Jump to content

John@John

Moderators
  • Posts

    1,039
  • Joined

  • Last visited

  • Days Won

    173

Everything posted by John@John

  1. Χρόνια Πολλά ρα ζευζεκι ,να χαιρεσαι την ονομαστικη σου εορτη ..Αντε και να σε βλεπουμε λιγο
  2. Προχωραει σιγα-σιγα ,οι μετατροπες και το στησιμο (οχι του σετ-απ),μεγας μπελας πολυ διαβασμα και ψαξιμο. Κατα παραξενο τροπο αυτα βγαινουν καλυτερα απο τα DTM ,ειδικα το GTE χτες με κατι αλλαγες στην αεροδυναμικη και στην διασταση των ελαστικων εγινε το κατι αλλο Οταν λες κανεις τι εννοεις ?Πως το διαπιστωσες αυτο?
  3. Ειναι αυτονοητο το τι θα οδηγαω εγω.............. Οσο για εσενα ετοιμαζετε το εργαλειο που σου ταιριαζει απολυτα.... Και πολυ σου ειναι Y.Γ Για την ομπρελα και με καροτσακι απο σουπερ-μαρκετ θα ετρεχες.....
  4. Για τους λατρεις της Group H Special κατηγοριας (6 αυτοκινητα) θα ανεβει εντος των ημερων και 2ος σερβερ Sim-Racing-World Dedi2
  5. Project Cars 2 THE ULTIMATE RACING SIM Μερικα στοιχεια για το game,που πιστευω με ολα αυτα που λεει θα ειναι το απολυτο σιμ της χρονιας πρωτα σε φυσικη και γραφικα και μετα σε αλλα πολλα που δεν τα εχουν αλλα σιμς . Race without boundaries - anytime, anywhere. Day or night, wet or dry. With LiveTrack 3.0, tracks dynamically transition from clean to rubbered-in to dirty,changing the grip physics whether on tarmac, dirt, or ice. Drivers can race a full 24-hour cycle with real-time vehicle, weather, and temperature changes, and even across all four seasons - faithfully recreating the atmospheic conditions and ambience of a specific time of year. Even weather effects like ground mist, thunder, and snow mean Mother Nature must now be conquered. Class-leading visuals defined by a 1:1 digital craftsmanship, precision physics, and dynamic real-time vehicle, surface, and seasonal conditions. Go beyond reality and experience true-to-life driving immersion with VR and 12K resolution support. Project CARS 2 is as exhilarating and challenging to play as it is state-of-the-art. Over 170 licensed cars from the most iconic brands The largest track roster of any console racing game including ice and dirt tracks New vehicle types and motorsport classes including Rallycross, IndyCar, and Oval Dynamic time of day, weather, and new seasonal conditions New Online Championships mode LiveTrack 3.0 powers dynamic surface conditions that affect vehicle performance and handling, and evolves the track over the course of a race weekend Esports built-in from day one with full ranking, and broadcasting/streaming functionality Bleeding-edge tire physics, advanced AI, and intuitive gamepad control VR, 12K, 21:9, and triple-screen support built-in. Αυτα μονο για αρχη...............
  6. Euro Truck Simulator 2 multiplayer Convoys & Meetings Upcoming Events Στο λινκ παρακατω μπορειτε να μπειτε και να συμμετασχετε σε διαφορα convoy ετοιμα για αναχωριση Convoys & Meetings
  7. 7 Security Measures to Protect Your Servers Introduction When setting up infrastructure, getting your applications up and running will often be your primary concern. However, making your applications to function correctly without addressing the security needs of your infrastructure could have devastating consequences down the line. In this guide, we will talk about some basic security practices that are best to configure before or as you set up your applications. SSH Keys SSH keys are a pair of cryptographic keys that can be used to authenticate to an SSH server as an alternative to password-based logins. A private and public key pair are created prior to authentication. The private key is kept secret and secure by the user, while the public key can be shared with anyone. To configure the SSH key authentication, you must place the user's public key on the server in a special directory. When the user connects to the server, the server will ask for proof that the client has the associated private key. The SSH client will use the private key to respond in a way that proves ownership of the private key. The server will then let the client connect without a password. To learn more about how SSH keys work, check out our article here. How Do They Enhance Security? With SSH, any kind of authentication, including password authentication, is completely encrypted. However, when password-based logins are allowed, malicious users can repeatedly attempt to access the server. With modern computing power, it is possible to gain entry to a server by automating these attempts and trying combination after combination until the right password is found. Setting up SSH key authentication allows you to disable password-based authentication. SSH keys generally have many more bits of data than a password, meaning that there are significantly more possible combinations that an attacker would have to run through. Many SSH key algorithms are considered uncrackable by modern computing hardware simply because they would require too much time to run through possible matches. How Difficult Is This to Implement? SSH keys are very easy to set up and are the recommended way to log into any Linux or Unix server environment remotely. A pair of SSH keys can be generated on your machine and you can transfer the public key to your servers within a few minutes. To learn about how to set up keys, follow this guide. If you still feel that you need password authentication, consider implementing a solution like fail2ban on your servers to limit password guesses. Firewalls A firewall is a piece of software (or hardware) that controls what services are exposed to the network. This means blocking or restricting access to every port except for those that should be publicly available. On a typical server, a number services may be running by default. These can be categorized into the following groups: Public services that can be accesses by anyone on the internet, often anonymously. A good example of this is a web server that might allow access to your site. Private services that should only be accessed by a select group of authorized accounts or from certain locations. An example of this may be a database control panel. Internal services that should be accessible only from within the server itself, without exposing the service to the outside world. For example, this may be a database that only accepts local connections. Firewalls can ensure that access to your software is restricted according to the categories above. Public services can be left open and available to everyone and private services can be restricted based on different criteria. Internal services can be made completely inaccessible to the outside world. For ports that are not being used, access is blocked entirely in most configurations. How Do They Enhance Security? Firewalls are an essential part of any server configuration. Even if your services themselves implement security features or are restricted to the interfaces you'd like them to run on, a firewall serves as an extra layer of protection. A properly configured firewall will restrict access to everything except the specific services you need to remain open. Exposing only a few pieces of software reduces the attack surface of your server, limiting the components that are vulnerable to exploitation. How Difficult Is This to Implement? There are many firewalls available for Linux systems, some of which have a steeper learning curve than others. In general though, setting up the firewall should only take a few minutes and will only need to happen during your server's initial setup or when you make changes in what services are offered on your computer. A simple choice is the UFW firewall. Other options are to use iptables or the CSF firewall. VPNs and Private Networking Private networks are networks that are only available to certain servers or users. For instance, in DigitalOcean, private networking is available in some regions as a data-center wide network. A VPN, or virtual private network, is a way to create secure connections between remote computers and present the connection as if it were a local private network. This provides a way to configure your services as if they were on a private network and connect remote servers over secure connections. How Do They Enhance Security? Utilizing private instead of public networking for internal communication is almost always preferable given the choice between the two. However, since other users within the data center are able to access the same network, you still must implement additional measures to secure communication between your servers. Using a VPN is, effectively, a way to map out a private network that only your servers can see. Communication will be fully private and secure. Other applications can be configured to pass their traffic over the virtual interface that the VPN software exposes. This way, only services that are meant to be consumable by clients on the public internet need to be exposed on the public network. How Difficult Is This to Implement? Utilizing private networks in a datacenter that has this capability is as simple as enabling the interface during your server's creation and configuring your applications and firewall to use the private network. Keep in mind that data center-wide private networks share space with other servers that use the same network. As for VPN, the initial setup is a bit more involved, but the increased security is worth it for most use-cases. Each server on a VPN must be install and configure the shared security and configuration data needed to establish the secure connection. After the VPN is up and running, applications must be configured to use the VPN tunnel. To learn about setting up a VPN to securely connect your infrastructure, check out our OpenVPN tutorial. Public Key Infrastructure and SSL/TLS Encryption Public key infrastructure, or PKI, refers to a system that is designed to create, manage, and validate certificates for identifying individuals and encrypting communication. SSL or TLS certificates can be used to authenticate different entities to one another. After authentication, they can also be used to established encrypted communication. How Do They Enhance Security? Establishing a certificate authority and managing certificates for your servers allows each entity within your infrastructure to validate the other members identity and encrypt their traffic. This can prevent man-in-the-middle attacks where an attacker imitates a server in your infrastructure to intercept traffic. Each server can be configured to trust a centralized certificate authority. Afterwards, any certificate that the authority signs can be implicitly trusted. If the applications and protocols you are using to communicate support TLS/SSL encryption, this is a way of encrypting your system without the overhead of a VPN tunnel (which also often uses SSL internally). How Difficult Is This to Implement? Configuring a certificate authority and setting up the rest of the public key infrastructure can involve quite a bit of initial effort. Furthermore, managing certificates can create an additional administration burden when new certificates need to be created, signed, or revoked. For many users, implementing a full-fledged public key infrastructure will make more sense as their infrastructure needs grow. Securing communications between components using VPN may be a good stop gap measure until you reach a point where PKI is worth the extra administration costs. Service Auditing Up until now, we have discussed some technology that you can implement to improve your security. However, a big portion of security is analyzing your systems, understanding the available attack surfaces, and locking down the components as best as you can. Service auditing is a process of discovering what services are running on the servers in your infrastructure. Often, the default operating system is configured to run certain services at boot. Installing additional software can sometimes pull in dependencies that are also auto-started. Service auditing is a way of knowing what services are running on your system, which ports they are using for communication, and what protocols are accepted. This information can help you configure your firewall settings. How Does It Enhance Security? Servers start many processes for internal purposes and to handle external clients. Each of these represents an expanded attack surface for malicious users. The more services that you have running, the greater chance there is of a vulnerability existing in your accessible software. Once you have a good idea of what network services are running on your machine, you can begin to analyze these services. Some questions that you will want to ask yourself for each one are: Should this service be running? Is the service running on interfaces that it doesn't needs to? Should it be bound to a single IP? Are your firewall rules structured to allow legitimate traffic pass to this service? Are your firewall rules blocking traffic that is not legitimate? Do you have a method of receiving security alerts about vulnerabilities for each of these services? This type of service audit should be standard practice when configuring any new server in your infrastructure. How Difficult Is This to Implement? Doing a basic service audit is incredibly simple. You can find out which services are listening to ports on each interface by using the netstat command. A simple example that shows the program name, PID, and addresses being used for listening for TCP and UDP traffic is: sudo netstat -plunt You will see output that looks like this: Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 887/sshd tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 919/nginx tcp6 0 0 :::22 :::* LISTEN 887/sshd tcp6 0 0 :::80 :::* LISTEN 919/nginx The main columns you need to stay attention to are Proto, Local Address, and PID/Program name. If the address is 0.0.0.0, then the service is accepting connections on all interfaces. File Auditing and Intrusion Detection Systems File auditing is the process of comparing the current system against a record of the files and file characteristics of your system when it is a known-good state. This is used to detect changes to the system that may have been authorized. An intrusion detection system, or IDS, is a piece of software that monitors a system or network for unauthorized activity. Many host-based IDS implementations use file auditing as a method of checking whether the system has changed. How Do They Enhance Security? Similar to the above service-level auditing, if you are serious about ensuring a secure system, it is very useful to be able to perform file-level audits of your system. This can be done periodically by the administrator or as part of an automated processes in an IDS. These strategies are some of the only ways to be absolutely sure that your filesystem has not been altered by some user or process. For many reasons, intruders often wish to remain hidden so that they can continue to exploit the server for an extended period of time. They might replace binaries with compromised versions. Doing an audit of the filesystem will tell you if any of the files have been altered, allowing you to be confident in the integrity of your server environment. How Difficult Is This to Implement? Implementing an IDS or conducting file audits can be quite an intensive process. The initial configuration involves telling the auditing system about any non-standard changes you've made to the server and defining paths that should be excluded to create a baseline reading. It also makes day-to-day operations more involved. It complicates updating procedures as you will need to re-check the system prior to running updates and then recreate the baseline after running the update to catch changes to the software versions. You will also need to offload the reports to another location so that an intruder cannot alter the audit to cover their tracks. While this may increase your administration load, being able to check your system against a known-good copy is one of the only ways of ensuring that files have not been altered without your knowledge. Some popular file auditing / intrusion detection systems are Tripwire and Aide. Isolated Execution Environments Isolating execution environments refers to any method in which individual components are run within their own dedicated space. This can mean separating out your discrete application components to their own servers or may refer to configuring your services to operate in chroot environments or containers. The level of isolation depends heavily on your application's requirements and the realities of your infrastructure. How Do They Enhance Security? Isolating your processes into individual execution environments increases your ability to isolate any security problems that may arise. Similar to how bulkheads and compartments can help contain hull breaches in ships, separating your individual components can limit the access that an intruder has to other pieces of your infrastructure. How Difficult Is This to Implement? Depending on the type of containment you choose, isolating your applications can be relatively simple. By packaging your individual components in containers, you can quickly achieve some measure of isolation, but note that Docker does not consider its containerization a security feature. Setting up a chroot environment for each piece can provide some level of isolation as well, but this also is not foolproof method of isolation as there are often ways of breaking out of a chroot environment. Moving components to dedicated machines is the best level of isolation, and in many cases may be the easiest, but may cost more for the additional machines. Conclusion The strategies outlined above are only some of the enhancements you can make to improve the security of your systems. It is important to recognize that, while it's better late than never, security measures decrease in their effectiveness the longer you wait to implement them. Security cannot be an afterthought and must be implemented from the start alongside the services and applications you are providing.
  8. Ultimate Greek Trailer Pack v126 Το παρων μοντ αποτελει πακετο με ρυμουλκες που φερουν τα λογοτυπα Ελληνικων εταιρειων και διατιθεται ΔΩΡΕΑΝ στην κοινοτητα του Euro Truck Simulator 2. Game version tested 1.26.xs AI Traffick enabled Advanced coupling παραμενει προβληματικο σε μερικες καροτσες χρησιμοποιηστετο με δικο σας ρισκο Trailer Authors NewS MDModding Roadhunter TZ Express Bora Unknown Skins Author Zeros Παρακαλω να μην κακομεταχειριστητε το παρων μοντ Δεν επιτρεπω την επαναδιανομη,μετατροπη,πωληση του. DOWNLOAD 482.6 MB http://ets2.gr/category/greek-mod/
  9. Σιγουρα ειναι καθαρα θεμα σετ-απ !
  10. Δοκιμαστικα και για λιγες ημερες θα τρεχουν στο σερβερ : Η Monza GP 1.2 , 5.793 km οποιος δεν την εχει,την κατεβαζει απο εδω Monza 1.2 και η Croft Circuit 1.01sm , 3.400 km που την κατεβαζετε απο το Steam Workshop η απο εδω Croft Circuit 1.01sm Race of 17 laps, Qualification race 9 laps, Practice 120min Weather: Sunny and warm Race starts 14:00 pm Ruleset: DTM with weight penalties and air restrictors --------------------------------------------------------------- Y.Γ Αν τυχον θεματα με τα λινκ ενημερωστε
  11. Ο @troffeo ηδη εχει κλεισει με την Ford οπως καλα ξερεις .... και αν πας οπως πηγες στα δοκιμαστικα,,,,,αστο καλυτερα,θα βγαλω Zastava DTM για παρτυ σου, για να παρεις τον αερα των DTM σιγα-σιγα
  12. Ξεκουραση μετα απο ενα δυσκολο ταξιδι
  13. Ωραιος..!! Αλλα ουτος η αλλως θα μαζευαμε ολα τα μικρολαθακια που μπορουν να διορθωθουν ευκολα για ολα και θα τα ανεβαζαμε στο τελευταιo up-date
  14. Ενα ακομη mod που δίνει λιγο περισσοτερο ρεαλισμο στο παιχνιδι. Animated gates in companies v1.5 Mod adds to the game more realism, making gates and barriers, many companies are animated! All gates and barriers have a collision, so to fully open do not attempt to drive to the base or to leave. In fashion there are not all companies that are in the game, the mod will be updated! Version 1.5: – Added new base – Fixed bugs Supported versions of the game: 1.26.x + DLC Going East + DLC Scandinavia + DLC Vive la France Credits: Schumi & SCS, CsewS,AlexeyP DOWNLOAD 16.4 MB List of companies for which made the animation of the gate: - Euroacres (Default) - BCP (Default) - NBFC (Default) - Eurogoodies (Default) - FCP (Default) - ITCC (Default) - Kaarfor (Default) - Lkwlog (Default) - Posped (Default) - Quarry (Default) - Sanbuilders (Default) - Sellplan (Default) - Skoda (Default) - Stokes (Default) - Tradeaux (Default) - Trameri (Default) - Transinet (Default) - Tree_et (Default) - Wgcc (Default) - Polar_fish (Scandinavia) - Ika_bohag (Scandinavia and France) - Vitas_power (Scandinavia) - Wilnet_trans (France) - Gomme_monde (France) - Boisserie (France) - Ns Chemicals (Scandinavia)* - Ns Oil (Scandinavia)* - Chimi (France)* - Huliant (France)* - BHB Raffin (France)* - Bjork (Scandinavia)* - Dans Jardin (France)* - Sag & Tre (Scandinavia)* Εαν δεν δουλευει το απο πανω λινκ υπαρχει εναλλακτηκα και αυτο. Animated gates in companies v1.6 DOWNLOAD V1.6 FOR 1.26
  15. Ενας ωραιος συνδιασμος απο 2 μοντ μαζι (πανε πακετο) για πιο ρεαλισστικ χειμωνιατικες καταστασεις για το off-line ! 1) Frosty Winter Weather Mod v 6.1 This mod simulates winter. Key Features Frosty winter weather and environment Frosty roads, vegetation and rooftops Snow/Sleet instead of rain Winter daylight hours and temperatures Early morning fog Heavy Winter addon addon available* *Optional Heavy Winter addon provides a snow covered landscape with little or no grass. No physics mod has been applied so the trucks will drive as normal. Works with Promods, TSM, MHA, Rus Map and others, compatible with all map DLCs. Place Frosty above Realistic Buildlng Lights mod. Place Frosty above Drive Safely’s Sound Fixes Pack to remove summer sounds like insect noises. Compatibility Latest Version: 1.26 Changes in v6.1 Updated for 1.26 Frostier roads and vegetation imported into default Improved weather Improved integration with Realistic Building Lights mod Many other fixes and improvements Important!! Frosty is a weather and graphics mod so other weather, HDR and environmental graphics mods should be disabled. Frosty should be given a HIGH priority in Mod Manager. Recommended Settings HDR: Enabled Color Correction: Enabled Vegetation Detail: High Grass Density: High Instructions Extract files from RAR and place in Mod Manager Credits: Grimes DOWNLOAD 740 MB =============================================== 2) Winter Physics for all Trucks Extremal winter physics for all trucks for winter mods such as “Frosty Winter Weather Mod” https://ets2.lt/en/frosty-winter-weather-mod-v-5-2/ Tested on default map on other not tested yet. You will be first WARNING. Don’t use automatic gearbox Author: piva DOWNLOAD 43 KB
  16. Aυτα ειναι...!!!Ωραιες καταστασεις που δεν τις βρισκεις σε αλλα και καλα που τα λεν σιμ και σε λιγο καιρο με το dx11 ........
  17. Ειδες?Eπειδη αποκλειεται να φοραν σασμαν/διαφορικα απο DTM σε αναβαση και εχοντας αλλη ιπποδυναμη απο αυτα που οριζουν στη DTΜ κατηγορια ,τοτε μονο DTM που δεν ειναι αυτα......
  18. με τα ιδια αλογα η ανεβασμενα? και με τα ιδια σασμαν-διαφορικα?
  19. Που μου την ειπε ρε George,τι DTM ? αυτα ανηκουν στη formula Sallon κατηγορια ....
  20. Μα ποιος σου ειπε για DTM ??Εχεις δει ποτε DTM σε αναβασεις??Εγω παντος οχι.Υπαρχει και η formula soloon κατηγορια..... *Παρεπιπτωντος θα ανεβασω 1 σερβερ με αυτα τα gt3 και με το σιερρα του Κεχαγια για να δω ποσο "ξυλο" τρωνε
  21. Πρεπει να ανεβασουμε κι'αλλο σερβερ για τα hillclimb γιατι με τους 2 μονο ισα-ισα χωραμε......
  22. Χαμος,fουλ οι σερβερ σημερα,δεν ξερω αν καναν καποιο update η πετυχα καμια μοντα εγω,παντος εχω ffb και πολυ καλο μαλιστα στο multiplayer. Για οποιαδηποτε πληροφορια-απορια στειλτε pm. To νεο εργαλειο μου

Living Legends

mad_dog, the fastest sim driver in the world

PC Games for free

UNREAL.jpg.06a44fa7bc9a0e74a2fd28f90ad76a27.jpg

Top 5 PC games

×
×
  • Create New...