the photo is lighter. With this you can blur the background and it is often used for shooting portraits.

    f/8.0 is a closed aperture and the photo will get much darker. Here you can shoot clearer backgrounds and it is mainly used for shooting landscapes.


    Exposure Triangle

    Focal Length

    Often you here that someone has a lens with 50mm or 300mm etc. This in fact indicates the angle used.

    So you have 180° whitch corresponds to 8mm (extra wide) - This one is rarely used for shooting photos.

    The most common used one is 46° aka 50mm and than it goes up to 8° aka 300mm (tele)

  • HTTP Status Codes

    • ISeeTWizard
    • October 26, 2025 at 12:26 PM

    Did you ever asked what all those error codes in the web means? 404 everyone know as the page you were looing for wasn't found but what about 301? 200? 500? and so many more?

    1XX - Information

    Number

    Description

    100

    Continue

    101

    Switching Protocols

    102

    Processing

    103

    Early Hints


    2XX - Success

    Number

    Description

    200

    OK

    201

    Created

    202

    Accepted

    203

    Non-Authoritative Information

    205

    Reset Content

    206

    Partial Content

    207

    Multi-Status (WebDAV)

    208

    Already Reported (WebDAV)

    226

    IM Used (HTTP Delta Encoding)


    3XX - Redirection

    Number

    Description

    300

    Multiple Choices

    301

    Moved Permanently

    302

    Found

    303

    See Other

    304

    Not Modified

    305

    Use Proxy

    306

    Unused

    307

    Temporary Redirect

    308

    Permanent Redirect


    4XX - Client Error

    Number

    Description

    400

    Bad request

    401

    Unauthorized

    402

    Payment required

    403

    Forbidden

    404

    Not found

    405

    Method not allowed

    406

    Not acceptable

    407

    Proxy authentication required

    408

    Request timout

    409

    Conflict

    410

    Gone

    411

    Lenght required

    412

    Precondition failed

    413

    Payload too large

    414

    URI too large

    415

    Unsupported media type

    416

    Range not satisfiable

    417

    Exception failed

    418

    I'm a teapot

    421

    Misdirected request

    422

    Unprocessable entity (WebDAV)

    423

    Locked (WebDAV)

    424

    Failed Dependency (WebDAV)

    425

    Too early

    426

    Upgrade required

    428

    Precondition required

    429

    Too many requests

    431

    Request header fields too large

    451

    Unavailable for leagal reasons

    499

    Client closed request


    5XX - Server Error Responses

    Number

    Description

    500

    Internal Server Error

    501

    Not implemented

    502

    Bad Gateway

    503

    Service Unavailable

    504

    Gateway Timeout

    505

    HTTP version not supported

    507

    Insufficient Storage (WebDAV)

    508

    Loop detected (WebDAV)

    510

    Not extended

    511

    Network authentication required

  • DNS Record Types

    • ISeeTWizard
    • October 26, 2025 at 12:24 PM

    I got several times the question what DNS record type is used for what and so I made a table.

    Type

    Used for

    Example

    A

    maps a domain name to an IPv4 address

    iseet.fans → 87.118.116.40

    AAAA

    maps a domain name to an IPv6 address

    Google DNS → 2001:4860:4860::8888

    CNAME

    maps an alias name to a canonical domain name

    http://www.iseet.fans → iseet.fans

    MX

    specifies mail exchange servers for a domain

    mx.iseet.fans

    NS

    indicates DNS servers for a domain

    iseet.fans NS ns1.iseet.fans

    PTR

    shows reverse DNS lookup info for an IP address

    87.118.116.40 → iseet.fans

    TXT

    allows admins to add any text info for verification

    SPF entry example → v=spf1 +a +mx -all

    SRV

    specifies info about available services in a domain

    SIP server host/port info

    SOA

    stores essential domain info

    primary domain server
    admin email
    domain serial

    CAA

    specifies which certificate authorities are allowed to issue certificates for domain


  • DSGVO konform (Germany)?

    • ISeeTWizard
    • October 26, 2025 at 12:22 PM

    INFO: This page is in german as many Germans had this problem/issue. If you want an english version please let me know it down in the comments section.

    Aus aktuellem Anlass - eine Abmahnungswelle wegen Google Fonts - sollt jeder der eine Webseite betriebt nicht vergessen diese DSGVO konform zu integrieren und Cookie Banner und co dürfen auch nicht vergessen werden.

    Es gibt für Wordpress relativ viele Plugins für den Cookie Banner usw und ich nutze zB folgendes Plugin: Complianz.

    Dazu gibt es noch Plugins zum cachen von Google Fonts so dass diese nicht mehr für den User bei Google geladen werden. OMGF ist zB ein solches Plugin oder auch noch Local Google Fonts.

    ACHTUNG: Über Google Recaptcha werden auch Google Fonts geladen deshalb ist es sehr wichtig die verschiedenen erforderlichen Seiten mit den Infos zu generieren.

    Neben solchen Plugins kann es aber auch vorkommen dass man eine andere Art von Webseite nutzt wo es kein Plugin oder ähnliches gibt und man deshalb die Google Fonts lokal laden muss.

    Dafür habe ich ein kleines Video auf YouTube gestellt wo das ganze etwas erläutert wird.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Um das ganze manuell zu bewerkstelligen braucht man nicht unbedingt ein Web Developer zu sein denn es ist keine grosse Hexerei.

    In fast allen Fällen wird der Google Font entweder in der index.php Seite oder des Templates geladen oder aber auch direkt über eine CSS Datei. Man muss nur in diesen Dateien schauen ob man etwas hat was so ähnlich wie folgendes aussieht:

    HTML
    <head>
    <link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Sofia">
    <style>
    body {
      font-family: "Sofia", sans-serif;
    }
    </style>
    </head>

    Dieses ist ein Beispiel mit HTML respektive auch unter PHP wird es so geladen.

    CSS
    @import url('https://fonts.googleapis.com/css?family=Muli&display=swap');
    @import url('https://fonts.googleapis.com/css?family=Quicksand&display=swap');
    body {
      font-family: 'Muli', sans-serif;
      color: rgba(0, 0, 0, 0.8);
      font-weight: 400;
      line-height: 1.58;
      letter-spacing: -.003em;
      font-size: 20px;
      padding: 70px;
    }
    
    h1 {
      font-family: 'Quicksand', sans-serif;
      font-weight: 700;
      font-style: normal;
      font-size: 38px;
      line-height: 1.15;
      letter-spacing: -.02em;
      color: rgba(0, 0, 0, 0.8);
      -webkit-font-smoothing: antialiased;
    }
    Display More

    Aber man kann es auch direkt unter der CSS Datei importieren wie oben erwähnt.


    Hat man nun den Font identifiziert geht man einfach auf die Seite von Google Fonts und lädt diese herunter.

    Wenn man den Font öffnet findet man oben recht "Download Family".

    Wenn man diese Datei herunter geladen hat kann man sie dekomprimieren und man hat mehrer Dateien. Normalerweise findet man eine Datei mit dem Font Namen-VariableFont also als Beispiel Quicksand-VariableFont_wght.ttf. Dieses ist die Beste Datei für den nächsten Schritt.

    Im nächsten Schritt benötigt Ihr einen Font Converter. Ich nutze dazu hier den OnlineFontConverter.

    Hier benötigen wir die Dateien eot, svg, woff und woff2. TTF könnte man auch nehmen ist aber unnötig da der Konverter aus dem hochgeladenen Font ein Regular Font dann macht und man verliert die Vorteile eines Variablen Fonts.

    Die Option font-face mit auswählen rate ich an da man dann eine CSS Datei bekommt wo aufgelistet ist wie man die Fonts integrieren kann.

    Ausserdem benenne ich die Font Datei um um es leichter zu haben also zB habe ich aus Quicksand-VariableFont_wght.ttf ganz einfach Quicksand.ttf gemacht ehe ich sie zum konverteieren hoch geladen habe.

    Nach der Konvertierung lädt man sich die Datei dann herunter und auch hier dekomprimiert man sie wieder.

    Alle Font Datei lädt man nun hoch wobei ich empfehle sie in einen Ordner nahmens Fonts zu laden um sie leichter zu finden. Vergesst diesen Ordner aber nicht da Ihr den beim laden der Fonts in der CSS Datei mit eingeben müsst.

    Ist alles fertig könnt Ihr die CSS Datei öffnen und den darin enthaltenen Code in eure eigene CSS Datei kopieren.

    CSS
    @font-face {
      font-family: 'Quicksand-Light';
      src: url('Quicksand-Light.svg#Quicksand-Light') format('svg'),
           url('Quicksand-Light.woff') format('woff');
      font-weight: normal;
      font-style: normal;
    }
    
    @font-face {
      font-family: 'Quicksand';
      src: url('Quicksand.eot');
      src: url('Quicksand.eot?#iefix') format('embedded-opentype'),
           url('Quicksand.woff2') format('woff2');
      font-weight: normal;
      font-style: normal;
    }
    Display More

    Dieses wird immer als erstes in der CSS Datei geladen!!

    CSS
    @font-face {
      font-family: 'Orbitron-Regular';
      src: url('https://fonts.datateam.center/fonts/Orbitron-Regular.svg#Orbitron-Regular') format('svg'),
           url('https://fonts.datateam.center/fonts/Orbitron-Regular.ttf') format('truetype'),
           url('https://fonts.datateam.center/fonts/Orbitron-Regular.woff') format('woff');
      font-weight: 700;
      font-style: normal;
    }
    
    @font-face {
      font-family: 'Orbitron';
      src: url('https://fonts.datateam.center/fonts/Orbitron.eot');
      src: url('https://fonts.datateam.center/fonts/Orbitron.eot?#iefix') format('embedded-opentype'),
           url('https://fonts.datateam.center/fonts/Orbitron.woff2') format('woff2');
      font-weight: 700;
      font-style: normal;
    }
    
    body {margin: 0px 0px 0px 0px;
      background-color: #000!important;
      color: #9999ff;
      font-family: Orbitron, Verdana, Helvetica, Arial, sans-serif;
    }
    Display More

    Wie Ihr hier sehen könnt wird unter dem Body nur die Font-Family Orbitron angegeben und Orbitron-Regular nicht. Dies ist unnötig da dieses automatisch passiert.

    Ausserdem seht Ihr oben font-weight: 700;

    Hätte ich nicht den variable font als TTF hochgeladen sondern den Regular würde das auf den Geräten die auf die TTF zugreifen müssen nicht funktionieren.

    • EOT → IE9 Compat Modes
    • EOT + ?#iefix → IE6-IE8
    • WOFF2 → Super Modern Browsers
    • WOFF → Pretty Modern Browsers
    • TTF → Safari, Android, iOS
    • SVG → Legacy iOS

    Über ein Plugin wie AutoOptimize kann man zB die Google Fonts danach komplett sperren.

  • Google Fonts DSGVO - Lokale EinbindungGoogle Fonts DSGVO - Lokale Einbindung

    • ISeeTWizard
    • October 26, 2025 at 12:16 PM

    Da dieses YouTube Video auf Deutsch ist wird der Begleittext in der selben Sprache sein.

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.

    Momentan läuft eine Abmahnwelle dank der tollen EU Gesetze und eines Urteils des LG München (DANKE GRRR)

    Wenn Google Fonts ohne Consent Banner eingebunden werden kann man abgemahnt werden da der Google Server die IP des Nutzers speichert (als würde das nicht tagtäglich überall sonst auch passieren) und dieser Server steht nicht in der EU sondern USA...

    Nun kann man Plugins nutzen wenn man zB. Wordpress nutzt damit die Fonts lokal gecached werden allerdings ist das nicht komplett möglich wenn man zB. Tools wie Recaptcha nutzt, was es auf jeder Seite mit Login, Formular und co. wohl gibt um SPAM zu vermeiden. Deshalb sollte man wie gesagt einen Banner einbinden mit diesen Infos.

    Es gibt aber auch die Möglichkeit dass man das Ganze manuell einbinden möchte, also die Fonts, oder sogar muss. Und das möchte ich euch an Hand eines kleinen Beispiels hier zeigen damit Ihr nicht unnötig Geld zahlt.

    Ich habe das Ganze auch schriftlich auf meiner ISeeT Seite fest gehalten:
    https://iseet.fans/dsgvo-konform-germany/


    Hier die im Video genutzten Links:

    Google Font Checker:
    https://www.ccm19.de/google-fonts-checker

    Achtung Abmahnung: Prüfen Sie jetzt die Einbindung von Google Fonts
    Das Landgericht München I hat am 20.01.2022 in seinem Urteil (Az.: 3 O 17493/20) die Rechtswidrigkeit der Remote-Einbindung von Google Fonts festgestellt.…
    www.e-recht24.de

    Font Converter:
    https://onlinefontconverter.com

    Google Fonts Seite zum Downloaden:
    https://fonts.google.com

    Wordpress Plugins:
    https://wordpress.org/plugins/complianz-gdpr
    OMGF - Daan.dev

    Font Face Nutzung:

    How to use @font-face in CSS | CSS-Tricks
    The @font-face rule allows custom fonts to be loaded on a webpage. Once added to a stylesheet, the rule instructs the browser to download the font from where
    css-tricks.com
  • Wordpress, wpForo & EnlighterJS

    • ISeeTWizard
    • October 26, 2025 at 12:02 PM

    I had now several issues to get more buttons and especially the code Enlighter to work with wpForo. Unfortunately wpForo by default only uses the minimal TinyMCE editor and this can't be changed.

    But thanks to the functions.php file in you theme you can at least modify it's behavior in some parts which helps a lot.

    Also images aren't shown directly but as upload. So here are some tweaks for your functions.php file that may help you.

    Code
    function ISeeT_customize_wpforo_editor($settings) {
        // Add more buttons to the toolbar
    $settings['tinymce']['toolbar1'] = 'fontsizeselect,bold,italic,underline,strikethrough,forecolor,bullist,numlist,hr,alignleft,aligncenter,alignright,alignjustify,link,unlink,blockquote,wpf_spoil,undo,redo,pastetext,emoticons,fullscreen';
    $settings['tinymce']['toolbar2'] = 'cut,subscript,superscript,outdent,indent,backcolor,removeformat,table,visualblocks,visualchars,insertdatetime,formats,charmap,styleselect,searchreplace,anchor,image,media,pre,codesample,EnlighterInsert,EnlighterEdit';
    
        // Enable additional plugins
        $settings['plugins'] = 'charmap,colorpicker,compat3x,directionality,fullscreen,hr,image,link,lists,media,paste,tabfocus,textcolor,wordpress,wpautoresize,wpdialogs,wpeditimage,wpemoji,wpgallery,wplink,wptextpattern,wpview,advlist,codesample,enlighterjs';
        
        $settings['external_plugins'] = 
    array(
        'enlighterjs' => site_url('/wp-content/plugins/enlighter/resources/tinymce/enlighterjs.tinymce.min.js')
    );
    
        
    
        // Optional: set other TinyMCE settings
        $settings['tinymce']['tinymce'] = true;
        $settings['tinymce']['menubar'] = false;
        $settings['tinymce']['resize'] = true;
        $settings['tinymce']['teeny'] = false;
        $settings['tinymce']['quicktags'] = true;
        $settings['tinymce']['height'] = 600;
        return $settings;
    }
    add_filter('wpforo_editor_settings', 'ISeeT_customize_wpforo_editor');
    Display More


    You can see within the code what is used for what - Pay attention that if you want to add additional plugins like me (advlist, codesample,...) you need to download the correct version and here you must know that Wordpress is using a very very old version of TinyMCE as they don't want to invest the time to upgrade it. So you need to download the version 4.9.11 (I'll attach a version here)

    Of course you can adapt this to your needs.

    But by default wpForo is stripping some HTML tags by default for security reasons which is good but also bad as with that behavior the code isn't loaded correctly with the Enlighter Plugin.

    Code
    function ISeeT_allow_custom_html_in_wpforo($content) {
        $allowed_tags = wp_kses_allowed_html('post');
    
        // Erlaube zusätzliche Tags und Attribute
        $allowed_tags['pre']['class'] = true;
        $allowed_tags['code']['class'] = true;
        $allowed_tags['span']['class'] = true;
        $allowed_tags['div']['class'] = true;
    
        return wp_kses($content, $allowed_tags);
    }
    add_filter('wpforo_content_filter', 'ISeeT_allow_custom_html_in_wpforo', 10);
    Display More


    Thanks to that little code now the Enlighter plugin works well. Here the link to the plugin I'm talking of.

    And last but not least the little code to show the images - I didn't test it myself yet as the forum is brand new but I already integrated the code on the site and other told me that it is working.

    Code
    add_filter('wpforo_content_after', 'wpforo_default_attachment_image_embed', 11);
    function wpforo_default_attachment_image_embed( $content ){
        if( preg_match_all('|<a class=\"wpforo\-default\-attachment\" href\=\"([^\"\']+)\"[^><]*>.+?<\/a>|is', $content, $data, PREG_SET_ORDER) ){
            foreach($data as $array){
                if(isset($array[1])){
                    $file = $array[1];
                    $e = strtolower(substr(strrchr($file, '.'), 1));
                    if( $e === 'jpg' || $e === 'jpeg' || $e === 'png' || $e === 'gif' || $e === 'bmp' || $e === 'webp' ){
                        $filename = explode('/', $file); $filename = end($filename);
                        $html = '<a href="' . esc_url($file) . '" target="_blank"><img class="wpforo-default-image-attachment" src="' . esc_url($file) . '" alt="' . esc_attr($filename) . '" title="' . esc_attr($filename) . '" /></a>';
                        $content = str_replace($array[0], $html, $content);
                    }
                }
            }
        }
        return $content;
    }
    Display More

    I hope this will help you as it helped me - It was much try on error until I got it to work like I wanted.

    Files

    tinymce_4.9.11.zip 565.32 kB – 54 Downloads
  • Ninja Foodi 3-in-1 - CI100EU

    • ISeeTWizard
    • October 26, 2025 at 11:45 AM
    Rating
    4.5/5
    Excellent

    Introduction/Description

    Switch between hand blender, hand mixer and chopper attachments, for mixing, kneading, pureeing and crushing. Tackle your kitchen preparations effortlessly to prepare soups, sauces, bread dough and more

    The 850W base automatically detects the attachment used and offers optimized speed settings for perfect textures. Smart Torque motor handles thick mixes effortlessly

    2 mixing speeds, 5 stirring speeds & turbo. The 850W Smart Torque motor maintains speed even with thick and stubborn ingredients. The gradual tarnish avoids splashes

    Add ingredients while mixing with the evenly weighted freestanding motor base. Hands free eject button. Easy to clean with dishwasher safe top rack accessories

    Box contents: hand blender, hand blender & chopper, 850 W base (EU plug), attachments for hand blender and hand mixer, 2 x whisks, 2 x dough hooks, 700 ml chopping bowl with blade unit and recipe booklet.


    Installation Difficulty

    4 out of 5

    Performance

    5 out of 5

    Noise

    4 out of 5

    Easy of use

    4 out of 5


    YouTube Video

    N/A


    Opinion

    I had enoough of many devices in my kitchen cupboard even that I recently bought a new chopper but I was very unhappy with it.

    So I thought let's try a Ninja product and now during the Amazon Prime Days with 42% I could resist and I bought it.

    I wasn't sure if it would be a good choice but at least it looked like. During the unboxing I already saw the good quality of the product and that the blender has even 4 blades. Continuying unboxing showed me that the chopper also have 4 blades (2 below in the bowl and 2 a bit higher). For me a great idea - I never had one like; that just saw some in videos.

    So I did some tests, first with the chopper as I needed some onions and what should is say, the blades are very sharp, you can ask my finger lol. I put 3 onions in the chopper bowl, so it was more than full, pushed the button 2 seconds and tada nearly all already chopped - some seconds more and it was like a mash - so pay attention not to push to long the power button.
    Also a good thing is the security here. I put all together and nothing worked - why? Very simple the part with motor wasn't 100% fitted on the bowl and than the blades won't turn - really really good...

    For the mixer I already thought, damn my device isn't working like it should but it was my fault or let's say it's very delicate when but the motor block and the mixer part together. They need both to be really fixed together as else the button on the motor blocks works but not the one on the mixer and so you can't decide the speed of it. But when both are well and correctly fixed it works great 🙂

    I didn't do a soup yet, so the hand blender wasn't tested yet, except a dry test. It seems also to work very well but the next soup will show it to me 🙂

    So overall it seems that I have taken a good choice by buying this device but the long-term usage will show it. For now I'm satisfied and I have more space in my cupboard lol 🙂


    Long Time Opinion:

    It's the best chopper, hand blender & hand mixer I ever had. You need to pay attention when fixing the different mountings in the point that they make correct contact with the motor unit but for the rest I just can say WOW


    Specifications

    Dimensions: hand blender mode - H40.4 x W7.6 x D6.9 cm
    Hand mixer mode - H24.3 x W8 x D12.5 cm
    Weight in hand blender mode - 1.07 kg
    Weight in hand mixer mode - 1.02 kg
    Total weight: 2.04 kg
    850W


    Link(s) - Non Affiliated!

    Amazon


    Photos


  • Cultivea Zen Bonsaï

    • ISeeTWizard
    • October 26, 2025 at 11:45 AM
    Rating
    1.2/5
    Worst

    Introduction/Description

    Just another unboxing to get more familiar with the english language again.

    It's a Bonsai starter set - in some month, if it works I'll do a follow up.


    Ratings

    These ratings are my personal opinion - Your Opinion maybe different than mine!


    Usage Difficulty

    2 out of 5

    Documentation

    2 out of 5


    YouTube Video

    External Content youtu.be
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.


    Opinion

    It seems to be a very intresting starter set for Bonsais but the documentation is very unclear. I have the advantage to understand english, french and german and so with checking all the text in the different languages and using the documentation delivered with and the one online I could find out what is meant to do...

    I tried the first one and we gonna see if it works

    Long time result: Don't buy it - it simply doesn't work
    After several tries I gave it up and put everything in the bin!


    Specifications

    none


    Link(s) - Non Affiliated!

    Amazon


    Photos



  • JNLP files not opening

    • ISeeTWizard
    • October 26, 2025 at 11:36 AM

    f you have the issue that JNLP files don't open correctly anymore with Java simply copy the code below in a .reg file and import it to your registry.

    Pay attention that this example here is for the Java 8 Update 201 (last free version) version and you may need to update the path to your jp2launcher.exe file.

    Code
    Windows Registry Editor Version 5.00
    
    [HKEY_CLASSES_ROOT\JNLPFile]
    @="JNLP File"
    "EditFlags"=dword:00010000
    
    [HKEY_CLASSES_ROOT\JNLPFile\Shell]
    
    [HKEY_CLASSES_ROOT\JNLPFile\Shell\Open]
    @="&Launch"
    
    [HKEY_CLASSES_ROOT\JNLPFile\Shell\Open\Command]
    @="\"C:\\Program Files (x86)\\Java\\jre1.8.0_201\\bin\\jp2launcher.exe\" -securejws \"%1\""
    
    [HKEY_CLASSES_ROOT\jnlp]
    @="URL:jnlp Protocol"
    "URL Protocol"=""
    
    [HKEY_CLASSES_ROOT\jnlp\Shell]
    
    [HKEY_CLASSES_ROOT\jnlp\Shell\Open]
    
    [HKEY_CLASSES_ROOT\jnlp\Shell\Open\Command]
    @="\"C:\\Program Files (x86)\\Java\\jre1.8.0_201\\bin\\jp2launcher.exe\" -securejws \"%1\""
    
    [HKEY_CLASSES_ROOT\.jnlp]
    @="JNLPFile"
    "Content Type"="application/x-java-jnlp-file"
    Display More
  • Shoutcast Server

    • ISeeTWizard
    • October 26, 2025 at 11:34 AM

    I configured my Shoutcast Server I was searching a lot for different configuration settings and so on and had to swap to different sites to find all the info I wanted and needed.

    So I decided to collect the settings/configuration also on my site so that it's easier to find.

    Mandatory Options

    Code
    ; MaxUser.  The maximum number of simultaneous listeners allowed.
    ; Compute a reasonable value for your available upstream bandwidth (i.e. if
    ; you have 256kbps upload DSL, and want to broadcast at 24kbps, you would
    ; choose 256kbps/24kbps=10 maximum listeners.)  Setting this value higher
    ; only wastes RAM and screws up your broadcast when more people connect
    ; than you can support.
    MaxUser=10
    
    ; Password.  While SHOUTcast never asks a listener for a password, a
    ; password is required to transport audio stream to the server, and to perform
    ; administration via the web interface to this server.  This password should
    ; consist of only letters and numbers, and it's the same password that your
    ; broadcaster will need to enter in the SHOUTcast Source Plug-in for Winamp.
    ; THIS VALUE CANNOT BE BLANK.
    Password=a_hard_to_crack_password
    
    ; PortBase. This is the port number your server will run on.  The
    ; value, and the value + 1 must be available.  If you get a fatal error when
    ; the DNAS is setting up a socket on startup, make sure nothing else on the
    ; machine is running on the same port (telnet localhost port number -- if you
    ; get connection refused then you're clear to use that port).  Ports less than 1024
    ; may require root privileges on *nix machines.  The default port is 8000.
    ; I use my shoutcast server directly on port 443 as example - so I never have an issue with
    ; connecting to it on networks that blocks special ports.
    PortBase=443
    
    ; LogFile: file to use for logging. Can be '/dev/null' or 'none'
    ; or empty to turn off logging. The default is ./sc_serv.log
    ; on *nix systems or sc_serv_dir\sc_serv.log on win32.
    ; Note: on win32 systems if no path is specified the location is
    ; in the same directory as the executable, on *nix systems it is in the
    ; current directory.
    LogFile=/shoutcast/logs/SHOUTcast.log
    
    ; RealTime displays a status line that is updated every second
    ; with the latest information on the current stream (*nix and win32
    ; console systems only)
    RealTime=0
    
    ; ScreenLog controls whether logging is printed to the screen or not
    ; on *nix and win32 console systems. It is useful to disable this when
    ; running servers in background without their own terminals. Default is 1
    ScreenLog=0
    
    ; ShowLastSongs specifies how many songs to list in the /played.html
    ; page.  The default is 10.  Acceptable entries are 1 to 20.
    ; I put this always on the max :P
    ShowLastSongs=20
    
    ; TchLog decides whether or not the DNAS log file should track yp
    ; directory touches.  Adds and removes still appear regardless of
    ; this setting.
    ; Default is yes
    ; Recommended for those who wish to have the most secure logging possible. 
    ; Basic home/casual users probably don't need this.
    ; TchLog=yes
    
    ; WebLog decides whether or not hits to http:// on this DNAS will
    ; be logged.  Most people leave this off because the DSP plug-in
    ; uses http:// calls to update titles and get the listener count,
    ; which takes up a lot of log space eventually.  If you want to
    ; see people making hits on your admin.cgi or index pages, turn
    ; this back on.  Note that this setting does NOT affect XML stats
    ; counters for hits to http:// pages.
    ; Default is no.
    ; Once again, recommended for those who wish the most secure logging possible, 
    ; but not recommended for home/casual users.
    ; WebLog=no
    
    ; W3CEnable turns on W3C Logging.  W3C logs contain httpd-like accounts
    ; of every track played for every listener, including byte counts those listeners
    ; took.  This data can be parsed with tools like Analog and WebTrends, or given
    ; to third parties like Arbitron and Measurecast for their reporting systems.
    ; Default is Yes (enabled).
    W3CEnable=Yes
      
    ; W3CLog describes the name of the log file for W3C logging.  Default log file is
    ; sc_w3c.log, in the same directory wherever the DNAS gets started from.
    W3CLog=/dev/null
    ; The first option enables W3C logging. 
    ; This type of logging can be easily parsed by the programs listed.
    ; This is highly recommended for those who wish to have the most in depth statistics possible.
    ; The second option specifies where to store the W3C log. 
    ; This is set to /dev/null by the ebuild.
    Display More


    Network configuration

    Code
    ; SrcIP, the interface to listen for source connections on (or to make relay
    ; connections on if relaying). Can and usually will be ANY or 127.0.0.1
    ; (Making it 127.0.0.1 will keep other machines from being able to
    ; broadcast using your SHOUTcast Server )
    SrcIP=ANY
    
    ; DestIP, IP to listen for clients on (and to contact yp.SHOUTcast.com)
    ; can and usually will be be ANY. If your machine has multiple IP addresses,
    ; set this to the one you want it to be accessed by.
    DestIP=ANY
    ; you can set both to your domain or, if you use multiple domains like I 
    ; set it to your machine IP
    
    ; Yport, port to connect to yp.SHOUTcast.com on. For people behind caching
    ; web proxies, change this to the alternate port (666 is what it might be,
    ; check www.SHOUTcast.com if you have problems). Otherwise, leave this at 80.
    ; We're actively working on re-opening port 666, but as of release the only
    ; working port is port 80.
    Yport=80
    
    ; NameLookups.  Specify 1 to perform reverse DNS on connections.
    ; This option may increase the time it takes to connect to your
    ; server if your DNS server is slow.  Default is 0 (off).
    NameLookups=0
    
    ; RelayPort and RelayServer specify that you want to be a relay server.
    ; Relay servers act as clients to another server, and rebroadcast.
    ; Set RelayPort to 0, RelayServer to empty, or just leave these commented
    ; out to disable relay mode.
    ; This specifies that you are acting as a relay server. 
    ; Relay servers are often used to take a low bandwidth connection
    ; that can only stream to one client,
    ; and use its own higher bandwidth to serve to more clients. 
    ; RelayPort specifies the port and IP address of the SHOUTcast Server 
    ; you wish to relay for
    ; RelayPort=8000
    ; RelayServer=192.168.101.5
    Display More


    Server Configuration

    Code
    ; AdminPassword.  This password (if specified) changes the
    ; behavior of Password to be a broadcast-only password, and
    ; limits HTTP administration tasks to the password specified
    ; here.  The broadcaster, with the password above, can still
    ; log in and view connected users, but only the AdminPassword
    ; will grant the right to kick, ban, and specify reserve hosts.
    ; The default is undefined (Password allows control for both
    ; source and admin)
    ; AdminPassword=adminpass
    
    ; AutoDumpUsers controls whether listeners are disconnected if the source
    ; stream disconnects. The default is 0.
    ; This is set to 0, so that clients will either timeout themselves, 
    ; or keep trying to buffer a stream.
    AutoDumpUsers=0
    
    ; AutoDumpSourceTime specifies how long, in seconds, the source stream is
    ; allowed to be idle before the server disconnects it. 0 will let the source
    ; stream idle indefinitely before disconnecting. The default is 30.
    AutoDumpSourceTime=30
    
    ; ContentDir specifies the directory location on disk of where to stream
    ; on-demand content from. Subdirectories are supported as of DNAS 1.8.2.
    ; Default is ./content/, meaning a directory named content in the same directory
    ; as where sc_serv was invoked from.
    ContentDir=/opt/SHOUTcast/content/
    ; To use this, put an mp3 in the content directory, then point your browser to 
    ;  http://example.com: [port]/content/mp3name.pls . 
    ; SHOUTcast Server will automatically create a streaming media compatible play list 
    ; for the mp3, and stream it on demand. 
    ; Use this as an alternative to SHOUTcast Trans for streaming media source.
    
    ; IntroFile can specify a mp3 file that will be streamed to listeners right
    ; when they connect before they hear the live stream.
    ; Note that the intro file MUST be the same sample rate/channels as the
    ; live stream in order for this to work properly. Although bit rate CAN
    ; vary, you can use '%d' to specify the bit rate in the filename
    ; (i.e. C:\intro%d.mp3 would be C:\intro64.mp3 if you are casting at 64kbps).
    ; The default is no IntroFile
    ; IntroFile=c:\intro%d.mp3
    
    
    ; BackupFile can specify a mp3 file that will be streamed to listeners over
    ; and over again when the source stream disconnects. AutoDumpUsers must be
    ; 0 to use this feature. When the source stream reconnects, the listeners
    ; are rejoined into the live broadcast.
    ; Note that the backup file MUST be the same sample rate/channels as the
    ; live stream in order for this to work properly. Although bit rate CAN
    ; vary, you can use '%d' to specify the bit rate in the filename
    ; (i.e. C:\backup%d.mp3 would be C:\backup32.mp3 if you are casting at 32kbps).
    ; The default is no BackupFile
    ; BackupFile=C:\intro%d.mp3
    
    ; TitleFormat specifies a format string for what title is sent to the listener.
    ; For example, a string of 'Justin Radio' forces the title 'Justin Radio' even
    ; when the source changes the title. You can use up to one '%s' in the string
    ; which lets you contain the title from the source. For example, if your
    ; TitleFormat is 'Justin Radio: %s', and the source plug-in's title is
    ; 'Billy plays the blues', then the net title is
    ; 'Justin Radio: Billy plays the blues'. Note: only works on non-relay servers.
    ; The default is no format string.
    TitleFormat=Chris Gentoo Beats: %s
    
    ; URLFormat specifies a format string for what URL is sent to the listener.
    ; Behaves like TitleFormat (see above).
    ; The default is no format string.
    ; URLFormat= http://www.server.com/redirect.cgi?url=%s 
    
    ; PublicServer can be always, never, or default (the default, heh)
    ; Any setting other than default will override the public status
    ; of the source plug-in or of a SHOUTcast Server that is being relayed.
    PublicServer=default
    
    ; AllowRelay determines whether or not other SHOUTcast Servers will be
    ; permitted to relay this server.  The default is Yes.
    AllowRelay=Yes
    
    ; AllowPublicRelay, when set to No, will tell any relaying servers not
    ; to list the server in the SHOUTcast directory (non-public), provided
    ; the relaying server's Public flag is set to default.  The default is
    ; Yes.
    AllowPublicRelay=Yes
    
    ; MetaInterval specifies how often, in bytes, meta data sent.
    ; You should really leave this at the default of 32768, but the option is
    ; provided anyway.
    MetaInterval=32768
    Display More


    Access configuration

    Code
    ; ListenerTimer is a value in minutes of maximum permitted time for
    ; a connected listener.  If someone is connected for longer than this
    ; amount of time, in minutes, they are disconnected.  When undefined,
    ; there is no limit defined.  Default is undefined.
    ; ListenerTimer=600
    
    ; BanFile is the text file sc_serv reads and writes to/from
    ; for the list of clients prohibited to connect to this
    ; server.  It's automatically generated via the web
    ; interface.
    ; BanFile=sc_serv.ban
    
    ; RipFile is the text file sc_serv reads and writes to/from
    ; for the list of client IP addresses which are *ALWAYS* permitted
    ; to connect to this server (useful for relay servers).
    ; This file is automatically generated via the web
    ; interface.  Note that if your server is FULL, and someone
    ; from a Reserved IP connects, the DNAS will force the person
    ; listening for the longest time off to make room for the new
    ; connection.
    ; RipFile=sc_serv.rip
    
    ; RipOnly, when set to Yes, will only allow IP addresses listed in the Reserved
    ; IP list to connect and relay.  All other connections for listening will be denied.
    ; This is really only useful for servers whose sole purpose is to provide the
    ; primary feed to all public relays.  Setting this value to Yes also forces the
    ; server into Private mode, since listing this server in the directory would
    ; be pointless.  Default is No.
    ; RipOnly=No
    Display More


    Mass configuration

    Code
    ; Unique: assigns a variable name for use in any configuration item which points to a
    ; file.  Useful for servers running lots of SHOUTcast Servers that have similar
    ; configuration parameters, excepting log file names, ban file names, etc.  Any
    ; parameter that takes a pathname can include the character $, which will
    ; substitute $ for the variable assigned here.  Keep in mind that the unique
    ; variable can only be used after it is defined, so don't try to use a unique
    ; variable substitution in a path before you define it.  For example, you
    ; could set:
    ; Unique=my_server
    ; and then define Log=/usr/local/SHOUTcast/$.log in an included configuration
    ; file.  Default is Unique=$, so that by default any file with $ in the name
    ; won't substitute anything at all.
    
    ; Include: instructs the sc_serv to read from the named configuration file,
    ; *at the point of insertion of the Include statement*, and process as though
    ; the included file was part of itself.  Note that all configuration parameters
    ; in the DNAS configuration file are processed first to last, so if an item is defined
    ; twice in a configuration, the last item to process will be the one that takes
    ; effect.  For this reason, it's usually a good idea to use the Includes first
    ; in a configuration file.
    ; example:
    ; Include=/usr/local/SHOUTcast/common.conf
    ; Default is not applicable.
    Display More


    Optimization configuration

    Code
    ; CpuCount is used to explicitly limit the DNAS to dominating a finite
    ; amount of processors in multiprocessor systems.  By default,
    ; SHOUTcast creates one thread for every processor it detects in the
    ; host system, and assigns listeners equally across all the threads.
    ; In the event SHOUTcast doesn't correctly determine the number of
    ; CPUs in your host, or if you for whatever reason want to force
    ; the DNAS to not use other processors, you can say so here.
    ; Default behavior is to use as many processors as the DNAS detects on
    ; your system.
    ; CpuCount=1
    
    ; Sleep defines the granularity of the client threads for sending data.
    ; DNAS 1.7.0, per client thread, will send up to 1,024 bytes of data
    ; per socket (or less depending on the window available), and then
    ; sleep for the provided duration before repeating the whole process.
    ; Note that making this value smaller will vastly increase CPU usage on
    ; your machine.  Increasing reduces CPU, but increasing this value too far
    ; will cause skips.  The value which seems most optimal for 128kbps
    ; streaming is 833 (833 microseconds per client poll) on our test labs.
    ; We wouldn't recommend setting it any lower than 100, or any higher than
    ; 1,024.  If you have a slower machine, set this number lower to fix
    ; skips.
    ; Default value is 833.
    ; Sleep=833
    
    ; CleanXML strips some whitespace and line feeds from XML output which
    ; confuses some (poorly written) XML parsers.  If you get XML rendering errors,
    ; try turning this on.  Default is No (off).
    ; CleanXML=No
    Display More


    Shoutcast Trans

    SHOUTcast Trans stands for SHOUTcast Trans(coder), as it is able to transcode mp3's to lower or higher bit rates. SHOUTcast Trans works by streaming mp3's from a play list specified in the configuration file. You should put this configuration in it's sepearated file shoutcast/sc_trans.conf as example.

    Code
    ; PlaylistFile (required EVEN IF RELAYING) - play list file (to create, use
    ; find /path/to/mp3/directory -type f -name "*.mp3" > playlist_filename.lst
    PlaylistFile=/shoutcast/playlists/playlist.lst
    
    ; Serverip/ServerPort are the target server to send to
    Serverip=127.0.0.1
    ServerPort=8765
    
    ; Password is the password on the sc_serv you're sending to.
    Password=password you also have in sc_serv.conf
    
    ; StreamTitle/URL/Genre define the data that appears on the directory and in the
    ; stream info.
    StreamTitle=ISeeT Radio
    StreamURL= https://iseet.fans 
    Genre=All around the world
    
    ; Logfile optionally denotes a text file to log sc_Trans to.  a kill -HUP
    ; will force a close and re-open of this file (but will also cease logging to
    ; the console)
    LogFile=/shoutcast/logs/sc_Trans.log
    
    ; Shuffle the play list
    Shuffle=1
    
    ; Bitrate/SampleRate/Channels recommended values:
    ; 8kbps 8000/11025/1
    ; 16kbps 16000/11025/1
    ; 24kbps 24000/22050/1
    ; 32kbps 32000/22050/1
    ; 64kbps mono 64000/44100/1
    ; 64kbps stereo 64000/22050/2
    ; 96kbps stereo 96000/44100/2
    ; 128kbps stereo 128000/44100/2
    Bitrate=128000
    SampleRate=44100
    Channels=2
    ; Quality is from 1-10. 1 is best, 10 is fastest.
    Quality=1
    
    ; Mode=0 for none, 1 for 100/100->100/0, 2 for 0/100->100/0
    CrossfadeMode=1
    ; Length is ms.
    CrossfadeLength=6000
    
    UseID3=1
    
    ; Public determines whether or not this station will show up in the directory
    Public=0
    
    ; Put stuff here for user interaction (AOL IM, ICQ, IRC)
    AIM=
    ICQ=
    IRC=
    ; You see ICQ - so very very old as ICQ is now death
    Display More


    Pay attention that Shoutcast trans is started separately with as example this command:
    /etc/init.d/shoutcast_trans start

    The command depends on your system!
    I as example don't use a start/stop script but I simply launch it at startup with a task manager.
    If you as example gentoo, you can install Shoutcast with emerge and then you have the init scripts.

  • How To Batch Delete All Empty Folders In Outlook?

    • ISeeTWizard
    • October 26, 2025 at 11:30 AM

    Press Alt + F11 keys to open the Microsoft Visual Basic for Applications window.

    Click Insert > Module, and paste below VBA code into the new module window.

    VBA
    Public Sub DeletindEmtpyFolder()
    Dim xFolders As Folders
    Dim xCount As Long
    Dim xFlag As Boolean
    Set xFolders = Application.GetNamespace("MAPI").PickFolder.Folders
    Do
    FolderPurge xFolders, xFlag, xCount
    Loop Until (Not xFlag)
    If xCount > 0 Then
    MsgBox "Deleted " & xCount & "(s) empty folders", vbExclamation + vbOKOnly, "Kutools for Outlook"
    Else
    MsgBox "No empty folders found", vbExclamation + vbOKOnly, "Kutools for Outlook"
    End If
    End Sub
     
    Public Sub FolderPurge(xFolders, xFlag, xCount)
    Dim I As Long
    Dim xFldr As Folder 'Declare sub folder objects
    xFlag = False
    If xFolders.Count > 0 Then
    For I = xFolders.Count To 1 Step -1
    Set xFldr = xFolders.Item(I)
    If xFldr.Items.Count < 1 Then 'If the folder is empty check for subfolders
    If xFldr.Folders.Count < 1 Then 'If the folder contains not sub folders confirm deletion
    xFldr.Delete 'Delete the folder
    xFlag = True
    xCount = xCount + 1
    Else 'Folder contains sub folders so confirm deletion
    FolderPurge xFldr.Folders, xFlag, xCount
    End If
    Else 'Folder contains items or (subfolders that may be empty).
    FolderPurge xFldr.Folders, xFlag, xCount
    End If
    Next
    End If
    End Sub
    Display More

    Press F5 Key or Run button to run this VBA code.

    In the popping out Select Folder dialog box, please select the specific folder whose empty subfolders you will delete in bulk, and click the OK button.

    Now a Kutools for Outlook dialog box comes out and shows you how many empty subfolders have been deleted. Click the OK button to close it.
    Until now, all subfolders of the specified Outlook folder have been deleted in bulk already.

    This FAQ comes from the following website:

    How to batch delete all empty folders in Outlook?
    Learn how to delete empty folders in Outlook to keep your mailbox organized and clutter-free.
    www.extendoffice.com
  • Open more than 10 mailboxes in Outlook

    • ISeeTWizard
    • October 26, 2025 at 11:28 AM

    Sometimes people need to open more than 10 mailboxes in Outlook but this is not possible due to a limit of the default Outlook settings.

    With a simple registry entry you can change this.

    Code
    Windows Registry Editor Version 5.00
    
    [HKEY_CURRENT_USER\Software\Microsoft\Exchange]
    
    "maxnumexchange"=dword:00000015

    But I wouldn't change this to a too high value - 15/20 and than you should consider in having 2 or more Outlook profiles.

  • How to change the RDP Port on your machine

    • ISeeTWizard
    • October 26, 2025 at 11:26 AM

    To make it hackers less easy to connect with RDP to our servers or desktops we can change the port for this and I really recommend it to every one.

    Simply choose a random number and than follow the instructions here.

    This can be achieved by using regedit to manipulate the registry

    Code
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\

    Enter here for the PortNumber a new decimal value (switch from hexadecimal to decimal).

    Pay attention to not forget to adapt your firewall rules with the new ports and your port forwarding rules within your router.

  • EDR vs MDR vs XDR

    • ISeeTWizard
    • October 26, 2025 at 11:24 AM

    MDR, which stands for managed detection and response.
    XDR, which stands for extended detection and response.
    EDR, which stands for endpoint detection and response.

    Features

    EDR

    MDR

    XDR

    Scope

    Endpoint devices only

    Broader infrastructure
    endpoints, networks, etc.

    Multi-Layer
    endpoints, networks, cloud, email, etc.

    Threat Detection

    Endpoint level detection

    Managed threat detection

    Cross-Layer threat detection across various systems

    Response

    Endpoint focused automated response

    Managed incident response with expert intervention

    Coordinated automated response across mutiple layers

    Management

    Requires internal teams

    Managed by an external service provider

    Mix of internal an automated management

    Visibility

    Limited to endpoint activities

    Endpoint and network visibility

    Holistic visibility across multiple layers and systems

    Human Expertise

    Requires in-house security expertise

    Extenral experts provide threat analysis and response

    Can involve human experts but focused on automation

    Automation

    Limited to endpoint level tasks

    Relies on humand and some automation

    High automation and orchestation across layers

    Cost

    Lower but requires in-house resources

    Higher due to managed services

    Medium to high for integrated multi-layer coverage

    Alert Management

    Can lead to alert overload from endpoints

    Alerts filtered by service provider

    Reduced alerts through correlation across multiple layers

    Ideal for

    Focused on endpoint security

    Companies with limited internal security resources

    Enterprises needing integrated protection across layers

  • Cyber Security Tools

    • ISeeTWizard
    • October 26, 2025 at 11:23 AM

    The different headings are links to the corresponding external site about the tool!


    OpenVAS

    • Vulnerabilities scanner
    • Can scan a target or a network with more of 4000 tests
    • Provide a report detailing any security vulnerabilities discovers


    SQLMap

    • Database exploitation
    • Automatic SQL injection
    • Sump entire or specific DB user
    • Tables, columns etc. monitoring
    • Automatic recognition of password hash and cracking with dictionary attack


    AIRCRACK-NG

    • WiFi Network security
    • Can recover WEP/WPA key
    • Wireless network monitoring


    MALTEGO

    • Data Mining Tool
    • OSINT Tool


    OpenSSH

    • Tool for remote login
    • SSH Tunneling


    Nessus

    • Vulnerabilities scanner
    • Database updated daily


    Zed Attack Proxy

    • WEB Application Scanner
    • Fuzzing
    • Websocket Testing
    • Flexible scan Policy Management


    Wireshark

    • Packets Analyser
    • GUI & Command line (tshark)
    • Free & Multiplatform
    • Can see the network traffic and detailed informations about packets. You can also use filters.


    Metasploit Packets Analyser

    • Exploitation Tool
    • Frequently updated
    • Open source and huge community
    • Free & Multiplatform


    John the Ripper

    • Password Cracker can crack different types of encrypted passwords
    • Brute Force Attack
    • Dictionary Attack


    NMAP

    • Security Scanner
    • Identify the device on a network
    • Can detect the running OS and open ports


    Burp Suite

    • Web Pentest
    • Target ASElyssf
    • Web Proxy
    • Lots of usefull mode


    VirusTotal

    VirusTotal refers to a popular online service used to scan files and URLs for viruses, malware and other security threats.


    Hybrid Analysis

    Hybrid Analysis is a sophisticated method used in cybersecurity for malware detection and analysis that combines both static and dynamic analysis techniques.


    ClamAV

    ClamAV is an opensource Linux based antivirus software widely used for detecting malware, viruses and other malicious threats.


    Suricata

    Surciata is an opensoruce network security tool for realtime threat detection, acting as an IDS, IPS and network monitor.


    Kali Linux

    Kali Linux is a Debian based operating system designed for cybersecurity offering a wide range of tools for penetration testing.


    MISP

    MISP is an open-source platform for sharing and analysing cybersecurity threat intelligence.

  • How to install Windows Updates on a Windows Core Edition Server

    • ISeeTWizard
    • October 26, 2025 at 11:19 AM

    The simplest way to realize that is to create a script for that.

    On MSDN you can find the following and it's working like a charm.

    Visual Basic
    Set updateSession = CreateObject("Microsoft.Update.Session")
    Set updateSearcher = updateSession.CreateupdateSearcher()
    
    WScript.Echo "Searching for updates…" & vbCRLF
    
    Set searchResult = _
    updateSearcher.Search("IsInstalled=0 and Type='Software'")
    
    WScript.Echo "List of applicable items on the machine:"
    
    For I = 0 To searchResult.Updates.Count-1
    Set update = searchResult.Updates.Item(I)
    WScript.Echo I + 1 & "> " & update.Title
    Next
    
    If searchResult.Updates.Count = 0 Then
    WScript.Echo "There are no applicable updates."
    WScript.Quit
    End If
    
    WScript.Echo vbCRLF & "Creating collection of updates to download:"
    
    Set updatesToDownload = CreateObject("Microsoft.Update.UpdateColl")
    
    For I = 0 to searchResult.Updates.Count-1
    Set update = searchResult.Updates.Item(I)
    WScript.Echo I + 1 & "> adding: " & update.Title
    updatesToDownload.Add(update)
    Next
    
    WScript.Echo vbCRLF & "Downloading updates…"
    
    Set downloader = updateSession.CreateUpdateDownloader()
    downloader.Updates = updatesToDownload
    downloader.Download()
    
    WScript.Echo  vbCRLF & "List of downloaded updates:"
    
    For I = 0 To searchResult.Updates.Count-1
    Set update = searchResult.Updates.Item(I)
    If update.IsDownloaded Then
    WScript.Echo I + 1 & "> " & update.Title
    End If
    Next
    
    Set updatesToInstall = CreateObject("Microsoft.Update.UpdateColl")
    
    WScript.Echo  vbCRLF & _
    "Creating collection of downloaded updates to install:"
    
    For I = 0 To searchResult.Updates.Count-1
    set update = searchResult.Updates.Item(I)
    If update.IsDownloaded = true Then
    WScript.Echo I + 1 & "> adding:  " & update.Title
    updatesToInstall.Add(update)
    End If
    Next
    
    WScript.Echo  vbCRLF & "Would you like to install updates now? (Y/N)"
    strInput = WScript.StdIn.Readline
    WScript.Echo
    
    If (strInput = "N" or strInput = "n") Then
    WScript.Quit
    ElseIf (strInput = "Y" or strInput = "y") Then
    WScript.Echo "Installing updates…"
    Set installer = updateSession.CreateUpdateInstaller()
    installer.Updates = updatesToInstall
    Set installationResult = installer.Install()
    
    'Output results of install
    WScript.Echo "Installation Result: " & _
    installationResult.ResultCode
    WScript.Echo "Reboot Required: " & _
    installationResult.RebootRequired & vbCRLF
    WScript.Echo "Listing of updates installed " & _
    "and individual installation results:"
    
    For I = 0 to updatesToInstall.Count – 1
    WScript.Echo I + 1 & "> " & _
    updatesToInstall.Item(i).Title & _
    ": " & installationResult.GetUpdateResult(i).ResultCode
    Next
    End If
    Display More


    Save this to a file named WUA_SearchDownloadInstall.vbs as example and than you can simply run cscript WUA_SearchDownloadInstall.vbs and he automatically searches for Updates and than asks to install them.

    There is also the option through the sconfig tool but this doesn't seem to always work like it should, at least in my case.

    Sconfig is the server config tool you now have as default on every core server. It opens automatically and trough option 6 (Windows Server 2012 R2, 2016, 2019 and maybe on newer versions) you can download and install updates.

  • Use a Windows Server Core installation as AD (link)

    • ISeeTWizard
    • October 26, 2025 at 11:16 AM

    For that I refer an external link as it's a bit complicated and why should I recreate something already so good explained from another one:

    https://4sysops.com/archives/server-roles-in-server-core-part-2-domain-controllers/

  • Upgrade a trial to a full server licence

    • ISeeTWizard
    • October 26, 2025 at 11:06 AM

    Enter in an elevated command prompt the following:

    Code
    Dism /online /Set-Edition:ServerStandard /AcceptEula /ProductKey:12345-67890-12345-67890-12345

    Of course you have to enter your correct Product Key


    To get the TargetEditions you can use

    Code
    Dism /online /Get-TargetEditions

    Possible Options are:

    • ServerDatacenter
    • ServerStandard
    • ServerSolution
    • ServerEnterprise
  • CP/M

    • ISeeTWizard
    • October 26, 2025 at 11:03 AM

    CP/M 86


    released

    1982

    floppies

    onesided 5,25" floppies


    CP/M 86 was brought out by Digital Research for the Intel 8080 CPU.
    It was the following version of the CP/M standart OS.


    It’s an operating system for 8-bit computers. It looks rather like DOS to use (only not so user-friendly); this is hardly surprising because DOS was copied from CP/M in about 1980.
    CP/M comes/came in three main versions; 1.4, 2.2 and 3.1. v2.2 was the basis of MSDOS, while v3.1 evolved into DRDOS and OpenDOS / DR-DOS.

    There were also 8086 and 68000 versions of CP/M. CP/M-86 evolved into DOS Plus, Concurrent DOSand REAL/32.

    They sold 600.000 copies of the OS. CP/M stands for: Control Program for Microcomputers

    CP/M disc formats

    The disc format used is to some extent implementation dependent. CP/M has no standard system (like the DOS boot record) to store disc parameters on the disc. Some individual systems use their own boot records (eg Amstrad PCW) but in general the only way to determine a format is to use a program like DISKSTAT on the computer which generated the discs. The sectors of some discs may be software skewed – again, the best way to determine this is to examine the translation table on the source computer.


    The layout of a disc is:

    Zero or more reserved tracks;
    One or more data blocks, a multiple of 1k in size. The data blocks can span tracks and usually contain multiple sectors.
    Any spare sectors – ignored by CP/M.
    There is one directory (with a fixed size), which occupies one or more blocks at the start of the file space. The directory contains 32-byte entries.


    DOS Plus 1.2 does not understand floppies bigger than 360k, and the only hard drive partitions it supports are DOS-formatted ones smaller than 32Mb. So, if you want to install it on your hard drive you may well have to do some serious partitioning.
    It will boot in the Linux DOS emulator as long as you have two or fewer emulated hard drives. It will crash on booting if there are three or more.




    Year 2000


    8-bit systems

    CP/M 1.x

    The OS makes no use of dates and so is fully Year 2000 compliant. You will still need to check any applications you use.


    CP/M 2.x

    The original Digital Research CP/M 2 makes no use of dates. However, several third-party BDOSes have been produced, which behave like CP/M 2 but also include time and date functionality:


    Z80DOS

    Z80DOS itself is 2000 compliant. Its date utility (TIMEZD12.COM) will not display dates past 2000 correctly, but such dates can be entered.


    DOS+

    DOS+ itself is 2000 compliant. Its date utility (TIME.COM) will accept dates past 2000, if they are entered explicitly as four digits.


    P2DOS

    P2DOS is 2000 compliant, and it is supplied with an excellent date utility that is also 2000 compliant.
    NovaDOS and SUPRBDOS are derivatives of P2DOS and the P2DOS information also applies to them.


    CP/M 3.x (CP/M Plus)

    The CP/M Plus BDOS is 2000 compliant, but the utilities DATE, DIR and SHOW are not.


    16-bit systems

    BDOS 2.x (CP/M-86 v1.1)

    The BDOS itself includes no date functions. However, the BIOS displays the current date on the screen; Year 2000 patches for this are available at the Unofficial CP/M Website, DOWNLOAD >> CP/M-86 >> PATCHES


    BDOS 4.x (DOSPLUS; Personal CP/M-86 v2.0/2; CP/M-86 Plus)

    The BDOS itself is Year 2000 compliant. The PCP/M-86 v2.0/2 and CP/M-86 Plus utilities (DIR.CMD; SDIR.CMD; SHOW.CMD; DATE.CMD) will not allow entry or display of dates after 2000. The DOSPLUS equivalent (COMMAND.COM) will.

  • Linux Commands

    • ISeeTWizard
    • October 26, 2025 at 10:58 AM

    Here are some basic linux commands. Please be aware that depending on your distribution they might me slightly different or non existent.

    File and directory management

    command

    description

    ls

    list directory contents

    cd

    change directory

    pwd

    print working directory

    cp

    copy files and directories

    mv

    move or rename files and directories

    rm

    remove files or directories

    mkdir

    make directories

    rmdir

    remove empty directories

    touch

    change file timestamps or create empty files

    find

    search for files in a directory hierarchy

    locate

    find files by name

    tree

    display directories in a tree like format

    chmod

    change file permissions

    chown

    change file owner and group

    chgrp

    change group ownership

    stat

    display file or file system status


    File viewing and editing

    command

    description

    cat

    concatenate and display file content

    tac

    concatenate and display file content in reverse

    more

    view file content interactively (page by page)

    less

    view file content interactively (scrollable)

    head

    output the first part of a file

    tail

    output the last part of a file

    nano

    text editor in terminal

    vim or vi

    advanced text editor in terminal

    emacs

    text editor in terminal

    grep

    search text using patterns

    sed

    stream editor for filtering and transforming text

    awk

    pattern scanning and processing language

    cut

    remove sections from each line of files

    sort

    sort lines of text files

    uniq

    report or omit repeated lines


    Process Management

    command

    description

    ps

    report a snapshot of current processes

    top

    display linux tasks

    htop

    interactive process viewer (advanced top)

    kill

    send a terminate signal to a process

    killall

    terminate process by name

    bg

    resume a suspended background job

    fg

    bring a job to the foreground

    jobs

    list active jobs

    nice

    run a program with modified scheduling priority

    renice

    alter priority of running processes

    uptime

    show how long the system is up and running

    time

    measure program running time


    Disk management

    command

    description

    df

    report file system disk space usage

    du

    estimate file space usage

    fdisk

    partition table manipulator

    lsblk

    list information about block devices

    mount

    mount a file system

    umount

    unmount a file system

    parted

    partition table manipulator

    mkfs

    create a file system

    fsck

    file system consistency check and repair

    blkid

    locate/print block device attributes


    Networking

    command

    description

    ifconfig

    configure network interfaces

    ip

    show/manipulate routing, devices and tunnels

    ping

    send ICMP echo requests to network host

    netstat

    network statistics

    ss

    socket statistics

    traceroute

    trace the route packets take to a network host

    nslookup

    query internet name servers interactively

    dig

    DNS lookup utility

    wget

    non-interactive downloader

    curl

    transfer data with URLs

    scp

    secure copy files between hosts

    ssh

    secure shell for remote login

    ftp

    file transfer protocol client


    User and group management

    command

    description

    useradd

    add a user

    usermod

    modify a user

    userdel

    delete a user

    groupadd

    add a group

    groupdel

    delete a group

    passwd

    modify the user password

    chage

    change password expiry information

    whoami

    print the current logged in user

    who

    show who is logged in

    w

    show who is logged in and what they are doing

    id

    display the user and group id

    groups

    show the user's groups


    System information and monitoring

    command

    description

    uname

    print system information

    hostname

    show or set the system's hostname

    uptime

    how long the system has been running

    dmesg

    boot and system messages

    free

    display memory usage

    top

    display linux tasks

    vmstat

    report virtual memory statistics

    lscpu

    display information about the CPU architecture

    lsusb

    list USB devices

    lspci

    list PCI devices

    lshw

    list hardware configuration


    Archiving and compression

    command

    description

    tar

    archive files
    tar -czf test.tar.gz /directory/path/ → compress files using gzip
    tar -xzf test.tar.gz → extract gzipped tarball
    tar -cf test.tar → /directory/path → create a tarball
    tar -xf test.tar → extract tarball

    zip

    package and compress files into a ZIP archive

    unzip

    extract files from a ZIP archive

    gzip

    compress files using the gzip algorithm

    gunzip

    decompress files compressed with gzip

    bzip2

    compress files using the bzip2 algorithm

    bunzip2

    decompress files compressed with bzip2

    xz

    compress files using the xz algorithm

    unxz

    decompress files compressed with xz


    Package Management

    Debian based (like Ubuntu)

    command

    description

    apt-get

    APT package handling utility
    apt-get install packagename → install a package
    apt-get update → update package list
    apt-get upgrade → upgrade installed packages
    apt-get remove packagename → remove a package

    apt-cache

    query APT cache
    apt-cache search packagename → search for a package
    apt-cache show packagename → show package details


    Red Hat based (like Centos, Fedora)

    command

    description

    yum

    package manager for RPM based systems
    yum install packagename → install a package
    yum update → update installed package
    yum remove packagename → remove a package

    dnf

    next generation package manager (CentOS 8+, Fedora)
    dnf install packagename → install a package
    dnf update → update installed packages
    dnf remove packagename → remove a package


    General

    command

    description

    rpm

    RPM package manager
    rpm -i packagename.rpm → install an RPM package
    rpm -e packagename → remove an RPM package

    dpkg

    Debian package manager
    dpkg -i packagename.deb → install a Debian package
    dpkg -r packagename → remove a Debian package


    System services and daemon management

    command

    description

    systemctl

    control the systemd system and service manager
    systemctl start servicename → start a service
    systemctl stop servicename → stop a service
    systemctl restart servicename → restart a service
    systemctl enable servicename → enable a service to start on boot
    systemctl disable servicename → disable a service from starting on boot
    systemctl status servicename → check service status

    service

    older service management command (used in non systemd systems)
    service servicename start → start a service
    service servicename stop → stop a service
    service servicename restart → restart a service
    service servicename status → check service status


    Scheduling tasks

    command

    description

    cron

    daemon for running scheduled commands
    crontab -e → edit cron jobs for the current user
    crontab -l → list the current user's cron jobs
    crontab -r → remove the current user's cron jobs

    at

    run commands at a specified time
    at 06:00 → schedule a command to run at 6:00 o'clock

    batch

    run commands when the system load is low

    sleep

    delay for a specified time
    sleep 6s → sleep for 6 seconds


    File permissions and security

    command

    description

    chmod

    change file permissions

    chown

    change file owner and group

    chgrp

    change the group ownership of a file

    umask

    set default permissions for new files

    setfacl

    set file access control lists (ACL)

    getfacl

    get file access control lists

    sudo

    execute a command as another user (usually root)

    visudo

    edit the sudoers file safely

    passwd

    change a user's password

    sudoers

    manage sudo access for users

    gpasswd

    administer group password

    ss

    display socket statistics (for secure network connections)


    System backup and restore

    command

    description

    rsync

    remote file and directory synchronization
    rsync -avz source destination → synchronize files
    rsync -avz -e ssh source user@remote:/destination/ → sync over SSH

    cpio

    copy files to and from archives

    dd

    low-level copying and backup of entire filesystems
    dd if=/dev/sda of=/path/backup.img → backup a disk or partition
    dd if=/path/backup.img of=/dev/sda → restore a disk or partition


    System Diagnostics and Troubleshooting

    command

    description

    dmesg

    print the kernel ring buffer messages
    system boot and hardware related messages

    journalctl

    query and view logs from systemd's jourmal

    strace

    trace system calls and signals
    strace commandname → trace a command's system call

    lsof

    list open files
    lsof files → show processes using a specific file

    vmstat

    report virtual memory statistics

    iostat

    report CPU and I/O statistics

    mpstat

    report CPU usage statistics

    pidstat

    report statistics by process

    free

    display memory usage

    uptime

    how long the system has been running

    watch

    execute a program periodically - showing output
    watch -n 1 free → watch memory usage every second

    lshw

    list hardware configuration

    htop

    interactive process viewer

    netstat

    network statistics (replaced by ss)

    ss

    show socket statistics


    Networking & Remote Management

    command

    description

    ifconfig

    configure network interfaces (replaced by ip)

    ip

    a more modern alternative for managing network interfaces and routing
    ip addr → show ip addresses
    ip link → show or manipulate network interfaces
    ip route → show or manipulate routing tables

    ss

    show socket statistics

    nmap

    network exploration tool

    telnet

    user interface to the telnet protocol

    nc

    network utility for reading and writing from network connections
    netcat
    nc -l -p 1234 → listen on port 1234
    nc host port → connect to a host and port

    iptables

    administration tool for IPv4 packet filtering and NAT

    firewalld

    frontend for managing firewall rules (Fedora/CentOS)

    ufw

    uncomplicated firewall
    ufw enable → enable firewall
    ufw allow port → allow traffic on a specific port

    tcpdump

    command line packet analyzer

    curl

    transfer data from or to a server using various protocols

    wget

    download files from the web

    scp

    secure copy over SSH
    scp test.txt user@remotemachine:/path → copy file to remote machine

    rsync

    remote file and directory synchronization
    rsync -avz /path/ remotemachine:/path → sync directories between 2 machines


    Text Processing Utilities

    command

    description

    grep

    search for patterns within files
    grep 'pattern' file.txt → search for a pattern in a file
    grep -r 'pattern' /dirname/ → recursively search for a pattern

    sed

    stream editor for filtering and transforming text
    sed 's/old/ne/g' file.txt → replace old by new globally

    awk

    a powerful text processing language
    awk '{print $1} file.txt → print the first column of each line in a file

    cut

    remove sections from each line of a file
    cut -d ':' -f 1 /etc/passwd → print the first field of each line delimited by ":"

    sort

    sort lines of text files
    sort file.txt → sort file content in ascending order

    uniq

    report or omit repeated lines in a file
    sort file.txt | uniq → sort an remove duplicate lines

    tee

    read from standard input and write to standard output and files
    echo "text" | tee file.txt → write to file and show output on screen

    tr

    translate or delete characters
    echo "hello" | tr 'a-z' 'A-Z' → convert lowercase to upercase letters

    paste

    merge lines of files
    paste file1.txt file2.txt → combine lines of file1 and file2 side by side

    wc

    word, line, character and or byte count
    wc -l file.txt → count lines in a file
    wc -w file.txt → count words in a file


    System shutdown and reboot

    command

    description

    shutdown

    shut down a system
    shutdown -h now → immediately shut down the system
    shutdown -r now → immediately reboot the system
    shutdown -h +10 → shut down after 10 minutes

    reboot

    reboot the system

    halt

    halt the system immediately

    poweroff

    power off the system

    init

    change the runlevel (old-style system manager)
    init 0 → shutdown
    init 6 → reboot


    File system mounting and management

    command

    description

    mount

    mount a file system
    mount /dev/sda1 /mnt → mount partition to a directory

    umount

    umount a file system
    umount /mnt → unmount the file system mounted at /mnt

    fstab

    file system table
    configuration file for mounting file systems

    blkid

    display block device attributes

    fsck

    check and repair a file system
    fsck /dev/sda1 → check and repair /dev/sda1


    Filesystem permissions and security

    command

    description

    chmod

    change file permissions
    chmod 755 file.txt → give read write and execute permissions to owner
    and read/execute permissions to others

    chown

    change file owner and group
    chown user:group file.txt → change owner and group of a file

    chgrp

    change group ownership of a file
    chgrp group file.txt → change the group of a file

    umask

    set default permissions for new files
    umask 022 → set default permissions for newly created files to 755

    setfack

    set access control lists (ACL) for file permissions

    getfacl

    get access control lists (ACL) for file permissions


    Docker (containerization and orchestration)

    command

    description

    docker

    docker command line (CLI) for managing containers

    docker run image

    run a container from an image

    docker ps

    list running containers

    docker ps -a

    list all containers including stopped ones

    docker build -t imagename .

    build an image from a dockerfile

    docker exec -it container_id bash

    start an interactive bash shell inside a running container

    docker stop container_id

    stop a container

    docker rm container_id

    remove a container

    docker logs container_id

    view logs of a container

    dock images

    list available images

    docker rmi imagename

    remove an image

    docker network ls

    list docker networks

    docker-compose

    manage multi-container docker applications

    docker-compose up

    start up a multi-container environment

    docker compose down

    stop and remove containers created by docker-compose

    docker-compose logs

    view logs from containers managed by docker-compose


    Kubernetes (k8s) (containerization and orchestration)

    command

    description

    kubectl

    command line tool for interacting with Kubernetes clusters

    kubectl get pods

    list pods in the current namespace

    kubectl get nodes

    list nodes in the cluster

    kubectl get services

    list services in the cluster

    kubectl apply -f file.yaml

    apply configuration from a file

    kubectl create -f file.yaml

    create a resource from a file

    kubectl delete -f file.yaml

    delete a ressource defined in a file

    kubectl exec -it podname --bash

    execute a command inside a pod (ex. open a shell)

    kubectl logs podname

    view the logs of a pod

    kubectl describe pod podname

    get detailed information about a pod

    kubectl scale deployment deploymentname --replicas=number

    scale a deployment to the desired number of replicas

    kubectl rollout restart deployment deploymentname

    restart a deployment

    kubectl port-forward pod podname localport:remoteport

    forward a port from a pod to localhost


    Helm (containerization and orchestration)

    command

    description

    helm

    Kubernetes package manager for deploying applications

    helm install releasename chartname

    install a helm chart

    helm upgrade releasename chartname

    upgrade a helm release

    helm list

    list all helm releases

    helm delete releasename

    delete a helm release

    helm search chartname

    search for a helm chart


    Automation and configuration management

    Ansible

    command

    description

    ansible

    automation tool for configuration management

    ansible all -m ping

    ping all hosts defined in the inventory

    ansible-playbook playbook.yml

    run an ansible playbook

    ansible -m command -a 'command' host

    run a single command on a target host

    ansible-playbook --check playbook.yml

    dry run a playbook to see what would change

    ansible-playbook --limit host playbook.yml

    run a playbook on a specific host or group

    ansible-playbook --extra-vars "key=value"

    pass extra variables to a playbook


    Terraform

    command

    description

    terraform

    infrastructure as code tool for provisioning and managing cloud ressources

    terraform init

    initialize a working directory for terraform configuration

    terraform plan

    show an execution plan (what changes would be made)

    terraform apply

    apply the changes described in a terraform configuration

    terraform destroy

    destroy infrastructure created by terraform

    terraform validate

    validate the configuration files

    terraform show

    show the current state of the infrastructure


    Puppet

    command

    description

    puppet

    configuration management tool

    puppet apply manifest.pp

    apply a puppet manifest locally

    puppet agent ---test

    test the puppet agent

    puppet resource

    show the current state of resources
    (files, services, etc.)


    CI/CD tools and commands

    Jenkins

    command

    description

    jenkins

    continous integration tool

    java -jar jenkins.war

    start jenkins from a war file
    access jenkins trough http://localhost:8080 by default


    GitLab CI

    command

    description

    .gitlab-ci.yml

    configuration file for GitLab CI/CD pipelines

    gitlab-runner register

    register a new runner with GitLab

    gitlab-runner run

    run the Gitlab Runner to process jobs


    GitHub Actions

    command

    description

    Info

    GitHub Actions uses YAML configuration files
    typically located in .github/workflows/

    actions/checkout@v2

    checkout the repository code in your CI pipeline

    actions/setup-node@v2

    setup Node.JS for use in a pipeline

    docker/setup-buildx-action@v1

    set up docker buildx for building multi platform images


    Cloud Services

    AWS CLI (Amazon Web Services)

    command

    description

    aws

    command line tool for managing AWS services

    aws configure

    configure AWS CLI with your credentials

    aws s3 cp file.txt s3://bucketname/

    copy a file to an S3 bucket

    aws ec2 describe-instances

    descripe EC2 instances

    aws ec2 start-instances --instance-ids id

    start an EC2 instance

    aws ec2 stop-instances --instance-ids id

    stop an EC2 instance

    aws s3 sync

    sync directories with an S3 bucket


    Azure CLI (Microsoft)

    command

    description

    az

    command line tool for managing Azure services

    az login

    log in to your Azure account

    az vm list

    list all virtual machines

    az vm start --name vmname --resource-group resourcegroup

    start an Azure VM

    az storage blob upload

    upload files to an Azure blob storage

    az group create

    create a new resource group in Azure AD


    Google Cloud SDK

    command

    description

    gcloud

    command line tool for Google cloud platform

    gcloud auth login

    log in to Google cloud

    gcloud compute instances list

    list compute instances

    gcloud compute instances stop instancename

    stop a Google cloud VM instance

    gcloud ap browse

    open the current Google app engine application in a browser


    Logging and Monitoring


    Prometheus

    command

    description

    prometheus

    open source system monitoring and alerting toolkit
    start prometheus server (usually as a background service)

    prometheus --config.file=configfile

    start prometheus with a specific config file


    Grafana

    command

    description

    grafana-cli

    command line interface for managing Grafana plugins

    grafana-cli plugins install pluginname

    install a plugin in Grafana


    ELK Stack (Elasticsearch, Logstash, Kibana)

    command

    description

    elasticsearch

    search engine for logging and data analytics

    curl -XGET 'localhost:9200/_cluster/health?pretty'

    get cluster health status

    logstash

    server side data processing pipeline

    logstash -f configfile

    run logstash with the specified configuration file

    kibana

    web interface for visualizing Elasticsearch data
    Kibana is generally access through web on http://localhost:5601

  • Linux File System

    • ISeeTWizard
    • October 26, 2025 at 10:50 AM

    Every folder under Linux has it's meaning.

    Folder

    What it contains

    /bin

    Essential command binaries

    /boot

    System boot loader files

    /dev

    Device files

    /etc

    Host specific system wide configuration files

    /home

    User home directory

    /lib

    Shared library modules

    /media

    Media file such as DVD-ROM

    /mnt

    Temporary mounted filesystem

    /opt

    Add-on application software packages

    /proc

    Automatically generated file system
    Interface to kernel data structures

    /root

    Home directory for root user

    /run

    Runtime program data

    /sbin

    System binaries

    /srv

    Site specific data served by this system

    /sys

    Virtual directory providing information about the system

    /tmp

    Temporary files

    /usr

    Read-only user files
    Unix System Ressources

    /var

    Files that are expected to continuously change

  • Linux Cheatsheet (for beginners)

    • ISeeTWizard
    • October 26, 2025 at 10:49 AM


    Command

    Description

    ls

    lists contents of a directory just like dir under DOS

    cat

    concatenate and print files

    grep

    searches for specific results with pattern

    clear

    clear the terminal

    cd

    change directory

    pwd

    print the working directory

    mkdir

    creates (make) a directory

    rmdir

    delete (remove) a directory

    man

    prints the manual pages of a specific tool

    which

    returns the path to an executable

    find

    searches for files in a directory hierarchy

    locate

    searches for files in a system using a prebuilt database

    who / whoami

    display all logged in users / current user

    id

    returns user ID

    chmod

    changes permissions and mode flags of a file or directory

    uname

    prints operating system's name (unix name)

    ifconfig

    network interface configuration of the system

    ip

    display and configure network parameters

    sudo / su

    executes a command as a different user
    by default the superuser
    open a sessions a s superuser

    ps

    lists the running processes status

    kill

    sends a kill signal to a process

    head

    view the first lines of any text

    mv

    move files

    cp

    copy files

  • Nmap commands

    • ISeeTWizard
    • October 26, 2025 at 10:41 AM

    What it does

    Command

    Details

    Host Discovery

    nmap -sn target

    Disables port scanning and performs
    host discovery to identify live hosts

    Port Scanning

    nmap -p port_range target

    Scans specified ports or
    port ranges on the target

    Service Version Detection

    nmap -sV target

    Detects version of services
    running on open ports

    Operating System Detection

    nmap -O target

    Identifies the operating system
    of the target host

    Aggressive Scan

    nmap -A target

    Performs OS detection, version detection
    script scanning and traceroute

    UDP Scan

    nmap -sU -p port_range target

    Scans specified UDP ports on target

    TCP Connect Scan

    nmap -sT target

    Performs a TCP connect scan
    to determine if ports are open or closed

    SYN Scan

    nmap -sS target

    Performs a stealth SYN scan to identify
    open ports without completing the
    TCP handshake

    Firewall Evasion

    nmap -T"0-5" target

    Adjusts timing templates to evade
    firewalls and intrusion
    detection systems

    Scan from File

    nmap -iL input_file target

    Reads target hosts from a file and
    performs the scan

    Scan All Ports

    nmap -p target

    Scans all 65, 535 ports on
    the target

    Service Enumeration

    nmap --script script_name target

    Uses Nmap Scripting Engine (NES)
    scripts to enumerate services and
    gather additional information

    Scan Specific Ports

    nmap -p port1,port2 target

    Scans specific ports on the target

  • Subnet Mask Cheat Sheet

    • ISeeTWizard
    • October 26, 2025 at 10:37 AM


    Addresses

    Host

    Netmask

    Amount of a Class C

    /30

    4

    2

    255.255.255.252

    1/64

    /38

    8

    6

    255.255.255.248

    1/32

    /28

    16

    14

    255.255.255.240

    1/16

    /27

    32

    30

    255.255.255.224

    1/8

    /26

    64

    62

    255.255.255.192

    1/4

    /25

    128

    126

    255.255.255.128

    1/2

    /24

    256

    254

    255.255.255.0

    1

    /23

    512

    510

    255.255.254.0

    2

    /22

    1024

    1022

    255.255.252.0

    4

    /21

    2048

    2046

    255.255.248.0

    8

    /20

    4096

    4094

    255.255.240.0

    16

    /19

    8192

    8190

    255.255.224.0

    32

    /18

    16384

    16382

    255.255.192.0

    64

    /18

    32768

    32766

    255.255.128.0

    128

    /16

    65536

    65534

    255.255.0.0

    256

    Guide to sub-class C blocks

    Network #

    IP Range

    Broadcast

    .0

    .1 - .126

    .127

    .128

    .129 - .254

    .255

    /25 -- 2 Subnets -- 126 Hosts/Subnet

Did you know…?

You cannot change what you refuse to confront.

“You have to believe in yourself when no one else does.”

Serena Williams

“The new dawn blooms as we free it. For there is always light if only we’re brave enough to see it, if only we’re brave enough to be it.”

Amanda Gorman

“Let us make our future now, and let us make our dreams tomorrow’s reality.”

Malala Yousafzai

“Success is stumbling from failure to failure with no loss of enthusiasm.”

Winston Churchill

“To succeed in life, you need three things: a wishbone, a backbone, and a funnybone.”

Reba McEntire

“We pass through this world but once.”

Stephen Jay Gould

“You can’t help what you feel, but you can help how you behave.”

Margaret Atwood

“And when you want something, all the universe conspires in helping you achieve it.”

Paulo Coelho

“Life is what happens to you when you are busy making other plans.”

John Lennon

“Dreaming, after all, is a form of planning.”

Gloria Steinem

“Keep your face towards the sunshine and shadows will fall behind you.”

Walt Whitman

“Once you face your fear, nothing is ever as hard as you think.”

Olivia Newton-John

“It does not matter how slowly you go, as long as you do not stop.”

Confucius

“Life is a daring adventure or it is nothing at all.”

Helen Keller

“You will face many defeats in life, but never let yourself be defeated.”

Maya Angelou

“It is better to fail in originality than to succeed in imitation.”

Herman Melville

“When you have a dream, you’ve got to grab it and never let go.”

Carol Burnett

“The future is not something we enter. The future is something we create.”

Leonard I. Sweet

“It’s amazing how a little tomorrow can make up for a whole lot of yesterday.”

John Guare

“For the great doesn’t happen through impulse alone, and is a succession of little things that are brought together.”

Vincent Van Gogh

“You only live once, but if you do it right, once is enough.”

Mae West

“The great courageous act that we must all do is to have the courage to step out of our history and past so that we can live our dreams.”

Oprah Winfrey

“Life has no limitations, except the ones you make.”

Les Brown

“Be where you are; otherwise you will miss your life.”

Buddha

“Do one thing every day that scares you.”

Eleanor Roosevelt

“In three words I can sum up everything I’ve learned about life: It goes on.”

Robert Frost

“Life is very interesting…in the end, some of your greatest pains become your greatest strengths.”

Drew Barrymore

“We must let go of the life we have planned, so as to accept the one that is waiting for us.”

Joseph Campbell

“The simple things are also the most extraordinary things, and only the wise can see them.”

Paulo Coelho

“Tomorrow is a new day. You shall begin it serenely and with too high a spirit to be encumbered with your old nonsense.”

Ralph Waldo Emerson

“Dreams do not come true just because you dream them. It’s hard work that makes things happen. It’s hard work that creates change.”

Shonda Rhimes

“Whatever we are, whatever we make of ourselves, is all we will ever have—and that, in its profound simplicity, is the meaning of life.”

Philip Appleman

“If you don’t like the road you’re walking, start paving another one.”

Dolly Parton

“Before anything else, preparation is the key to success.”

Alexander Graham Bell

“Always remember that you are absolutely unique. Just like everyone else.”

Margaret Mead

“Find out who you are and do it on purpose.”

Dolly Parton

“We are here to add what we can to life, not to get what we can from life.”

William Osler

“There is no passion to be found playing small—in settling for a life that is less than the one you are capable of living.”

Nelson Mandela

“Some people want it to happen, some wish it would happen, others make it happen.”

Michael Jordan

“Life does not have to be perfect to be wonderful.”

Annette Funicello

“Nothing is impossible. The word itself says ‘I’m possible!’”

Audrey Hepburn

“There are so many great things in life; why dwell on negativity?”

Zendaya

“Live in the sunshine, swim the sea, drink the wild air.”

Ralph Waldo Emerson

“There is no perfection, only life.”

Milan Kundera

“The purpose of life is to live it, to taste experience to the utmost, to reach out eagerly and without fear for newer and richer experience.”

Eleanor Roosevelt

“The art of life is to know how to enjoy a little and to endure very much.”

William Hazlitt

“Coming together is a beginning; keeping together is progress; working together is success.”

Henry Ford

“We make a living by what we get, but we make a life by what we give.”

Winston Churchill

“Get busy living or get busy dying.”

Stephen King

“Good friends, good books, and a sleepy conscience: This is the ideal life.”

Mark Twain

“Next time, ask ‘What’s the worst that will happen?’ Then push yourself a little further than you dare.”

Audre Lorde

“You don’t always need a plan. Sometimes you just need to breathe, trust, let go and see what happens.”

Mandy Hale

“One of the deep secrets of life is that all that is really worth doing is what we do for others.”

Lewis Carroll

“I’m not going to continue knocking on that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

W.P. Kinsella

“There are no regrets in life. Just lessons.”

Jennifer Aniston

“No need to hurry. No need to sparkle. No need to be anybody but oneself.”

Virginia Woolf

“There’s love enough in this world for everybody, if people will just look.”

Kurt Vonnegut

“Life isn’t about finding yourself. Life is about creating yourself.”

George Bernard Shaw

“Life is like riding a bicycle. To keep your balance, you must keep moving.”

Albert Einstein

“For me, becoming isn’t about arriving somewhere or achieving a certain aim. I see it instead as forward motion, a means of evolving, a way to reach continuously toward a better self. The journey doesn’t end.”

Michelle Obama

“Always do your best. What you plant now, you will harvest later.”

Og Mandino

“Dream big and dare to fail.”

Norman Vaughan

“The biggest adventure you can take is to live the life of your dreams.”

Oprah Winfrey

“The only thing we have to fear is fear itself.”

Franklin D. Roosevelt

“We have to dare to be ourselves, however frightening or strange that self may prove to be.”

May Sarton

“Failure is a great teacher and, if you are open to it, every mistake has a lesson to offer.”

Oprah Winfrey

“It is better to be hated for what you are than to be loved for what you are not.”

Andre Gide

“Don’t judge each day by the harvest you reap but by the seeds that you plant.”

Robert Louis Stevenson

“Be sure you put your feet in the right place, then stand firm.”

Abraham Lincoln

“Living might mean taking chances, but they’re worth taking.”

Lee Ann Womack

“Yesterday is but today’s memory and tomorrow is today’s dream.”

Khalil Gibran

“I believe that if you’ll just stand up and go, life will open up for you. Something just motivates you to keep moving.”

Tina Turner

“The future belongs to those who believe in the beauty of their dreams.”

Eleanor Roosevelt

“Everything you can imagine is real.”

Pablo Picasso

“When I let go of what I am, I become what I might be.”

Lao Tzu

“The fear of death follows from the fear of life. A man who lives fully is prepared to die at any time.”

Mark Twain

“Never let the fear of striking out keep you from playing the game.”

Babe Ruth

“The future belongs to those who prepare for it today.”

Malcolm X

“I may not have gone where I intended to go, but I think I have ended up where I needed to be.”

Douglas Adams

“If you don’t have any shadows, you’re not in the light.”

Lady Gaga

“Ambition is the path to success. Persistence is the vehicle you arrive in.”

Bill Bradley

“I’m not going to continue knocking that old door that doesn’t open for me. I’m going to create my own door and walk through that.”

Ava DuVernay

“Always go with your passions. Never ask yourself if it’s realistic or not.”

Deepak Chopra

“Keep smiling, because life is a beautiful thing and there’s so much to smile about.”

Marilyn Monroe

“Don’t worry about failure, you only have to be right once.”

Drew Houston

“It is during our darkest moments that we must focus to see the light.”

Aristotle

“Be yourself; everyone else is already taken.”

Oscar Wilde

“All dreams are within reach. All you have to do is keep moving towards them.”

Viola Davis

“If you live long enough, you’ll make mistakes. But if you learn from them, you’ll be a better person.”

Bill Clinton

“Spread love everywhere you go. Let no one ever come without leaving happier.”

Mother Teresa

“It is never too late to be what you might have been.”

George Elliot

“You may not control all the events that happen to you, but you can decide not to be reduced by them.”

Maya Angelou

“Just when you think it can’t get any worse, it can. And just when you think it can’t get any better, it can.”

Nicholas Sparks

“Don’t take yourself too seriously. Know when to laugh at yourself, and find a way to laugh at obstacles that inevitably present themselves.”

Halle Bailey

“If you have knowledge, let others light their candles in it.”

Margaret Fuller

“You can be everything. You can be the infinite amount of things that people are.”

Kesha

“Life is made of ever so many partings welded together.”

Charles Dickens

“The world you desire can be won. It exists... it is real... it is possible... it’s yours.”

Ayn Rand

“Be persistent and never give up hope.”

George Lucas

“My wish for you is that you continue. Continue to be who you are, to astonish a mean world with your acts of kindness.”

Maya Angelou

Latest Posts

  • 3dfx - Voodoo Graphics

    ISeeTWizard February 3, 2026 at 10:47 AM
  • ATI 3D Rage (II)

    ISeeTWizard February 3, 2026 at 10:46 AM
  • Matrox Mystique

    ISeeTWizard February 3, 2026 at 10:45 AM
  • PowerVR PCX1

    ISeeTWizard February 3, 2026 at 10:44 AM
  • S3 Virge Series

    ISeeTWizard February 3, 2026 at 10:40 AM
  1. Privacy Policy
  2. Contact
  3. Legal Notice
Powered by WoltLab Suite™
Style: Ambience by cls-design
Stylename
Ambience
Manufacturer
cls-design
Licence
Commercial styles
Help
Supportforum
Visit cls-design