The proprietary systems by Adobe and Microsoft carry no doubts regarding their stability for those having at least basic interest into the field of information security. Still, widespread is a popular stereotype telling that the Linux operating systems properly secure a user’s personal data from accessing it by thirdparties. Apart from a special SELinux module that is built into the Linux core by the U.S. NSA, the most of contemporary Linux distributives contain integrated proprietary packages, the contents of which is open to doubt.
In an office of a small and fast evolving web development studio located in Sochi our company has installed and configured a local server running under an open source software and securing all means necessary to host and test web sites at low hardware costs. For the web hosting management we decided upon a free and open source version of the Virtualmin dashboard.
Let us introduce our friends that have recently implemented an approach to make chatting in the Vkontakte social net secure, by using the AES encrypting algorithm. This technology ensures that the correspondence is kept privately and remains unavailable to not only providers, but to the VK itself. The encryption is performed on the side of a web browser by a plugin that is available for Mozilla Firefox and Google Chrome/Chromium. The plugin’s open source code is provided by SourceForge.
We are open for partnership and provide personal service to everyone, making some of our customers and clients show their special appreciation towards us. This site has been provided a new customers and clients page where we hope to continue publishing the acknowledgements for our work and service.
Squid is a powerful proxyserver having a flexible configuration. While there are plenty of graphical user interfaces available for his proxyserver adjustment, this article addresses its simplest configuration by using the command line of Debian/Ubuntu operating systems, with the statistics displayed. As a result, you will have the proxyserver running and being capable of managing and granting access to a multitude of users while monitoring the proxy’s activity.
When working with MySQL databases, a common problem is to lose the root password for whatever reason. This article describes how to avoid losing data during fast recovery of the MySQL root password, by taking a Debian/Ubuntu system as an example.
Our organization has undergone a rebranding, resulting in its logo and name being changed. The new name stands for “open source software and information technology”, oss-it for short.
Qnap System has announced their new HD net media player that is based on Linux – this is Network Attached Storage (NAS, a net system of data storage, a net storage) together with IP Set Top Box (capable of coding the information from digital to analog with a resolution up to 1080 pixels).
This article illustrates the process of OpenVPN (Virtual Private Network) setup on both the server and client, and describes an approach to keep client addresses fixed in a virtual network under a public key security certificate. This technology makes for a quick and cheap setup of local virtual nets, by using the existing physical resources or the Internet.
As part of the “Linux to schools” project (an initiative of our friends – Soft Consulting IT Center), the employees of our company assist the schools of Tula city and region in adopting the open source software.