<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ds | DXSdata</title>
	<atom:link href="https://www.dxsdata.com/author/ds/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.dxsdata.com</link>
	<description>Software &#124; Network &#124; Administration</description>
	<lastBuildDate>Wed, 04 Feb 2015 06:55:19 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.dxsdata.com/wp-content/uploads/2023/08/cropped-logo-32x32.jpg</url>
	<title>ds | DXSdata</title>
	<link>https://www.dxsdata.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Auf Linux-Disk-Images unter Windows zugreifenHow to access Linux disk images under Windows</title>
		<link>https://www.dxsdata.com/2015/02/how-to-access-linux-disk-images-under-windows/</link>
					<comments>https://www.dxsdata.com/2015/02/how-to-access-linux-disk-images-under-windows/#comments</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 04 Feb 2015 06:55:19 +0000</pubDate>
				<category><![CDATA[Virtualization]]></category>
		<guid isPermaLink="false">http://san.schausberger.cc/?p=313</guid>

					<description><![CDATA[Scenario You have created an image of an SD card containing a Linux operating system. Afterwards you want to access and extract files of the image, but do not have a spare physical storage available or you are working on a virtual machine. Unfortunately, it is not an ISO image which could be mounted by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><!--:en--><strong>Scenario</strong></p>
<p>You have created an image of an SD card containing a Linux operating system. Afterwards you want to access and extract files of the image, but do not have a spare physical storage available or you are working on a virtual machine.</p>
<p>Unfortunately, it is not an ISO image which could be mounted by Windows itself or opened with 7-Zip.</p>
<p><strong>Solution</strong></p>
<p>Run <a href="http://sourceforge.net/projects/win32diskimager/">Win32DiskImager </a>to create your image.</p>
<p>Install <a href="http://www.ltr-data.se/opencode.html/#ImDisk">ImDisk</a>. It lets you mount Linux SD card images and similar drives under Windows.</p>
<p>Install <a href="http://sourceforge.net/projects/ext2fsd/files/Ext2fsd/">Ext2Fsd</a>. With this tool, you can access EXT2, EXT3, EXT4 and VFAT partitions under Windows.</p>
<p>Now mount your Linux partition with Imdisk and you should be able to access the files and folders via Windows Explorer.<!--:--></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2015/02/how-to-access-linux-disk-images-under-windows/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>BettbelegungssensorBed occupancy sensor</title>
		<link>https://www.dxsdata.com/2015/01/bettbelegungssensor-german/</link>
					<comments>https://www.dxsdata.com/2015/01/bettbelegungssensor-german/#respond</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 14 Jan 2015 15:44:50 +0000</pubDate>
				<category><![CDATA[Home Automation]]></category>
		<guid isPermaLink="false">http://misc.schausberger.cc/?p=268</guid>

					<description><![CDATA[Was auf den ersten Blick vielleicht unsinnig erscheinen mag, lässt sich heute &#8211; in Kombination mit Bussystemen wie KNX &#8211; oft sinnvoll einsetzen. Beispiel: Jalousien nur dann öffnen, wenn niemand mehr im Bett liegt. Grundfunktion: Bett nicht belegt -&#62; Lamellen vom Lattenrost gerade -&#62; Taster geschlossen Bett belegt -&#62; Lamellen werden gebogen -&#62; Taster geöffnet [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><!--:de--></p>
<p><p>Was auf den ersten Blick vielleicht unsinnig erscheinen mag, lässt sich heute &#8211; in Kombination mit Bussystemen wie KNX &#8211; oft sinnvoll einsetzen.</p>
<p>Beispiel: Jalousien nur dann öffnen, wenn niemand mehr im Bett liegt.</p>
<p>Grundfunktion:</p>
<ul>
<li>Bett nicht belegt -&gt; Lamellen vom Lattenrost gerade -&gt; Taster geschlossen</li>
<li>Bett belegt -&gt; Lamellen werden gebogen -&gt; Taster geöffnet</li>
</ul>
<p><a href="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_134543.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-269" src="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_134543-300x225.jpg" alt="IMG_20150102_134543" width="300" height="225" /></a></p>
<p>Verwendet wird ein gewöhnlicher Tastknopf, der z.B. auf ebay günstig erhältlich ist.</p>
<p>Als Halterung kann ein beliebiges Material dienen, das einigermaßen stabil ist.</p>
<p><a href="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_1346061.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-270" src="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_1346061-300x225.jpg" alt="IMG_20150102_134606" width="300" height="225" /></a> <a href="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_1403001.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-271" src="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_1403001-300x225.jpg" alt="IMG_20150102_140300" width="300" height="225" /></a></p>
<p>Befestigung ungefähr in Lattenrostmitte.</p>
<p><a href="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_142405.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-272" src="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_142405-300x225.jpg" alt="IMG_20150102_142405" width="300" height="225" /></a> <a href="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_152305.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-273" src="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_152305-300x225.jpg" alt="IMG_20150102_152305" width="300" height="225" /></a> <a href="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_152317.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-274" src="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_152317-300x225.jpg" alt="IMG_20150102_152317" width="300" height="225" /></a></p>
<p>Anschluss an einer Tasterschnittstelle des Bussystems.</p>
<p><a href="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_184610.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-275" src="https://www.dxsdata.com/wp-content/uploads/2015/01/IMG_20150102_184610-300x225.jpg" alt="IMG_20150102_184610" width="300" height="225" /></a></p>
</p>
<p><!--:--></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2015/01/bettbelegungssensor-german/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenELEC mit Raspberry Pi: Falsches Datum und UhrzeitOpenELEC with Raspberry Pi: Wrong date and time</title>
		<link>https://www.dxsdata.com/2015/01/openelec-with-raspberry-pi-wrong-date-and-time/</link>
					<comments>https://www.dxsdata.com/2015/01/openelec-with-raspberry-pi-wrong-date-and-time/#comments</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 14 Jan 2015 15:23:24 +0000</pubDate>
				<category><![CDATA[Entertainment]]></category>
		<guid isPermaLink="false">http://misc.schausberger.cc/?p=266</guid>

					<description><![CDATA[Problem For some sporadic models of Raspberry Pi there seems to be a problem with time sync. No matter which time server (local or Internet) is set in IPv4 or OE general settings, it does not synchronize the time. Additionally, there is no way in the GUI to set time manually. The RPi would forget [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><!--:en--><strong>Problem</strong></p>
<p>For some sporadic models of Raspberry Pi there seems to be a problem with time sync. No matter which time server (local or Internet) is set in IPv4 or OE general settings, it does not synchronize the time.</p>
<p>Additionally, there is no way in the GUI to set time manually. The RPi would forget it anyway after its next shutdown.</p>
<p>Command &#8220;ntpdate&#8221; is not available via SSH.</p>
<p><strong>Workaround</strong></p>
<p>Connect to your Pi via SSH</p>
<p>Open or create file /storage/.config/autostart.sh and insert</p>
<pre class="lang:sh decode:true ">(sleep 20 &amp;&amp; /sbin/ntpd -p [yourTimeserver]) &amp;</pre>
<p>&nbsp;</p>
<p>Reboot and wait some seconds &#8211; time should be correct.<!--:--></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2015/01/openelec-with-raspberry-pi-wrong-date-and-time/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>WDS / Active Directory: System UUID / GUID nicht eindeutigWDS / Active Directory: System UUID / GUID not unique</title>
		<link>https://www.dxsdata.com/2015/01/wds-active-directory-system-uuid-guid-not-unique/</link>
					<comments>https://www.dxsdata.com/2015/01/wds-active-directory-system-uuid-guid-not-unique/#respond</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 14 Jan 2015 12:07:38 +0000</pubDate>
				<category><![CDATA[Virtualization]]></category>
		<guid isPermaLink="false">http://san.schausberger.cc/?p=306</guid>

					<description><![CDATA[Problem WDS / PXE booting needs a unique GUID for every client workstation, e.g. if the PC has to be approved and given a name in the WDS console by the administrator. Sometimes it may happen that not every GUID is unique. But duplicate GUIDs can lead to painful problems. E.g. if the workstation joins the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><!--:de--></p>
<p><strong>Problem</strong></p>
<p>WDS / PXE booting needs a unique GUID for every client workstation, e.g. if the PC has to be approved and given a name in the WDS console by the administrator.</p>
<p>Sometimes it may happen that not every GUID is unique. But duplicate GUIDs can lead to painful problems. E.g. if the workstation joins the domain automatically, the other machine which already exists in AD is overwritten. The result: One of both machines loses domain trust and has to be re-added to the domain.</p>
<p>Example with Zotac ID89, ID90, ID92 etc.: Every device seems to generate the same GUID by default. You see the GUID when you boot via PXE:</p>
<blockquote>
<p><em><span style="font-family: Georgia;">00020003-0004-0005-0006-000700080009 </span></em></p>
</blockquote>
<p>According to Zotac, this behavior is wanted and not a bug.</p>
<p><strong>Workaround 1</strong></p>
<ol>
<li>A new, random GUID can be generated by using an AMIBIOS tool &#8220;AMI DMI Edit&#8221;.</li>
<li>Create a DOS boot stick, e.g. with <a href="https://rufus.akeo.ie/">Rufus</a>.</li>
<li>Copy AMIDEDOS.exe of the <a href="http://www.wintotal.de/server/tipps/amidmi.zip">AMI DMI Edit Tools Package </a>to the stick.</li>
<li>Boot to DOS with the USB stick and run AMIDEDOS /u.</li>
<li>You should now have a freshly generated GUID.</li>
</ol>
<p><strong>Workaround 2</strong></p>
<p>Use a registry key to tell WDS that certain GUIDs are banned. If these GUIDs appear again to WDS, it uses the MAC address as GUID.</p>
<blockquote>
<p>HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWDSServerProvidersWDSPXE</p>
</blockquote>
<p><a href="http://technet.microsoft.com/en-us/library/cc733103(WS.10).aspx#banned">More information here</a></p>
<p><strong>Workaround 3</strong></p>
<p>In Active Directory Users and Computers, you can modify or delete the netbootGUID attribute. You find it under [yourExistingWorkstation] -&gt; Properties -&gt; Attribute Editor. So if you PXE boot a new workstation, the GUID is not assumed as existing. Please note that this is not the recommended way because the problem is not really solved.</p>
<p><strong>Notes</strong></p>
<p>It might be useful in most cases to use both workarounds 1 and 2 to never accidentally overwrite an existing computer in your domain.</p>
<p>Sometimes WDS seems to block booting a PXE image after changing the GUID. Errors like this one may appear:</p>
<blockquote>
<p>proxydhcp service did not reply to request on port 4011.</p>
</blockquote>
<p>You can then use another LAN port (if available) or just temporarily disable the setting &#8220;administrator approval for unknown devices&#8221;.</p>
<p>Some sites provide Powershell scripts which can be used to delete every netbootGUID in your AD. I would not recommend this, because keeping the netbootGUID attribute of the computers can make later re-installing of Windows easier (the previous PC name is recognized automatically).</p>
<p><!--:--><!--:en--><strong>Problem</strong></p>
<p>WDS / PXE booting needs a unique GUID for every client workstation, e.g. if the PC has to be approved and given a name in the WDS console by the administrator.</p>
<p>Sometimes it may happen that not every GUID is unique. But duplicate GUIDs can lead to painful problems. E.g. if the workstation joins the domain automatically, the other machine which already exists in AD is overwritten. The result: One of both machines loses domain trust and has to be re-added to the domain.</p>
<p>Example with Zotac ID89, ID90, ID92 etc.: Every device seems to generate the same GUID by default. You see the GUID when you boot via PXE:</p>
<blockquote><p><em><span style="font-family: Georgia;">00020003-0004-0005-0006-000700080009 </span></em></p></blockquote>
<p>According to Zotac, this behavior is wanted and not a bug.</p>
<p><strong>Workaround 1</strong></p>
<ol>
<li>A new, random GUID can be generated by using an AMIBIOS tool &#8220;AMI DMI Edit&#8221;.</li>
<li>Create a DOS boot stick, e.g. with <a href="https://rufus.akeo.ie/">Rufus</a>.</li>
<li>Copy AMIDEDOS.exe of the <a href="http://www.wintotal.de/server/tipps/amidmi.zip">AMI DMI Edit Tools Package </a>to the stick.</li>
<li>Boot to DOS with the USB stick and run AMIDEDOS /u.</li>
<li>You should now have a freshly generated GUID.</li>
</ol>
<p><strong>Workaround 2</strong></p>
<p>Use a registry key to tell WDS that certain GUIDs are banned. If these GUIDs appear again to WDS, it uses the MAC address as GUID.</p>
<blockquote><p>HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWDSServerProvidersWDSPXE</p></blockquote>
<p><a href="http://technet.microsoft.com/en-us/library/cc733103(WS.10).aspx#banned">More information here</a></p>
<p><strong>Workaround 3</strong></p>
<p>In Active Directory Users and Computers, you can modify or delete the netbootGUID attribute. You find it under [yourExistingWorkstation] -&gt; Properties -&gt; Attribute Editor. So if you PXE boot a new workstation, the GUID is not assumed as existing. Please note that this is not the recommended way because the problem is not really solved.</p>
<p><strong>Notes</strong></p>
<p>It might be useful in most cases to use both workarounds 1 and 2 to never accidentally overwrite an existing computer in your domain.</p>
<p>Sometimes WDS seems to block booting a PXE image after changing the GUID. Errors like this one may appear:</p>
<blockquote><p>proxydhcp service did not reply to request on port 4011.</p></blockquote>
<p>You can then use another LAN port (if available) or just temporarily disable the setting &#8220;administrator approval for unknown devices&#8221;.</p>
<p>Some sites provide Powershell scripts which can be used to delete every netbootGUID in your AD. I would not recommend this, because keeping the netbootGUID attribute of the computers can make later re-installing of Windows easier (the previous PC name is recognized automatically).<!--:--></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2015/01/wds-active-directory-system-uuid-guid-not-unique/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android 4.0.4: Workaround for VPN issueAndroid 4.0.4: Workaround for VPN issue</title>
		<link>https://www.dxsdata.com/2014/11/android-4-0-4-workaround-for-vpn-issue/</link>
					<comments>https://www.dxsdata.com/2014/11/android-4-0-4-workaround-for-vpn-issue/#respond</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Sat, 29 Nov 2014 13:31:19 +0000</pubDate>
				<category><![CDATA[Mobile phones]]></category>
		<guid isPermaLink="false">http://misc.schausberger.cc/?p=263</guid>

					<description><![CDATA[Scenario You want to configure a VPN connection to your firewall. It does not work on Android 4.0.4, but the same settings work in 4.1.x and above. Used in this example: VPN method L2TP IPsec PSK, Samsung GT-P7501, Dell Sonicwall tz 210 Problem According to some googlecode threads, this is a bug which has not [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><!--:de--></p>
<p><strong>Scenario</strong></p>
<p>You want to configure a VPN connection to your firewall. It does not work on Android 4.0.4, but the same settings work in 4.1.x and above.</p>
<p>Used in this example: VPN method L2TP IPsec PSK, Samsung GT-P7501, Dell Sonicwall tz 210</p>
<p><strong>Problem</strong></p>
<p>According to some googlecode threads, this is a bug which has not been solved for years.</p>
<p><a href="http://code.google.com/p/android/issues/detail?id=23124">http://code.google.com/p/android/issues/detail?id=23124</a></p>
<p><strong>Solution</strong></p>
<p>If possible, upgrade to a higher Android version the official way.</p>
<p>Unfortunately, there seems to be no solution which works without rooting the device, because for devices like the Samsung Galaxy Tab 10.1 the latest official Android version is 4.0.4.</p>
<p>So another way would be changing the OS to Cyanogenmod 10.2 or similar, but it is a matter of opinion to use it because it is not supported officially. CM11 also seems not to be supported on this device.</p>
<p>The most effective way for me finally was to root the tablet and change the &#8220;racoon&#8221; file.</p>
<p><strong>Steps</strong></p>
<p>Root the device. <a href="http://www.kingoapp.com/">KingoApp </a>which runs under Windows is very comfortable for doing this.</p>
<p>Look at the <a href="http://code.google.com/p/android/issues/detail?id=23124#c203">google code thread</a> -&gt; #203. Download the modified racoon file.</p>
<p>Establish an ADB connection to your Android device. If you do not want to install the full Android SDK, there are portable packages available (google &#8220;adb tools&#8221; etc.).</p>
<p>Open cmd, go to your ADB folder, note the location of your racoon file and execute:</p>
<ol>
<li>adb shell</li>
<li>su</li>
<li>mount -o rw,remount /system</li>
<li>chmod 777 /system/bin/racoon</li>
<li>exit</li>
<li>adb push racoon /system/bin/</li>
<li>adb shell</li>
<li>su chmod 777 /system/bin/racoon</li>
<li>reboot</li>
</ol>
<p>Then retry your VPN connection.</p>
<p><!--:--><!--:en--><strong>Scenario</strong></p>
<p>You want to configure a VPN connection to your firewall. It does not work on Android 4.0.4, but the same settings work in 4.1.x and above.</p>
<p>Used in this example: VPN method L2TP IPsec PSK, Samsung GT-P7501, Dell Sonicwall tz 210</p>
<p><strong>Problem</strong></p>
<p>According to some googlecode threads, this is a bug which has not been solved for years.</p>
<p><a href="http://code.google.com/p/android/issues/detail?id=23124">http://code.google.com/p/android/issues/detail?id=23124</a></p>
<p><strong>Solution</strong></p>
<p>If possible, upgrade to a higher Android version the official way.</p>
<p>Unfortunately, there seems to be no solution which works without rooting the device, because for devices like the Samsung Galaxy Tab 10.1 the latest official Android version is 4.0.4.</p>
<p>So another way would be changing the OS to Cyanogenmod 10.2 or similar, but it is a matter of opinion to use it because it is not supported officially. CM11 also seems not to be supported on this device.</p>
<p>The most effective way for me finally was to root the tablet and change the &#8220;racoon&#8221; file.</p>
<p><strong>Steps</strong></p>
<p>Root the device. <a href="http://www.kingoapp.com/">KingoApp </a>which runs under Windows is very comfortable for doing this.</p>
<p>Look at the <a href="http://code.google.com/p/android/issues/detail?id=23124#c203">google code thread</a> -&gt; #203. Download the modified racoon file.</p>
<p>Establish an ADB connection to your Android device. If you do not want to install the full Android SDK, there are portable packages available (google &#8220;adb tools&#8221; etc.).</p>
<p>Open cmd, go to your ADB folder, note the location of your racoon file and execute:</p>
<pre class="lang:sh decode:true ">adb shell

su

mount -o rw,remount /system

chmod 777 /system/bin/racoon

exit

adb push racoon /system/bin/

adb shell

su chmod 777 /system/bin/racoon

reboot</pre>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Then retry your VPN connection.<!--:--></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2014/11/android-4-0-4-workaround-for-vpn-issue/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MySQL: Find all references to a table before moving it</title>
		<link>https://www.dxsdata.com/2014/09/mysql-find-all-references-to-a-table-before-moving-it/</link>
					<comments>https://www.dxsdata.com/2014/09/mysql-find-all-references-to-a-table-before-moving-it/#respond</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Thu, 25 Sep 2014 12:08:28 +0000</pubDate>
				<category><![CDATA[MySQL]]></category>
		<category><![CDATA[PHP]]></category>
		<guid isPermaLink="false">http://dev.schausberger.cc/?p=190</guid>

					<description><![CDATA[Scenario You have to move a MySQL database table to another database, but you have many other tables, functions, routines, events etc. which access it. Before moving it, it is not enough to find only the tables containing foreign keys, but also find functions etc. which use it. This PHP script does that for you: [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Scenario</strong></p>
<p>You have to move a MySQL database table to another database, but you have many other tables, functions, routines, events etc. which access it. Before moving it, it is not enough to find only the tables containing foreign keys, but also find functions etc. which use it.</p>
<p>This PHP script does that for you: <a href="https://www.dxsdata.com/wp-content/uploads/2014/09/mysql_table_references.zip">mysql_table_references</a></p>
<p><strong>Usage</strong></p>
<p>Edit the script to enter your DB server login data, then run it in your browser and enter the table name which you want to find references for.</p>
<p><strong>Script code</strong></p>
<pre class="brush: php; title: ; notranslate">
&lt;!DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
 &lt;link rel=&quot;stylesheet&quot; href=&quot;https://maxcdn.bootstrapcdn.com/bootstrap/3.2.0/css/bootstrap.min.css&quot;&gt;

&lt;/head&gt;
&lt;body&gt;
&lt;?php
    $searchtable = @$_GET&#x5B;'searchtable'];
?&gt;

&lt;h1&gt;References, Views and Routines regarding Table&lt;/h1&gt;

&lt;form action=&quot;&lt;?=$_SERVER&#x5B;'PHP_SELF']?&gt;&quot; method=&quot;get&quot;&gt;
Table name: &lt;input type=&quot;text&quot; name=&quot;searchtable&quot; value=&quot;&lt;?=@$searchtable?&gt;&quot;&gt;
&lt;input type=&quot;submit&quot; value=&quot;Search&quot;&gt;
&lt;/form&gt;

&lt;?php
    if (!$searchtable)
        exit;

?&gt;

&lt;?php

$dbhost = 'localhost';
$dbname = 'yourdb';
$dbuser = 'root';
$dbpw = 'yourpw';

try
{
    $db = new PDO(&quot;mysql:host=$dbhost;&quot;, $dbuser, $dbpw);
}
catch(PDOException $ex)
{
    echo &quot;&lt;b&gt;Could not connect to server! Please make sure you have set the correct config values in this file.&lt;/b&gt;&quot;;
    echo &quot;&lt;br&gt;Details:&lt;br&gt;&quot;.$ex-&gt;getMessage();
    exit;
}

//Foreign Keys:
$result = $db-&gt;query(&quot;select
  TABLE_NAME,COLUMN_NAME,CONSTRAINT_NAME, TABLE_SCHEMA, REFERENCED_TABLE_NAME,REFERENCED_COLUMN_NAME
from INFORMATION_SCHEMA.KEY_COLUMN_USAGE
where
  REFERENCED_TABLE_NAME = '$searchtable' or TABLE_NAME = '$searchtable'
  order by TABLE_NAME, REFERENCED_TABLE_NAME;&quot;);
//Alternative?
//  show create table $searchtable;
?&gt;

&lt;div&gt;Note: Results may contain unrelated entries if the table name is not unique, e.g. if it is also used in column names etc.&lt;/div&gt;

&lt;hr&gt;
&lt;h2&gt;Results for &lt;b&gt;&lt;?=$searchtable?&gt;&lt;/b&gt;&lt;/h2&gt;

&lt;h3&gt;Foreign Keys&lt;/h3&gt;
&lt;table border=&quot;1&quot;&gt;
&lt;tr&gt;
    &lt;th&gt;DB&lt;/th&gt;
    &lt;th&gt;Table&lt;/th&gt;
    &lt;th&gt;Column&lt;/th&gt;
    &lt;th&gt;Referenced Table&lt;/th&gt;
    &lt;th&gt;Referenced Column&lt;/th&gt;
&lt;/tr&gt;

&lt;?php
while($row = $result-&gt;fetch())
{
     ?&gt;
     &lt;tr&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'TABLE_SCHEMA']?&gt;&lt;/td&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'TABLE_NAME']?&gt;&lt;/td&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'COLUMN_NAME']?&gt;&lt;/td&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'REFERENCED_TABLE_NAME']?&gt;&lt;/td&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'REFERENCED_COLUMN_NAME']?&gt;&lt;/td&gt;
     &lt;/tr&gt;
     &lt;?php
}
?&gt;
&lt;/table&gt;
&lt;?php

//Usage in Views:
$result = $db -&gt; query(&quot;select
    TABLE_SCHEMA, TABLE_NAME, VIEW_DEFINITION
    from INFORMATION_SCHEMA.views
    where view_definition like '%from%$searchtable%'
&quot;);

?&gt;
&lt;h3&gt;Views&lt;/h3&gt;
&lt;table border=&quot;1&quot;&gt;
&lt;tr&gt;
    &lt;th&gt;DB&lt;/th&gt;
    &lt;th&gt;Table&lt;/th&gt;
    &lt;th&gt;View Definition&lt;/th&gt;
&lt;/tr&gt;

&lt;?php

while($row = $result-&gt;fetch())
{
     ?&gt;
     &lt;tr&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'TABLE_SCHEMA']?&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;&lt;?=$row&#x5B;'TABLE_NAME']?&gt;&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;small&gt;&lt;?=nl2br(str_ireplace($searchtable, &quot;&lt;b&gt;$searchtable&lt;/b&gt;&quot;, $row&#x5B;'VIEW_DEFINITION']))?&gt;&lt;/small&gt;&lt;/td&gt;
     &lt;/tr&gt;
     &lt;?php
}

?&gt;
&lt;/table&gt;
&lt;?php

//Usage in Routines:
$result = $db -&gt; query(&quot;select
    ROUTINE_SCHEMA, ROUTINE_NAME, ROUTINE_DEFINITION
    from INFORMATION_SCHEMA.ROUTINES
    where routine_definition like '%from%$searchtable%'
&quot;);
?&gt;
&lt;h3&gt;Routines&lt;/h3&gt;
&lt;table border=&quot;1&quot;&gt;
&lt;tr&gt;
    &lt;th&gt;DB&lt;/th&gt;
    &lt;th&gt;Table&lt;/th&gt;
    &lt;th&gt;Routine Definition&lt;/th&gt;
&lt;/tr&gt;

&lt;?php

while($row = $result-&gt;fetch())
{
     ?&gt;
     &lt;tr&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'ROUTINE_SCHEMA']?&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;&lt;?=$row&#x5B;'ROUTINE_NAME']?&gt;&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;small&gt;&lt;?=nl2br(str_ireplace($searchtable, &quot;&lt;b&gt;$searchtable&lt;/b&gt;&quot;, $row&#x5B;'ROUTINE_DEFINITION']))?&gt;&lt;/small&gt;&lt;/td&gt;

     &lt;/tr&gt;
     &lt;?php
}

?&gt;
&lt;/table&gt;
&lt;?php

//Usage in Events:
$result = $db -&gt; query(&quot;select
    EVENT_SCHEMA, EVENT_NAME, EVENT_DEFINITION
    from INFORMATION_SCHEMA.events
    where event_definition like '%from%$searchtable%'
&quot;);

?&gt;
&lt;h3&gt;Events&lt;/h3&gt;
&lt;table border=&quot;1&quot;&gt;
&lt;tr&gt;
    &lt;th&gt;DB&lt;/th&gt;
    &lt;th&gt;Table&lt;/th&gt;
    &lt;th&gt;Event Definition&lt;/th&gt;
&lt;/tr&gt;

&lt;?php

while($row = $result-&gt;fetch())
{
     ?&gt;
     &lt;tr&gt;
        &lt;td&gt;&lt;?=$row&#x5B;'EVENT_SCHEMA']?&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;&lt;?=$row&#x5B;'EVENT_NAME']?&gt;&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;small&gt;&lt;?=nl2br(str_ireplace($searchtable, &quot;&lt;b&gt;$searchtable&lt;/b&gt;&quot;, $row&#x5B;'EVENT_DEFINITION']))?&gt;&lt;/small&gt;&lt;/td&gt;

     &lt;/tr&gt;
     &lt;?php
}

?&gt;
&lt;/table&gt;

&lt;script src=&quot;https://maxcdn.bootstrapcdn.com/bootstrap/3.2.0/js/bootstrap.min.js&quot;&gt;&lt;/script&gt;
&lt;/body&gt;
&lt;/html&gt;

</pre>
<p>It might also be useful to get all DB users which have access to the table(s). Use phpMyAdmin for this (Activate table, then click &#8220;Permissions&#8221;).</p>
<p>Moving tables to another database might have effect to a lot of software accessing the data, and it could take a long time to get the code updated. During this process, use a workaround like table views. You can reference the new table with the view, so it is accessible via both databases. Using MySQL, you can e.g. use &#8220;update&#8221; or &#8220;insert&#8221; commands directly on the view in many cases, e.g. if there is exactly 1 table in the view query.</p>
<p>Example: create view address as select * from newdb.address</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2014/09/mysql-find-all-references-to-a-table-before-moving-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zugriffssicherheit am EIB-/KNX-Bus</title>
		<link>https://www.dxsdata.com/2014/08/zugriffssicherheit-am-eib-knx-bus/</link>
					<comments>https://www.dxsdata.com/2014/08/zugriffssicherheit-am-eib-knx-bus/#respond</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 13 Aug 2014 13:45:41 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://eibknx.schausberger.cc/?p=66</guid>

					<description><![CDATA[Einer KNX-Installation, vor allem in Kombination mit KNX-IP-Gateway, stehen eine Unzahl an Angriffsmöglichkeiten gegenüber. Der Bus selbst bietet keinerlei Authentifizierungsmechanismen oder sonstige Sicherheitsmechanismen. Für die meisten Fälle gibt es vernünftige Gegenmaßnahmen, allerdings sollte der Bedienungskomfort nicht allzu sehr darunter leiden. Dazu hier einige Tipps. Zugriff über das Internet Diese Zugriffsvariante beinhaltet das mit Abstand größte [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Einer KNX-Installation, vor allem in Kombination mit KNX-IP-Gateway, stehen eine Unzahl an Angriffsmöglichkeiten gegenüber. Der Bus selbst bietet keinerlei Authentifizierungsmechanismen oder sonstige Sicherheitsmechanismen.</p>
<p>Für die meisten Fälle gibt es vernünftige Gegenmaßnahmen, allerdings sollte der Bedienungskomfort nicht allzu sehr darunter leiden. Dazu hier einige Tipps.</p>
<p><strong>Zugriff über das Internet</strong></p>
<p>Diese Zugriffsvariante beinhaltet das mit Abstand größte Gefahrenpotenzial und sollte daher gut durchdacht sein.</p>
<p>Im Normalfall befindet sich im selben Netzwerk, in dem sich der KNX-IP-Gateway und somit auch der Bus befindet, ein Internetrouter. Über Port-Forwardings lässt sich dieser so konfigurieren, dass z.B. interne Webserver oder eine Bus-Visualisierung von außen erreichbar sind.</p>
<p>Auch wenn die Visualisierung selbst Zugangsdaten anfordert, ist dies extrem unsicher. Außerdem kommt es vor, dass solche Software Sicherheitslücken aufweist, die möglicherweise noch nicht behoben sind.</p>
<p>Für solche Dinge daher unbedingt ein VPN verwenden! Im einfachsten Fall lässt sich dieses auf dem Internetrouter oder auf einem internen Windows-/Linux-Betriebssystem einrichten. Der Bedienungskomfort bleibt hier nicht unbedingt auf der Strecke, da so gut wie alle gängigen Smartphones und PC-Betriebssysteme in irgend einer Form VPN-kompatibel sind und es sich bei Bedarf relativ schnell aktivieren lässt.</p>
<p>Diese &#8220;2-stufige&#8221; Sicherheit ist um ein Vielfaches schwieriger zu umgehen, als wenn der Angreifer bloß Passwörter bei der Visualisierung probieren muss.</p>
<p><strong>Im lokalen Netzwerk: LAN-Ports und WLAN absichern</strong></p>
<p>Ein Angriff ist zwar, verglichen mit der ersten Variante, vor allem in Privathäusern relativ unwahrscheinlich, aber trotzdem nicht unmöglich.</p>
<p>Für den Fall, dass sich verbundene LAN-Ports außerhalb der Gebäudes befinden oder es vorkommen kann, dass Mitbewohner oder Mitarbeiter dubiose Hardware ins Netzwerk bringen, sollten diese besonders geschützt werden.</p>
<p>Möglichkeiten:</p>
<ul>
<li>Über den internen (managed) Switch die bestimmten Ports so konfigurieren, dass sie nur einzelne MAC-Adressen zulassen, und zwar die der vertrauenswürdigen Geräte. MAC-Adressen können jedoch bei vielen Endgeräten selbst vergeben bzw. überschrieben werden. Trotzdem macht diese Variante den Zugriff für Angreifer um einiges schwieriger.</li>
<li>Tagged VLANs konfigurieren. Damit lässt sich genauer bestimmen, welches Gerät im Netzwerk auf welche Ziele zugreifen darf. Die Einrichtung ist jedoch relativ aufwändig und für den Privathaushalt eher vernachlässigbar.</li>
</ul>
<p>Für das WLAN empfiehlt es sich, möglichst sichere Passwörter zu vergeben, und zwar pro Benutzer &#8211; je nach Möglichkeit im Idealfall kombiniert mit WPA2-Enterprise und einem Radius-Server. Gästezugriff grundsätzlich vermeiden oder einen eigenen Gast-Zugang, ev. mit VLAN, einrichten.</p>
<p><strong>KNX-Leitungen im Außenbereich</strong></p>
<p>Soweit möglich, ist für den Außenbereich eine eigene Bus-Linie sinnvoll, d.h. mit eigener Spannungsversorgung und vom internen Busnetz getrennt durch einen Linienkoppler. Falls nun jemand die Leitung von außen kurzschließen sollte (warum auch immer &#8211; bringt niemandem etwas), laufen die Geräte auf den anderen Linien weiter. Ein Kurzschluss auf dem Bus zerstört übrigens keine Geräte, sondern bewirkt im Prinzip &#8220;nur&#8221; einen Reset.</p>
<p>Ob jemand von außen den Bus tatsächlich so manipulieren kann, um z.B. ein Öffnen einer Tür etc. zu bewirken, kommt natürlich darauf an, wie genau dieser über den gesamten Aufbau Bescheid weiß. Ohne jegliche Informationen dauert es wohl in Summe (zu) lange, um eine entsprechende GA zu finden, falls überhaupt vorhanden. Generell fehlen leider sinnvolle / einfache Möglichkeiten, um hier mehr Sicherheit schaffen zu können.</p>
<p>Um unerlaubte Programmierungen zu verhindern, empfiehlt sich das Modul <a href="http://www.bb-steuerungstechnik.de/cms/de/produkte/gebaeudeautomation/eibknx-betriebssicherheit/eibknx-betriebssicherheit/knxguard-der-sicherheitsbaustein.html">KNXGuard</a>. Möglicherweise wäre etwas Ähnliches auch über den eibd-Server möglich, dazu habe ich aber (noch) keine Informationen.</p>
<p><strong>Im lokalen Netzwerk: Visualisierung, EIB-Server absichern</strong></p>
<p>Sollte es der Angreifer bis ins LAN schaffen, sind jedenfalls sichere Passwörter für die einzelnen Geräte mit IP-basiertem Zugang hilfreich.</p>
<p>Bei Visualisierungen wie openHAB oder Systemen, die solche anbieten (Gira Homeserver), ist das Einrichten einer Authentifizierung normalerweise kein Problem.</p>
<p>Auch beim <a href="http://www.auto.tuwien.ac.at/~mkoegler/index.php/eibd">eibd</a>, der unter Linux läuft, lässt sich auf dem System eine Firewall einrichten &#8211; unter Ubuntu z.B. die ufw. Sie ist relativ einfach zu handhaben und man schränkt damit den Zugriff der Geräte, denen der Zugriff auf eibd erlaubt ist, ein wie gewünscht.</p>
<p>Ein großes Sicherheitsproblem stellt jedoch der KNX-IP-Gateway dar. Diese Geräte besitzen meist absolut keine sicherheitstechnischen Funktionen, um den Zugriff einzuschränken. Folgendes ist daher empfehlenswert:</p>
<ul>
<li>VLAN, wie oben beschrieben, in dem sich nur vertrauenswürdige Geräte befinden, oder</li>
<li>Router mit Firewall-Funktion zwischen Gateway und Switch (gibt es relativ günstig). Dabei sollte vor allem der UDP-Port 3671 genau behandelt werden. Oder</li>
<li>Verwendung der DMZ-Funktion des Routers, falls vorhanden, oder</li>
<li>Ist ein Hostserver für virtuelle Maschinen vorhanden (z.B. MS Hyper-V), kann eine separate VM mit eigenem virtuellen Switch als Firewall zwischen LAN und KNX-Gateway dienen. Dabei wäre allerdings eine separate Netzwerkkarte pro Gateway notwendig.</li>
</ul>
<p>Module wie das eibmarkt KNX IP Gateway haben hier noch den kleinen Sicherheits-&#8220;Vorteil&#8221;, dass zu einem Zeitpunkt nur 1 Verbindung möglich ist. Ist z.B. ein eibd mit dem Gateway verbunden, ist es quasi für weitere Verbindungen gesperrt.</p>
<p>Alle Angaben ohne Gewähr!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2014/08/zugriffssicherheit-am-eib-knx-bus/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zyxel GS1900: Allow only one certain device on a certain port</title>
		<link>https://www.dxsdata.com/2014/08/zyxel-gs1900-allow-only-one-certain-device-on-a-certain-port/</link>
					<comments>https://www.dxsdata.com/2014/08/zyxel-gs1900-allow-only-one-certain-device-on-a-certain-port/#comments</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 13 Aug 2014 11:27:54 +0000</pubDate>
				<category><![CDATA[Administration]]></category>
		<guid isPermaLink="false">http://san.schausberger.cc/?p=298</guid>

					<description><![CDATA[The documentation of the Zyxel GS1900-48HP seems to be quite useless when it comes to security features. It does not explain what e.g. the Protected Port or similar features do in detail. Anyway, in this tutorial you will see how to allow exactly one Ethernet device for one port. This makes sense e.g. if you have LAN [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The documentation of the Zyxel GS1900-48HP seems to be quite useless when it comes to security features. It does not explain what e.g. the Protected Port or similar features do in detail.</p>
<p>Anyway, in this tutorial you will see how to allow exactly one Ethernet device for one port. This makes sense e.g. if you have LAN ports outside your house (PoE doorbell etc.), or for companies to only allow certain devices to be connected.</p>
<p>Note: MAC addresses can always be modified, so this is not 100% secure, but better than nothing as at least it takes more time for the invader to find the correct MAC.</p>
<ol>
<li>Log into the web interface of your Zyxel GS1900 switch.</li>
<li>Configuration -&gt; MAC Table: Add an entry for your static MAC address you want to allow, and enter the correct port number.</li>
<li>Security -&gt; Port Security -&gt; Global: Enable, Apply</li>
<li>Security -&gt; Port Security -&gt; Port: Edit your port number. For Max Entry MAC Number, enter value 0 (not 1!).</li>
<li>Test connectivity with a ping. For further testing, you can connect another hardware to the switch port, or enter a wrong static MAC in the table &#8211; ping should not work in these cases.</li>
</ol>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2014/08/zyxel-gs1900-allow-only-one-certain-device-on-a-certain-port/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Nagios Plugin for monitoring EIB / KNX group addresses</title>
		<link>https://www.dxsdata.com/2014/08/nagios-plugin-for-monitoring-eib-knx-group-addresses/</link>
					<comments>https://www.dxsdata.com/2014/08/nagios-plugin-for-monitoring-eib-knx-group-addresses/#respond</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 13 Aug 2014 06:06:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://dev.schausberger.cc/?p=185</guid>

					<description><![CDATA[You can monitor basic functionality of KNX components with the components you find on this site. Unfortunately, they don&#8217;t offer a script for reading KNX group addresses. According to check_maskversion.pl, I modified the script a bit to be able to get KNX GA values: check_knx_groupaddress.pl. You can e.g. use it for checking GAs periodically for errors, e.g. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>You can monitor basic functionality of KNX components with the components you find <a href="https://www.monitoringexchange.org/inventory/Check-Plugins/Others/Monitoring-EIB-and-KNX-Components">on this site</a>. Unfortunately, they don&#8217;t offer a script for reading KNX group addresses.</p>
<p>According to check_maskversion.pl, I modified the script a bit to be able to get KNX GA values: check_knx_groupaddress.pl. You can e.g. use it for checking GAs periodically for errors, e.g. some KNX devices offer GAs like &#8220;device failure&#8221;, &#8220;no signal&#8221; etc. It basically does the following:</p>
<ul>
<li>It runs the groupreadresponse command of the bcusdk package, which is also needed for the other KNX plugins.</li>
<li>If the GA returns 0/false, the plugin returns OK -&gt; no error. Otherwise you receive an alarm in Nagios.</li>
</ul>
<p>You can download the Perl plugin here: <a href="https://www.dxsdata.com/wp-content/uploads/2014/08/check_knx_groupaddress.zip">check_knx_groupaddress</a></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2014/08/nagios-plugin-for-monitoring-eib-knx-group-addresses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nagios-Plugins zur Überwachung von EIB-/KNX-Komponenten</title>
		<link>https://www.dxsdata.com/2014/08/nagios-plugins-zur-uberwachung-von-eib-knx-komponenten/</link>
					<comments>https://www.dxsdata.com/2014/08/nagios-plugins-zur-uberwachung-von-eib-knx-komponenten/#respond</comments>
		
		<dc:creator><![CDATA[ds]]></dc:creator>
		<pubDate>Wed, 13 Aug 2014 06:12:43 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://eibknx.schausberger.cc/?p=64</guid>

					<description><![CDATA[Wenn es um die Überwachung der Basisfunktionen von KNX-Modulen geht, sind die Plugins von dieser Seite sehr empfehlenswert. Habe in meinem Dev-Blog ein weiteres Modul als Ergänzung zur Verfügung gestellt, um auch Gruppenadressen abfragen zu können. Dies kann z.B. für GAs sinnvoll sein, die Störungen beinhalten, wie &#8220;Heizspannung ausgefallen&#8221;, &#8220;Drahtbruch&#8221; etc. Funktion: Kommt von der [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Wenn es um die Überwachung der Basisfunktionen von KNX-Modulen geht, sind die Plugins von <a href="https://www.monitoringexchange.org/inventory/Check-Plugins/Others/Monitoring-EIB-and-KNX-Components">dieser Seite </a>sehr empfehlenswert.</p>
<p>Habe in meinem <a href="http://dev.schausberger.cc/">Dev-Blog</a> ein weiteres Modul als Ergänzung zur Verfügung gestellt, um auch Gruppenadressen abfragen zu können. Dies kann z.B. für GAs sinnvoll sein, die Störungen beinhalten, wie &#8220;Heizspannung ausgefallen&#8221;, &#8220;Drahtbruch&#8221; etc.</p>
<p>Funktion:</p>
<ul>
<li>Kommt von der GA 0 / false zurück, gibt das Plugin &#8220;OK&#8221; an Nagios zurück.</li>
<li>Andernfalls wird CRITICAL zurückgegeben.</li>
</ul>
<p>Download und weitere Infos <a href="http://dev.schausberger.cc/2014/08/nagios-plugin-for-monitoring-eib-knx-group-addresses/">hier</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dxsdata.com/2014/08/nagios-plugins-zur-uberwachung-von-eib-knx-komponenten/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
