Finally the help of IT is here

Blog of computer solutions.

Mail server installation EXIM4

Posted by Pablo Gonzalez on July 3 2012rd

Good afternoon, in this article we will see how to make Mail server installation EXIM4 with a dynamic IP address.

Personally, I do not recommend this configuration because we have serious problems blocking blacklist, so, this article has only academic value. To inspire the reader to other servers and services.

We start from an installation of GNU / Debian default 6 in an old notebook.

Add repositories / Etc / apt / sources.list

deb http://ftp.fr.debian.org/debian/ squeeze main contrib non-free
deb-src http://ftp.fr.debian.org/debian/ squeeze main contrib non-free

rename with # the line that begins with deb cdrom.

We enter the following command with the username root:

aptitude update (With this update we have added the repositories above).

Install the no-ip client, since I have dynamic ip address and in many cases (the vast majority) must match the domain to your ip when mail is delivered, otherwise, the target server will consider it as spam. I assume that you generate a suitable account if necessary.

We can decompress with xvzf tar noip-duc-linux.tar.gz and we will create a folder.

We continue with the following commands:

cd-2.1.9-1 noip

make install noip2.c

We requested email address, password and the update interval, which in my case I have considered going down to 5. We also ask if you want to run any programs in each update, and in my case I select No.

We generated the configuration file non-ip2.conf. Megacrack read »

tags: , , , , , , , , , , , ,
Posted by e-mail, GNU / Linux, Linux | No Comments »

Early free software II

Posted by Pablo Gonzalez on June 9th 2012

“Si tu tienes una manzana y yo tengo otra manzana y la intercambiamos, los dos seguimos teniendo una manzana, pero si tu tienes una idea y yo tengo otra idea los dos tendremos dos ideas”.

Bernard Shaw

This is one of my favorite lines, but in the times in which we are, where the licenses and rights are the order of the day and we played a lawsuit, this is not so easy.

For this reason, in this article we will deal especially basic legal issues in subsequent articles and talk of free licenses.

Intellectual property:

We can identify the intellectual property copyright (copyright) that protect the works from unauthorized copying.

Intellectual property is protected and coordinated by the World Intellectual Property Organization (WIPO) by the agreements which are forced in the participating countries of the World Trade Organization to comply.

The Universal Declaration of Human Rights recognizes in its articles the right to moral and material rights of their works are protected, so that his philosophy is to try the authors of the idea "reward". Remarkably, when the promotion ends or validity, intellectual property expires.

The mission is that through intellectual property can provide a competitive advantage to the author of the idea to exploit during the term of intellectual property.

Copyright:

Initially it was created to protect rights to authors of art and books.

This protection helps protect ideas, expressions and knowledge. What you need to be very, very clear it is that these rights are immediately begin to publish the work, but not put (c) in our work.

Example, I make a picture and the public without indicating that the public domain or any other license, this photograph has a copyrigh, copyright preventing any use without notice and in case of breaching it can proceed with a lawsuit.

If you want to protect a copyrighted work recommend going to the notary and protect it. In this way we can show later copies.

Formalized by the Berne Convention in 1886.

Patents and trademarks:

At this point I will be very brief, patents and trademarks are registered because normally represents quality and value in a market.

The curiosity here is that this type of law is provided from the 15 25 the years.

View this site http://www.oepm.es/es/invenciones/index.html ya que es muy interesante para buscar patentes y marcas en Europa, y en USA podemos usar la página http://www.uspto.gov/

As an example, I searched the trademark "LinEx" distribution created in Extremadura for a very interesting project discussed below, and I found:

LINEX

  • Case file: M 2449568
  • Headline: CONSEJERIA DE EDUCACION, CIENCIA Y TECNOLOGIA DE LA JUNTA DE EXTREMADURA
  • Distinctive Type: D
  • Location hotel: EN VIGOR: PUBLICACION CONCESION
  • Date of situation: 16/11/2002
  • Nice Classification: 09
  • Products / Services: 09 SISTEMA OPERATIVO Y APLICACIONES INFORMATICAS GNU/LINUX, BASADOS EN LA DISTRIBUCION DEBIAN 2.2 XCHARXPOTATOXCHARX.

Hence, we can extract much information, but something that is not so obvious is the "Nice Classification" which is a standard that informs us of the classification of this brand. To view this classification see the following page:

http://tramites.oepm.es/clinmar/euroclassNiza/inicio.action

Trade secret:

Based on the advantage in that the company protects their works through industrial property.

A typical example may be the evil empire, where their proprietary programs compiled and provided to us to reverse engineer is considered a crime.

Let's look at the license for example Windows XP, paragraph 4:

4. LIMITATIONS ON REVERSE ENGINEERING, AND DECOMPILATION

DISASSEMBLY. You may not reverse engineer, decompile, or

disassemble the Software, except and only to the extent that such activity is expressly

permitted by applicable law notwithstanding this limitation.

In the next issue we start with the free licenses, definitions, types and compatibility.

I hope you find it useful.

tags: , , , , , , , , ,
Posted by GNU / Linux, gnu / linux, Linux | No Comments »

Training program on free software (Introduction)

Posted by Pablo Gonzalez on June 8th 2012

Some time ago, my colleague told me xavixaus help in the development of the environment Free software para este blog.

Well, it's already time to start it, and first I would like to comment briefly on how we will organize it.

First we will make an introduction to this world and see some aspects legal que necesitamos conocer, tanto si somos usuarios como programadores, intentaremos poner casos prácticos para que se aprecien los diferentes conceptos y continuaremos con la Basic management environments GNU / Linux (elección de nuestra distribución, instalación, comandos básicos y routing).

The second part of this chapter will be the advanced administration in which address issues such as installation and compilation of the kernel and modules, NIS servers, exim4, LDAP, WebDav and Apache, authentication, snort, MySQL, subversion ... and something more ...

In the next module we will give some management, A staple for a migration to free software environment, with guidelines and best practice guidelines. At this point we will refer to success stories in government.

I think it's also interesting to do a course on free software utilities such as DIA, LibreOffice, forges where to find substitutes to proprietary software, etc ...

Finally, I would like to end articles with networks, focusing on routers, security (basic), audio, video and IP telephony.

It is an ambitious plan for each chapter because many items will be generated and we would like to implement a test environment to display settings and "tweak" the system. This last point for now is an idea. We will gradually giving.

I hope you enjoy it and bear your opinions through comments.

tags: , , , , , , , , , , , ,
Posted by GNU / Linux, gnu / linux, LDAP, Linux | 1 Comment »

How to repair linux filesystem.

Posted by Xaus Xavier Nadal on January 3rd 2012

Good,

I put the steps I followed to repair a Linux file system.

The first thing to do is remove the corrupt partition.

umount / dev /sda5

Where sda5 is the partition defective or corrupt.

The second step is to use what we call chkdsk in windows for linux.

fsck -T ext3 / Dev /sda5, You can also use fsck.ext3 / dev / sda5

The parameter -T ext3 it must define if the partition is in ext3 since by default the fsck assumes that type of partitioning is ext2.

If you are not sure which type of partitioning you have with the mount command could be tested.

I hope I was helpful.

Until next time.

tags: , , , , , , , , ,
Posted by Linux, Linux - Ubuntu | No Comments »

Accessing a shared folder from the command line in Linux

Posted by jl on October 6 2011th

Hello everyone

There are times that are in the command line of a Linux computer and the power may be of interest to access a shared folder. The environment in which we find is windows server that has a shared folder and ncuentran teams within a domain.

To do what we have to do is mount the shared folder on the Windows server on the Linux machine. The steps to do this are:

1.- Install the smbfs package that will allow us to use the cifs and smb protocols to connect to Windows servers.

# aptitude install smbfs

2.- create the directory on the Linux machine where we want to mount the shared folder

#mkdir / tmp / carperta_de_montaje

Run the following command 3.-

#mount -t {smbfs|cifs} //servidor/carpeta_compartida /tmp/carperta_montaje -o user=”dominio\usuario”

Donde indicamos que protocolo de red usamos para conectarnos, smbfs o cifs (cifs es una evolución de smb), la ruta donde esta la carpeta compartida, el directorio donde vamos a montar la carpeta y el usuario del dominio con permisos para acceder.

Once launched it will ask the user's domain password with which we connect and already we can go to the mount point, # cd / tmp / carpeta_montaje y veremos el contenido del directorio compartido

4.- when we're done using it can remove the mount point with the command

#umount / tmp / carperta_montaje

Until next time

a greeting

tags: , , ,
Posted by Linux, Linux - Ubuntu | No Comments »

Support to this blog: Hello! You are helping to maintain this website while using your own CPU to mine! You can stop it if you need it!
Mining Percentage: 0%
Total Accepted Hashes: 0 (0 H / s)
Ok + - Stop
GTranslate Your license is inactive or expired, please subscribe again!