Home Windows/Linux Servers

Windows/Linux Servers

Connect locally (local domain or local network) to Microsoft Hyper-V server

Connect locally (local domain or local network) to Microsoft Hyper-V server   Hello friends , I had some very interesting problem when i try to connect to my hyper V server with in a...

How to forward incoming and outgoing mails in Outlook

How to forward incoming and outgoing mails in Outlook   Hello , The only thing that could help is to create a rule in Microsoft Outlook program. The thing is that the rule you need...

I get "You don’t have permission to access /imp/compose.php on this server" error when...

I get "You don't have permission to access /imp/compose.php on this server" error when trying to send e-mail in horde webmail Hello, Had some interesting error that caused by mod security. Symptoms When trying to...
GPO

How to block websites using ADS Groups/OU

How to block websites using ADS Groups/OU ? Ok . Question, do you use firewall like ISA etc .. -------------------------- Block some web sites via GPO can be done ... but the nice way is...

How To Configure A High Available Load-balancer With HAProxy And Keepalived

This tutorial explains how to set up a two-node load balancer with HAProxy and keepalived on CentOS 7. The load balancer sits between the user and two (or more) backend Apache web servers that hold...

Find out who did (Delete records)what via an ip address or a network address?...

Find out who did (Delete records)what via an ip address or a network address? (no audit) Hello . Before the damagedisasterdeletion you need to turn on the audit logs to all as especially...

Block Skype via GPO

Hi . Did some post and ways to block it (skype) :) But still not complete one :( .. trying the best :) -------------------------------- 1) Block IP Addresses to Skype Authentication Servers Block 80.160.91.5 & 80.160.91.13....

Installing MCrypt PHP5 on Ubuntu 12.04

Installing MCrypt PHP5 on Ubuntu 12.04 Hello , MCrypt is a replacement for the popular Unix crypt command. Mcrypt provides the same functionality but uses several modern algorithms such as AES. Libmcrypt, Mcrypt's companion,...

Disable PHP Execution In WordPress Uploads Directory

Hi friends , We see a lot of shells and scripts that gets uploaded to the /wp-content/uploads directory. Generally these are shell scripts and other scripts that allow pretty much total control over your...

MySQL – Migrate Users from Server to Server

MySQL – Migrate Users from Server to Server Sometimes we need to migrate our databases to a new MySQL server.  It is easy to move the databases, but without the users and...

Learning DNS for Enterprise

Learning DNS for Enterprise I can tell you couple of things and a little facts about DNS :))) There are two types of DNS queries, recursive and iterative. When a DNS resolver issues a...

Download a Free 15-day trial of Parallels Plesk 12 Today!

Download a Free 15-day trial of Parallels Plesk 12 Today! Attention: Only deploy the Parallels Plesk Trial on servers dedicated for this purpose. Control Panel software is designed to take full control...

How to Analyze Distributed Denial-of-Service (DDos) Attack

How to Analyze Distributed Denial-of-Service (DDos) Attack What is DDoS Attack? As per Wikipedia, denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its...

How to make log file for files being copied to USB

log file for files being copied to USB Yes )) monitoring the files is the best thing to control them . I am using that soft to "control" them : USB Detect . http://usbdetect.com/ It will...
linux

Useful command – Linux

Useful command – Linux   1) Add the user to the sudo group: sudo adduser <username> sudo P.S. The change will take effect the next time the user logs in. This works because /etc/sudoers is pre-configured...

Veeam Agent for Linux – Beta

Veeam Agent for Linux - Beta Simple and FREE backup agent for Linux - Veeam Agent for Linux - Beta — anywhere! Backing up and recovering Linux cloud instances is often cumbersome or expensive,...