Posts Tagged Ubuntu

Can I connect to an amazon instance and create more instances?

Can I connect to an amazon instance and create more instances? I have heard this question several times now and the answer is yes. You are limited to running 20 On-Demand and 100 Spot Instances per region with Amazon EC2. If that not enough for you then you’ll need to file a Request to Increase the EC2 Instance Limit, to use more instances.

Each instance is basically a virtual machine running on amazons infrastructure, and each instance is allocated its own address allowing you to connect to it. Because each instance runs independently you can connect to as many as you want simultaneously. Read the rest of this entry »

, , , , , , , , , , , , ,

No Comments

Setup an IDS with Snort & MySQL

An Intrusion Detection system is like a burglar alarm for your computer. It monitors you network and system activities for malicious activities or policy violations and reports to some kind of Management Station. This is great as it lets your know who where when & how people are trying to break into your network, and knowing this is half the battle. You may be thinking that this isn’t enough and you want to block all hacks from happening, well most IDS systems include some “Network Intrusion Prevention” features. However the main concern should be closing up vulnerabilities rather then blocking someone already trying to hack your systems ,after all its a bit late if they are already in your system, and this way you may block any innocent users.
Read the rest of this entry »

, , , , , , , , , , , ,

1 Comment

Add NRPE host to Nagios

nagios Logo NRPE (Nagios Remote Plugin Executor) is a Nagios agent witch allows for remote system monitoring by executing scripts on a remote system allowing monitoring of disk usage, system’s load or number of users currently logged in and much more.

Normally Nagios can only monitor public services such as HTTP & FTP. This is great if you only want to monitor public servers, however I bet that most people want to monitor their own servers and have access to private information, that’s were NRPE comes in. It works on a client server basis, you install a daemon on the machine you want to monitor, then setup your Nagios server to connect to the remote daemon to gather information Read the rest of this entry »

, , , , , , , , , , ,


Top 10 uses for Dedicated/Cloud server

So you want a Dedicated or Cloud server, or you already have one and you want to know what to do with it, well there are many uses for remote servers, just check out the long list at But witch ones are actually worth installing, well that depends on your needs, if you need a web-server then install LAMP, if you need a chat server install IRC. But its always good to look at other servers you can install because it might inspire you to improve your service, If you are already running a popular website on a LAMP server you might not realise you could install an IRC server and provide your readers with a chat room. So read on for my Top 10 uses for a sever Read the rest of this entry »

, , , , , , , , , , , ,

No Comments

Setting Up an Basic IRC Server on Ubuntu

IRC Funny Cartoon Ahh the good old IRC server, these things have been letting people chat to each other since 1988. In there most basic form they are chat room servers, pretty much every chat room you’ve used on a web page is connecting to an IRC server. They definitely have a place in computing history as they were used to report on the 1991 Soviet coup d’état attempt and Gulf War during media blackouts.  But they have become much more then simple chat rooms, they allow for: File Transfer, Encryption, Proxy, Colour, Channels, Users, and even chat bots.

Sadly the IRC chat room  are being replaced by things like MSN and Facebook messenger. They are great to install on web servers because they allow you to include chat rooms into your websites, or just to play with something that’s been such an important part of computing history. Read the rest of this entry »

, , , , , , , , , ,

1 Comment

Donate you Spare CPU Time to Science

I’m talking about Folding@Home, the distributed computing project that runs throughout the world to make one of the largest supercomputers in the world. The project is running large scale simulations on Protein Folds to try and cure diseases like Alzheimer’s, ALS, Huntington’s, Parkinson’s disease, and many Cancers.

So how can your server help, well I bet your server CPU’s hardly ever runs at a high load, otherwise you would be setting up faster processes and more servers, but it does seem wasteful having all these spare cycles just in case you get a surge in users. Well folding@home is clever it will never let your load average go much above 1.0 and if you start experiencing a surge in users folding@home will automatically throttle its CPU use, meaning your users will not be effected. So how do you install and run Folding@Home: Read the rest of this entry »

, , , , , , , , ,

1 Comment

VPN: Cannot find Address

VPN is great, it enables us to securely connect to work from home or anywhere else, but there are often problems. I find the most common problem is that people can’t connect to a computer over VPN when the server address uses the same address scheme as the network their connecting form.

For example is you’re at home I bet your IP address is something like and your gateway is, no problems there at all. But what happens if your VPN connection uses a similar address scheme, so your server address is something like The problem happends because the first 3 numbers in a normal IP Address is used to identify the network and the last digit identifies the computer, if there are two networks with the same address i.e. 192.168.0 then how does your computer decide witch netowk to look at? Read the rest of this entry »

, , , , , , , , , , ,

No Comments

Hide Traffic with SSH

SSH Packet ExampleSecure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH was designed to replace Telnet (an insecure shell), now nearly all Unix based computers use SSH to access their shell accounts. SSH uses Public-Key encryption, thus enabling it to provide confidentiality and integrity of data over an insecure network like the Internet.

So you can hide your shell commands, nice, but how does this allow me to hide my traffic. SSH can do much more then just remotely login to machines, it supports tunnelling, TCP port forwarding , file transfer and X11 connections. So for this tutorial I’m going to discuss using SSH to tunnel and port forward enabling us to encrypt our data across the Internet. Read the rest of this entry »

, , , , , , , , , , , , , , ,

No Comments

Top 10 Command Line Games

On a more light-hearted subject, what are my Top 10 Favourite Command line games for Linux? I bet you’re asking yourself why command line games? Well I’m often using Linux boxes via command line, and sometimes I get mantel blocks, tired or just bord and I want to play a game. There are more Command Line games then you think and most of them can provide a welcome break from your busy day and often a great source of inspiration. Read the rest of this entry »

, , , , , ,

No Comments

Setting up a Seedbox

Tutoiral Seed Torrentflux Logo torrent dataA seed box is a server for downloading and uploading digital files, commonly making use of the BitTorrent protocol. A common use for seed boxes is seeding torrents, it’s much more efficient to setup a Seedbox as it’s likely to have access to higher upload speeds. They are also good for general downloading, its easier to have a server running 24/7 then it is running your PC or Laptop all day. The ability to remote control seed boxes is a great advantage, it enables you to add and monitor downloads from anywhere, especially useful if someone recommends you something to watch at work.

In this tutorial I’m going to talk you through setting up a seed box designed for downloading torrents. I’m going to use TorrentFlux for this tutorial as it can easily be installed on a LAMP stack Read the rest of this entry »

, , , , , , ,