Archive for the ‘Open source’ Category

Logging remote host to specific logfile with syslog-ng

Tuesday, January 1st, 2008

http://www.quietearth.us/articles/2006/09/27/Logging-remote-host-to-specific-logfile-with-syslogng

Software RAID 5 in Ubuntu with mdadm

Tuesday, January 1st, 2008

Great tutorial – http://bfish.xaedalus.net/?p=188

Apache .htaccess / Username and password OR valid IP address

Monday, March 5th, 2007

http://wiki.apache.org/httpd/Recipes/BypassAuthenticationOrAuthorizationRequirements

…modern alternative for measuring TCP and UDP bandwidth performance…

Wednesday, February 7th, 2007

http://dast.nlanr.net/Projects/Iperf/ – official site
http://www.noc.ucf.edu/Tools/Iperf/default.htm – win32 port

Ko se sprašuješ o firewallu in usmerjevalniku… / When you are asking about what kind of firewall and router to use…

Monday, January 1st, 2007

V zadnjem času sem kar precej časa posvetil dvema odprtokodnima firewalloma/routerjema, m0n0wall-u ter pfSense-u. Celotna mreža kiWi-Fi network je postavljena na m0n0wallu. Obe zadevi delujeta super tudi v specifičnih režimih delovanja (transparent firewall, dodatni programski paketi (pfSense) …)

In the past weeks I spent some time to check the two opensource firewall/router programs: m0n0wall and pfSense. The kiWi-Fi network infrastructure is based on m0n0wall. Both produts work perfectly even in complex and specific environment (transparent firewall, extra packages (pfSense) …).

Že večkrat so me ljudje spraševali o znanih težavah – preveliki količini sej (še posebej ob uporabi raznih *donkey *mule in podobnih P2P programih). Za vse tiste je primeren spodaj naveden članek. “Računica” pa je nakako takšna: 32MB RAMa = 30000 sej. :)

Some people asked me about the known troubles using low cost routers – too many sessions (when using *donkey and *emule like p2p programs). For all that have questions regarding this problem there is a link below. The calculation is quite simple: 32MB of RAM = 30000 sessions. :)

http://www.openbsd.org/faq/pf/perf.html
http://m0n0.ch/wall/
http://www.pfsense.com/

Tcpdump – “commandprompt” network analyzer example

Monday, January 1st, 2007

tcpdump port not 52000 and host not dns1.t-2.net and not arp and host not govedo.klub-kgs.si

Show traffic that is NOT on port 520000 and NOT from host dns1.t-2.net and NOT ARP traffic and NOT from host govedo.klub-kgs.si