Run SSTP VPN Client

sudo sstpc --user arturs --password "-" usepeerdns require-mschap-v2 noauth noipdefault defaultroute refuse-eap noccp --log-stderr --cert-warn debug

Configure IEEE mail in thunderbird

  1. Tools->Account settings
  2. Create acccount
  3. mail address
  4. Select “manual config”
  5. Username:
  6. Incoming:, 993 (SSL), normal password
  7. Outgoing:, 465 (SSL), normal password
  8. Re-test (fails), but button “Advanced config” at the bottom becomes available
  9. Open “Advanced config” at the bottom
  10. Change authorization to OAuth2

RTL SDR dongle installation in MATLAB

su sc
sudo adduser user sudo

sudo -s
vim /etc/modprobe.d/blacklist.conf

blacklist dvb_usb_rtl28xxu
blacklist rtl2832

depmod -a
update-initramfs -u

-insert SDR dongle
rmmod dvb_usb_rtl28xxu rtl2832

search RTL in addons
add RTL

mv /home/user/Documents/MATLAB/SupportPackages/R2016b/toolbox/shared/sdr /usr/local/MATLAB/R2016b/toolbox/shared
deluser user sudo

-fix matlab path-

Sharelatex e-mail config =
fromAddress: ""
replyTo: process.env["SHARELATEX_EMAIL_REPLY_TO"] or ""
host: "dockerhost"
port: 25
secure: false
ignoreTLS: true

thunderbird command error 12

If Thunderbird chowws “…command error 12”


by default it is TRUE. toggling it to FALSE will stop tbird from sending the “ID command”. The error seems to be happening with some servers that _claim_ to support that command but return an error when it is used.

proxychains via reverse socks proxy

1. Start local socks proxy:
Connect to localhost via SSH and open SOCKS proxy on port 54321.

ssh -f -N -D 54321 localhost

-f runs SSH in the background.

2. connect to server and setup reverse port forwarding
Bind remote port 6666 to local port 54321. This makes your local socks proxy available to the remote site on port 6666.

ssh root@server -R6666:localhost:54321

3. configure the server software to use the forwarded proxy
I found that installing proxychains makes things a lot easier. Its a tool that uses an LD_PRELOAD trick to wrap TCP and DNS requests from arbitrary commands into a proxy.

This is optional – you may also configure yum or whatever to use the socks proxy, when supported. However, proxychains is really cool because it enables any software to use SOCKS proxy, even those without proxy support. (telnet for example)

Setup /etc/proxychains.conf to use the forwarded socks proxy:

# SSH reverse proxy
socks5 6666

Tunnel arbitrary tools (that use TCP) with proxychains:

$ proxychains telnet 80
$ proxychains yum update
$ proxychains apt-get update