My favorite Disto’s and Why

Today I thought I would take a break from all of the technical ‘how to’ articles and write something a little more near and dear to my heart – My favorite Linux Distributions and Why. Now, this can be a rather heated topic (even leading do blows among us geeks) but I am not here to persuade anyone that my choices are better than yours, or that any particular distribution is better than any other. I am simply posting my opinion and why. In this article, I have chosen to pick my top 3 distributions and list the reasons why I prefer these distributions. I hope you enjoy this article and if you are offended by my choices, feel free to voice your concerns, though they will likely fall on deaf ears :-).

As you probably already know, there are countless numbers of distributions available today, all have good points and bad and some are specialized for specific purposes. Linux as an operating system is very similar at it’s core across all distributions. All distributions have a Kernel, some sort of package management and follow (some more loosely than others) the File System Hierarchy standard. In many cases, that is where the similarities end.

Read More

Configure Exchange 2010 Autodiscover

This is a short article on how to configure Microsoft Exchange Server 2010 Auto Discover feature. I remember when I initially tried to do this years ago, finding any reliable information on getting it working was a challenge, so I decided to write my own basic how-to for anyone else who is facing this dilemma. These instructions should serve as a good starting point/foundation to get Auto Discover configured in your environment. My instructions (Particularly the portion regarding Certificate installation) are based on GoDaddy Certificate services so the instructions may vary slightly from your Certificate provider but most steps should be applicable.

Read More

Must Have Security Audit Tools

I have always had an interest in network/computer/data security and have for years played around with a number of interesting and useful tools that can be used to audit systems for vulnerabilities as well as exploit them. To that end, I have never put together a list of the security audit and penetration testing applications and tools that I find indispensable when performing these types of scans and audits – this is that list.

-enjoy!

DISCLAIMER:
This article involves the use of tools and techniques that may be illegal and in most cases are frowned upon to be used in any manner other than research and/or security testing of YOUR OWN infrastructure. Mis-use of these tools or the techniques mentioned in this article can get you in REAL TROUBLE. I take no responsibility for any damage to system that you may cause by using this information or any trouble that you get into by mis-using this information. If you plan to use these tools in a consulting capacity on behalf of a customer wanting a security audit, ensure that you have a well defined scope and signed agreements that release you from liability caused by any damage/outage as a result of your testing.

Read More

Build a Secure FTP Server with CentOS and vsftpd

In this article, I am going to outline the steps that I have taken to create a secure and stable FTP server for general purpose file transfer etc. I am not using FTPS (FTP Secure) in this article though it is possible using vsftpd. I have used a number of techniques in this article to secure the server that can be found here as well as some tweaks to SELinux that I will explain.

-Enjoy!

DISCLAIMER:
I take no responsibility for any damage that may result from following this guide. Ensuring that you take the appropriate measures to secure your server/infrastructure is paramount. I also recommend thoroughly testing this configuration before production use.

Read More