Information security in today’s world


The proprietary systems by Adobe and Microsoft carry no doubts regarding their stability for those having at least basic interest into the field of information security. Still, widespread is a popular stereotype telling that the Linux operating systems properly secure a user’s personal data from accessing it by third­parties. Apart from a special SELinux module that is built into the Linux core by the U.S. NSA, the most of contemporary Linux distributives contain integrated proprietary packages, the contents of which is open to doubt.

An example of a network running under a Linux­server at a web development office


In an office of a small and fast evolving web development studio located in Sochi our company has installed and configured a local server running under an open source software and securing all means necessary to host and test web sites at low hardware costs. For the web hosting management we decided upon a free and open source version of the Virtualmin dashboard.

VkCrypt ­ Encrypting the VK social net’s messenger


Let us introduce our friends that have recently implemented an approach to make chatting in the Vkontakte social net secure, by using the AES encrypting algorithm. This technology ensures that the correspondence is kept privately and remains unavailable to not only providers, but to the VK itself. The encryption is performed on the side of a web browser by a plug­in that is available for Mozilla Firefox and Google Chrome/Chromium. The plug­in’s open source code is provided by SourceForge.

Testimonials from our clients and customers


We are open to cooperation and take an individual approach with each person. For this, some of our customers and clients express their special appreciation to us. We have a new section on our website, “Customers and Clients”, where we will publish letters of thanks for the work done and services provided.

Squid ­ An example of a simple proxy­server configuration


Squid is a powerful proxy­server having a flexible configuration. While there are plenty of graphical user interfaces available for his proxy­server adjustment, this article addresses its simplest configuration by using the command line of Debian/Ubuntu operating systems, with the statistics displayed. As a result, you will have the proxy­server running and being capable of managing and granting access to a multitude of users while monitoring the proxy’s activity.

MySQL ­ Restoring the root password


A common problem with mysql databases is the loss of the root password for various reasons. This article will describe how to quickly recover a root password in mysql without losing data, using Debian/Ubuntu as an example.

Oss­-it rebranding


Our organization has undergone a rebranding, resulting in its logo and name being changed. The new name stands for “open source software and information technology”, oss­-it for short.

A functional Linux­based HD media player announced


Qnap System has announced their new HD net media player that is based on Linux – this is Network Attached Storage (NAS, a net system of data storage, a net storage) together with IP Set Top Box (capable of coding the information from digital to analog with a resolution up to 1080 pixels).

A simple OpenVPN setup with fixed client addresses


This article illustrates the process of OpenVPN (Virtual Private Network) setup on both the server and client, and describes an approach to keep client addresses fixed in a virtual network under a public key security certificate. This technology makes for a quick and cheap setup of local virtual nets, by using the existing physical resources or the Internet.