How-To: Prevent SPAM with Apache’s mod security
WordPress is a great piece of software to run a blog, it is flexible, has tons of plugins are developed for it and updates are really easy to do. To fight sp...
WordPress is a great piece of software to run a blog, it is flexible, has tons of plugins are developed for it and updates are really easy to do. To fight sp...
Spam, spam everywhere! If you are hosting your own mail server, fighting spam can become tricky. Antispam solutions do catch a fair amount of them, but still...
It can be useful to have a bash session automatically closing after some time. One of the obvious reason you might want this to happen is to make sure that n...
OpenVPN is a SSL based VPN software that runs on most OS. It is simple to install and run.
In the previous part, we have configured XL2TP
We have now configured IPSec, let’s carry on with the next step.
Even though I pretty like OpenVPN, there is still some devices that might not support the TUN/TAP driver needed by OpenVPN.
In the first part, we have set up our database, let now add some user to authenticate.
this tutorial will explain how to use a MySQL backend in order to authentication users against your Apache website.
4. Installing the system
3. Encrypting the partitions
Even though new distros installers tend to support filesystem encryption out of the box, most of the time, it might be interesting to actually understand how...
When copying files over the network, the files informations can be modified.
This tutorial will show how you can export and import a set of GPG keys from one computer to another. This way, you can sign/encrypt the same way one differ...
This tutorial will explain how to create a self-signed certificate that you will be able to use with apache in order to provide ssl support.
This tutorial will show how-to connect to a Cisco VPN Concentrator using vpnc.
3. Adding new devices to cacti
Now that we have our snmp server up and running, we are going to install cacti to manage the snmp server in our network.
SNMP (Simple Network Management Protocol) is a protocol for managing networks. Each managed entity in the network will run an snmp server (snmpd) which is go...
MySQL is a widely spread SQL database management system mainly used on LAMP (Linux/Apache/MySQL/PHP) projects.
2. Configuring the clients
LDAP (Lightweight Directory Access Protocol) allows central user, group, domain….. authentication, information storage …
4. Disabling Authentication by password
2. Adding the public key to the authorized key
Open SSH is the most widely used SSH server on Linux. Using SSH, one can connect to a remote host and gain a shell access on it in a secure manner as all tra...
AIDE is an Intrusion Detection System (IDS). Which means that AIDE is not a tool to prevent an intrusion but is actually here to report that an intrusion mig...
4. Using iptables’script
3.3. Defining custom chains
3. Iptables Script
iptables is a command line tool which allow system administrators to configure Linux packet filtering ruleset.
4. mod-security filter examples
3. Adding Filtering Rules
This article will show how-to install, configure and set up apache’s mod-security module on a debian based system. This was done on Ubuntu Dapper and should ...