Finally the help of IT is here

Blog of computer solutions.

Mail server installation EXIM4

Posted by Pablo Gonzalez on July 3 2012rd

Good afternoon, in this article we will see how to makeMail server installation EXIM4with a dynamic IP address.

Personally, I do not recommend this configuration because we have serious problems blocking blacklist, so, this article has only academic value. To inspire the reader to other servers and services.

We start from an installation of GNU / Debian default 6 in an old notebook.

Add repositories / Etc / apt / sources.list

deb http://ftp.fr.debian.org/debian/ squeeze main contrib non-free
deb-src http://ftp.fr.debian.org/debian/ squeeze main contrib non-free

rename with # the line that begins with deb cdrom.

We enter the following command with the username root:

aptitude update (With this update we have added the repositories above).

Install the no-ip client, since I have dynamic ip address and in many cases (the vast majority) must match the domain to your ip when mail is delivered, otherwise, the target server will consider it as spam. I assume that you generate a suitable account if necessary.

We can decompress with xvzf tar noip-duc-linux.tar.gz and we will create a folder.

We continue with the following commands:

cd-2.1.9-1 noip

make install noip2.c

We requested email address, password and the update interval, which in my case I have considered going down to 5. We also ask if you want to run any programs in each update, and in my case I select No.

We generated the configuration file non-ip2.conf. Megacrack read »

tags: , , , , , , , , , , , ,
Posted by e-mail, GNU / Linux, Linux | No Comments »

Early free software II

Posted by Pablo Gonzalez on June 9th 2012

"If you have an apple and I have another apple and we exchange the two continue to have an apple, but if you have an idea and I have another idea we'll both have two ideas."

Bernard Shaw

This is one of my favorite lines, but in the times in which we are, where the licenses and rights are the order of the day and we played a lawsuit, this is not so easy.

For this reason, in this article we will deal especially basic legal issues in subsequent articles and talk of free licenses.

 

Intellectual property:

We can identify the intellectual property copyright (copyright) that protect the works from unauthorized copying.

Intellectual property is protected and coordinated by the World Intellectual Property Organization (WIPO) by the agreements which are forced in the participating countries of the World Trade Organization to comply.

The Universal Declaration of Human Rights recognizes in its articles the right to moral and material rights of their works are protected, so that his philosophy is to try the authors of the idea "reward". Remarkably, when the promotion ends or validity, intellectual property expires.

The mission is that through intellectual property can provide a competitive advantage to the author of the idea to exploit during the term of intellectual property.

 

Copyright:

Initially it was created to protect rights to authors of art and books.

This protection helps protect ideas, expressions and knowledge. What you need to be very, very clear it is that these rights are immediately begin to publish the work, but not put (c) in our work.

Example, I make a picture and the public without indicating that the public domain or any other license, this photograph has a copyrigh, copyright preventing any use without notice and in case of breaching it can proceed with a lawsuit.

If you want to protect a copyrighted work recommend going to the notary and protect it. In this way we can show later copies.

Formalized by the Berne Convention in 1886.

 

Patents and trademarks:

At this point I will be very brief, patents and trademarks are registered because normally represents quality and value in a market.

The curiosity here is that this type of law is provided from the 15 25 the years.

View this site http://www.oepm.es/es/invenciones/index.htmlas it is very interesting to search for patents and trademarks in Europe and USA we can use the pagehttp://www.uspto.gov/

As an example, I searched the trademark "LinEx" distribution created in Extremadura for a very interesting project discussed below, and I found:

LINEX

  • Case file:M 2449568
  • Headline:COUNSELING EDUCATION, SCIENCE AND TECHNOLOGY BOARD EXTREMADURA THE
  • Distinctive Type:D
  • Situation:IN FORCE: PUBLICATION CONCESSION
  • Date of situation:16 / 11 / 2002
  • Nice Classification:09
  • Products / Services:09 OPERATING SYSTEM AND APPLICATIONS INFORMATICAS GNU / LINUX, DEBIAN BASED DISTRIBUTION 2.2 "POTATO".

Hence, we can extract much information, but something that is not so obvious is the "Nice Classification" which is a standard that informs us of the classification of this brand. To view this classification see the following page:

http://tramites.oepm.es/clinmar/euroclassNiza/inicio.action

 

Trade secret:

Based on the advantage in that the company protects their works through industrial property.

A typical example may be the evil empire, where their proprietary programs compiled and provided to us to reverse engineer is considered a crime.

 

Let's look at the license for example Windows XP, paragraph 4:

4. LIMITATIONS ON REVERSE ENGINEERING, AND DECOMPILATION

DISASSEMBLY. You may not reverse engineer, decompile, or

disassemble the Software, except and only to the extent that such activity is expressly

permitted by applicable law notwithstanding this limitation.

 

In the next issue we start with the free licenses, definitions, types and compatibility.

 

I hope you find it useful.

tags: , , , , , , , , ,
Posted by GNU / Linux, gnu / linux, Linux | No Comments »

Training program on free software (Introduction)

Posted by Pablo Gonzalez on June 8th 2012

Some time ago, my colleague told me xavixaus help in the development of the environment Free softwarefor this blog.

Well, it's already time to start it, and first I would like to comment briefly on how we will organize it.

First we will make an introduction to this world and see some aspects legalwe need to know, whether we are users and programmers, case studies to try to put the different concepts and continue to appreciate Basic management environments GNU / Linux(Choice of our distribution, installation, basic commands and routing).

The second part of this chapter will be the advanced administration in which address issues such as installation and compilation of the kernel and modules, NIS servers, exim4, LDAP, WebDav and Apache, authentication, snort, MySQL, subversion ... and something more ...

In the next module we will give some management, A staple for a migration to free software environment, with guidelines and best practice guidelines. At this point we will refer to success stories in government.

I think it's also interesting to do a course on free software utilities such as DIA, LibreOffice, forges where to find substitutes to proprietary software, etc ...

Finally, I would like to end articles with networks, focusing on routers, security (basic), audio, video and IP telephony.

It is an ambitious plan for each chapter because many items will be generated and we would like to implement a test environment to display settings and "tweak" the system. This last point for now is an idea. We will gradually giving.

I hope you enjoy it and bear your opinions through comments.

tags: , , , , , , , , , , , ,
Posted by GNU / Linux, gnu / linux, LDAP, Linux | 1 Comment »

How to repair linux filesystem.

Posted by Xaus Xavier Nadal 3rd on January 2012

Good,

I put the steps I followed to repair a Linux file system.

The first thing to do is remove the corrupt partition.

umount / dev /sda5

 

Where sda5 is the partition defective or corrupt.

The second step is to use what we call chkdsk in windows for linux.

fsck -T ext3 / Dev /sda5, You can also use fsck.ext3 / dev / sda5

 

The parameter -T ext3 it must define if the partition is in ext3 since by default the fsck assumes that type of partitioning is ext2.

If you are not sure which type of partitioning you have with the mount command could be tested.

I hope I was helpful.

Until next time.

tags: , , , , , , , , ,
Posted by Linux, Linux - Ubuntu | No Comments »

Accessing a shared folder from the command line in Linux

Posted by jl on October 6 2011th

Hello everyone

There are times that are in the command line of a Linux computer and the power may be of interest to access a shared folder. The environment in which we find is windows server that has a shared folder and ncuentran teams within a domain.

To do what we have to do is mount the shared folder on the Windows server on the Linux machine. The steps to do this are:

1.- Install the smbfs package that will allow us to use the cifs and smb protocols to connect to Windows servers.

# aptitude install smbfs

2.- create the directory on the Linux machine where we want to mount the shared folder

#mkdir / tmp / carperta_de_montaje

Run the following command 3.-

#mount -t smbfs {|} // server cifs / shared_folder / tmp / carperta_montaje -o user = "domain \ user"

Where we indicated that the network protocol used to connect,smbfs o cifs (Cifs is an evolution of smb), the path where the shared folder, the directory where we will mount the folder and the domain user with permissions to access.

Once launched it will ask the user's domain password with which we connect and already we can go to the mount point, # cd / tmp / carpeta_montajeand see the contents of the shared directory

4.- when we're done using it can remove the mount point with the command

#umount / tmp / carperta_montaje

 

Until next time

a greeting

tags: , , ,
Posted by Linux, Linux - Ubuntu | No Comments »