Category Archives: How To
How do I install and configure SquidGuard – a web filter plugin for Squid to restrict access to domains/URLs based upon access control lists? How do I block porn, gambling, and other web-sites using squid proxy server version 3.x under Debian or Ubuntu Linux server for my school ?
Want to secure your SSH server with easy-to-use two-factor authentication? Google provides the necessary software to integrate Google Authenticator’s time-based one-time password (TOTP) system with your SSH server. You’ll have to enter the code from your phone when you connect.
“Discarded computers are truly our most wasted education resource today,” says Robert Litt, ending his presentation at the World Maker Faire on the importance of bringing computer technology into classrooms.
A lot of people use cloud storage systems like Dropbox, Spideroak or Ubuntu One, these software allow you to store your files on a remote server (on the clouds) and be able to access them on all your devices: computers with Linux,mac or Windows and also from tablets and smarthphones.
But it wouldn’t better to manage yourself your own storage system ?
Iometer is an I/O subsystem measurement and characterization tool for single and clustered systems. It was originally developed by the Intel Corporation and announced at the Intel Developers Forum (IDF) on February 17, 1998 – since then it got wide spread within the industry.
This article takes a detailed look at the design principles, the basis for deploying VPN, and the IPSEC protocol concept, providing a description of the general features of IPSEC and of the mechanisms required for its implementation.
This is one of those things that doesn’t get explained much, because it’s almost too simple to document: it’s often useful to keep a few Debian package files (
.deb files, used in Debian, Ubuntu, and Linux distributions derived from them) available for installation, either on your local host or on other computers on the same local-area network (LAN). You can make these available as an extra “repository” for your APT system, so that APT-based package tools (
apt-get, Aptitude, Synaptic, etc) can access them.
This HOWTO describes how to protect your home / small enterprise network users from objectionable internet contents with help of HTTP proxy. Our goal is to set up a free Linux based server running Squid and deploy web filtering application on it saving bandwidth, speeding up web access and blocking obsessive and potentially illegal and malicious web files.
Many Ubuntu users and Administrators struggle with Active Directory integration. One approach that folks are using is the free offerings from Centrify Express.
In this current changing world of unified communication, organizations and support teams require some form of communication to improve efficiency and possibly customer satisfaction. In this document, we will look at how to setup an Instant Messaging server on CentOS 5.6 using a free and open source XMPP based IM server.
This document covers setup of a Squid Proxy which will seamlessly integrate with Active Directory for authentication using Kerberos with LDAP as a backup for users not authenticated via Kerberos. Authorisation is managed by Groups in Active Directory.
Packages installed via ppa:serge-hallyn/spice2 have been tested for F14, W7 KVMs installs and runtime. Package qemu-kvm-spice (0.14.0+noroms-0ubuntu4qxl2) is based on the most recent RH’s QXL patches sets for qemu-kvm-0.14.tar.gz. Disabling AppArmor’s profile for libvirtd allows to manage and create domains via virt-manager 0.8.6-1 installed on Ubuntu Natty Narwhal.
The VPN is very often critical to working within a company. With working from home being such a popular draw to many industries, it is still necessary to be able to access company folders and hardware that exists within the LAN. When outside of that LAN, one of the best ways to gain that access is with the help of a VPN. Many VPN solutions are costly, and/or challenging to set up and manage. Fortunately, for the open source/Linux community, there is a solution that is actually quite simple to set up, configure, and manage.
In this post I’ll walk through the procedure for resizing your virtual disk in place without having to create a copy of it or performing any kind of cloning. If you’ve ever been in a situation where you have used up almost all of your guest virtual disk space and you need to increase the size of your virtual disk, you’ll find this procedure useful.