Wednesday, February 29, 2012

Realityloop | Drupal solutions tailored to your needs

Realityloop | Drupal solutions tailored to your needs: "Ægir to be a major time saver and great tool for deplying Drupal websites, so several months ago we started on the path to get Aegir running locally on our Mac's for development purposes, with one caveat.. using NGINX instead of Apache!

Without further ado here is how to do it both by Video and Text instructions, please follow the instructions carefully as this process has been refined to make the process as painless as possible. "

'via Blog this'

What is "reverse DNS" and do I need it? [KB1052]

What is "reverse DNS" and do I need it? [KB1052]: "ard DNS in who points the zone (domain name) to your DNS server.
With forward DNS, you point the zone to your DNS server by registering that domain name with a registrar.
With reverse DNS, your Internet connection provider (ISP) must point (or "sub-delegate") the zone ("....in-addr.arpa") to your DNS server.
Without this sub-delegation from your ISP, your reverse zone will not work.

Reverse DNS is mostly used by humans for such things as tracking where a web-site visitor came from, or where an e-mail message originated etc.
It is typically not as critical in as forward DNS - visitors will still reach your web-site just fine without any reverse DNS for your web-server IP or the visitor's IP."

'via Blog this'

How do I get reverse DNS for my IP addresses delegated to my own DNS server? [KB1187]

How do I get reverse DNS for my IP addresses delegated to my own DNS server? [KB1187]: "Reverse DNS is controlled by whoever "owns" the IP address.
The owner can choose to sub-delegate reverse DNS for a range of IP range to someone else, who in turn can sub-delegate parts of that range further, etc.

IANA ultimately "owns" all Internet IP addresses.
IANA delegates these IP addresses to 5 regional registires; AfriNIC (Africa), APNIC (Asia/Pacific), ARIN (North America), LACNIC (Latin America), and RIPE (Europe, Middle East, Central Asia).
And these registries delegate their IP addresses to backbones providers and ISPs, who delegate to end-users.

So as an end-user, if you want control of reverse DNS for your IP addresses, you need to contact whoever provides you with these IP addresses, and ask them to do a reverse DNS sub-delegation to your DNS servers."

'via Blog this'

How to sub-delegate a reverse zone [KB1240]

How to sub-delegate a reverse zone [KB1240]: "ARIN (which is *usually* a Class B), then you should do your own DNS sub-delegation for any block you reassign that is larger than class B. Everything smaller than that you should use the CNAME method.
I think your distinction comes from the fact that it used to be that (mostly) ARIN assigned Class B's to ISPs who then reassigned to their customers. However, I have worked in multiple locations where we had direct assignments from ARIN that were smaller (/20 to /23). In those cases, when we reassigned parts of our block and wanted to also delegate the reverse DNS to them, we simply added NS records. The number of DNS redirects is kept to a minimum and ARIN doesn't have to get involved in your business.
"

'via Blog this'

How to sub-delegate a reverse zone [KB1240]

How to sub-delegate a reverse zone [KB1240]: "Sub-delegate from less than a class C (< 256 IP addresses)

If you have an IP address range of less than 256 IP addresses, then the best way to sub-delegate reverse DNS for part of that range is to ask your IP address provider to create/change this delegation on their DNS servers.
Technically you could create another level of CNAME redirection similar to "classless IN-ADDR.ARPA delegation" (see above) but this is not recommend because the redirection becomes too deep."

'via Blog this'

How to sub-delegate a reverse zone [KB1240]

How to sub-delegate a reverse zone [KB1240]: "NS: 64/30.33.22.11.in-addr.arpa -> ns1.customer.com
NS: 64/30.33.22.11.in-addr.arpa -> ns2.customer.com
CNAME: 64.33.22.11.in-addr.arpa -> 64.64/30.33.22.11.in-addr.arpa
CNAME: 65.33.22.11.in-addr.arpa -> 65.64/30.33.22.11.in-addr.arpa
CNAME: 66.33.22.11.in-addr.arpa -> 66.64/30.33.22.11.in-addr.arpa
CNAME: 67.33.22.11.in-addr.arpa -> 67.64/30.33.22.11.in-addr.arpa

Your customer would setup a zone called "64/30.33.22.11.in-addr.arpa" on his DNS server with the following records:

SOA: 64/30.33.22.11.in-addr.arpa ...
NS: 64/30.33.22.11.in-addr.arpa -> ns1.customer.com
NS: 64/30.33.22.11.in-addr.arpa -> ns2.customer.com
PTR: 64.64/30.33.22.11.in-addr.arpa -> [reverse DNS name for IP 11.22.33.64]
PTR: 65.64/30.33.22.11.in-addr.arpa -> [reverse DNS name for IP 11.22.33.65]
PTR: 66.64/30.33.22.11.in-addr.arpa -> [reverse DNS name for IP 11.22.33.66]
PTR: 67.64/30.33.22.11.in-addr.arpa -> [reverse DNS name for IP 11.22.33.67]"

'via Blog this'

http://buildasite.us

"$ORIGIN 2.0.192.in-addr.arpa.
@ IN SOA my-ns.my.domain. hostmaster.my.domain. (...)
; ...
1 CNAME 1.A.domain.
2 CNAME 2.A.domain.
; ...
129 CNAME 129.B.domain.
130 CNAME 130.B.domain.
;"

'via Blog this'

http://buildasite.us

" $ORIGIN 128/26.2.0.192.in-addr.arpa.
@ IN SOA ns.B.domain. hostmaster.B.domain. (...)
@ NS ns.B.domain.
@ NS some.other.name.server.too.
;
129 PTR host1.B.domain.
130 PTR host2.B.domain.
131 PTR host3.B.domain."

'via Blog this'

How to delegate a sub-domain to other DNS servers [KB1300]

How to delegate a sub-domain to other DNS servers [KB1300]: "Note that it is important that matching A-records exist for DNS server host names listed in these NS-records.
For the example above, A-records must exist for "ns1.otherdomain.com" and "ns2.otherdomain.com" - in the "otherdomain.com" zone on whatever DNS server is hosting "otherdomain.com".

If the DNS server host names are themselves sub-names of the domain name being delegated, it is necessary to include a copy of these A-records in the parent zone. These are called "glue records".
Otherwise other DNS servers will have no way to find the sub-domain's DNS servers, and therefore no way to resolve records in the sub-domain."

'via Blog this'

How to delegate a sub-domain to other DNS servers [KB1300]

How to delegate a sub-domain to other DNS servers [KB1300]: "
Knowledge Base
Article ID:
1300
Last updated:
17 Sep 2010
Print
E-Mail
Comment
Share
How to delegate a sub-domain to other DNS servers

To do this, you need to add NS-records for the sub-domain name pointing to the host names of the DNS servers hosting the sub-domain - in the parent zone.

In the "DNS records" window right-click the parent zone in the left list and select "New NS-record":
"

'via Blog this'

How to sub-delegate a reverse zone [KB1240]

How to sub-delegate a reverse zone [KB1240]: "For example say you have IP addresses 11.22.33.0/24 (11.22.33.0 to 11.22.33.255) and you want to sub-delegate reverse DNS for 11.22.33.64/30 (11.22.33.64 to 11.22.33.67) to your customer's DNS servers.
Then in your "33.22.11.in-addr.arpa" zone, you would add an NS-record for "64/30.33.22.11.in-addr.arpa" for each of your customers's DNS servers, and a CNAME-record for "XX.33.22.11.in-addr.arpa" pointing to "XX.64/30.33.22.11.in-addr.arpa" for each of the IP addresses in the customer's IP range where XX is the last segment of each IP address like this:

NS: 64/30.33.22.11.in-addr.arpa -> ns1.customer.com
NS: 64/30.33.22.11.in-addr.arpa -> ns2.customer.com
CNAME: 64.33.22.11.in-addr.arpa -> 64.64/30.33.22.11.in-addr.arpa
CNAME: 65.33.22.11.in-addr.arpa -> 65.64/30.33.22.11.in-addr.arpa
CNAME: 66.33.22.11.in-addr.arpa -> 66.64/30.33.22.11.in-addr.arpa
CNAME: 67.33.22.11.in-addr.arpa -> 67.64/30.33.22.11.in-addr.arpa"

'via Blog this'

How do I get reverse DNS for my IP addresses delegated to my own DNS server? [KB1187]

How do I get reverse DNS for my IP addresses delegated to my own DNS server? [KB1187]: "For example if your IP range is 1.2.3.0 to 1.2.3.255, then the reverse DNS sub-delegation is typically done using a DNS zone name "3.2.1.in-addr.arpa".
If you have less than a class C (256 IP addresses), then the reverse DNS sub-delegation uses a slightly different format called "Classless IN-ADDR.ARPA delegation". The exact zone name format used for this vary for each ISP, so it is very important that you setup your reverse zone on your DNS server with the zone name provided by the ISP.
For more on this, please see RFC2317

If you only have one or a few IP addresses, most ISPs will not do reverse DNS sub-delegation for this at all.
However in most cases, they will point reverse DNS for your IP addresses to whatever domain name that you want, at least if you are a business customer."

'via Blog this'

Sunday, February 26, 2012

What is a website hack? How and why do they do it?

What is a website hack? How and why do they do it?: "ining links to the phishing page on your site. When victims log in, thinking it's PayPal, your site steals their login data and relays it to a remote computer. Then the thieves log into the real PayPal accounts and steal the money.
Illegal pornographic content.
Use your webspace to store PHP or Perl scripts like c99 or r57 for use in Remote File Inclusion (RFI) attacks on other sites, making your site look like the attacker.
Your traffic. They put visible links on your pages that visitors on your site can follo"

'via Blog this'

What is a website hack? How and why do they do it?

What is a website hack? How and why do they do it?: "Website hacking is one of the modern enterprises of organized crime, but if you think that means it's being done amateurishly by a bunch of elderly mobsters who took night classes in Computer ABC's to learn what "this Internet Explore thing is", think again. These organizations have professional programmers. Their campaigns to take control of thousands of the world's computers are well planned and sophisticated, drawing on an in-depth knowledge of operating system software, browser vulnerabilities, programming, and even psychology, and their attacks are almost always automated.

Strangely enough, if your site was hacked, it probably wasn't done by a person, but by another computer, which was hacked by another computer, which was hacked by yet another, and somewhere way back in the chain is a programmer who initially unleashed the sequence of events"

'via Blog this'

Use strong (long, random) passwords. Practice them.

Use strong (long, random) passwords. Practice them.: "Many people have heard that passwords should never be written down, but that rule was for U.S. government employees who had to protect secret information from spies rummaging through their desks. You don't have to be concerned about that (I hope).

It is a huge security risk, with a high probability that somebody will exploit it, to use a weak password because you're afraid of writing it down and a weak password is the only kind you can memorize. "

'via Blog this'

Use strong (long, random) passwords. Practice them.

Use strong (long, random) passwords. Practice them.: " to use "dictionary words" (real words that are in dictionaries) in their passwords. The problem is that it only takes a hacker about 250,000 tries to run through every word in the English language, and doing that is usually one of the first steps in a password cracking attack. Trying to choose an "obscure" word is pointless. They'll try them all, anyway."

'via Blog this'

Use strong (long, random) passwords. Practice them.

Use strong (long, random) passwords. Practice them.: "ite about it.

If you have a PayPal or other online banking account, your password is the only thing preventing someone else from logging in as you and stealing all your money.

If you use an online email service like Yahoo, Gmail, or Hotmail, your password is the only thing blocking someone else from reading all your mail, sending mail as you to people you know (or not), registering memberships"

'via Blog this'

Use strong (long, random) passwords. Practice them.

Use strong (long, random) passwords. Practice them.: "They fail to recognize the high value of the data that their passwords are protecting.
They are not aware how many other people want that data, and how determined they are to get it.
They underestimate the sophistication of password hackers and how fast their methods are.
Therefore, to most people, passwords are a nuisance, something that gets in the way of easily reaching desired destinations and doing desired activities. But your passwords are the only things preventing other people from going to those same destinations and doing those same activities AS YOU! "

'via Blog this'

How to prevent your website from getting hacked. Repair damaged site.

How to prevent your website from getting hacked. Repair damaged site.: "
On a Windows system, once a month, while logged into your PC as an Administrator, visit Windows Update to install the latest security patches for Microsoft products, including Internet Explorer.

Keep all your internet-related software such as browsers, plug-ins, and add-ons up to date with the latest security patches. Examples are Adobe Reader, Flash, and Java. You can check whether your Firefox plugins are up to date at Mozilla Plugin Check.
"

'via Blog this'

How to search for backdoor PHP shell scripts on a hacked server

How to search for backdoor PHP shell scripts on a hacked server: "is supplemental information for a series of articles that begins at:

Website security: what to do after your site is hacked, and how to prevent it
Although the article below looks like my others that are intended to be understandable to a novice who is sufficiently motivated to make the attempt, this one might not realistically be in that same category. The information presented below is probably most useful to a person who already knows how to use these search programs, has experience with regular expressions, and has at least some experience running system commands on a webserver, but has not previously put all those things to use for this particular purpose"

'via Blog this'

How to prevent your website from getting hacked. Repair damaged site.

How to prevent your website from getting hacked. Repair damaged site.: "Go to cPanel > Raw Log Manager (the name varies in different cPanel versions).
Check the "Archive Logs..." box.
Uncheck the "Remove the previous month's archived logs..." box.
Click Save
3) Take your website offline

If your pages have become infected with viruses that will attack your site visitors, which is usually the case, you should protect your visitors, and your reputation, by taking your site offline, which involves adding a few lines to your .htaccess and optionally uploading a file."

'via Blog this'

How to prevent your website from getting hacked. Repair damaged site.

How to prevent your website from getting hacked. Repair damaged site.: "What not to do

Don't just repair the damaged files and hope this experience doesn't happen again. That is not enough.

Nobody is ever supposed to be able to add, delete, or change files in your website without your permission. It should never happen, and it usually doesn't. Most websites don't get hacked. If yours did, there is something wrong with it, or with the server, or with the webhost, or with the security on your PC. You have to figure out how this happened so you can prevent it from happening again."

'via Blog this'

NSLOOKUP Command, DNS lookup

NSLOOKUP Command, DNS lookup: "NSLOOKUP programs. NSLOOKUP was originally written on a Unix system, and so is easily run on most Linux variants by simply typing "nslookup" on the command line. On Windows systems you need to search your computer for the program "nslookup.exe". On Macintosh, there are two methods:

In the Terminal application (found at Applications -> Utilities -> Terminal), nslookup is available and used as with any Unix system."

'via Blog this'

Google Public DNS

Google Public DNS: "Why does DNS matter?
The DNS protocol is an important part of the web's infrastructure, serving as the Internet's phone book: every time you visit a website, your computer performs a DNS lookup. Complex pages often require multiple DNS lookups before they start loading, so your computer may be performing hundreds of lookups a day.

Why should you try Google Public DNS?"

'via Blog this'

pm_htmlparser - Solaris package

pm_htmlparser - Solaris package: "Dependencies ( 3 )
Oracle / Sun Solaris SUNW packages not shown.

Software name Description
common Installs some useful standard CSW filesystem symlinks and files
perl A high-level, general-purpose programming language
pm_html_parser HTML-Parser: HTML parser class
Reverse dependencies ( 8 )
Reverse dependencies are Solaris packages that depends on pm_htmlparser.

Software name Description
pm_frontierrpc XML-RPC client interface
pm_htmlscrubber HTML-Scrubber: Perl extension for scrubbing/sanitizing html
pm_htmltree HTML-Tree: Modules for making parse trees from HTML source"

'via Blog this'

Secret Origin of SVG - SVG

Secret Origin of SVG - SVG: "n recent years, SVG has been implemented natively in several browsers, including Opera, Firefox, and WebKit (Safari and Google Chrome); in 2009, Microsoft announced that it too would support SVG natively in Internet Explorer 9, rounding out the major browsers to support SVG, and bringing SVG full circle to its origin."

'via Blog this'

Secret Origin of SVG - SVG

Secret Origin of SVG - SVG: "VML's Influence
Vector Markup Language (VML) originated in Microsoft's Office group as a PowerPoint add-on, and shipped as an ActiveX control in Internet Explorer. VML's element types and compressed path syntax influenced SVG. The SVG WG did some tests on simple XML files both by uncompressed and gzip-compressed, and found that, even compressed, the compact path syntax made a big difference"

'via Blog this'

Secret Origin of SVG - SVG

Secret Origin of SVG - SVG: "Web Schematics, from CCLRC
PGML, from Adobe, IBM, Netscape, and Sun
VML, by Autodesk, Hewlett-Packard, Macromedia, and Microsoft
Hyper Graphics Markup Language, by Orange, PCSL, and PRP
WebCGM, from Boeing, CCLRC, Inso, JISC, and Xerox
DrawML, from Excosoft"

'via Blog this'

W3C SVG Working Group

W3C SVG Working Group: "SVG is a markup language for describing two-dimensional graphics applications and images, and a set of related graphics script interfaces. SVG 1.1 is a W3C "

'via Blog this'

WW Web Design Studios in Pembroke Pines, FL - YellowBot

WW Web Design Studios in Pembroke Pines, FL - YellowBot: "Three Cheers for Walter at WW Web Design Studios!

Three Cheers for Walter at WW Web Design Studios! Walter was comfortable working with a wide range of media including audio, video and graphic (I am a musician; being able to display a wide range of media is a very important aspect of my website). He is very knowledgeable about all aspects of web design and he keeps up with the latest trends and statistics about web building. His recommendations were on target for my business. Walter has an excellent professional demeanor and was patient; he always took the time to explain things thoroughly. Walter went the extra mile and delivered a web site that I am 100% happy with. I highly recommend Walter at WW Web Design Studios."

'via Blog this'

OLAF / Net-DNS - search.cpan.org

OLAF / Net-DNS - search.cpan.org: "
Net::DNS Perl interface to the Domain Name System 0.68
Net::DNS::Domain Domain Name System domains 964
Net::DNS::DomainName DNS domain name wire representation 964"

'via Blog this'

Core principles » OpenCSW Solaris packages

Core principles » OpenCSW Solaris packages: "CSW packages should be as useful to a “newbie” solaris user, as they are to the 10-year veteran in a “fortune 500″ company. Neither should be favoured to the detriment of the other.

Tech note: the “accomodating NFS-sharing out /opt/csw”, means that whenever reasonable, a single package for all solaris revs of a cpu, is preferred over multiple versions of a package. In this way, a site can NFS-share out a single “full install” of /opt/csw to Solaris 9, and 10 machines equally. Having a single filesystem, instead of multiple, is much more efficient use of NFS-server caching."

'via Blog this'

Core principles » OpenCSW Solaris packages

Core principles » OpenCSW Solaris packages: "W packages should be as useful to a “newbie” solaris user, as they are to the 10-year veteran in a “fortune 500″ company. Neither should be favoured to the detriment of the other.

Tech note: the “accomodating NFS-sharing out /opt/csw”, means that whenever reasonable, a single package for all solaris revs of a cpu, is preferred over multiple versions of a package. In this way, a site can NFS-share out a single “full install” of /opt/csw to Solaris 9, and 10 machines equally. Having a single filesystem, instead of multiple, is much more efficient use of NFS-server caching."

'via Blog this'

About » OpenCSW Solaris packages

About » OpenCSW Solaris packages: "OpenCSW aims to produce an easy to use open source software distribution installable on top of Solaris and Solaris-based systems, developed by a transparent and democratic community. OpenCSW is dedicated to working closely with upstream projects to improve portability of open source software.

OpenCSW Solaris packages are provided in the OS-native SVR4 format. We publish both binary packages and source package definitions, making it possible for others to build on top of OpenCSW’s work."

'via Blog this'

pm_net_dns - Solaris package

pm_net_dns - Solaris package: "Dependencies ( 4 )
Oracle / Sun Solaris SUNW packages not shown.

Software name Description
common Installs some useful standard CSW filesystem symlinks and files
perl A high-level, general-purpose programming language
pm_digesthmac Digest-HMAC: Keyed-hashing for message authentication
pm_netip Net-IP: Perl extension for manipulating IPv4/IPv6 addresses"

'via Blog this'

CVS Repository

CVS Repository: "This is a WWW interface for CVS repositories. You can browse the file hierarchy by following directory links (which have slashes after them, e.g. src/). If you follow a link to a file, you will see its revision history. Following a link labeled with a revision number will display that revision of the file. In the revision history view, there is a link near each revision to display diffs between that revision and the previous one, and a form at the bottom of the page that allows you to display diffs between arbitrary revisions."

'via Blog this'

Platforms Supported by NetBSD

Platforms Supported by NetBSD: "Tiers
Tier I: Focus — support is part of NetBSD's strategy
Tier II: Organic — evolving at its own pace
Tier III: Life Support — severely incapacitated or broken
CPU architectures
Ports by CPU architecture"

'via Blog this'

How to get NetBSD

How to get NetBSD: "Downloading NetBSD 5.1.2

Download an ISO image via BitTorrent or FTP. If using FTP, choose a server from the list of mirrors, change into the 5.1.2 directory, and fetch the ISO image for the relevant port.
Download NetBSD 5.1.2 via FTP or HTTP: Change into the NetBSD 5.1.2 directory and fetch the files for the relevant port.
NetBSD 5.1.2 (and previous releases) can also be ordered as CD-ROM sets.

More information about the NetBSD releases:

NetBSD release glossary and graphs"

'via Blog this'

dnswalk - Solaris package

dnswalk - Solaris package: "Contact maintainer
View files in package
Dependencies ( 3 )
Oracle / Sun Solaris SUNW packages not shown.

Software name Description
common Installs some useful standard CSW filesystem symlinks and files
perl A high-level, general-purpose programming language
pm_netdns Transitional package. Content moved to CSWpm-net-dns"

'via Blog this'

Free IP Address Tracker from SolarWinds

Free IP Address Tracker from SolarWinds: "IP Address Space Management Simplified

Does managing your IP address space with spreadsheets remind you of a visit to the dentist? Necessary, but usually painful? As if keeping the network running in tip-top condition wasn’t enough, you have to spend precious time wading through home-grown IP address tools to track down conflicting addresses and to see which ones are free"

'via Blog this'

The FreeBSD Project

The FreeBSD Project: "FreeBSD® is an advanced operating system for modern server, desktop, and embedded computer platforms. FreeBSD's code base has undergone over thirty years of continuous development, improvement, and optimization. It is developed and maintained by a large team of individuals. FreeBSD provides advanced networking, impressive security features, and world class performance and is used by some of the world's busiest web sites and most pervasive embedded networking and storage "

'via Blog this'