MediaWiki API result

This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.

Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.

See the complete documentation, or the API help for more information.

{
    "warnings": {
        "query": {
            "*": "Formatting of continuation data will be changing soon. To continue using the current formatting, use the 'rawcontinue' parameter. To begin using the new format, pass an empty string for 'continue' in the initial query."
        }
    },
    "query-continue": {
        "allpages": {
            "gapcontinue": "Setup_Ldap_Server"
        }
    },
    "query": {
        "pages": {
            "80": {
                "pageid": 80,
                "ns": 0,
                "title": "SAMBA Domain Controller",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "Samba Domain on XP:\n Start->run->MMC\n ->File->add/remove snap-in->Add\n -->Add\n --->Group Policy Object Editor->Add\n ---->(Group Policy Object must be 'Local Computer')->Finish\n --->Close\n -->OK\n ->Local Computer Policy\n ->Computer Configuration\n ->Windows Settings\n ->Security Settings\n ->Local Policies\n ->Security Options\n ->Disable \"Domain Member: Digitally encrypt or sign secure channel data (always)\"\n Restart, and you should be able to log on with your Samba username and password.\n\nSamba Domain on Windows7:\n Start-> MMC\n ->File->add/remove snap-in->Add\n -->Select Group Policy Object Editor->Add\n ---->(Group Policy Object must be 'Local Computer')->Finish\n -->OK\n ->Local Computer Policy\n ->Computer Configuration\n ->Windows Settings\n ->Security Settings\n ->Local Policies\n ->Security Options\n ->Disable \"Domain Member: Digitally encrypt or sign secure channel data (always)\"\n\nsamba config:\n testparm -s \n\nsave this as samba_w7.reg, run it to load in the registry:\n Windows Registry Editor Version 5.00\n [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\lanmanserver\\parameters]\n [HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\services\\lanmanworkstation\\parameters]\n \"DNSNameResolutionRequired\"=dword:00000000\n \"DomainCompatibilityMode\"=dword:00000001\n [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\netlogon\\parameters]\n \"DisablePasswordChange\"=dword:00000001\n \"RequireSignOrSeal\"=dword:00000001\n \"RequireStrongKey\"=dword:00000001\n [HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\system]\n \"dontdisplaylastusername\"=dword:00000001\n [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\wscsvc]\n \"Start\"=dword:00000003\n [HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\System]\n \"SlowLinkDetectEnabled\"=dword:00000000\n \"DeleteRoamingCache\"=dword:00000001\n \"WaitForNetwork\"=dword:00000000\n \"CompatibleRUPSecurity\"=dword:00000001\n [HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System]\n \"EnableLUA\"=dword:00000000\n \"LocalAccountTokenFilterPolicy\"=dword:00000001\n [HKEY_LOCAL_MACHINE\\SYSTEM\\Setup]\n \"RestartSetup\"=dword:00000000\n \"SetupType\"=dword:00000000\n \"SystemSetupInProgress\"=dword:00000000\n \"SetupPhase\"=dword:00000000\n \"CmdLine\"=\"\"\n \"OOBEInProgress\"=dword:00000000\n\nTo Disable Roaming profiles:\n [HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System]\n \"LocalProfile\"=dword:00000001\n [HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System]\n \"ReadOnlyProfile\"=dword:00000001\n\nadd user\n smbpasswd -a <user>\n\nadd machine\n smbpasswd -a -m <machine>\n\ndelete user\n smbpasswd -x <user>\n\nmachine verwijderen en vervolgens opnieuw aanmelden\n pdbedit -x CLIENT-PC$\n userdel CLIENT-PC$\n\nList all users, with settings:\n pdbedit -Lv\n\n\n\non workstation, scan and repair corruptions:\n sfc /scanall\n\ndiv. commands (samba):\n sbmtree -b\n net rpc rights list -all\n net -S server -U domadmin rpc rights grant 'DOMAIN\\Domain Admins' SeMachineAccountPrivilege\n net rpc rights grant 'DOMAIN\\Domain Admins' SeMachineAccountPrivilege -S server -U domadmin\n getfacl -t  /data/profiles/roland\n net groupmap add ntgroup=\"Domain Admins\" unixgroup=domadm rid=512 type=d\n net rpc group add demo -L -Uroot%not24get\n net rpc group addmem demo \"DOM\\Domain Users\" \n net groupmap list\n net groupmap add ntgroup=\"Domain Admins\" unixgroup=ntadmins rid=512 type=d \n net groupmap add ntgroup=\"Domain Users\" unixgroup=ntusers rid=513 type=d\n\n net groupmap add ntgroup=\"Domain Guests\" unixgroup=nobody rid=514 type=d\n groupadd Orks\n groupadd Elves\n groupadd Gnomes\n net groupmap add ntgroup=\"Orks\"   unixgroup=Orks   type=d\n net groupmap add ntgroup=\"Elves\"  unixgroup=Elves  type=d\n net groupmap add ntgroup=\"Gnomes\" unixgroup=Gnomes type=d\n net rpc trust create otherdomainsid=S-x-x-xx-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxx \\\n   other_netbios_domain=dom2 otherdomain=dom2.dom trustpw=12345678 -S srv1.dom1.dom\n net rpc trust create otherserver=srv2.dom2.test otheruser=dom2adm -S srv1.dom1.dom\n\nDefault ID's\n Well-Known Entity\tRID\tType\tEssential\n Domain Administrator\t500\tUser\tNo\n Domain Guest\t501\tUser\tNo\n Domain KRBTGT\t502\tUser\tNo\n Domain Admins\t512\tGroup\tYes\n Domain Users\t513\tGroup\tYes\n Domain Guests\t514\tGroup\tYes\n Domain Computers\t515\tGroup\tNo\n Domain Controllers\t516\tGroup\tNo\n Domain Certificate Admins\t517\tGroup\tNo\n Domain Schema Admins\t518\tGroup\tNo\n Domain Enterprise Admins\t519\tGroup\tNo\n Domain Policy Admins\t520\tGroup\tNo\n Builtin Admins\t544\tAlias\tNo\n Builtin users\t545\tAlias\tNo\n Builtin Guests\t546\tAlias\tNo\n Builtin Power Users\t547\tAlias\tNo\n Builtin Account Operators\t548\tAlias\tNo\n Builtin System Operators\t549\tAlias\tNo\n Builtin Print Operators\t550\tAlias\tNo\n Builtin Backup Operators\t551\tAlias\tNo\n Builtin Replicator\t552\tAlias\tNo\n Builtin RAS Servers\t553\tAlias\tNo\n \n\ndiv. commands (workstation):\n net localgroup administrators /add domain_name\\entity\n\nThe registry commands are:\n net registry enumerate - Enumerate registry keys and values.\n net registry enumerate_recursive - Enumerate registry key and its subkeys.\n net registry createkey - Create a new registry key.\n net registry deletekey - Delete a registry key.\n net registry deletekey_recursive - Delete a registry key with subkeys.\n net registry getvalue - Print a registry value.\n net registry getvalueraw - Print a registry value (raw format).\n net registry setvalue - Set a new registry value.\n net registry increment - Increment a DWORD registry value under a lock.\n net registry deletevalue - Delete a registry value.\n net registry getsd - Get security descriptor.\n net registry getsd_sdd1 - Get security descriptor in sddl format.\n net registry setsd_sdd1 - Set security descriptor from sddl format string.\n net registry import - Import a registration entries (.reg) file.\n net registry export - Export a registration entries (.reg) file.\n net registry convert - Convert a registration entries (.reg) file.\n net registry check - Check and reapair a registry database."
                    }
                ]
            },
            "20": {
                "pageid": 20,
                "ns": 0,
                "title": "SSH Tunneling",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "There are 2 types of ssh tunnels, Forward and Reverse:\n\nexample for ssh tunneling on the ftp-port to your home server, for imap-mail, vnc and internet proxy:\n\nIf you like, it is easier to distibute a public key, so you can automate these commands.\n\nwhile many company's have limitted internet access for ssh, you will run a daemmon on a different free port.\ne.g. 21 (ftp) 443 (htps) or 8080\n\nat home start a ssh daemon running on the ftp port 21\n /usr/sbin/sshd -p 21\nyou can add this in your /etc/rc.local\n\nfrom your client run:\n ssh -C -g -L6001:<vncserver>:5901\n           -L6002:<mailserver>:143 \\\n           -L6003:<proxyserver>:3128 \\\n           -p 21 \\\n            user@<home-server>\nOptions:\n -C will compress the traffic (very handy for VNC connections)\n -g will access other pc's at home to connect to the tunnel on your server\nother options are:\n -n will not return your session to your prompt and redirect everything to /dev/null\n -X will forward a tunnel for X sessions\nfor more options see the ssh manpage\n\nit will be nice to create a dedicated user on your home-server.\nOn your client you should configure your imap-mail with port 6002, e.g.\n\nIf you want to connect from the outside to an internal server which is not accessible from the outsite, you will setup a reverse tunnel:\nyou run this on a server which can connect both to (example) a vnc service on another server and to the internet.\n ssh -C -g -R6001:<vncserver>:5901 \\\n           -p 21 \\\n           user@<home-server>\nAt home you start a VNC sesion to your server:1 (5901), it will connect through the tunnel to the vnc-session of the server on the internal network.\n\nIf the connection drops the tunnes is gone, so you write a little loop around it:\n #!/bin/bash\n while true\n do\n   ssh -C -g -R6001:<vncserver>:5901 \\\n             -p 21 \\\n           user@<home-server>\n   sleep 10\n done\nIn this situation you can remote force a reconnect by killing the incomming ssh session on your home-server:\n pkill -u <user>\nin this case it is easier to create a dedicated ssh user on your home-server.\n\nFor Gnome users the is a verry nice GUI called gSTM:<br>\n[[Image:gstm.jpg]]"
                    }
                ]
            }
        }
    }
}