Files
AstroVim_Config/README.md
2025-08-24 17:57:15 +07:00

98 lines
2.6 KiB
Markdown

```bash
install gnome-disk-utility
install yay
install conda nvm nvim
```
**use for reconfig grub for fix stuck at initial ramdisks:**
how does i get out stuck at initial ramdisk:
- first, access local os:
```bash
mount /dev/sda2 /mnt
mount /dev/sda1 /mnt/boot
arch-chroot /mnt/
```
- second, remove all initframs and vmlinuz, amd-ucode on `\boot`
- third, copy each vmlinuz from `usr\lib\modules` to boot
example:
```bash
cp \usr\lib\modules\6.10.10-lts..\vmlinuz \boot\vmlinuz-linux-lts
```
- forth, check on `etc\modprob.d` have any file `.conf` if it exist remove it
- fifth, reinstall amd-ucode `pacman -S amd-ucode`
- six, run `mkinitcpio -P`
done!
---
config mhz for gpu ignore tearing when inactivity
```bash
sudo pacman -S lact
```
---
## SSH tunneling
1. first u must have port 22 available on 192.168.1.1 virtual trigger
2. uncomment `port 22` on file follow path `/etc/ssh/sshd_config`
3. `sudo systemctl enable sshd | systemctl start --now sshd`
-> after that u can connect to ssh. it means u doesnt need add open port 22
## Open port
-> This is depend on your method firewall u have
-> file config on `/etc/nftables.conf`
```bash
#!/usr/bin/nft -f
# vim:set ts=2 sw=2 et:
# IPv4/IPv6 Simple & Safe firewall ruleset.
# More examples in /usr/share/nftables/ and /usr/share/doc/nftables/examples/.
destroy table inet filter
table inet filter {
chain input {
type filter hook input priority filter
policy drop
# ct state invalid drop comment "early drop of invalid connections"
ct state {established, related} accept comment "allow tracked connections"
iif lo accept comment "allow from loopback"
ip protocol icmp accept comment "allow icmp"
meta l4proto ipv6-icmp accept comment "allow icmp v6"
tcp dport ssh accept comment "allow sshd"
# pkttype host limit rate 5/second counter reject with icmpx type admin-prohibited
# WARNING: open port right here
tcp dport 8501-8509 accept
tcp dport 8511-8519 accept
tcp dport 8521-8529 accept
counter
}
chain forward {
type filter hook forward priority filter
policy drop
}
}
```
-> after config run command `sudo nft -f /etc/nftables.conf`
-> in my case, i have `nftables`
- `sudo nft -a list chain inet filter input` : list current port and rule was accepted
- `sudo nft add rule inet filter input tcp dport 8505 accept` : add open port (in case is 8505)
- `sudo nft add rule inet filter input tcp dport '{ 8501-8509 }' accept` : add open port range
- `sudo nft delete rule inet filter input handle 16` : if u use command `list chain` (first command) u will see a number for each rule to replace for a number 16