Sep 132013
 

This is an article of mine first published on Wazi.

Apache is still by far the most widely deployed HTTP server, according to the latest Netcraft web server survey, but nginx has been slowly, steadily gaining market share, thanks to its blazing speed. If you want to try a faster web server and move from Apache to nginx, you’ll probably have to change some of your websites’ configurations, starting with rewrite directives. To migrate rewrite rules from Apache to nginx, start with these tips and tricks.

The Apache mod_rewrite module provides powerful and sophisticated tools for nearly all types of URL rewriting. It is, however, somewhat complex, and may be intimidating to beginners. In fact, however, rewrite rules are not magical incantations, though to understand them you need some understanding of regular expressions.

Even if you have never heard of mod_rewrite, you may still be using it. Popular applications such as WordPress, Drupal, and Magento are shipped with .htaccess files that contain standard configurations that make these applications work properly, and these usually include one or more rewrites, so to properly move your website to an nginx web server you have to “translate” the Apache mod_rewrite directives into equivalent rules for nginx’s HttpRewriteModule.

Continue reading »

Flattr this!

Sep 102013
 

282px-Amnesia-a-machine-for-pigs-logo
Do you remember the Indie title Amnesia the Dark Descent ?
A great Survival-horror game released in 2010 that has had a lot of success, and if you don’t know it, check it on the net, it’s probable that with the release of the new game you can find it at a discounted price.

But I’m here to talk about Amnesia: A Machine for Pigs, from the creators of Amnesia: The Dark Descent and Dear Esther comes this new first-person horrorgame that will drag you to the depths of greed, power and madness, sound interesting enough ?

Continue reading »

Flattr this!

Sep 052013
 

screengrab-ubuntu-linux
Original article by Roberto Ferramosca, published in Italian on lffl.org

ScreenGen is a useful software with which we can easily create an image with various thumbnail of a video ready to be shared or stored in our blogs, forums etc..

In the last years we have seen a lot of hype on the net about services dedicated to sharing videos, as any simple smartphone can quickly create a video and share it with our friends on Facebook, Twitter, YouTube etc..
On the net you can find very often images containing various thumbnail of a video, that allow us to have information about the video file we want to download, for example. To quickly create various thumbnail of a video and then group them into a single image we can use on Linux ScreenGen.
Continue reading »

Flattr this!

Sep 032013
 

Logo_Emmabuntüs_septembre_2012Today I want to present you Emmabuntüs  a Linux distribution derived from Ubuntu and designed to facilitate the repacking of computers donated to Emmaüs Communities.
The name itself is a combination of two words: Ubuntu and Emmaüs.

Emmabuntüs 2 has been released on July 21 2013 and it’s based on Xubuntu 12.04 LTS, this is because the team want a Long Term support base distribution, and with this version you can be sure to have support for 5 years.

But let’s see some detail of this distribution.

Continue reading »

Flattr this!

Aug 312013
 

Article By 

Let face it, the Secure Shell (SSH) daemon running on your VPS is the most sensitive service open to attack on your system. Any hacker worth their salt will first try to gain access to your VPS via SSH and 99.9% of all VPS connected to the internet run this service by default and on their public IP.

If somebody gains access to your VPS via the SSH service, you can kiss your data and entire VPS goodbye. This is the ultimate goal for any would-be hacker and as such, needs to be the first thing you secure as a VPS administrator.

In this article I’m going to show you how to take three simple precautions with the SSH service that will stop most hackers and script kiddies in their tracks. So what will you learn?

  1. How and why to change the port SSH listens on
  2. How to disable password based access to SSH and only allow key based access
  3. Monitor failed SSH login attempts and automatically block the originating IP using an Intrusion Detection System

Continue reading »

Flattr this!