Linux

Want to support HowtoForge? Become a subscriber!
 

Adding A DHCP Server To CIITIX-WiFi

Adding A DHCP Server To CIITIX-WiFi

CIITIX-WiFi is a turnkey solution to your WiFi hotspot needs. Built onto the rock solid stable debian linux, setting up a secure (TTLS) WiFi hotspot is just a minute away. This Howto will show you the step by step configuration of setting up a DHCP Server within CIITIX-WiFi. It is useful in the sense that it will act as a standalone solution for both CIITIX-WiFi and DHCP Server on a single machine i.e no separate machine needed for DHCP.

Openfiler 2.3 Active/Passive Cluster (heartbeat,DRBD) With Offsite Replication Node

Openfiler 2.3 Active/Passive Cluster (Heartbeat, DRBD) With Offsite Replication Node

Openfiler is a Linux based NAS/SAN application which can deliver storage over nfs/smb/iscsi and ftp. It has a web interface over that you can control these services. The cluster we build will consist of two nodes replicating each other and taking over services and storage in case of emergency. Furthermore we have an Offsite Replication Server, which ideally stands in a physically different position and replicates the configurations/storage from which ever node is active. In case of emergency this Offsite Replication Server can be used to restore the cluster and to deliver the services.

System Monitoring With sar And ksar

System Monitoring With sar And ksar

sar is one of the old and famous commandline utilities, which is often overlooked. It provides a wealth of information when you have kind of performance bottlenecks. By itself it only provides lengthy columns of numerical data, kind of hard to interpret. sar exists on most Linux distributions, for example Ubuntu, Debian, CentOS, Gentoo, and is also available on Solaris, AIX, and other commercial Unices. ksar, on the other hand, is a Java based front end for sar's numerical data. It produces friendly graphs which could be exported to .pdf and some other formats.

Host Based Intrusion Detection - Samhain

Host Based Intrusion Detection - Samhain

This article describes in some detail how to install Samhain, the host based intrusion detection system. I am not going to ramble on about what host based intrusion detection is or why to use it, as there are plenty of articles already covering those subjects. This article is just to show you how to get Samhain up and running in a client / server configuration with a couple bells and whistles thrown in for fun.

Changing From SquirrelMail To Atmail Open With ISPConfig 3

Changing From SquirrelMail To Atmail Open With ISPConfig 3

Atmail Open is an open source webmail client which is available free of charge and is a great alternative to Squirrelmail. This tutorial shows how to use it with ISPConfig 3 (instead of SquirrelMail).

How To Test Your Dansguardian, Safesquid, POESIA, Parental Internet Filter Or We-Blocker Keyword Filter Anytime Anywhere

How To Test Your Dansguardian, Safesquid, POESIA, Parental Internet Filter Or We-Blocker Keyword Filter Anytime Anywhere

Keyword filters block unwanted web pages on the basis of potentially fallen words found in them. However, to be sure that a page is indeed offensive, keyword filters nowadays are not designed to block sites on the basis of just about any potentially offensive word. Instead they measure the number of potentially offensive phrases and often the number of times they occur so as to allow a limited number of occurrences in pages such as those on anatomy, forms requiring gender information, crime reports, statistical reports, administrative information, art etc. The leading keyword blockers like Dansguardian which is extremely popular on Linux or SafeSquid which is popular on Linux and Windows use this method known as a weighed keyword score.

How To Monitor Your Linux Server With SMS Alerts And Performance Graphs

How To Monitor Your Linux Server With SMS Alerts And Performance Graphs

This tutorial shows how you can monitor your Linux server with a tool from Bijk - with email and SMS alerts. Bijk is an open source application, for creating live graphs and alerts, thus monitoring your server performance. With the Basic version of Bijk, you can easily set up email alerts for monitoring almost everything on your server (system overload, disk space usage, Apache troubles, MySQL, etc.).

CIITIX-VoIP 1.0 How-To

CIITIX-VoIP 1.0 How-To

This document can be a used as a rough guide to installation of CIITIX-VOIP on a persistent media. It also describes the basic usage. CIITIX-VoIP is a carrier grade VoIP server distribution, leveraging upon the great efforts of the open source community. CIITIX-VoIP is based on rock solid Debian Lenny. This distribution comes as a turn-key solution to any company (small, medium to large scale) wishing to deploy a SIP-based presence service à la Skype. Laced with accounting, NAT and DB backend based features, setting up a SIP based setup is a breeze, achievable within 7 minutes.

How To Set Up A Wireless Network Using WPA/WPA2 With Radius Authentication With CIITIX-WiFi

How To Set Up A Wireless Network Using WPA/WPA2 With Radius Authentication With CIITIX-WiFi

This document serves as quick guide on how to set up a wireless network using WPA / WPA2 with radius authentication. This document will only cover the basics and is not exhaustive of all possibilities and features but with this information and basic networking skills you should be able to get running very soon. I decided to do this guide for the users wanting to try out and implement radius authentication for WiFi security.

How To Configure The AIDE (Advanced Intrusion Detection Environment) File Integrity Scanner For Your Website

How To Configure The AIDE (Advanced Intrusion Detection Environment) File Integrity Scanner For Your Website

A file integrity scanner is something you need to have.  Imagine a hacker placing a backdoor on your web site, or changing your order form to email him a copy of everyone's credit card while leaving it appear to be functionally normally. By setting up daily reporting, this notifies you within, at most, 24 hours of when any file was changed, added, or removed.  It also helps establish an audit trail in the event your site is compromised. These instructions are designed for an end user, where you don't need to have root access, to implement and assumes your server has the aide binary installed.  Most hosts will have this installed already, or will install it for you upon request.

first page
previous page
...
18
...
next page
last page
XML feed
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.