- Web Server
- Control Panels
- Site Map/RSS Feeds
Decision Making Using PHP Switch Statement
Today I am going to discuss Switch Statement. The basic concept of Switch is similar to the IF-ELSE statement; it helps you to write decision making code just like IF-ELSE but it is a little more organized, elegant and handy when dealing with complex logics as compare to IF-ELSE.
Set Up Postfix For Relaying Emails Through Another Mailserver
This short guide shows how you can set up Postfix to relay emails through another mailserver. This can be useful if you run a Postfix mailserver in your local network and have a dynamic IP address because most dynamic IP addresses are blacklisted today. By relaying your emails through another mailserver that is hosted on a static IP address in a data center (e.g. your ISP's mailserver) you can prevent your emails from being categorized as spam.
.htaccess Based Authentication On Subdirectories
.htaccess is used to provide facility of changing configuration per directory basis, this file can contain one or more directives that are going to be forced on the directory that contains the.htaccess file. In this howto, I will take a dummy scenario of two parallel level subdirectories and will implement password authentication on both of them. This means only those users can access these directories that have the correct username and password.
Secure your SSH deployment with WiKID two-factor authentication
In this document we are going to demonstrate how to combine two-factor authentication from WiKID with an SSH gateway server with hosted private keys to create a highly secure, auditable and easy to use remote access solution. The WiKID Strong Authentication System is a commercial/open source two-factor authentication solution.
How to configure OpenVPN to use WiKID Strong Authentication
The WiKID Strong Authentication System is a commercial/open source two-factor authentication solution. This guide demonstrates how to OpenVPN and SSH to use one-time passwords from WiKID. While both solutions support private key authentication, that may not be sufficient for your requirements; you may need one-time passwords for webmail or extranet access; or centralized authentication management and logging.
Create A Desktop Background Wallpaper Changer For Xfce
I have switched to Xubuntu a few months ago coming from Kubuntu. In Kubuntu I liked the (already available) option of setting up a list of image files and have them randomly displayed as background image on the desktop. This was one of the things I have missed so far in Xfce. This small howto shows you how you can randomly display background wallpapers in XFCE.
Securing the connection between MySQL and MySQL Administrator using an SSH tunnel
This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn't even there. In effect, make your MySQL server disappear from the outside world.
Cisco 350 Series And Kismet
This tutorial is describing how to configure a Cisco Aironet wireless card and how to set up kismet in order to run with it.
How to perform a point in time restoration using ZRM for MySQL
ZRM for MySQL is a powerful, flexible and robust backup and recovery solution for MySQL databases for all storage engines. With ZRM for MySQL a Database Administrator can automate logical or raw backup to a local or remote disk. In this How To, we attempt to explain how to recover from an user error at any given point in time.
Step-By-Step Configuration of NAT with iptables
This tutorial shows how to set up network-address-translation (NAT) on a Linux system with iptables rules so that the system can act as a gateway and provide internet access to multiple hosts on a local network using a single public IP address. This is achieved by rewriting the source and/or destination addresses of IP packets as they pass through the NAT system.