Using CloudFlare
So I have signed up 0ink.net to use the CloudFlare service. CloudFlare is a reverse proxy service that is supposed to speed up and improve web server security. This is done by: globally distributed reverse proxy cache network ...
So I have signed up 0ink.net to use the CloudFlare service. CloudFlare is a reverse proxy service that is supposed to speed up and improve web server security. This is done by: globally distributed reverse proxy cache network ...
So last weekend finally had some time to work with a Askozia Desktop Appliance. It actually arrived much earlier but without a Power Supply. Initially I though, "this is strange; I didn't know this supported PoE". (Power Over Ethernet). It turns out it didn't and there was a shipping mistake. After contacting the vendor, they sent me the required Power Supply. Overall I think the product is quite nice. It has a very nice User Interface that is quite easy to use. Simple configurations are indeed very easy to set-up. My feeling is that, as with any GUI, it usually trades user-friendly with expressiveness. So while I could configure most of the things I wanted from the UI, it did not support my home network topology fully. Initially, I had a DMZ vs Home-LAN configuration, with the Askozia box in the DMZ. Because the separation between the DMZ and the Home-LAN was through the router, it considered all the IP phones (in the Home-LAN) on the other side of the NAT, so things did not work properly. ...
This is an interesting concept. Essentially is an Encryption dongle that encrypts stuff between your PC and your USB mass storage device. Addonics Product: CipherUSB. ...
So when upgrading software packages sometimes you need to merge changes. My recipe in archlinux is as follows: Look for *.pacnew files. Retrieve the original version (from /var/cache/pacman) from the old source package. Use a 3 way merge tool between old version, current file and the pacnew file. ...
Recently I found this Open Source project. Apparently it recently gained support to unpack Exchange Offline Address Book files. What I don't know is after you unpack it, how would you use such a file. Intriguing but apparently falls a little bit short. Probably would need to try it out for myself to see how it works. libmspack. ...
The other day I came across this project. Looks an interesting idea. It is a project that lets you run unmodified Linux binaries on Windows. It is more similar to WINE than to for example coLinux. While I conceptually I understand how it would work at a low level, I am curious how it works with dynamically link executables. This is something I would like to test out when I have time. ...
This is an article about different media (and more specifically) video files can be manipulated. This is just for historical purposes as now almost everything can be done using ffmpeg and the right options. libmp4v2 contains: ...
I am still to test this recipe Server Configuration First of all, we must install the following components: A DHCP server to assign IP addresses to our diskless nodes. A TFTP server to transfer the boot image (a requirement of all PXE option roms). ...
Some useful tidbits to use when using the OpenWRT embedded web server (uHTTPD). Embedded Lua uHTTPd supports running Lua in-process, which can speed up Lua CGI scripts. It is unclear whether LuCI supports running in this embedded interpreter. LuCI seems to work fine (if not better) with the embedded ...
So these are my ideas on how to document projects. There are three types of documentation types: User guides Targetted and end-users of the software and people who want a brief overview. Man pages Again targetted at end-users but also sysadmins. Usually to address a specific feature. ...
Reference for Git tutorials http://linux.yyz.us/git-howto.html http://git.or.cz/course/svn.html http://spheredev.org/wiki/Git_for_the_lazy http://www.kernel.org/pub/software/scm/git/docs/gittutorial.html ...
Sometimes we need to connect two or more geographically distributed ethernet networks to one broadcast domain. There can be two different office networks of some company which uses smb protocol partially based on broadcast network messages. Another example of such situation is computer cafes: a couple of computer cafes can provide to users more convinient environment forr playing multiplayer computer games without dedicated servers. Both sample networks in this article need to have one *nix server for bridging. Our networks can be connected by any possible hardware that provides IP connection between them. Connecting Two Remote Local Networks With Transparent Bridging Technique Short description In described configuration we are connecting two remote LANs to make them appearing as one network with 192.168.1.0/24 address space (however physically, presense of bridges in network configuration is not affecting IP protocol and is fully transparent for it, so you can freely select any address space). Both of the bridging servers has two network interfaces: one (as eth0 in our example) connested to the LAN, and second (eth1) is being used as transport to connect networks. When ethernet tunnel between gateways in both networks will be bringed up we will connect tunnel interfaces with appropriate LAN interfaces with bridge interfaces. Schematically this configuration can be following: ...
What you were probably looking forT568A/B (10-BASE-T and 100-BASE-TX): With pin positions are counted from left to right with the contacts facing you (clip on the back) and pointing up (cable coming out the bottom): Color (568B) ...
This article is about integrating OpenSSH in a kerberos environment. Allthough OpenSSH can provide passwordless logins (through Public/Private keys), it is not a true SSO set-up. This article makes use of Kerberos TGT service to implement a true SSO configuration for OpenSSH. Pre-requisites First off, you'll need to make sure that the OpenSSH server's Kerberos configuration (in /etc/krb5.conf) is correct and works, and that the server's keytab (typically /etc/krb5.keytab) contains an entry for host/fqdn@REALM (case-sensitive). I won't go into details on how this is done again; instead, I'll refer you to any one of the recent Kerberos-related articles (like this one, this one, or even this one). Just be sure that you can issue a kinit -k host/fqdn@REALM and get back a Kerberos ticket without having specify a password. (This tells you that the keytab is working as expected.) ...
So one weekend went by and managed to finish up my 0ink.net web site. So now I have: wordpress For main content. tt-rss This is my answer to Google's shutdown of the Reader service. ...
There is nothing special with GitHub and Gitorious here. This technique would work exactly the same the other way around or with other servers. In a nutshell # Inital setup git clone --mirror git://gitorious.org/weasyprint/weasyprint.git weasyprint ...
Kerberos is a network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. (Source Kerberos_(protocol) ) Backups Create backup: ...
Quick reference article for how to use Emacs. Yes, it is really old skool! Cursor Motion ...
A bunch of recipes useful for an ArchLinux system environment. Mostly around system administration. Custom Repos and Packages In the repo directory, put all the packages in there. repo-add ./custom.db.tar.gz ./* ...
Notes on doing different things within the PHP language. Object oriented introspection property_exists(obj,prop_name) method_exists(obj,method_name) is_a(obj,'clas_name') or ($obj instanceof ClassName) ...