Posts Tagged Setup

Installing Ruby on Rails Ubuntu 12.04 LTS using RVM and Ruby 1.9.3

Ruby Rails is a Web application framework created in 2004 intended as a rapid development web framework that runs the Ruby programing language. The latest version of the Ruby is ‘Ruby 1.9.2‘ and was realised in August 2011, it brings many new features and bug fixeses. The most signifiant changes are Block local variables, An additional lambda syntax, Per-string character encodings are supported and a new New socket API (IPv6 support). You can find a great walkthrough of all the new features at Ruby Inside. coinciding with the release of Ruby 1.9 is the Rails 3.1 framework which requires Ruby 1.8.7 or higher. RubyonRails 3.1 brings many new features, most notably: jQuery as default, HTTP Streaming, a new assets pipeline powered by Sprockets 2.0. So this is all good stuff and I’m sure you want to be working with the latest version of Ruby and RubyonRails, especially if you setting up a new server. Read the rest of this entry »

, , , , , , , , , , , ,

4 Comments

Install and Configure a Ubuntu 11.04 Snort-MySQL Honeypot

An Intrusion Detection system is like a burglar alarm for your computer. It monitors you network and system activities for malicious activities or policy violations and reports to some kind of management station. This is great as it lets you know who were when & how people are trying to break into your network and knowing this is half the battle. You may be thinking that this isn’t enough and you want to block all hacks from happening, well most IDS systems include some “Network Intrusion Prevention” features. However the main concern should be closing up vulnerabilities rather than blocking someone already trying to hack your systems, after all it’s a bit late if they are already in your system, and this way you may accedently block innocent users.
Read the rest of this entry »

, , , , , , , , , , , , , ,

No Comments

Installing and Configuring Nagios Ubuntu 11.04

Nagios Logo

Nagios is the Industry Standard Network Monitoring Engine. OK great so what’s that mean, well Nagios is a server that monitors your hosts and services and will inform you if something goes wrong and when it is fixed again. It can monitor network services, host resources and even network probes such as temperature and moisture.

These features as well as many more make Nagios, by far, the most complete open-source Network Monitoring tool on the market, however with all these features comes complexity and Nagios has obviously been designed with the experienced Network Administrator in mind. But don’t worry too much, its not that difficult to learn as long as you take it one step at a time, and in today’s tutorial we’re going to look at the first step, actually getting it installed Read the rest of this entry »

, , , , , , , , , ,

No Comments

Top 5 easy Nagios setup solutions

nagios LogoNagios is the Industry Standard Network Monitoring Engine, however it can be a pain to set up and configure. We’ll it doesn’t always need to be that way there are a few other systems you could use that are much easier to setup and configure so much so you might even be able to get your end-users to manage their own monitoring configuration. So here is my Top 5 easy Nagios setup solutions Read the rest of this entry »

, , , , , , , ,

No Comments

Ubuntu Rsync Tutorial (ubuntu)

Rsync is a great lightweight backup utility for Linux and windows, its selling point over other backup solutions is that it only copies the diffs of the files that have changed, therefore only transmitting the bare minimum of data. This makes it great for running backups into the cloud & to over internet services.

Rsync has two modes, daemon & client. The Rsync server runs in daemon mode, this listens for requests on port 873 and can serve these requests in Rsync’s own protocol or via remote shell (RSH or SSH), thus making it a very secure way to backup your files. The Rsync client is pretty simple and normally runs as a simple executable. What makes Rsync more remarkable is its huge array of features, to name a few: Read the rest of this entry »

, , , , , , , , , ,

No Comments

Can I connect to an amazon instance and create more instances?

Can I connect to an amazon instance and create more instances? I have heard this question several times now and the answer is yes. You are limited to running 20 On-Demand and 100 Spot Instances per region with Amazon EC2. If that not enough for you then you’ll need to file a Request to Increase the EC2 Instance Limit, to use more instances.

Each instance is basically a virtual machine running on amazons infrastructure, and each instance is allocated its own address allowing you to connect to it. Because each instance runs independently you can connect to as many as you want simultaneously. Read the rest of this entry »

, , , , , , , , , , , , ,

No Comments

Save Outlook 2010 Archive Remotely

Save Outlook 2010 Archive Remotely

Have you ever had your computer lost or stolen, had to format it, or had a corrupted HDD, well if you have you’ll know its a pain, especially when trying to get you data back. Now with high-speed networks and cheap storage its becoming more common to backup are data remotely. This helps reduce data lost in the event your computer is lost or damaged.

This is all fair and well for your documents, you just copy them to a remote server and you can sleep safe in the knowledge your files will be OK. But what about your emails, these can be just as important, if not more, then your documents, in fact someone told me the other day that his emails were like is calendar and identity and would be completely lost without them, so its worth ensuring they are all backed up correctly. Read the rest of this entry »

, , , , , , , , , ,

No Comments

How to edit Host File Windows 7

The host file in windows is a file that maps host names to IP Address. This works much like a simple DNS, however only one Host Name can go to one IP Address. This can be useful in many situations, for example if you are setting up a small office and don’t have the resources for a DNS you could set-up a host file to resolve internal Host Names for you.

Back in the days of Windows XP and NT all you had to do was open you host file and edit the data. But when windows Vista and 7 came along things became a bit more complicated as you have to open as administrator, so what if your not logged in as an administrator? Read the rest of this entry »

, , , , , , , ,

No Comments

Snort Email Reports

Snort has many logging ability’s, syslog, unixsock, tcpdumps, csv, xml, unified and my favourite, database. All these logging methods are great if you are going to look through your logs regularly. But if your busy doing other things or maintaining snort isn’t you main priority how are you expected to keep up to date with the logs.

I find that having snort email me every morning with a simple report is a much better way of ensuring that no one is attacking my systems. It only takes me a minute to read through the report and if there is something I think needs looking at I can easily log into my database and get as much information on the event as I need. So how do you setup email reports, well if you installed Snort on a Debian based system it is already installed, just not setup correctly: Read the rest of this entry »

, , , , , , , , , , , , ,

No Comments

Setup an IDS with Snort & MySQL

An Intrusion Detection system is like a burglar alarm for your computer. It monitors you network and system activities for malicious activities or policy violations and reports to some kind of Management Station. This is great as it lets your know who where when & how people are trying to break into your network, and knowing this is half the battle. You may be thinking that this isn’t enough and you want to block all hacks from happening, well most IDS systems include some “Network Intrusion Prevention” features. However the main concern should be closing up vulnerabilities rather then blocking someone already trying to hack your systems ,after all its a bit late if they are already in your system, and this way you may block any innocent users.
Read the rest of this entry »

, , , , , , , , , , , ,

No Comments