Howtos

Want to support HowtoForge? Become a subscriber!
 

How to Avoid Being Blacklisted

How to Avoid Being Blacklisted

A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.

Installing ModSecurity2 On Debian Etch

Installing ModSecurity2 On Debian Etch

This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.

Network Card Bonding On CentOS

Network Card Bonding On CentOS

Bonding is the same as port trunking. In the following I will use the word bonding because practically we will bond interfaces as one. Bonding allows you to aggregate multiple ports into a single group, effectively combining the bandwidth into a single connection. Bonding also allows you to create multi-gigabit pipes to transport traffic through the highest traffic areas of your network. For example, you can aggregate three megabits ports into a three-megabits trunk port. That is equivalent with having one interface with three megabytes speed.

Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn

Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn

This article shows how you can install the Linux version of Google Desktop on a PCLinuxOS 2007 desktop and an Ubuntu Feisty Fawn (Ubuntu 7.04) desktop. Although the program is still marked as beta, Linux users can already search for text inside documents, local email messages, their Web history, and their Gmail accounts.

TrueCrypt Tutorial: Truly Portable Data Encryption

TrueCrypt Tutorial: Truly Portable Data Encryption

TrueCrypt is a free software that encrypts data “on-the-fly”. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It doesn’t simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.

Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop

Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop

This tutorial shows how you can install and use Beryl or Compiz Fusion on a Fedora 7 desktop (the system must have a 3D-capable graphics card). With both Beryl and Compiz Fusion, you can make your desktop use beautiful 3D effects like wobbly windows or a desktop cube.

How to secure an SSL VPN with one-time passcodes and mutual authentication

How to secure an SSL VPN with one-time passcodes and mutual authentication

SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it's protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.

Installing Xen On An Ubuntu Feisty Fawn Server From The Ubuntu Repositories

Installing Xen On An Ubuntu Feisty Fawn Server From The Ubuntu Repositories

This tutorial provides step-by-step instructions on how to install Xen on an Ubuntu Feisty Fawn (Ubuntu 7.04) server system (i386). You can find all the software used here in the Ubuntu repositories, so no external files or compilation are needed. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0).

Entering A Safe Mirror When Logging In With Unionfs And Chroot

Entering A Safe Mirror When Logging In With Unionfs And Chroot

When reading a 'hint' on the website of LinuxFromScratch I discovered the special capabilities of unionfs, specially in combination with chroot. Later I read a HowTo on a wikiwebsite of Gentoo, about entering a chrooted homedirectory when using a special script as shell. Combining these two brings me to using a chrooted environment, which you enter when logging in as a special user. This environment is a exact copy (mirror) of the system you're working on. Because you're in safe copy of the real system, you can do whatever you like, it will never change the system, everything stays inside the cache (the readwrite branch).

Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch

Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch

This article describes how you can monitor your Postfix mailserver with the tools Mailgraph and pflogsumm. Mailgraph creates daily, weekly, monthly, and yearly graphs of sent, received, bounced, and rejected emails and also of spam and viruses, if SpamAssassin and ClamAV are integrated into Postfix (e.g. using amavisd-new). These graphs can be accessed with a browser, whereas pflogsumm ("Postfix Log Entry Summarizer") can be used to send reports of Postfix activity per email.

first page
previous page
...
226
...
next page
last page