public marks

PUBLIC MARKS from camel with tag network

November 2008

Install and Configure Cacti Monitoring tool in Ubuntu 8.10 (Intrepid Ibex) Server -- Ubuntu Geek

(via)
Cacti is a complete network graphing solution designed to harness the power of RRDTool’s data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use interface that makes sense for LAN-sized installations up to complex networks with hundreds of devices.

Developer's Guide - AJAX Libraries API - Google Code

The AJAX Libraries API is a content distribution network and loading architecture for the most popular open source JavaScript libraries. By using the google.load() method, your application has high speed, globally available access to a growing list of the most popular JavaScript open source libraries.

October 2008

Midnight Research Labs - Depant your network

MRL has a new tool we’re releasing that will check your network for services with default passwords. The tool is called depant ((DE)fault (PA)ssword (N)etwork (T)ool). Depant works by downloading a default password list, and then mapping out the local network to see what open services are available. Once it has a list of services, it will test each service for default passwords. Once it’s gone through each of the services, depant will determine the fastest service (as recorded in phase one) and use it to perform an optional second phase of tests with a larger (user-supplied) set of default users/passwords.

Box Backup - Trac

Box Backup is an open source, completely automatic, on-line backup system. It has the following key features: * All backed up data is stored on the server in files on a filesystem - no tape, archive or other special devices are required. * The server is trusted only to make files available when they are required - all data is encrypted and can be decoded only by the original client. This makes it ideal for backing up over an untrusted network (such as the Internet), or where the server is in an uncontrolled environment. * A backup daemon runs on systems to be backed up, and copies encrypted data to the server when it notices changes - so backups are continuous and up-to-date (although traditional snapshot backups are possible too). * Only changes within files are sent to the server, just like rsync, minimising the bandwidth used between clients and server. This makes it particularly suitable for backing up between distant locations, or over the Internet. * It behaves like tape - old file versions and deleted files are available. * Old versions of files on the server are stored as changes from the current version, minimising the storage space required on the server. Files are the server are also compressed to minimise their size. * Choice of backup behaviour - it can be optimised for document or server backup. * It is designed to be easy and cheap to run a server. It has a portable implementation, and optional RAID implemented in userland for reliability without complex server setup or expensive hardware.

Xen Networking - Wiki

This guide shows the types of networks Xen can be used on, or to set-up. It uses default configurations of xen, in their most simplest form. Firewalls and security is not discussed here. Feel free to email the author comments at: sburke[at]burkesys.com Xen is used from Debian, and the following setup should be the same for Ubuntu and all other setups of Xen 3.

Funky Routing - OptionC

This has been tested on Xen 2.0.7-1 with Shorewall 3.0.3-1. This Howto presupposes you already have a base Xen install. If not, and you are unfamiliar with Xen, then you probably want to start with the Xen_Debian_Quick_Start. If you do have such a system and you used the default, networking should be running relatively seemlessly. These configurations are only if you want to switch to routed networking (and have a bit more control). There is nothing particularly funky about them, but I haven't had a chance to change it, and that was the first thing that came off of my fingers when I created this page

September 2008

Nimbus

Nimbus provides a free, open source infrastructure for remote deployment and management of virtual machines, allowing you to: * Create compute clouds (make your own EC2 style service). For examples, see the science clouds page. * Deploy "one-click" auto-configuring virtual clusters (see the cloud clusters page). They adapt on the fly into new network and security contexts so you can set them up once and run them over and over again, even across different clouds. * Serve clients that are compatible with the Amazon EC2 service, see What is the EC2 frontend? * Integrate VMs on a set of resources already configured to manage jobs (i.e., already using a batch scheduler like PBS). See What is the Workspace Pilot? * Interface to Amazon EC2 resources, see What is the EC2 backend? * Easily experiment with new remote protocols and backends, see What is the RM API?

Free File Hosting & Video Downloads, Free File Sharing, Online Friends Network - Ziddu

by 1 other (via)
J’ai découvert Ziddu, c’est un site qui vous permet un stockage en ligne et un Uploads illimité avec un compte gratuit et qui ne mets pas de temps d’attente entre les téléchargement pour vos visiteurs et de plus chaque fois que quelqu’un téléchargera votre fichier, vous serez payer, bien sûr pas de quoi changer de voiture ou de maison. Le paiement est de $0.001 par téléchargement et les sommes vous seront envoyés sur votre compte Paypal dès que vous aurez atteint 10 $. Je teste ce service en attendant de trouver LE service qui va bien. Ziddu vous permet de stocker et partager de manière illimités:

A Primer for OpenID with PHP | dev.aol.com | The AOL Developer Network

by 2 others
OpenID is another one of those "cool technologies you've never heard of" type of deals. OpenID is an open source initiative that provides a way for Web users to register their identity in one place and then use that identity anywhere on the Web that supports OpenID. This means that, as a user, you don't have to keep creating (and remembering) new user names and passwords at every site you visit. And, as a service provider, you can identify and authenticate users that show up at your site without having to do all of the user management involved in giving them access. The list of services that support OpenID is growing, but not as fast as it should be given how cool and useful OpenID is. Hopefully, this article will help with that. The idea behind OpenID is fairly simple: a Web user can get an ID from an OpenID provider and use that ID to access any Web application or service that supports OpenID.

Mail Avenger

Mail Avenger is a highly-configurable, MTA-independent SMTP server daemon. It lets users run messages through filters like ClamAV and SpamAssassin during SMTP transactions, so the server can reject mail before assuming responsibility for its delivery. Other unique features include TCP SYN fingerprint and network route recording, verification of sender addresses through SMTP callbacks, SPF (sender policy framework) as a general policy language, qmail-style control over both SMTP-level behavior and local delivery of extension addresses, mail-bomb protection, integration with kernel firewalls, and more.

WiFiDog - Trac

by 2 others
The Wifidog project is an open source captive portal solution. As such, it has three main functions: 1. Location-aware delivery of internal or external content 2. Authentication and authorization 3. Centralized network monitoring

August 2008

About Opsview | opsview.org

by 1 other
Opsview is enterprise network and application monitoring software designed for scalability, flexibility and ease of use. Opsview has been in development since 2003 and is released under the GNU GPL license. Current version is 2.12. Opsview is a fully integrated monitoring tool that incorporates popular Open Source software including Nagios, Net-SNMP and RRDtool. The Catalyst web framework provides an extensible monitoring and configuration user interface. Opsview software is supported on Linux (Debian, CentOS, RHEL and Ubuntu) and Solaris 10. It will monitor all common operating systems including Windows. Opsview extends the capabilities of Nagios in the following ways: * Distributed monitoring with high availability and fail-over * Much improved SNMP support with trap processing with rules engine * API supporting automation of Opsview configuration * Data warehouse for storage of historical performance and event data * Opsview Reports customisable reporting * Powerful configuration and management UI * Extended monitoring UI * Extensible architecture based on Catalyst Web Framework and Altinity middleware software

April 2008

Logmonster FAQ - The Network People, Inc.

Typical Scenario: You have a web server that serves your domain. You write a simple script to restart apache each night and pipe the logs off to your analyzer. It works. ISP/Hosting Scenario: Each server hosts many domains. You may also have load balanced servers (multiple machines) serving each domain. A tool like this is necessary to: 1. collect all the log files from each server 2. split the logs based on the virtual host(s) 3. discard invalid entries (phishing, referrer spam, etc) 4. sort them into chronological order 5. feed logs into analyzer 6. do something with the raw logs (compress, save to vhost dir, etc) [edit]

Openfiler — Openfiler Community

Openfiler is a powerful, intuitive browser-based network storage software distribution. Openfiler ScreenshotsOpenfiler delivers file-based Network Attached Storage and block-based Storage Area Networking in a single framework. Openfiler is built on the rPath Linux metadistribution and is distributed as a stand-alone Linux distribution. The entire software stack interfaces with third-party software that is all open source. File-based networking protocols supported by Openfiler include: NFS, SMB/CIFS, HTTP/WebDAV and FTP. Network directories supported by Openfiler include NIS, LDAP (with support for SMB/CIFS encrypted passwords), Active Directory (in native and mixed modes) and Hesiod. Authentication protocols include Kerberos 5. Openfiler includes support for volume-based partitioning, iSCSI (target and initiator), scheduled snapshots, resource quota, and a single unified interface for share management which makes allocating shares for various network file-system protocols a breeze.

March 2008

Des cartes réseaux comme chez Free

Vous êtes admiratifs des cartes réseaux proposées sur le site de l’opérateur pour afficher en temps (presque) réel l’état de leurs liaisons ? Vous voulez faire la même chose chez vous ? Alors ce tutorial est fait pour vous… Nous allons pour cela utiliser le logiciel open-source WeatherMap4RRD. Ce dernier peut produire des cartes de ce type:

Set Up Gateway Level Virus Security With ClamAV And SafeSquid Proxy | HowtoForge - Linux Howtos and Tutorials

In this HowTo, I will explain how you can secure your network from virus and other malware, by installing ClamAV and integrating it with SafeSquid, to scan all in-coming content for virus, and block all infected content at the HTTP Gateway, even before it enters your network. Virus Security In SafeSquid SafeSquid has built-in connectivity to various daemon based anti virus software like ClamAV, Sophos, Avast, F-Prot, NOD32 and Kaspersky. It also has a universal ICAP (Internet Content Adaptation Protocol) client that can be used to connect to ICAP based security software like Dr.Web ICAP, Kaspersky Antivirus for Proxy Server, Trend Micro InterScan Web Security and Symantec Scan Engine. You can even use multiple anti virus software with SafeSquid to simultaneously scan in-coming content. This does not cause any significant latency, since SafeSquid has a multi-threaded architecture.

February 2008

Greylisting: The Next Step in the Spam Control War

by 1 other
Greylisting is a new method of blocking significant amounts of spam at the mailserver level, but without resorting to heavyweight statistical analysis or other heuristical (and error-prone) approaches. Consequently, implementations are fairly lightweight, and may even decrease network traffic and processor load on your mailserver. Greylisting relies on the fact that most spam sources do not behave in the same way as "normal" mail systems. Although it is currently very effective by itself, it will perform best when it is used in conjunction with other forms of spam prevention. For a detailed description of the method, see the Whitepaper. The term Greylisting is meant to describe a general method of blocking spam based on the behavior of the sending server, rather than the content of the messages. Greylisting does not refer to any particular implementation of these methods. Consequently, there is no single Greylisting product. Instead, there are many products that incorporate some or all of the methods described here.

Globule: the Open-Source Content Distribution Network

by 1 other
Globule is a third-party module for the Apache Web server that allows a given server to replicate its documents to other Globule servers. It takes care of maintaining consistency between the replicas, of monitoring the servers, and of automatically redirecting clients to one of the available replicas. Globule also supports the replication of PHP documents. It runs on Unix and Windows systems.

January 2008

Welcome to the RESTORE Website

RESTORE was developed by Holonyx Ruffdogs and is a free, open source, enterprise network backup and recovery solution for Windows, Novell, Mac OS X (data fork), Unix and Linux systems. RESTORE is scalable to a complete backup solution for multiple workstations, servers, and data centers. It operates over local area networks, wide area networks, and the Internet. Holonyx Ruffdogs is placing RESTORE into the open-source community.

ClusterMonkey - Building A Virtual Cluster with Xen (Part One)

This guide is the first of a series in which I give you detailed step-by-step instructions on how to build a virtual cluster with Xen. The cluster thus built might not be appropriate for your case, and does reflect the author's preferences and/or needs, but if you are new to clusters or Xen, it will hopefully help you get started with both. The goal is to start it simple and then add more complexity as we progress, so in this first guide I show you how to get do the basics: * A Xen installation, the creation of 5 virtual machines (one to act as the master and four slaves), * Shared storage through NFS, * The network configuration on which to build the virtual cluster. The network structure of this first attempt will be very simple, the master having two network cards, one to the outside world and the other one connected through a switch to the slaves.

Using multiple network cards in XEN 3.0

Xen is great. But installing more than one network card became a pain when I tried it the first time. There are some documents describing the principle but I was unable to find a real life example somewhere else. So this is a summary about how it works here now. Using a bridge for a Dom is generally a good idea but then all packets traversing the bridge can be intercepted by any Dom that is using the same bridge. Having a single network card in a Xen landscape also means that theoretically each Dom would be able to sniff all packets traversing this single network card including packets to and from other Doms. A solution is to have more than one network card attached to Xen using a single network card for a single dom. The scenario described here has a server with 3 network cards installed. The first card should be used to access Dom0 and some other DomNs while the second and third network card should be used to purely access Dom1 rsp. Dom2. The Dom configuration file just needs to select the appropriate bridge for each dom.

IPerf: des exemples…

by 1 other
Pour rappel, IPerf est un logiciel client/serveur, il faut donc deux machines positionner aux deux extremités du réseau à tester pour fonctionner (pour l’installation et une rapide introduction, vous pouvez consulter ce billet). Dans les exemples ci-dessous, nous allons considérer que nous allons utiliser deux machines nommées C (avec comme adresse IP: IPC) et S (avec comme adresse IP: IPS).

November 2007

CentOS / Red Hat Linux: Install and manage iSCSI Volume

Internet SCSI (iSCSI) is a network protocol s that allows you to use of the SCSI protocol over TCP/IP networks. It is good alternative to Fibre Channel-based SANs. You can easily manage, mount and format iSCSI Volume under Linux. It allows access to SAN storage over Ethernet. Open-iSCSI Project Open-iSCSI project is a high-performance, transport independent, multi-platform implementation of iSCSI. Open-iSCSI is partitioned into user and kernel parts.

eBox Platform » EBOX PLATFORM

The eBox platform will effectively and easily help you managing the advanced services for your corporate network. Designed with extensibility in mind it offers, among others, these modules: Firewall, Transparent proxy, Traffic shaping, VPN’s, Content filter, NTP Server, Users and groups, Mail server… more modules!

camel's TAGS related to tag network

admin +   ajax +   apache +   api +   appliance +   application +   applications +   backup +   box +   brige +   build +   cacti +   charge +   cluster +   code +   configuration +   control +   debian +   déploiement +   doc +   documentation +   dom +   drop +   environment +   extension +   file +   firewall +   framework +   free +   gateway +   ghost +   google +   gpl +   graph +   greylist +   guide +   hosting +   howto +   http +   image +   install +   interface +   internet +   ipref +   iscsi +   javascript +   linux +   list +   load +   log +   mail +   management +   map +   monitoring +   mp3 +   multicast +   musique +   nagios +   nmap +   online +   openid +   optimize +   password +   performance +   php +   portal +   project +   proxy +   remote +   replication +   reseau +   rss +   sample +   sauvegarde +   script +   secure +   security +   server +   setup +   share +   site +   software +   spam +   storage +   sysadmin +   system +   test +   testing +   tutorial +   ubuntu +   video +   virtualisation +   vmware +   vpn +   web +   wifi +   windows +   xen +