The Linux and OS X versions of ESET NOD32 Anti-Virus (Business Edition) require an X-server to present in order to install. Since this isn’t an issue on OS X, it might on Linux since this isn’t installed on most servers. Although you can use the ESET Remote Administration Console to generate a custom installer to circumvent this, sometimes you might need to make a manual change in the configuration. I will show you how to do this using the command line (very useful for remote access).
A very useful application for Linux and BSD systems is the sudo application. This allows a user to execute a root task without being logged in as root. There are some security concerns when this is not configured correctly. Fortunately most distributions have this enabled only for the ‘sudo’ usergroup. But in some cases you want sudo to merge into your environment, instead of having to change your environment for sudo.
New releases of Ubuntu are using a new desktop environment, which is something not every user is accepting. Although it’s very useful for non-experienced computer users, it will be annoying to others. Getting the old GNOME back is rather simple.
I’ve compiled the 3.3.0 kernel for Debian Squeeze (i386). You can download it from the following directory (I’d appreciate some mirrors):
Please note that the 3.3.0 kernel does not have the Stable status.
This guide will demonstrate how to deploy DKIM on Debian-based Linux distributions. Other distributions work similar, except some do not use the scripts in init.d. The configuration of DKIM will be the same. I will discuss HOW to deploy it, not WHY to deploy it as I assume you’ve already decided to do so.
Using SSH is a great way to remotely manage a server and to securely transfer data to and from it. You basically connect using SSH with your username and password. In that case you authenticate with something you know, which in this case is the password.
But you can also authenticate with something you have, like an SSH key. You can use this to authenticate without a password, and even configure the server to only allow SSH keys to prevent password attacks.
This tutorial shows how to configure the SSH server, generate SSH keys for each user and optionally disable password logins.
Many people who are configuring a web server for the first time are struggling with the proper file and group permissions. Either the scripts don’t execute properly, or they can’t upload or modify files without getting a Permission Denied error message. The only way to make it work is by setting the CHMOD permissions to 777 (world read, write and execute), which is very dangerous. Any individual could upload a (PHP) script to the server, and cause serious damage (erase the files or even disrupt the OS if the security is very weak). I’m going to teach you how to set up the permissions properly to make the server both functional and safe.