- Web Server
- Control Panels
- Site Map/RSS Feeds
Converting All Your MS Outlook PST Files To Maildir Format
One of the challenges you may face when converting an office from Microsoft Windows to Linux is that many people archive their e-mail in PST files. There are PST tools available, but most of them are commercial, since the PST file format is closed and protected by Microsoft. There are several non-commercial methods to achieve roughly the same goal, and in this tutorial we use IMAP (more specifically, courier-imap) to convert all our e-mails from PST to the Maildir format. The advantage of this approach is that you also lay the foundation for a new mail system, with all your old e-mails already imported the day you switch over.
How To Compile A Kernel - Debian Etch
Each distribution has some specific tools to build a custom kernel from the sources. This article is about compiling a kernel on a Debian Etch system. It describes how to build a custom kernel using the latest unmodified kernel sources from www.kernel.org (vanilla kernel) so that you are independent from the kernels supplied by your distribution. It also shows how to patch the kernel sources if you need features that are not in there.
Installing And Working With eyeOS Under Debian 4.0
This tutorial shows how you can install eyeOS on a standard Linux system. When you have finished this tutorial, you will have a full, working eyeOS on your server. eyeOS is a kind of operating system which works online, i.e. it manages files on the server and enables the user to upload, download and edit files.
Introduction to Antispam Practices
Competitive Antispam products, proper legislation, efforts towards a better user education, it has all been tried in order to stop spam. However, unsolicited emails keep consuming the space and time of all email users. Moreover, spam messages can be the cause of serious virus and spyware outbreaks, while others “phish” for sensitive information like bank accounts and passwords.
Installing Xen On CentOS 5.0 (i386)
This tutorial provides step-by-step instructions on how to install Xen (version 3.0.3) on a CentOS 5.0 system (i386). Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware.
Installing The PHP-MSSQL Module On CentOS 5.0
As you might have noticed on Centos 5.0, there is no PHP-MSSQL module/extension available in the default yum repositories. So if you want to use it you can alter the PHP binary or you can compile an mssql module/extension. In this article I will explain how to compile the mssql module/extension.
How To Install VMware Server On A Fedora 7 Desktop
This tutorial provides step-by-step instructions on how to install VMware Server on a Fedora 7 desktop system. With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free).
Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity
Say you have a nasty application on your Apache webserver that has been installed by some jerks from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach. It has all you need to lock down the application.
Virtual Users And Domains With Postfix, Courier And MySQL (Debian Etch)
This document describes how to install a mail server based on Postfix that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses.
How To Block Spam Before It Enters The Server (Postfix)
The last few weeks have seen a dramatic increase in spam (once again). Estimates say that spam makes now up for 80 - 90% of all emails, and many mail servers have difficulties in managing the additional load caused by the latest spam, and spam filters such as SpamAssassin do not recognize large parts of that spam as they did before. Fortunately, we can block a big amount of that spam at the MTA level, for example by using blacklists, running tests on the sender and recipient domains, etc. An additional benefit of doing this is that it lowers the load on the mail servers because the (resource-hungry) spamfilters have to look at less emails.