Sunday, March 6, 2011

Squid Analysis Report Generator (SARG) and Webmin

The Squid Analysis Report Generator (SARG) enables you to see your Squid users internet usage. SARG provides many informations about Squid users activities like times, bytes, sites, etc. This article will show you how to use SARG through Webmin, a web-based interface for administering Linux.


Installing Webmin and SARG

RPM Forge 
1. Add the RPMforge repository into Yum. We will be getting the SARG RPM package for Red Hat/CentOS from RPMforge.
Yum install SARG 
2. From a terminal window, type in the command below to install SARG.
yum install sarg
Webmin 
3. Install Webmin. After installing, login to Webmin. Webmin will enable us to control who gets access to the Squid reports. We will also have an easy to use web-based interface for configuring the report format.
SARG configure 
4. Click Un-used modules in the side bar. Next click Squid Report Generator. We need to configure SARG so click module configuration.
SARG configure 
5. Change the value of Full path to SARG configuration file to /etc/sarg/sarg.conf then click the Save.
NoteNext time you need to use the Squid Report Generator, look for it under Servers instead of Un-used modules.

Generating a report

SARG 
1. To generate a report, click the Generate Report Now button.
SARG 
2. Next, click View completed report.
SARG 
3. Click the latest generated report.
SARG 
4. Review the generated report.

Sunday, February 13, 2011

Online Diagram Software and Flowchart Software - Gliffy

Online Diagram Software and Flowchart Software - Gliffy
Need a replacement for your Visio software? Here's an online application where everything you need for illustrations, visualization and diagramming capabilities can be found from a single site.
It's a cloud application...
Well apparently, I just used some proprietary application such as Visio2007 when I'm using a Windows platform. But since most of the time I use Linux, I tend to use Dia which is also a good free application but not that as graphically smooth like Visio. Anyway, it doesn't really matter how it looks because my main purpose is to have a diagram for my analytical info and design. And until I found Gliffy which is I think its been there for quite sometime.

I made a sample layout for my trial period.

Sunday, January 9, 2011

Convert AVI to MP4 in Fedora 14 Linux

The Mplayer program includes a utility for converting multimedia from one format to another called MEncoder. The MEncoder utility can be used to convert AVI video files to the MP4 format from the command line. The resulting video can be played on Apple iPods and other handheld devices. The MP4 format is based on the Apple Quicktime container format. MP4 can contain audio only, or audio and video together. However, the standard is to use MP4 to refer to video files and M4A to refer to audio only files.
Difficulty: Easy

Instructions

Things You'll Need:

* MPlayer, MEncoder

1.Download and install MPlayer through your distribution's software repository, or from the MPlayer website.
2.Open a terminal window.
3.Type the command "mencoder input.avi -o output.mp4 -oac copy -ovc lavc -lavcopts vcodec=mpeg1video -of mpeg" to convert the AVI video to MP4.
4.Type the command "mplayer output.mp4" to test the video.
5.Type the command "exit" to close the terminal session.


If you dant have Mplayer installed, just type in terminal
# yum install mplayer mencoder

(must be root to install)

Saturday, January 8, 2011

Old schematics from my 10 year old backup

I have here some of my old schematic diagrams which I compiled around 10 years ago. I have decided to post here as another copy from my angelfire.com account  but in no particular order/details.

For those electronic enthusiast, you may find below classic diagrams useful on some of homebrew projects and repairs.


200W PC ATX Power Supply

35Amps, 13.8VDC Regulated Power Supply for HAM/Amateur Radio Enthusiast

Hi-Power Amplifier - Diect-Coupled railing output

Thursday, December 30, 2010

'Data Cap' - NTC's proposed data caps violate consumer rights, lawyer says

I've been a 3G broadband user since 2007, and now such policy has to be materialized in-order to serve millions of user wirelessly.

If you observe those Blackberry users are kinda tech savvy fond of twitting and posting stats on FB and same with iPhone users, Smartphones has began since around +5 years ago and yet the real bandwidth which is capable of, can only be experienced smoothly right now.

Imagine how many users on mobile passing to all that microwave repeaters/cellsites with different comm-features (text, calls & internet) if without certain restrictions, real heavy net traffic can be experienced.

Although, in near future, much larger data bandwidth can be serve to us like HSPA, HSUPA & 4G.





Thursday, November 18, 2010

Install Squirrel Mail on Ubuntu 10.04 server

To install the SquirrelMail webmail client, run

aptitude install squirrelmail

Then create the following symlink...

ln -s /usr/share/squirrelmail/ /var/www/webmail

... and configure SquirrelMail:

squirrelmail-configure

We must tell SquirrelMail that we are using Courier-IMAP/-POP3:

SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >>
<-- D


SquirrelMail Configuration : Read: config.php
---------------------------------------------------------
While we have been building SquirrelMail, we have discovered some
preferences that work better with some servers that don't work so
well with others. If you select your IMAP server, this option will
set some pre-defined settings for that server.

Please note that you will still need to go through and make sure
everything is correct. This does not change everything. There are
only a few settings that this will change.

Please select your IMAP server:
bincimap = Binc IMAP server
courier = Courier IMAP server
cyrus = Cyrus IMAP server
dovecot = Dovecot Secure IMAP server
exchange = Microsoft Exchange IMAP server
hmailserver = hMailServer
macosx = Mac OS X Mailserver
mercury32 = Mercury/32
uw = University of Washington's IMAP server
gmail = IMAP access to Google mail (Gmail) accounts

quit = Do not change anything
Command >>
<-- courier


SquirrelMail Configuration : Read: config.php
---------------------------------------------------------
While we have been building SquirrelMail, we have discovered some
preferences that work better with some servers that don't work so
well with others. If you select your IMAP server, this option will
set some pre-defined settings for that server.

Please note that you will still need to go through and make sure
everything is correct. This does not change everything. There are
only a few settings that this will change.

Please select your IMAP server:
bincimap = Binc IMAP server
courier = Courier IMAP server
cyrus = Cyrus IMAP server
dovecot = Dovecot Secure IMAP server
exchange = Microsoft Exchange IMAP server
hmailserver = hMailServer
macosx = Mac OS X Mailserver
mercury32 = Mercury/32
uw = University of Washington's IMAP server

quit = Do not change anything
Command >> courier

imap_server_type = courier
default_folder_prefix = INBOX.
trash_folder = Trash
sent_folder = Sent
draft_folder = Drafts
show_prefix_option = false
default_sub_of_inbox = false
show_contain_subfolders_option = false
optional_delimiter = .
delete_folder = true

Press any key to continue...
<-- ENTER


SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >>
<-- S


SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >> S

Data saved in config.php
Press enter to continue...
<-- ENTER


SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >>
<-- Q

Afterwards you can access SquirrelMail under http://server1.example.com/webmail or http://192.168.0.100/webmail:

Monday, November 15, 2010

How to add a user to the sudoers list

How to add a user to the sudoers list? Beleive it or not, this is a fairly common question and in all reality the answer is quite simple. Adding a user to the sudoers list on a fully installed Linux system such as Debian is only possible via the command visudo. Users in the sudoers list are allowed the privileges to run commands and open files as the root user. In the following quick tutorial, we will show you how adding a new sudoer is quickly done.

How to add a user to the sudoers list:

  1. Open a Root Terminal and type visudo (to access and edit the list)
  2. Using the up/down arrows, navigate to the bottom of the sudoers file that is now displayed in the terminal
  3. Just under the line that looks like the following:
  4. root ALL=(ALL) ALL

  5. Add the following (replacing user with your actual username):
  6. user ALL=(ALL) ALL

  7. Now press Ctrl+X and press Y when promted to save

That's it, your new user now has root privileges!

Example Sudoers Screenshot:

Adding a new sudoer

Saturday, November 6, 2010

My old server room

Back in 2004, this is my training grounds after my contract in Toshiba as ISG data center support. I am the MIS assistant of a multi-national company that has four branches located in different areas in Laguna. I was stationed on their logistics head quarters in laguna technopark.

My network hosts 3 branches, we are the 4th and act as main host provider to Binan, Cabuyao and Calamba factories; all branches interconnected via private leased line. We have ATM direct network from HK and VPN's serving VoIP phones between HK, UK and PH.

It was a very simple network consisting one primary domain controller (windows 2000 server), and four mail servers running POP3 iMAIL.

My main network head units consists of cisco routers/catalyst, HP/Compaq server, 3com and Cisco layer 3switches and few Nokia modems. Cisco configs is the hardest part when we started with the setups.

I have here a short video that was taken secretly before it goes for rehabilitation and shelve it in a ventilated cabinets.

Saturday, October 2, 2010

Encrypt Your E-Mail



Your e-mail holds the bulk of your online information. Unfortunately, that information is out in the open. That is, unless you decide to encrypt it so only you can determine who can read it.

The growth of the internet, and e-mail in particular, has given rise to numerous types of encryption software for the secure transmission of information. There are various reasons for wanting to encrypt your e-mail today:

  1. Client confidentiality. You need to transmit sensitive commercial information over e-mail, and you don't want people who sneak onto or steal your computer to compromise your clients' privacy.
  2. You want to avoid prosecution by the government. Perhaps you you live under an authoritarian regime that is trying to infringe on your civil liberties. We'll give you the benefit of the doubt here.
  3. You are a business owner or the head of an organization targeted by digital con artists and you need a system to authenticate your identity amongst your clientele.
  4. You read "Cryptonomicon" by Neal Stephenson and you geeked out on the encryption descriptions
What You'll Need

Encryption on the internet is not unlike your typical lock and key combination. What you'll need to do is choose the lock, in the form of encryption platform, and then generate a key to lock (encrypt) or unlock (decrypt) your data.

Choose your lock

There are various encryption platforms. Some popular standards include:

  • Advanced Encryption Standard (AES)
  • Triple Data Encryption Algorithm (TDEA), X.509
  • Various flavors of Pretty Good Privacy (PGP), including Open PGP and Gnu Privacy Guard (GPG)

Because encryption ought to be tightly integrated with your e-mail client, the standard you end up using is probably going to be determined by what works with your e-mail client of choice. For example, Microsoft Outlook comes with TDEA encryption, Apple's Mail supports X.509 encryption, and there is a GPG add-on for Firefox that works with Google's GMail.

Create your keys

To get started with encryption, you need to create an encryption key pair, which is like a digital signature and pass code. Your e-mail client or stand-alone encryption software might be able to create these keys for you or you may be directed to the web site of a certificate authority such as Thawte or Verisign to create and store your key.

Enter your full name, your e-mail address, and create a pass phrase that will ensure that only you can use your key. Your pass phrase should be fairly long and complicated - you shouldn't use names, dates, addresses, or anything else that can be easily guessed at. One simple method is to use mondegreens; you know, those misinterpreted words you used to sing along with, until you learn what the real lyrics really are and become terribly embarrassed. For example, Jimi Hendrix's "'scuse me, while I kiss this guy."

Certificate authorities create a key pair of both a private and a public key for you. The only people who should have access to your private key are you and the certificate authority; this key is what allows you to encrypt files and decrypt files meant just for you. The public key is freely distributed to anyone you correspond with; it allows other people to check your digital signature to confirm that you are the actual author, and it allows them to encrypt files and messages that only you can decrypt. Depending on the encryption standard you are using, you may have to send people your public key by attaching a file, or it may be automatically downloaded from the certificate authority's public key server.

Start encrypting!

The two most common functions of encryption software are Signing and Encrypting. Signing an e-mail lets anyone who has access to your public key decrypt the message, and serves to confirm that you are the original author. Signing is useful in situations where unsavory characters may be sending out fraudulent information in your name and you need people to know what information is really coming from you. Encrypting scrambles plain text or file attachments and only allows the intended recipient to access them. Encrypted files and messages are also signed as a matter of course, so the recipient can also confirm that the message they are decoding did actually come from you.

In the Future

As computers get more powerful, it becomes easier to crack encryption. In fact, one of the very first digital computers ever created, Colossus, was used to decrypt German codes during World War II. Typically as code breakers get more powerful, encryption systems just use longer and longer codes to slow down brute-force attempts to guess them: right now most desktop encryption software offers up to 4,096-bit encryption.

An entirely new system of encryption is being developed that takes advantage of the principles of quantum mechanics: quantum encryption creates an entangled key pair of qubits that is shared among two parties. These entangled qubits allow the two parties to share information securely, and - due to the peculiar role observation plays in quantum mechanics - also alerts them if anyone is attempting to eavesdrop on their secure channel. Quantum cryptography is already running on experimental military and university communication networks, and if the example of the World War II code-breaking machines is any indication, it's only a matter of time until the technology trickles down to consumers.