background preloader

How to run your own e-mail server with your own domain, part 1

How to run your own e-mail server with your own domain, part 1
E-mail is old and complex. It's the oldest still-recognizable component of the Internet, with its modern incarnation having coalesced out of several different decades-old messaging technologies including ARPANET node-to-node messaging in the early 1970s. And though it remains a cornerstone of the Internet—the original killer app, really—it's also extraordinarily hard to do right. We most often interact with e-mail servers through friendly Web-based front-ends or applications, but a tremendous amount of work goes into hiding the complexity that allows the whole system to work. E-mail functions in a poisoned and hostile environment, flooded by viruses and spam. From a normal person's perspective, e-mail seems like a solved problem: sign up for Internet access and your ISP gives you an e-mail address. I'll tell you why: because if it's in the cloud, it's not yours. Because you must rely on others for your security. Well, to hell with that. This is hard and even a bit scary... Related:  Pc and MobileVPS

101 Amazing PC / Internet Tricks no one told you before Below is a list of one of the best hidden 101 Computer tips and tricks to impress your friends which you have been unaware of so far in life. Here you go. You can search Google timer in Google for a timer with alarm Search This in Google for Direct Mp3 Links intitle:index.of? Use your Chrome Browser as Notepad quickly. Just copy the text below to the address Bar. data:text/html, <html contenteditable> Note: You can also bookmark this to use it anytime. View Hidden Password in Browser Visit to see How Google View You Read: 50 more Google search Tricks Rename Subtitle File same as movie name and VLC will load subtitle automatically every time you open Movie Rename the subtitle file same as movie name (Kept in same folder) and you do not need to load subtitle everytime you play the movie. In your PC just create a folder with the name given below and access everything GodMode. To Undo an Undo Just press CTRL+Y Bored !

Ars walkthrough: Using the ZFS next-gen filesystem on Linux In my last article on next-gen filesystems, we did something in between a generic high altitude overview of next-gen filesystems and a walkthrough of some of btrfs' features and usage. This time, we're going to specifically look at what ZFS brings to the table, walking through getting it installed and using it on one of the more popular Linux distributions: Precise Pangolin. That's the most current Long Term Support (LTS) Ubuntu release. With that said... if Ubuntu's not your cup of tea, don't worry! There are lots of options for running ZFS, and very little of this walkthrough will really depend on your use of Ubuntu in particular or even Linux in general. In the interest of brevity, I'm going to assume you're already familiar with most of the generic terms and features associated with next-gen filesystems: atomic snapshots, asynchronous incremental replication, self-healing arrays, per-block checksumming, etc. Prerequisites and installation Initial tuning Learning ZFS lingo vdev zpool

NSA-proof your e-mail in 2 hours You may be concerned that the NSA is reading your e-mail. Is there really anything you can do about it though? After all, you don’t really want to move off of GMail / Google Apps. And no place you would host is any better. Except, you know, hosting it yourself. Today we kill your excuses. Now fair warning: it took me about two days to figure the stuff out you’re going to see in this blogpost, starting from knowing basically nothing about modern e-mail servers. So bookmark this blog post, block off a Saturday next month, and get it done. Edit Some people are complaining that the NSA is pulling all the e-mail over the wire anyway, so encrypting your own server is stupid. In the next two hours, we’re going to fix this. You’re going to host your own mail.It’s going to be encrypted on the server, locked-on-boot, SSH on reboots to unlockWhile we’re at it, let’s fix some things that annoy me about GMail:Better SPAM detection. I’m going to assume: Hang on just a minute though. Let’s get started!

Install WordPress 3.9 using Apache in Debian, Ubuntu and Linux Mint Writing an Apache or WordPress introduction will do no good due to the fact that both of them, combined together, are one of the most used Open Source platforms in Internet today, in fact Apache runs on 52 % world web servers and WordPress on one of every 6 websites – Apache with MYSQL and PHP providing the dynamic server gateway interface for WordPress Publishing Content Management. This topic explains the steps needed to be processed in order to install WordPress 3.9 on top of LAMP, which stands for Linux-Apache-MySQL-Php-Perl-Python-PhpMyAdmin on Debian, Ubuntu and Linux Mint, with basic Apache Virtual Host configurations and MySQL database access through CLI or PhpMyAdmin Web Interface, but be aware that does not cover other important network service configurations, like an IP name mapping provided by DNS server and simply uses the rudimentary system hosts file for IP name transactions (DNS query). Step 1: Server Basic Configurations 1. 2. 3. 4. $ sudo apt-get install phpmyadmin 5. 6.

FREE Computer Training - Computer Repair Classes - Laptop Repair Instruction - Data Recovery Lessons - Web Design Seminars - Computer Security Counseling 2014/02/hackers-exploiting-router.html In past months, we have reported about critical vulnerabilities in many wireless Routers including Netgear, Linksys, TP-LINK, Cisco, ASUS, TENDA and more vendors, installed by millions of home users worldwide. Polish Computer Emergency Response Team (CERT Polska) recently noticed a large scale cyber attack ongoing campaign aimed at Polish e-banking users. Cyber criminals are using known router vulnerability which allow attackers to change the router's DNS configuration remotely so they can lure users to fake bank websites or can perform Man-in-the-Middle attack. 'After DNS servers settings are changed on a router, all queries from inside the network are forwarded to rogue servers. Obviously the platform of a client device is not an issue, as there is no need for the attackers to install any malicious software at all.' CERT Polska researchers said. To perform this, he used DNS Proxy tool 'Dnschef' and exploitation tools including Metasploit, webmitm and Burp Suite. .

Mail-in-a-Box VirtualHost Examples This document attempts to answer the commonly-asked questions about setting up virtual hosts. These scenarios are those involving multiple web sites running on a single server, via name-based or IP-based virtual hosts. Running several name-based web sites on a single IP address. Your server has multiple hostnames that resolve to a single address, and you want to respond differently for and Note Creating virtual host configurations on your Apache server does not magically cause DNS entries to be created for those host names. # Ensure that Apache listens on port 80Listen 80<VirtualHost *:80> DocumentRoot "/www/example1" ServerName # Other directives here</VirtualHost><VirtualHost *:80> DocumentRoot "/www/example2" ServerName # Other directives here</VirtualHost> The asterisks match all addresses, so the main server serves no requests. You may replace * with a specific IP address on the system. The server has two IP addresses.

15 CMD Commands Every Windows User Should Know Advertisement Updated by Tina Sieber on January 21, 2017. Microsoft has slowly but surely pushed the command line aside in the Windows interface. This is not without reason. It’s an antiquated and mostly unnecessary tool from an era of text-based input. 10 Windows Command Line Tips You Should Check Out 10 Windows Command Line Tips You Should Check Out While the Windows command line is not considered as powerful as a Linux's, here are some Windows command line tips and tricks not everyone might know about. But many commands remain useful, and Windows 8 and 10 even added new features. In case you’re not sure how to access the command prompt, forgot basic commands, or would like to know how to see a list of switches for each command, you can refer to our beginners guide to the Windows command line for instructions. Our 15 Favorites Most files in Windows are associated with a specific program that is assigned to open the file by default. 2. 4. You can also extend the command in several ways.