How-To: Convert a WordPress site from Multisite to Standalone install
Since wordpress 3.0, it is possible to create a network or site by using the multisite feature. It allows to manage multiple wordpress websites from a single...
Since wordpress 3.0, it is possible to create a network or site by using the multisite feature. It allows to manage multiple wordpress websites from a single...
WordPress is a great piece of software to run a blog, it is flexible, has tons of plugins are developed for it and updates are really easy to do. To fight sp...
Spam, spam everywhere! If you are hosting your own mail server, fighting spam can become tricky. Antispam solutions do catch a fair amount of them, but still...
It can be useful to have a bash session automatically closing after some time. One of the obvious reason you might want this to happen is to make sure that n...
wpa_supplicant can be used as a roaming daemon so you can get your system to automatically connect to different network as you are going from one location to...
There might be time when you want to make sure that a file will be protected from accidental/automated change/deletion. While one can protect a file/director...
Many times you will end up tailing multiple files simultaneously. There is a sweet linux utility called multitail that will let you tail multiple files at th...
Ever had your linux box getting Out of Memory (OOM)? Cleaning up after the OOM killer kicked in to find out that even though OOM killer did a decent job at t...
Let’s continue the network monitoring serie with yet another use case…. the “What program is using my bandwidth?” problem while not imposible to solve, still...
There is many tools out there that help in monitoring network usage, collect statistics and generate graphs so we can view what happened at a given date/time...
Last time we saw how bash can help us in handling default values out of the box using parameter expansion. This time we will see how basic string operations ...
Bash is a sh-compatible command language interpreter that executes commands read from the standard input or from a file. There is much more to bash than run...
top is most likely one of the most known Linux command and also one of the most used one, however most people do not take full advantage of its capabilities.
OpenVPN is a SSL based VPN software that runs on most OS. It is simple to install and run.
Munin 2.0 has been released and a .deb package has even been backported to Debian Squeeze!.
Linux start up behaviour is driven by the so-called runlevels. It will use the default value provided in /etc/inittab for some systems (Debian…), or /etc/ini...
As a sysadmin, most of my time is spent working on remote machines and different task. tmux is a terminal multiplexer, meaning it allows you to run multiple ...
When enabling logs with HAProxy on a busy web site, hard disk space can quickly become a scarce resource.
In the previous part, we have configured XL2TP
We have now configured IPSec, let’s carry on with the next step.
Even though I pretty like OpenVPN, there is still some devices that might not support the TUN/TAP driver needed by OpenVPN.
When working in a chrooted environment, there is a few special file systems that needs to be mounted so all programs behave properly.
There is a few software that will use the editor command to find out what text editor to use. Example commands will be dch to add a new .deb changelog entry,...
Following Postfix configuration, it is now time to configure Dovecot.
We have set up the database in the first part. Now let’s go ahead and configure our email server to use that database.
This tutorial will explain how to run a mail server with virtual domains and users using a MySQL backend to store email informations.
In the first part, we have set up our database, let now add some user to authenticate.
this tutorial will explain how to use a MySQL backend in order to authentication users against your Apache website.
While doing a server migration, it happens that some traffic still go to the old machine because the DNS servers are not yet synced or simply because some pe...
We have set up our network, now let’s get BGP rolling.
Now that we have defined what we will be setting up, let’s build this up.
Vyatta is a Linux based distro that ease the set up of VPN, Routers, antivirus…. It has a really small footprint on your system as it only requires something...
Bazaar (bzr) is a distributed version control system (VCS) sponsored by Canonical and thus bzr is widely used by the Ubuntu community.
4. Installing the system
3. Encrypting the partitions
Even though new distros installers tend to support filesystem encryption out of the box, most of the time, it might be interesting to actually understand how...
syslogd is the Linux system logging utility that take care of filling up your files in /var/log when it is asked to.
We now provide IPs to the hosts in our LAN with our newly installed DHCP server. Now we need to pass their network packets around.
Now that we have configured our DNS server, we need to distribute IPs to the machines in our LAN.
1. DNS server
Linux is a perfect platform to act as a router/gateway.
When copying files over the network, the files informations can be modified.
In the 2 previous articles, I explained how to set up a serial console on Ubuntu and Debian.
This tutorial will go over the steps to go through in order to set up a serial console on Debian Linux.
This tutorial will go over the steps to go through in order to set up a serial console on Ubuntu Linux.
SSH is great. There is so many thing you can do with it other than just a remote secure shell like X forwarding, port forwarding, authenticate using a privat...
cron-apt is a tool run by a cron job at regular interval that will check for package updates and optionally do some actions.
We have now set up the base live cd, let’s make this live CD our own by customizing it.
Live CD are great, they let you try out a distribution without installing it. They allow you to run your favorite distribution on any computer and on the top...
A standard Linux system has an incredible amount of files installed. Looking for a file location can be a painful task to do though a file browser.
Filesystems are usually created on a partition. When all your hard drive is already partitioned, creating a new partition can become a pain and creating a ne...
This tutorial will explain how to create a self-signed certificate that you will be able to use with apache in order to provide ssl support.
This tutorial will show how-to connect to a Cisco VPN Concentrator using vpnc.
LVM (Logical Volume Manager) is a great piece of software which allow you to deal with Logical Volumes. Using LVM along with ext3 filesystem, you are allowed...
Linux services can be started, stopped and reloaded with the use of scripts stocked in /etc/init.d/.
5. Preseed: Installation automation:
For the purpose of this tutorial, I decided to choose dnsmasq to act as a DNS/DHCP server. The reason behind this is that dnsmasq is simple to configure and ...
there is many ways of installing Linux. Nowadays, the most common one is probably by using a CD. Download the CD, stick it in your CDRom drive and let’s roll...
3. Adding new devices to cacti
Now that we have our snmp server up and running, we are going to install cacti to manage the snmp server in our network.
SNMP (Simple Network Management Protocol) is a protocol for managing networks. Each managed entity in the network will run an snmp server (snmpd) which is go...
4. Configure ProFTPd
Using ProFTPD and its SQL module for MySQL, it is possible to give FTP access to non system users.
MySQL is a widely spread SQL database management system mainly used on LAMP (Linux/Apache/MySQL/PHP) projects.
After an upgrade from Debian 3.1 (sarge) to Debian 4.0 (etch), awstats stopped automatically updating.
It happens sometime that you can’t remember root password. On Linux, recovering root password can be done by booting Linux under a specific mode: single user...
2. Configuring the clients
LDAP (Lightweight Directory Access Protocol) allows central user, group, domain….. authentication, information storage …
This tutorial will show how to set samba to allow read-only file sharing for your LAN computers as guest (without be prompted for a password).
4. Disabling Authentication by password
2. Adding the public key to the authorized key
Open SSH is the most widely used SSH server on Linux. Using SSH, one can connect to a remote host and gain a shell access on it in a secure manner as all tra...
You might have wondered how comes that your mp3 player is automatically mounted under a nice name like JUKEBOX for instance, while you usb stick simply get a...
AIDE is an Intrusion Detection System (IDS). Which means that AIDE is not a tool to prevent an intrusion but is actually here to report that an intrusion mig...
4. Using iptables’script
3.3. Defining custom chains
3. Iptables Script
iptables is a command line tool which allow system administrators to configure Linux packet filtering ruleset.
2. Setting up apache
Munin is a simple to configure tool that make real nice graph about your server status. It can actually deal with almost any aspect of your server (load aver...
4. Tweaking up Postgrey
Greylisting is yet another way for preventing your mailbox getting full of spam. A famous spam fighter software is spamassassin which filter emails. Greylist...
3. Make Postfix call Spamassassin
Postfix is a widely used mail transport agent (MTA) used on many popular Unix/Linux systems. Nowadays, networks are overwhelmed by SPAM mail, fortunately, th...
3. Setting up the Clients and Server sources.list
When running multiple machine with the same distribution, it is interesting to set up a repository cache on your network so that once a package is downloaded...
On Debian based systems such as Ubuntu… Apache comes with mod_status compiled in by default.
KeepAlive
Apache, the most popular web server, is a stable and reliable software for providing web pages to the world. But sometimes, it happens that Apache will strug...
4. mod-security filter examples
3. Adding Filtering Rules
This article will show how-to install, configure and set up apache’s mod-security module on a debian based system. This was done on Ubuntu Dapper and should ...
3. Setting up Reverse Name Resolution
Bind is a well known Unix name server, it is a powerfull piece of software which is used by the majority of nameservers.
This is part 2 of How-To: Apache web server basic security measure.
While running a HTTP server such as Apache, there is a few step an administrator have to take in order not to get easily hacked. The very basic one is to hid...
High loaded website can get slow to respond when a lot of different visitors visit sites querying the same mysql database server, making it slow to respond.
nload is a ncurse based network traffic analyser. Being a ncurse based tools, you do not need to start X in order to use that software which is necessary whe...
2. Adding modules
Apache is usually suitable out of the box for most common used. The apache structure under debian based systems is actually really well made as it is really ...
This tutorial will bring you through dpkg, the debian package manager. As I introduce apt, I will now introduce dpkg and show how to search which files are i...
Subversion is an application used for version control, it is meant to become a replacement of CVS Concurrent Versions System. Subversion is also known as svn.
Well, since I reinstalled a Debian, I decided to make an article on Exim4, as a complement to Postfix and Virtual Host.
##5. Install and Configure Xorg
3. Installing utils package and Configuring your new system
This How To will show how you can install Debian Etch and basically any Debian based distribution from a chroot environment. This way you don’t need to downl...
Apt is the debian tool to install, remove and search packages. It is a front-end to the dpkg package manager and offer easy searching, installing …, by using...
I really love Debian based distribution, namely, Debian itself and Ubuntu, but there is something wrong… The weakest part is located in /var/lib/dpkg/.
Postfix comes as the default mail server under ubuntu. By default, it is set such as it can basically send system notice mail to the user you predefined duri...
Earlier on, I showed how-to mount a remote filesystem with fuse, using a remote partition accessible by SSH. Since version version 2.4.0, it is possible to u...
3. Configuring Awstats
Awstats is a great web log analyser. It gives really useful statistics about traffic on your web sites.
Most unix administrator might know wget, a HTTP, HTTPS and FTP client developped by the GNU project. Using that tool, you can easily download HTTP page but a...
Today, when I wanted to start my mldonkey-server from command line, the service reported
SSH is a protocol to securely connect to a remote host. In previous article we have seen how-to connect to a remote database through a secured tunnel.
In a previous article we saw how to connect to a remote mysql server running both ssh and mysql.
A lot of laptop computers using Centrino processor use the Intel Pro Wireless 2200 BG wireless interface, also known as ipw2200.
It happens sometimes that you get more than one connection to the internet. Also it might not be usefull in most of the cases, there are few cases when it ge...
Virtual Hosting allow web servers to host more than one website on a sing machine. This is how sharing hosting works. I become pretty handy as well while dev...
This will explain how to connect to a remote mysql server only allowing connections from locahost, from your computer in a secure way as it is being done thr...