- Web Server
- Control Panels
- Site Map/RSS Feeds
Installing ISP-fw (Firewall) On Linux
ISP-fW is a firewall script that provides port forwarding, packet filtering, stateful packet inspection, port redirection, masquerading, SNAT/ DNAT, TOS, and never the last it generates htb rules for bandwidth management. With ISP-fw, you can turn a PC into a gateway with shaping capabilities.
Preventing MySQL Injection Attacks With GreenSQL On Debian Etch
GreenSQL (or greensql-fw) is a firewall for MySQL databases that filters SQL injection attacks. It works as a reverse proxy, i.e., it takes the SQL queries, checks them, passes them on to the MySQL database and delivers back the result from the MySQL database. It comes with a web interface (called greensql-console) so that you can manage GreenSQL through a web browser. This guide shows how you can install GreenSQL and its web interface on a Debian Etch server.
Ultimate Security Proxy With Tor
Nowadays, within the growing web 2.0 environment you may want to have some anonymity, and use other IP addresses than your own IP. Or, for some special purposes - a few IPs or more, frequently changed. So no one will be able to track you. A solution exists, and it is called Tor Project, or simply tor. There are a lot of articles and howtos giving you the idea of how it works, I'm not going to describe here onion routing and its principles, I'll rather tell you how practically pull out the maximum out of it.
Firewall Management With Gufw On Ubuntu 8.04
Gufw is a graphical frontend for managing an iptables firewall on an Ubuntu 8.04 desktop. It is based on ufw and enables you to allow or block pre-configured, common p2p, or individual ports. This guide shows how you can install and use Gufw on Ubuntu 8.04.
Virtual Users And Domains With Postfix, Courier, MySQL And SquirrelMail (Mandriva 2009.0 i386)
This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I'll show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses. I will also show how to install SquirrelMail as a webmail interface so that users can read and send emails and change their passwords.
Secure SSH Using WiKID Two-Factor Authentication And TACACS+
These instructions are designed to help you configure and test using the WiKID TACACS+ protocol module via Linux PAM on Red Hat. This document has been updated to cover pam .99 and higher. We assume that you have already installed the open-source WiKID Strong Authentication Server Community Edition.
Drupal + Postfix Integration Under Ubuntu 8.04 (Hardy)
This document will guide you through the necessary steps to configure a Drupal driven mail server. It provides the following features: Drupal managed email accounts, support for virtual domains, automatic forwarding, Postfix quota support, silent BCC monitoring, anti-spam, anti-virus.
ISPConfig 2.x: How To Add A "Move to SPAM"-Option To Your ISPConfig Installation
This document describes the steps needed to add a third spam filter strategy to your ISPConfig 2.x installation. It will allow you and your users to select, wether they want to drop spam, allow spam or move it to the corresponding IMAP junk mail folder.
Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway
Untangle bundles common open-source applications for blocking spam, spyware, viruses, adware and unwanted content on the network in one single Linux distribution. It can be integrated into existing networks either as a router or as a transparent bridge (directly behind the router, but before the switch that connects the client PCs with the router). The best thing about Untangle is that you don't have to reconfigure the client PCs - Untangle works out of the box.