October 2012
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  

Categories

October 2012
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  

DB2 Database

Starting the DB2 control center on Linux

This procedure describes how to start the DB2® control center on Linux®.

To start the DB2 control center, perform the following steps: Login as root. At the command line, run the following command: xhost +localhost. Run the following command su – ctginst1. Run the following command db2cc. […]

Keeping multiple web servers in sync with rsync

People looking to create a load balanced web server solution often ask, how can they keep their web servers in sync with each other? There are many ways to go about this: NFS, lsync, rsync, etc. This guide will discuss a technique using rsync that runs from a cron job every 10 minutes.

There […]

SQUID TIPS

How to install squid proxy on centos 6

Squid is a proxy server for caching and filtering web content . Squid proxy is used by various organisation and internet providers to reduce bandwidth and to increase response time .

Squid proxy service will cache the requested web-content and re-using it for the further request of […]

IPTables “Stealth” Scan Detection

Many of you probably know about port scanning. It’s a very simple process, where essentially you attempt to to make a connection on several ports of several machines. If the port is closed, a reset is returned. If the port is open, a SYN+ACK is returned.

Now, there are some other types of scans, such […]

Bridging, Transparent Firewalls and Intrusion Prevention

Contents

What is Bridging? Installing a Bridge Configuring a Bridge What is a Bridging Firewall? Installing a Bridging Ebtables Firewall Configuring a Bridging Ebtables Firewall Installing a Bridging Iptables Firewall Configuring a Bridging Iptables Firewall What is an Intrusion Prevention System? Installing an Intrusion Prevention System Configuring an Intrusion Prevention System

What is Bridging?

[…]

Stealth Firewalling with Linux

What Is Stealth Firewalling with Linux?Simply put, a stealth firewall is an Ethernet bridge with filtering capabilities. This means that it’s a firewall that operates at Layer 2 of the OSI model, leveraging netfilter rules and chains (Linux’s firewall system) applied to the bridge. For those not familiar with what a bridge is: an Ethernet […]

open source software

Infrarecorder

Great application, it is a very good alternative to Nero. Add files and burn!Infrarecorder home site http://infrarecorder.org/.

7-zip

Great application, it is a very good alternative to Winzip.7-zip home site http://www.7-zip.org/.

Bulk rename utility

This is a very cool application, it will let you rename filenames in bulk. DO NOT get discouraged by its […]

Disabling Mod_Security

1 Disabling Mod_Security Globally 2 Disabling Mod_security per domain 3 Disabling Mod_security per domain for an IP address 4 Disable Mod_security on a global URL 5 Disable Mod_security for an IP address 6 Whitelist an IP 7 Disable a rule for a single domain 8 Disable Mod_security rule for a specific application in a […]

Apache Minimal to Learn

APACHE :-

Apache is an open source web server which guarantees availability of active websites online . The original version of apache was especially designed for unix-like operating system Nowadays, it can be implemented on variety of O.S. platforms. According to Apache Software Foundation and Net craft web server survey, 65% of websites on the […]