If you want a personal VPN solution that you can host at home or on a VPS, PPTP is the easiest way to do it. Or if you want a VPN test subject, PPTP is also the easiest way to do it. The following will detail how to set up a PPTP server on a Debian (version 7.8) machine. To be understood that choosing PPTP as a VPN doesn’t guarantee a really secure solution , but it can save time and setup issues associated with other alternatives. For a more secure alternative over PPTP, I’d recommend OpenVPN. Continue reading “Setting up and debugging a PPTP server on Debian”
03As mentioned in a previous articles on hosting control panels to use for your VPS , buying a VPS is as affordable as or even cheaper than shared-hosting. This is only when it comes down to money/month or year. Other costs or resources would include time and knowledge to actually setup and maintain your VPS. A great way to start lowering those costs is by having a look at free alternatives to CPanel. Continue reading “7 things I look for at a VPS provider”
We all receive spam email. Everyday. Typically they end up in the “spam” folder and we never even get to see them. I never did really care about them and normally erase as soon as possible. This one got my attention as it ended up in my inbox on of my fictive emails (doesn’t everybody has that?) and I decided to play along to see where is everything going. Continue reading “Email scams – getting money from Industrial and Commercial Bank of China”
Lately I’ve been intrigued by how affordable (or even free) a VPS is nowadays and how (relatively) easy can one host his own website(s). This is determined mostly by ones technical expertise and the tools available at hand. To better manage several websites and everything related to them (DNS,FTP,databases,email and so on) one would use a “hosting control panel”. Tools that hosting providers use to manage customers, customer websites, resellers and tools that are also being made available to end-users to manage their website. The most known in the industry would be CPanel (end-user tool) and WHM (administrative control panel). Their prices can get pretty high and would mostly be suited for companies specializing in web services / hosting.
A “must have” should be placed in relation to the users needs. In my case, my requirements from an email client are not that diverse, but inclined towards security and efficiency. Continue reading “Must have plugins for Thunderbird”
Several months ago, I got my Bachelor in Product development and Technology Integration with a project on IT automation. Admin-in-a-Box – Provisioning and cloning for SMBs , a project that aims at increasing efficiency in IT department in Danish small and medium sized businesses.
The Linux crontab is relatively easy to understand. Still, it can generate a lot of frustration when debugging or even when creating an entry. In the present article I have gathered resources and information that I’ve used over the time when playing with cronjobs.
The present article describes how to use mail encryption with Thunderbird on Ubuntu 14.04. It assumes that you have the below mentioned prerequisites in place and you have an idea about how it works. If not, please consult the links at the ending of the article, under “Resources”. Continue reading “Sending encrypted emails using Thunderbird”
.htaccess is a file used with Apache servers to set configurations on a directory level. This is particularly useful when you are setting specific configuration for different directories. It is also useful (and recommended to be used only) in case you don’t have access to the main configuration file for Apache – which is mostly the case covering websites on shared-hosting accounts. There are a lot of tricks you can do with the .htaccess file like password protecting a directory, changing the way your hosted file extensions appear to users and even securing your WordPress website against malicious scans and requests. Continue reading “The most complete .htaccess generator ever – v0.1”
Even though I was using Linux for a while, I really didn’t got the idea with the file permissions clear from the beginning. Or even after a year. Changing permissions to allow certain things to happen (e.g. execute a script file) was embedded into my habits, but without really understanding what was happening. Nor did I was that interested to find out, but there is a point where you really want to know what you’re doing and not run commands just because you want “stuff working”.