https://samoreira.eu
Hello, good morning!
Today is Tuesday, 19 March 2024
facebooktwitterlinkedininstagrambloggeryoutuberumbleodyseeGoogle PlayGitLab

Web (Google) Web (DuckDuckGo) Images Wikipedia Youtube

Military Modeling

Small replicas of tanks, planes, ships, and other military vehicles in miniature, reproducing their characteristics with maximum detail.

Military modeling is a hobby that allows me to develop my creativity and manual skills, as well as learn more about military history and technology. I love researching the different periods and countries that I represent in my creations, striving to reproduce their colors and camouflage patterns with accuracy.

I enjoy experimenting with different techniques and materials, using everything from brushes and acrylic paints to more advanced materials such as airbrushes and resins. Each project is a new challenge and an opportunity to improve my skills and techniques.

I share my creations and experiences in the world of military modeling, as well as tips and tutorials for other hobby enthusiasts. It's a pleasure to be able to share my love for this hobby with others and contribute to the military modeling community.

📷  Fluffy Engineers at Work: The Pituska & Kiko Model Assembly Adventure

Fluffy Engineers at Work

pencil Ping. Servidor não responde ao ping

Ping. Servidor não responde ao ping

Pode estar relacionado ao fato de desabilitar o rastreamento de conexão para tráfego NTP. Isso aparentemente faz com que as mensagens ICMP relacionadas a esse tráfego sejam sinalizadas como estado de rastreamento de conexão "inválido" na configuração padrão, a queda "inválida" aconteceu antes do ICMP permitindo.

Verificar e editar o ficheiro /etc/ufw/before.rules e /etc/ufw/before6.rules.
Se estiver conforme o primeiro exemplo, devemos editar conforme o segundo exemplo.


# drop INVALID packets (logs these in loglevel medium and higher)
-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP

# ok icmp codes for INPUT
-A ufw-before-input -p icmp --icmp-type destination-unreachable -j ACCEPT
-A ufw-before-input -p icmp --icmp-type time-exceeded -j ACCEPT
-A ufw-before-input -p icmp --icmp-type parameter-problem -j ACCEPT
-A ufw-before-input -p icmp --icmp-type echo-request -j ACCEPT

Edite o before.rules e o before6.rules para trocar esses dois blocos para que os ICMPs sejam permitidos antes que a verificação de "inválido" aconteça.


# ok icmp codes for INPUT
-A ufw-before-input -p icmp --icmp-type destination-unreachable -j ACCEPT
-A ufw-before-input -p icmp --icmp-type time-exceeded -j ACCEPT
-A ufw-before-input -p icmp --icmp-type parameter-problem -j ACCEPT
-A ufw-before-input -p icmp --icmp-type echo-request -j ACCEPT

# drop INVALID packets (logs these in loglevel medium and higher)
# moved to after ICMP to prevent NTP stuff from being blocked
-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP

IP: 54.226.25.246 | | US
facebooktwitterlinkedininstagrambloggeryoutuberumbleodyseeGoogle PlayGitLab
Design & copyright© 2016-2024 Sérgio Moreira |
All rights reserved
Hospedado em: Hostinger