You can use this code to test out the disk speed of your Linux system
dd if=/dev/zero of=/tmp/output conv=fdatasync bs=384k count=1k; rm -f /tmp/output
credit: https://github.com/ethereum/go-ethereum/issues/26174

Free and Open Source blogger with an attitude
You can use this code to test out the disk speed of your Linux system
dd if=/dev/zero of=/tmp/output conv=fdatasync bs=384k count=1k; rm -f /tmp/output
credit: https://github.com/ethereum/go-ethereum/issues/26174
Grab this opportunity.
OVHCloud is offering VPS Hosting for USD 0.97/mo for this VPS spec:
20GB SSD Storage
2GB RAM
1vCore
100Mbps unmetered
This VPS / KVM option is available in several datacenters :

Get the OVHcloud USD 0.97/mo offer here before it expired!
Here’s an nmap snippet for scanning for hidden cctv / ip camera in the network
nmap -sV --script=http-enum,http-title,rtsp-url-brute -p 80,443,554,8000 <ip range>
Or you can write as :
sudo nmap -sV --script=http-enum,http-title,rtsp-url-brute -p 80,443,554,8000 192.168.0.0/24
Make sure you have permission to scan on the network!
It seems Google have implemented private prefetch proxy in Chrome for Android.
The upside of this private prefetch proxy is improved browsing experience for mobile users by reducing waiting time for web pages to load.
The downside is, as web server administrators – you might find a lot of 404 status in your web logs.
To solve this, you could either :
Solution
Luckily, TechTitBits have come up with a convenient solution which only involves adding a few lines in configuration files to enable Chrome for Android prefetched proxy in nginx.
location = /.well-known/traffic-advice {
types { }
default_type "application/trafficadvice+json; charset=utf-8";
return 200 '[{ "user_agent": "prefetch-proxy", "fraction": 1 }]';
}
With this solution, you would only need to add the location block within the server { } context in the site configurations.
Thank you for the tip: Traffic Advice configuration for Nginx
This handy script is useful for webserver traffic analysis task. It can be use to detect abusive IP address or spambots which accesses the webserver.
ystem administrators can utilize the generated list of IP addresses to enhance webserver security by blocking those IPs deemed potentially harmful or suspicious.
A lot of people struggling in configuring PKP Open Journal System 3 (OJS3) to run behind nginx reverse proxy as OJS3 does not support nginx natively
So most implementation would settle with Apache HTTPD server or install it behind nginx reverse proxy.
However the problem is that the OJS3 behave badly when placed behind nginx reverse proxy, especially when the reverse proxy is using HTTPS / TLS. This messed up the based URL in the OJS3, subsequently causing some resources from the website to be unavailable.
To solve this, you only need to add a single line in the Apache HTTPD site configuration file.
SetEnvIf X-Forwarded-Proto "https" HTTPS=on
A full blown example is included via gist