FTP- File Transfer Protocol is used to transfer files between one computer to another computer. With ftp service you can send file, get file from server computer to your computer. Suppose, you are a web developer, after developing your sites you have to upload your files to web server to make change your site. Here, ftp help you to upload files to server.
Antivirus for Linux? Are you kidding with me? Isn’t Linux secure from viruses? many new users of Linux are thinking those questions right..! I am telling you don’t be hesitate to see this title. Keep eye on this whole article and you can get all your answers.
First of all, Linux is the most stable and secure operating system than all other operating systems. Theoretically its possible to create viruses for Linux OS, but in practically its almost impossible to attack Linux machine through a virus. So here questions is why I use antivirus for Linux machine? For your better understanding, I am giving you some reasons:
In internet world filtering is very important factor, for many reasons we have to initiate filtering to safe our web life. documentations is world class. With Squidguard you can set rules in many ways, you can block special words, any domain name, TLDs, Sub-domains etc. SquidGuard use databases to filter any domain within this database.is a Plugins for to provide strong filtering options for Administrators. Great things is that, Squidguard is free, opensource and online
HTTP Server is a web server developed and maintained by The Apache Software Foundation. The stated objective of Apache is to create an open source HTTP server that will run on any modern operating system and hardware. In addition to it’s wide platform support, Apache is also infinitely configurable. LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server. With Apache+LDAP authentication Apache users are stored in LDAP directory is very useful in single sign-on (SSO) authentication on various Apache servers and LDAP directory. In this article we will show how you can configure Apache to authentication users from LDAP directory.
- Working Apache 2.1 or later
- OpenLDAP server, client and other libraries and utilities.
Below yum commands may help you to install them if you don’t have them ready. If you don’t have yum you can use similar commands (e.g. apt-get) to install them.
is very known to best suited open source Database system when it comes about web application. But still it shows bad performance which causes bad times for web site owners. Most of the time its not MySQL’s capability, rather database design or SQL code causes MySQL act badly. In this article we will discuss about some common issues related MySQL performance and give you some direction to fixing this problem.
Generally there are 4 kinds of problem that may hit MySQL performance:
- Inefficient schema design
- Poor indexing or no indexing
- Bad SQL Code writing
- Server Variable not tuned properly
Webmail is a mailing system to provide web based email client to it’s user known as Mail User Agent (MUA). Unlike typical MUA, webmails are OS independent or platform independent. What you need is just a web browser (i.e. IE, Firefox, Opera, Safari etc) to use email. Webmail gives almost same features like traditional MUA; check new emails, compose, forward, archive, spam control, MIME support and so on. There are many free webmail software’s and most of them are based on Linux/UNIX based platform. In this article I will discuss about five free and popular webmail software and their features. The chronology are based on alphabet, which one is the best is not the intention of this topic.
– The Community Enterprise Operating System. CentOS is free and open source Linux Kernel base operating system. CentOS is one of the most popular Linux distribution now a days. It is known as a variant because of its similarity with Red Hat Operating system. CentOS developer uses Red Hat source code for developing CentOS. Anyway, in this article we will describe step by step guide to install CentOS 6.2. Even you never installed any Linux in your life, with this guide you will be able to install CentOS 6.2. Let’s enjoy together!
We can use DVD or USB drive to install CentOS 6.2. If we want to install form DVD then, just download ISO file from http://www.centos.org/modules/tinycontent/index.php?id=15 here and burn this file to a blank DVD. But if we want to install from a USB drive then we need third party software for this. UNetbootin is the best software to make USB drive bootable specially for Linux.
One of the most important things in every organization that should be properly implemented is security policy. Today, there is many threats can be used to violate business and gain information for abusing activities. There are many ways for attacking your internal corporate network. One of most often used is using your internal mail organization to compromise your network. Unsecured corporate mail infrastructure offers possibility for unattended attacks and inserting malware software as viruses, trojans, backdoors and other in your organization.
Secure Exchange infrastructure
Securing mail infrastructure is one of the most important tasks should be done by administrators. This article describes best security practices for2007 organization. More practices are applied, less potential security threats for your organization exist.
The Shell script is a script where we are writing different types of commands and executing those commands from a single file. We can execute that command manually, by entering command one by one. But if we use shell script we have to write those commands into a text file for the first time and then we can run those commands as many times as required.
In this article first I will show you, Complete Script. Later on, you will get a description of that script. I assumed that you know about shell scripting, mysqldump and crontab.
Operating System: Any Linux or UNIX.
Companies and organizations often have many applications for internal use. For almost all of that there is need for user authentication during login process. In most cases user and password combination is unique application in which users are logging. Users have to remember or keep all this password and usernames which can be difficult for handling. In that case mechanism known as Single Sign On (SSO) enables easier management with users credentials.
SSO is a software mechanism that enables using one username/password combination for set of applications in which SSO is applied. Example for SSO can be using windows domain credentials for logging in applications used in company. For that authentication mechanism windows Domain Controller (DC) is needed. When logs in application, user credentials are passed to domain controller, authentication is performed and user is allowed access to application. This authentication is applied when user logs to Windows after system boot.