GPG/PGP for the pine application Monday, February 26, 2007

GnuPG and PGP are public key encryption programs, they are nice and convenient and helpful at avoiding sending ‘important’ content in the clear in email (SMTP is plain-text you remember, right?) Often console-based email clients can be fussy to setup to use this software. Here’s a quick guide, stolen from someone else (Stolen-content).

Grub and New Kernel Installation Friday, February 23, 2007

Once you make your new kernel, how do you put it into use? 

Setting an SSL Certificate's passphrase Thursday, February 22, 2007

Often when you start with an SSL certificate it has a passphrase, you may want to change that later. You may realize your webserver won’t start without entering a passphrase at the startup dialog. That’d be a bad thing for your webserver, eh? Really the problem isn’t with the certificate so much as the key, which is encrypted with a passphrase.

Making yourself an SSL certificate Monday, October 30, 2006

How many people have wanted to make an SSL certificate for one reason or another and didn’t want to pay the outrageous fees to someone to get a legittimate one, afterall if it’s just encryption you want why pay when openssl makes them free for you? Here’s how…

Automating Secure File Copies - ssh forced command keys Sunday, June 11, 2006

Ever had to move data around on a regular basis? Say to copy statistics and such from machine to machine to a central location without having some hokie psuedo user with funked up permissions? Have you the same problem as I do? Every single time you want to do this you have to google: “ssh forced command keys” and hope that link 3 doesn’t change on you? Fear not… documentation below!

System Statistics/Monitoring Tuesday, April 04, 2006

Some simple statistics gathering for systems monitoring, graphicalized for your pleasure! Everyone likes graphics and they do help to make trends visible quickly. This short explanation should give some starting points and references on using Tobi Oetiker’s fine rrdtool to store and later display the data in question.

Securing Your Network Equipment - simple steps Tuesday, January 31, 2006

A few simple yet apparently often overlooked security measures for equipment that lives on an untrusted network.

Log Analysis, why not grep? Saturday, January 14, 2006

Grep, sort, uniq, awk, sed are all worthy tools, but part of the job is deciding when one tool, or tool-set is no longer enough to accomplish your mission. When should you turn over the job to a true sorting engine, a relational database?

So you say you dislike gallery yappa gallery-program-13? Tuesday, January 03, 2006

I dislike gallery programs as well, why I have no idea. I think I wanted to write my own sometime in the past. I may still do that in the future… something with a nice web-form to upload images, user privileges and comment capability… sometime, when I have time and don’t have other obligations.

Quick Log Parsing router access-list logs Monday, January 02, 2006

A few quick ways to use normal unix command-line tools to parse logs for classification of problems or identification of activity. The aim of this would be to help folks find out what is causing a problem on a particular interface, not long term analysis which should be covered somewhere else. Part of it is covered in this package available on SourceForge.Net.

Page 4 of 4 pages « First  <  2 3 4