dugaduga
Senior Member
@thelonelycoder, how does one go about resetting statistics? I deleted everything in the stats folder and divstats still shows old stats, but minus unique devices
I replied in the other tread, but anyway.@thelonelycoder, how does one go about resetting statistics? I deleted everything in the stats folder and divstats still shows old stats, but minus unique devices
I replied in the other tread, but anyway.
In Diversion under d.
With ac in the o options.Tx, how can I manually re-enter the block count total for continuity after resetting the stats?
How you created it? Can you share some links, I am interested because I want to block p*rn, gambling... Used to have something like that before but after uninstall and reinstall I've lost it.
What are you doing that requires more than 512? Or do I not want to know?Dear thelonelycoder
Can you add a 768MB swap file too?
More options will be great!
If I remember correctly first choice - 256MB - was enough not so long ago but now... 512MB is not enough right now!
1) print_red_line
echo " Select a Swap file size"
echo
echo " 1. 256MB"
echo " 2. 512MB"
echo " 3. 768MB"
echo " 4. 1GB"
echo " 5. 2GB"
while true; do
printf "\\n Enter size [1-5 e=Exit] ";read -r size
case "$size" in
1) swapsize=262144;break;;
2) swapsize=524288;break;;
3) swapsize=786432;break;;
4) swapsize=1048576;break;;
5) swapsize=2097152;break;;
[Ee]) exit_message;reload_menu;break;;
*) printf "\\n input is not an option\\n";;
esac
done
/opt/share/diversion/file/functions.div
escape_password_special_characters(){
i=0
PASSWORD=
while [ $i -lt `expr length "$value"` ]
do
case ${value:$i:1} in
[\`\'\$\\\"])
PASSWORD="$PASSWORD\\"
;;
%)
PASSWORD="$PASSWORD%"
;;
esac
PASSWORD="$PASSWORD${value:$i:1}"
i=`expr $i + 1`
done
}
printf "\\n${RED_BG} Enter Password: ${NC} ";read -r PASSWORD
printf "\\n${RED_BG} Enter Password: ${NC} ";read -r value;escape_password_special_characters
6) printf "\\n Note: Password may NOT contain \" character.\\n"
printf "\\n $PASSWORD${RED} <-- current password${NC}\\n"
printf "${RED_BG} Enter Password: ${NC} [e=Exit] ";read -r value
PASSWORD=$value;break;;
6) printf "\\n $PASSWORD${RED} <-- current password${NC}\\n"
printf "${RED_BG} Enter Password: ${NC} [e=Exit] ";read -r value
escape_password_special_characters;break;;
GOAL:block everything!
I've used a gmail account, but hit a few problems along the way (one of which was to enable Less secure app access in the gmail account settings).
Importing your CA cert on clients is not mandatory but recommended. Your Pixelserv CA cert is available through URL http://pixelserv ip/ca.crt.
slh 8 # of accepted HTTPS requests
slm 19 # of rejected HTTPS requests (missing certificate)
sle 0 # of rejected HTTPS requests (certificate available but bad)
slc 676 # of dropped HTTPS requests (client disconnect without sending any request)
slu 1417 # of dropped HTTPS requests (unknown error)
I tried to update blocking list with second option-512MB but gives me errors, so I moved to third option 1GB and everything seems to work fine!What are you doing that requires more than 512? Or do I not want to know?
You would really only be able to do this sanely by having the log-queries=extra enabled so it will include the requesting IP in the log when it is being blocked. Otherwise, you get the query and source IP on one line, and the blocking indicator further down on a later line without the source IP included.@thelonelycoder Hey Bro one suggestion for you if and whenever it's possible and you're feeling lonely [emoji14][emoji14][emoji16]
Can you add an IP filter in the log follow option " Filtered by blocked domains" so that it only show blocked domains generating from that single IP/Device because right now it shows blocked domains from all the devices in your network and it's hard to pinpoint which device generates the blocked entry.
I know it can be done by enabling extra loging and using "Filtered by term" option but it generates a lot of noise and not as clean as "filter by blocked domains"
You would really only be able to do this sanely by having the log-queries=extra enabled so it will include the requesting IP in the log when it is being blocked. Otherwise, you get the query and source IP on one line, and the blocking indicator further down on a later line without the source IP included.
Right, I just mean to filter the blocked domains per a specific IP, Diversion would need to always enable the extra logging so it can get the blocked domain and the source IP in the same line. I think it'd be a useful feature, but the prerequisite would be the extra logging, in my limited experience.I know that alternative workaround but as I said in my previous post it generates lots of noise and not as clean as "Filtered by blocked domains" filter.
Right, I just mean to filter the blocked domains per a specific IP, Diversion would need to always enable the extra logging so it can get the blocked domain and the source IP in the same line. I think it'd be a useful feature, but the prerequisite would be the extra logging, in my limited experience.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!