How-To: Prevent SPAM with Apache’s mod security
WordPress is a great piece of software to run a blog, it is flexible, has tons of plugins are developed for it and updates are really easy to do. To fight sp...
WordPress is a great piece of software to run a blog, it is flexible, has tons of plugins are developed for it and updates are really easy to do. To fight sp...
Spam, spam everywhere! If you are hosting your own mail server, fighting spam can become tricky. Antispam solutions do catch a fair amount of them, but still...
wpa_supplicant can be used as a roaming daemon so you can get your system to automatically connect to different network as you are going from one location to...
Let’s continue the network monitoring serie with yet another use case…. the “What program is using my bandwidth?” problem while not imposible to solve, still...
There is many tools out there that help in monitoring network usage, collect statistics and generate graphs so we can view what happened at a given date/time...
OpenVPN is a SSL based VPN software that runs on most OS. It is simple to install and run.
In the previous part, we have configured XL2TP
We have now configured IPSec, let’s carry on with the next step.
Even though I pretty like OpenVPN, there is still some devices that might not support the TUN/TAP driver needed by OpenVPN.
I was trying network-manager-openvpn plugin today on Lucid, I could import my configuration, DNS was set up correctly upon connection/disconnection, route im...
Following Postfix configuration, it is now time to configure Dovecot.
We have set up the database in the first part. Now let’s go ahead and configure our email server to use that database.
This tutorial will explain how to run a mail server with virtual domains and users using a MySQL backend to store email informations.
In the first part, we have set up our database, let now add some user to authenticate.
this tutorial will explain how to use a MySQL backend in order to authentication users against your Apache website.
While doing a server migration, it happens that some traffic still go to the old machine because the DNS servers are not yet synced or simply because some pe...
We have set up our network, now let’s get BGP rolling.
Now that we have defined what we will be setting up, let’s build this up.
Vyatta is a Linux based distro that ease the set up of VPN, Routers, antivirus…. It has a really small footprint on your system as it only requires something...
We now provide IPs to the hosts in our LAN with our newly installed DHCP server. Now we need to pass their network packets around.
Now that we have configured our DNS server, we need to distribute IPs to the machines in our LAN.
1. DNS server
Linux is a perfect platform to act as a router/gateway.
When copying files over the network, the files informations can be modified.
The Intel wireless card 4965 AGN does not work properly on ad-hoc networks since hardy and kernel 2.6.24 or around, network-manager can’t get it to use the m...
This tutorial will show how-to connect to a Cisco VPN Concentrator using vpnc.
5. Preseed: Installation automation:
For the purpose of this tutorial, I decided to choose dnsmasq to act as a DNS/DHCP server. The reason behind this is that dnsmasq is simple to configure and ...
there is many ways of installing Linux. Nowadays, the most common one is probably by using a CD. Download the CD, stick it in your CDRom drive and let’s roll...
3. Adding new devices to cacti
Now that we have our snmp server up and running, we are going to install cacti to manage the snmp server in our network.
SNMP (Simple Network Management Protocol) is a protocol for managing networks. Each managed entity in the network will run an snmp server (snmpd) which is go...
4. Configure ProFTPd
Using ProFTPD and its SQL module for MySQL, it is possible to give FTP access to non system users.
2. Configuring the clients
LDAP (Lightweight Directory Access Protocol) allows central user, group, domain….. authentication, information storage …
This tutorial will show how to set samba to allow read-only file sharing for your LAN computers as guest (without be prompted for a password).
4. Disabling Authentication by password
2. Adding the public key to the authorized key
Open SSH is the most widely used SSH server on Linux. Using SSH, one can connect to a remote host and gain a shell access on it in a secure manner as all tra...
4. Using iptables’script
3.3. Defining custom chains
3. Iptables Script
iptables is a command line tool which allow system administrators to configure Linux packet filtering ruleset.
2. Setting up apache
Munin is a simple to configure tool that make real nice graph about your server status. It can actually deal with almost any aspect of your server (load aver...
4. Tweaking up Postgrey
Greylisting is yet another way for preventing your mailbox getting full of spam. A famous spam fighter software is spamassassin which filter emails. Greylist...
3. Make Postfix call Spamassassin
Postfix is a widely used mail transport agent (MTA) used on many popular Unix/Linux systems. Nowadays, networks are overwhelmed by SPAM mail, fortunately, th...
In relation to a tutorial I previously made on how-to connect to a remote mysql server by forwarding port with ssh, I found out that some distributions like ...
3. Setting up Reverse Name Resolution
Bind is a well known Unix name server, it is a powerfull piece of software which is used by the majority of nameservers.
High loaded website can get slow to respond when a lot of different visitors visit sites querying the same mysql database server, making it slow to respond.
nload is a ncurse based network traffic analyser. Being a ncurse based tools, you do not need to start X in order to use that software which is necessary whe...
Quite often, when using program such as smb4k, I encountered the following error:
Well, since I reinstalled a Debian, I decided to make an article on Exim4, as a complement to Postfix and Virtual Host.
Postfix comes as the default mail server under ubuntu. By default, it is set such as it can basically send system notice mail to the user you predefined duri...
Earlier on, I showed how-to mount a remote filesystem with fuse, using a remote partition accessible by SSH. Since version version 2.4.0, it is possible to u...
In a previous article, I introduced gsubedit, a GNOME Subtitle Editor for linux using GTK. It was the best subtitles editor I’d ever found for linux.
In this article I’m going to show you how you can use SSH Port Forwarding to access a service a firewall might be blocking.
Most unix administrator might know wget, a HTTP, HTTPS and FTP client developped by the GNU project. Using that tool, you can easily download HTTP page but a...
SSH is a protocol to securely connect to a remote host. In previous article we have seen how-to connect to a remote database through a secured tunnel.
In a previous article we saw how to connect to a remote mysql server running both ssh and mysql.
A lot of laptop computers using Centrino processor use the Intel Pro Wireless 2200 BG wireless interface, also known as ipw2200.
It happens sometimes that you get more than one connection to the internet. Also it might not be usefull in most of the cases, there are few cases when it ge...
Virtual Hosting allow web servers to host more than one website on a sing machine. This is how sharing hosting works. I become pretty handy as well while dev...
This will explain how to connect to a remote mysql server only allowing connections from locahost, from your computer in a secure way as it is being done thr...