AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() ![]() By using the memconf command, you can determine the speed of the Linux memory. Linux, UNIX, and *BSD-based computers can use this command. The output contains a description of the system’s hardware components, as well as other useful information such as serial numbers and BIOS updates. You can also use the “cat /proc/meminfo” command to get a detailed list of your RAM and its current usage.ĭMI tables, sometimes referred to as SMBIOS tables, can be converted into human-readable Dmidecode files using a tool or by dumping them into a computer. To get a more detailed breakdown of your RAM, you can use the “dmidecode” command which will provide you with the model number, size, speed, type, and other details about the RAM installed in your system. ![]() This will output your system’s total used and free RAM in megabytes. Once you have opened the terminal window, you will need to type the command “free -m” and press enter. To check your RAM from the command line, you will need to open a terminal window in your operating system. Enter into the RAM speed check box to check. To use the command, you must first specify how much speed your Marvelmic memorychip requires. To open the Run box, type cmd, and then press the Windows and R keys together. The top Command displays the total memory and RAM consumption for a process. This program displays the total amount of free and used physical and swap memory in the system, as well as the buffer and cache used by the operating system. Terminal one can be used to determine the total memory on Linux in GB. In this article, we will show you how to check your RAM size in Linux using the command line, as well as discussing what kind of information you can glean from the results of this command. Fortunately, checking your RAM size in Linux is easy, and can be done quickly through the Linux command line. You may be wondering if you have enough RAM to run a certain program, or if you should upgrade your system. ![]() If you are a Linux user, you may often find yourself wanting to know how much RAM your computer has. ![]()
0 Comments
Read More
Back to Blog
System mechanic for mac9/1/2023 ![]() Taking care of your privacy is becoming an important issue nowadays. It's hard to believe that a user might still need to employ another application to complete the experience offered by System Mechanic Pro. With these three components, one will complete the maintenance side with a security-related one. Seeing as the most important features in this app have to do with maintenance, next up is the security system which includes a Firewall, a Privacy Guardian, and Malware Killer. This last feature is dedicated to people such as gamers or programmers who need every ounce of power they can get when executing resource-consuming applications. Real-Time Boost is yet another feature meant to help any user gain more resources by clearing and cleaning a PC's memory and optimizing its CPU's cores. All these tools will probably prove useful on a daily basis, depending on how often you do take the time to clean and clear your PC of junk files.Īutomatic PC maintenance is also a possibility for those who don't want to waste time on executing the whole process manually. In addition, one can also recover or manage certain files on that particular machine. This particular category includes a junk-cleaning feature and a speed-up utility. ![]() Seeing as this particular application has many sides to it, the first and most prominent has to do with cleaning or conducting maintenance on your PC. In fact, you might just feel relieved because this program incorporates so many useful cleanup features. Options are clearly labeled and accurately categorized, so you won't be lost at any given moment. It's a one-stop-shop for repairs, malware removal, and overall system performance improvement. System Mechanic Pro, as the name suggests, is an application that should aid any user in fixing or conducting maintenance on whatever machine is currently used. ![]()
Back to Blog
Bitreplica download9/1/2023 ![]() ![]() Specify what, where, how and when to back up by creating a backup profile. Go ahead, connect your camera to your computer and back up all those precious moments you would be devastated to lose! The program supports HDD`s, SSD`s, USB flash drives, networked drives and more as source folders for backing up. Or browse it like a regular folder and select individual items you would like to restore.Īuslogics BitReplica lets you back up files from practically any storage device, not just your hard drive. ![]() Yyou can restore the whole backup with just one click of the Restore button. ![]() Restoring the saved data is made easy too. You can specify file groups or select individual folders to back up.Ĭreate full backups or save disk space by using incremental or differential backup engines. The program should be especially useful for anyone who has several storage drives (it could be several hard drives installed on one PC or several PCs networked together).Īuslogics BitReplica lets you save all of your files to an external drive or a networked PC to make sure you never lose any of them. It protects your photos, music, videos, documents and any other data from being lost due to a hard drive crash, virus attack or accidental deletion. Auslogics BitReplica is a tool for backing up files stored on your Windows PC. ![]()
Back to Blog
Mikrotik transparent firewall9/1/2023 ![]() This will redirect the packets from all users other than nobody on the machine to mitmproxy. Pass out route-to (lo0 127.0.0.1) proto tcp from any to any port $redir_ports user įollow steps 3-5 above. Rdr pass proto tcp from any to any port $redir_ports -> $tproxy #transparent proxy as that would cause an infinite loop. #This cannot involve the user which runs the #The users whose connection must be redirected. #The user the transparent proxy is running as ![]() #The address the transparent proxy is listening on # Work-around to redirect traffic originating from the machine itselfįollow steps 1, 2 as above, but in step 2 change the contents of the file pf.conf to #The ports to redirect to proxy In fact, PF isįlexible to cater for a range of creative possibilities, like If you want to intercept your own macOS traffic, see the work-around below or use an external host to run mitmproxy. Outbound connection from a non-mitmproxy app, and an outbound connectionįrom mitmproxy itself. This means that they will NOT redirect traffic comingįrom the box running pf itself. ![]() Note that the rdr rules in the pf.conf given above only apply to On Linux, mitmproxy integrates with the iptables redirection mechanism toĪchieve transparent mode. That allows us to query the redirector for the original destination of the TCPĪt the moment, mitmproxy supports transparent proxying on OSX Lion and above,Īnd all current flavors of Linux. This is where the second new component comes in - a host module ![]() Receives a redirected connection, it sees a vanilla HTTP request, without a host This usually takes theįorm of a firewall on the same host as the proxy server. ![]() Redirection mechanism that transparently reroutes a TCP connection destined forĪ server on the Internet to a listening proxy server. To set up transparent proxying, we need two new components. It is muchĮasier to set up, as it does not require setting up IP forwarding or modifying Provides an alternative implementation for transparent proxying. ![]() |