Howtos

Want to support HowtoForge? Become a subscriber!
 

Introduction to Antispam Practices

Introduction to Antispam Practices 

Competitive Antispam products, proper legislation, efforts towards a better user education, it has all been tried in order to stop spam. However, unsolicited emails keep consuming the space and time of all email users. Moreover, spam messages can be the cause of serious virus and spyware outbreaks, while others “phish” for sensitive information like bank accounts and passwords.

Installing Xen On CentOS 5.0 (i386)

Installing Xen On CentOS 5.0 (i386)

This tutorial provides step-by-step instructions on how to install Xen (version 3.0.3) on a CentOS 5.0 system (i386). Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware.

Installing The PHP-MSSQL Module On CentOS 5.0

Installing The PHP-MSSQL Module On CentOS 5.0

As you might have noticed on Centos 5.0, there is no PHP-MSSQL module/extension available in the default yum repositories. So if you want to use it you can alter the PHP binary or you can compile an mssql module/extension. In this article I will explain how to compile the mssql module/extension.

How To Install VMware Server On A Fedora 7 Desktop

How To Install VMware Server On A Fedora 7 Desktop

This tutorial provides step-by-step instructions on how to install VMware Server on a Fedora 7 desktop system. With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free).

Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

Say you have a nasty application on your Apache webserver that has been installed by some jerks from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach. It has all you need to lock down the application.

Virtual Users And Domains With Postfix, Courier And MySQL (Debian Etch)

Virtual Users And Domains With Postfix, Courier And MySQL (Debian Etch)

This document describes how to install a mail server based on Postfix that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses.

How To Block Spam Before It Enters The Server (Postfix)

How To Block Spam Before It Enters The Server (Postfix)

The last few weeks have seen a dramatic increase in spam (once again). Estimates say that spam makes now up for 80 - 90% of all emails, and many mail servers have difficulties in managing the additional load caused by the latest spam, and spam filters such as SpamAssassin do not recognize large parts of that spam as they did before. Fortunately, we can block a big amount of that spam at the MTA level, for example by using blacklists, running tests on the sender and recipient domains, etc. An additional benefit of doing this is that it lowers the load on the mail servers because the (resource-hungry) spamfilters have to look at less emails.

The Perfect Xen 3.1.0 Setup For Debian Etch (i386)

The Perfect Xen 3.1.0 Setup For Debian Etch (i386)

This tutorial provides step-by-step instructions on how to install Xen (version 3.1.0) on a Debian Etch (4.0) system (i386). Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware.

The Perfect Desktop - Fedora 7

The Perfect Desktop - Fedora 7

This tutorial shows how you can set up a Fedora 7 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

The Perfect Server - CentOS 4.5 (32-bit)

The Perfect Server - CentOS 4.5 (32-bit)

This tutorial shows how to set up a CentOS 4.5 based server that offers all services needed by ISPs and web hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Dovecot POP3/IMAP, Quota, Firewall, etc. This tutorial is written for the 32-bit version of CentOS 4.5, but should apply to the 64-bit version with very little modifications as well.

first page
previous page
...
228
...
next page
last page