You are here

Blogs

Ivan Radovanovic's picture

How to create user and grant privileges on MySQL

Like this
grant all privileges on db.* to 'user'@'host' identified by 'password';

Ivan Radovanovic's picture

How to flush DNS cache on windows

Execute ipconfig /flushdns on command prompt

Ivan Radovanovic's picture

Zimbra stupidities

Probably impossible to list all, but here are really harmful if you are moving it to other server:

Ivan Radovanovic's picture

Keeping FreeBSD ports secure and up to date

  1. Install /usr/ports/ports-mgmt/portaudit in order to receive vulnerability reports with daily security reports
  2. Install /usr/ports/ports-mgmt/portupgrade in order to be able to update ports in easier way
  3. When you need to upgrade ports
    • portsnap fetch
    • portsnap update (or portsnap extract if using portsnap for the first time)
Ivan Radovanovic's picture

Enable ssl on apache2

a2enmod ssl

Ivan Radovanovic's picture

Extracting private key and certificate from pfx file

To extract private key:

  • openssl pkcs12 -in file.pfx -nocerts -out pk.pem
  • openssl rsa -in pk.pem -out key.pem

To extract certificate:

  • openssl pkcs12 -in file.pfx -clcerts -nokeys -out cert.pem
Ivan Radovanovic's picture

Making SQL Server express listen for tcp connections

Start Configuration Manager (separate program with that name), go to "SQL server network configuration", choose "Protocols" bellow that - right click TCP/IP and click enable if not enabled already. Right click it again - choose properties this time, choose no for "listen all" unless you are exposing service to other machines, then on next tab choose "Enabled" for addresses you want to listen on (::1 and 127.0.0.1 make sense). Make sure you delete "TCP dynamic ports" and set 1433 for "TCP port" value. Also make sure that your web.config files contain 127.0.0.1 for server address.

Ivan Radovanovic's picture

Basic linux firewall configuration (iptables)

Linux firewall divides all traffic into 3 groups

  • INPUT
  • OUTPUT
  • FORWARD

First two are obvious, third group I guess also covers nat and similar features.

Traffic is controlled by adding accept or reject rules to appropriate group - compared to OpenBSD's pf iptables seems to be missing tables (weird choice for name, he he), all rules seem to behave like quick rules and you need explicitly to take care of connection state.

Ivan Radovanovic's picture

How to install deb file on linux

dpkg -i filename.deb

Ivan Radovanovic's picture

IPsec based VPN using FreeBSD

Since I wasn't really able to find information how to set this up on one place here is short recipe.

Prerequisites:

Pages

Subscribe to RSS - blogs