Article Title: Redhat6.2 + qmail + smtpd authentication prevents spammers from abusing your server. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Author: Polaris
Software environment:
Redhat6.2 qmail1.3
The email server serves both internal and external services. It uses ADSL for Internet access and dns2go.com for domain name resolution. Single Nic. The
-NAT interface, set the NAT parameter to dynamic NAPTStep 3: In parameter settings-interface on the right of the virtual service,Add a virtual serviceFirst, add ID: 1, public port: 16881, Private Port: 16881, TCP, Host IP: 192.168.1.7.Then click SetSecond, add ID: 2; Same as above, always add to 16889Then click set to add a virtual serviceThe last step is to choose "Save reboot" on the parameter settings-protection restart interface.That's all done.If you are using a personal firewall, add the a
can still use their underlying interfaces to change their settings, but these settings may be overwritten on the web configuration page.
Asterisk is an open-source software VoIP PBX system initiated by Digium. Digium is a company that also produces hardware VoIP products. Asterisk @ Home is a third-party release version, including Asterisk,
AAH has two different application methods: one is to use it as a package in an installed Linux system, and the other is to use the CD image file (ISO format
AP devices, you cannot select this option. Similarly, the "Access Point (structure) network only" option also requires the wireless Nic device to work in the Wireless AP mode. Therefore, we must select the "computer-to-computer (specific)" option here to ensure that computer A and computer B can form a point-to-point wireless transmission network.
To enable computer A to automatically establish a wireless network connection with computer B, we also need to create an ADHOC Network in comp
At present, China's wireless routers are developing rapidly. Here we will mainly explain the experiences of using wireless routers. Recently, I 've played with several common wireless routers on the market. I 'd like to explain my feelings so that users can buy them later. it's just a little bit of a diving old bird. I am a player who prefers p2p software. I like to squeeze every 1 k of bandwidth. therefore, the stability requirements for wireless routers are also relatively high. here I will al
performance and therefore be more expensive.
The LAN switch supports a speed from 10 m to 10G. The transmission medium uses copper wires or optical fiber cables, and the port ranges from several to several hundred. This type of switch generally supports TCP/IP and UDP, IPX, and AppleTalk protocols. Other features of this type of switch include: support for VoIP (IP-based voice service), QoS (service quality evaluation), bandwidth management and automatic report generation, support for multicast
) vro products of many manufacturers, such as Linksys and Netgear, have backdoors. Hackers can directly control the vro and initiate DNS (Domain Name System) hijacking, information theft, phishing, and other attacks, directly threatening users' online transactions and Data Storage Security, turning related products into security "mines" that can be detonated at any time ". Taking some router products in D-LINK as an example, attackers can obtain full
up configuration settings correctly, and only access authorized persons.
1 describes an instance of a standard firewall rule repository. In this example, the standard policy describes the default settings in detail.
Figure 1
Work with Firewall Builder
Firewall Builder is a General Public License Software Package, which is set to help administrators configure the Firewall. The current version supports many FireWall platforms, such as FireWall Services Module (FWSM), ipfi lter, ipfw, iptables, P
general key. The emergence of WPA makes network transmission more secure and reliable.
Wireless Network Security Settings 3: SSID Broadcast
In short, the SSID is the name you give your wireless network. When searching for a wireless network, your network name is displayed in the search results. Once attackers use a common initialization string to connect to the wireless network, it is very easy to intrude into your wireless network. Therefore, I strongly recommend that you Disable SSID broadcas
, we can see that the model of the target device is wrt54g, which is published by linksys. (4)
Step 5: Next we will try to use the default Management username and password to log on. Generally, you can search for the wrt54g default password information from the Internet and use the default account admin or root for access, the password is also admin or root. You can also enter an empty password and common numbers 123,123456, 111111 to guess. If the r
two services.
After completing the above work, if the operation is correct, we can see an additional gateway in "network connection", which indicates that the UPnP has been successfully added;
4. Enable the UPnP function in P2P software:
The following uses BC and eMule as an example to describe the corresponding settings.
So far, the work of UPnP is truly finished.
Taking BC as an example, after the UPnP function is successfully added, we will see several lines similar to the following in "Glob
network" -- "Next" -- "Virtual Private Network Connection ", follow the instructions to complete subsequent operations.
In Vista, select "Control Panel" from the "Start" menu (or select "Control Panel" from "start" in the "classic start" menu "). Select create a connection or network, double-click "connect to workplace", select "use my Internet connection (VPN)", and then follow the instructions to complete subsequent operations.
Set wireless encryption
Each home or small office wireless netw
In fact, the initial prototype of the DD-WRT was released by Cisco, the originator of the router, and was carried on the WRT54G Wireless Router launched by Cisco's Linksys, supporting the highest 54mbps connection speed at that time. Soon, some enthusiasts discovered that WRT54G firmware is based on Linux. However, a basic condition for using Linux as an operating system is that the source code must be opened public. After this incident was passed on,
reality-the iPhone has been synonymous with the coming iPhone for years. No matter who wins this lawsuit, the results will greatly increase people's awareness of Apple's iPhone.
What if Cisco sued apple and won the lawsuit, or successfully obtained the exclusive right to the iPhone through negotiations? Will Apple name its product imobile or icell again? No. Before Steve Jobs asked his staff to perform development, we decided to call that thing an iPhone. What about Cisco's phone number? We
Some small size USB flash drives are too small to use, and it seems a pity to lose them. However, after a small transformation, we can use our computer to get a powerful router, which not only saves the money to buy a route, but is basically unavailable on the market!
About DD-WRTEach router device we use usually has its own operating system OS, which is used to set and manage various functions of routing devices. In fact, what we usually call upgrading the router firmware is to update and refr
default value can be changed during compilation.nmap.hThe DEFAULT-UDP-PROBE-PORT value in the file is configured. By default, such a strange port is used because such scanning on open ports is generally undesirable.
If the port of the target machine is disabled, UDP detection should immediately receive a response message that the ICMP port cannot reach. This means that the machine is running for NMAP. Many other types of ICMP errors, such as host/network failures or TTL timeout, indicate down
restriction function.
This window is open. You do not need to close it. You need to open a terminal window again for subsequent commands.
4) aireplay-ng-1 0-e ap_essid-A ap_mac-H xxxxxxxxxx ath1
At the beginning of this step, we will do some real cracking work, mainly for those clients that only connect and have no traffic. This AP, # data growth is very slow, it usually takes a long time to obtain enough packets (generally, a 5-bit password requires about 10000 packets, and more passwords are
E-mapreduce has been fascinated by eMule in recent days. However, when I access the Internet through a vro at home, I always get a lowid and the speed is low. Verycd website is introduced to some of the NAT method (http://www.emule.org.cn/topic/nat/), But I zonet Broadband Router (ZSR-0104) with a lot of people, didn't say in it, had to try it, the success was finally achieved, roughly the same as the port ing settings (http://board.verycd.com/t34337.html) for
about NATs), and 100%The time between pairs of certain popular, well-behaved NATs. See [1]For more details.
An open-source Java library for tcp nat traversal is now available:Webpage: http://nutss.net/stunt.phpFAQ: http://nutss.net/jstunt-faq.phpLibrary and example: http://nutss.net/jstunt-examples.php
The above library has been tested for pair-wise connectivity limit SS 11Brands of NATs from Windows and Linux Hosts. NATs tested were Linksys,Dlink
restricted universe multiverse
Deb-src http://archive.ubuntu.com/ubuntu dapper-backports main restricted universe multiverse
# Plf repository (Unsupported. May contain illegal packages. Use at own risk .)
Deb http://packages.freecontrib.org/ubuntu/plf dapper free non-free
Deb-src http://packages.freecontrib.org/ubuntu/plf dapper free non-free
Save the file and exit the editor. Run the following command:
Sudo apt-get update
Now we can install the packages that will be used later:
Sudo apt-get in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.