Filtering Apache logs / conditional Logging – This can be very troublesome when trying to access certain web pages. The only way to get through is to make use of conditional logging (it is not the only way to control the contents of the logs) To do this, simply define an environment variable ,according to certain criteria, then request that the server does not write the file type within log when this variable exists
TestSSLServer – TestSSLServer is a simple command-line tool which contacts a SSL/TLS server (name and port are given as parameters) and obtains some information from it: Supported versions (among SSL 2.0, SSL 3.0, TLS 1.0, TLS 1.1 and TLS 1.2). Support of Deflate compression (TLS-level compression, not HTTP-level gzip/deflate compression, which this tool does not consider). Supported cipher suites, for each protocol version. Server certificate hash and name.
These are my links for 23 gen 2014 through 24 gen 2014:
Pancake HTTP Server – What is Pancake? Pancake is a lightweight and modern HTTP server that comes with its own PHP Server API and interfaces for FastCGI and AJP13. With its modern server architecture Pancake is capable of handling very high concurrency loads along with many other features – try it out!
GitLab: Self Hosted Git Management Application – GitLab is open source software to collaborate on code. Create projects and repositories, manage access and do code reviews. GitLab allows you to keep your code secure on your own server manage repositories, users and access permissions communicate through issues, line-comments and wiki pages perform code review with merge requests GitLab is powered by Ruby on Rails completely free and open source (MIT license) used by more than 25.000 organizations to keep their code secureGitLab is open source software to collaborate on code. Create projects and repositories, manage access and do code reviews.
Hardening the Linux server – Summary: Servers — whether used for testing or production — are primary targets for attackers. By taking the proper steps, you can turn a vulnerable box into a hardened server and help thwart outside attackers. Learn how to tighten Secure Shell (SSH) sessions, configure firewall rules, and set up intrusion detection to alert you to possible attacks on your GNU/Linux® server.
These are my links for 16 gen 2014 from 10:51 to 11:03:
Using KVM virtualization – Kernel Virtual Machine (KVM) virtualization has largely replaced Xen as the default open source mechanism for creating and supporting virtual machines (VMs) on most Linux systems. Though the motivation for this change is primarily build and support related rather than technical, the reality is that many enterprise IT groups that are interested in virtualization will need to learn the administrative command-and-control tools that KVM uses. Similarly, IT shops with an existing investment in Xen virtualization that are moving to KVM will probably want to convert existing VMs to the formats that KVM supports whenever possible, rather than having to re-create them.
Create Linux and Windows images for OpenStack private clouds – This article proposes a new way to construct Linux® and Windows® images for private clouds built with the OpenStack cloud operating system. Current image-creation methods for OpenStack environments are cumbersome and time-consuming. The authors present an online, self-service method that makes image construction faster and easier for operators and end users of private clouds.
The Tengine Web Server – Tengine is a web server originated by Taobao, the largest e-commerce website in Asia. It is based on the Nginx HTTP server and has many advanced features. Tengine has proven to be very stable and efficient on some of the top 100 websites in the world, including taobao.com and tmall.com. Tengine has been an open source project since December 2011. It is being actively developed by the Tengine team, whose core members are from Taobao, Sogou and other Internet companies. Tengine is a community effort and everyone is encouraged to get involved.
These are my links for 10 gen 2014 through 15 gen 2014:
» Linuxaria – Everything about GNU/Linux and Open source SSH in 2 steps on Linux with Google Authenticator – Many security policies require you to change the port number of the SSH service to ensure greater security in a Linux system. Situation now used throughout the IT world and used mostly by users who have their own private server. Today I want to show you how to add another security layer without having to change the SSH port. To do this we’ll incorporate the famous Google Authenticator to our ssh service, in this way we’ll have a safe, two steps security, by entering our password and the combination given from the GA application. Let’s see how to do this…
SoftEther VPN Project – SoftEther VPN Project – SoftEther VPN is one of the most powerful and easiest VPN software in the world. It is freeware, developed as an academic research project in University of Tsukuba, Japan. Download SoftEther VPN and enjoy it today. It is open source. Features * Easy to establish both remote-access and site-to-site VPN. * SSL-VPN Tunneling on HTTPS to pass through NATs and firewalls. * Revolutionary VPN over ICMP and VPN over DNS features. * Ethernet-bridging (L2) and IP-routing (L3) over VPN. * Embedded dynamic-DNS and NAT-traversal so that no static nor fixed IP address is required. * AES 256-bit and RSA 4096-bit encryptions. * 1Gbps-class high-speed throughput performance with low memory and CPU usage. * Windows, Linux, Mac, Android, iPhone, iPad and Windows Phone are supported. * SSL-VPN (HTTPS) and 6 major VPN protocols (OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP) [ via http://www.net-security.org/secworld.php?id=16171 ]