Security

Sending emails securely

Sending emails securely is needed for certain situations, such as sending my bank account to my wife, giving my account password to my close friend for a while. How to send it? Regarding the recent US PRISM program, it is an important issue. Seeing your solution, a few of my own popped up. Here are…

| | |

Where Does Evolution Save Its Data and Configuration Files on Linux?

Evolution is a great personal information management tool that provides Email, address book and calendar tools. Evolution provides many enterprise friendly feature such as native support to Microsoft Exchange connectivity for Emails, address books and calendars. Evolution uses various ways including plain files and dconf configuration systems. This post will give an introduction to the…

| |

How to force a metadata checkpointing in HDFS

The metadata checkpointing in HDFS is done by the Secondary NameNode to merge the fsimage and the edits log files periodically and keep edits log size within a limit. For various reasons, the checkpointing by the Secondary NameNode may fail. For one example, HDFS SecondaraNameNode log shows errors in its log as follows. 2017-08-06 10:54:14,488…

|

Moving Junk Emails to Junk Folder Automatically in Thunderbird

Junk Emails, or Email spams, are annoying and they cost time to deal with. While they are something we need to cope with, we can use tools to help us. Thunderbird has an adaptive junk filter that can learn from user’s actions to identify junk messages. I find that Thunderbird default settings are not fully…

| |

How to Configure the Latest Version of Flash on Firefox for Linux: by the Fresh Player Plugin

As you may know, Adobe stopped supporting the NPAPI version of Flash on Linux and the latest NPAPI version of Flash player at version 11.2 released back in 2012 will only receive security fixes. Even the security fixes to the 11.2 version of the Flash Plugin your Firefox is using will end on May 4,…

| | | |

Free VPNs for iPhone Users: OpenVPN + Ovpn Spider

VPNs are useful for testing viewing webpages from a remote location or visiting blocked websites. In this post, I will introduce a method for finding and using free VPNs on iPhone. Note that the VPNs are free and the providers are not identified. Hence, only use this method for visiting public webpages or keeping visiting…

|

Directly SSH to Hosts’ Internal IPs Through the Gateway

We have many hosts with internal/LAN IPs like 10.0.3.* behind a gateway and the hosts with LAN IPs can connect to the Internet through the gateway. We used iptables to forward port from the gateway to internal IPs so that users from hosts with Internet connections can SSH to the gateway’s forwarded port to log…

| | |

Improving ssh/scp Performance by Choosing Suitable Ciphers

Update on Oct. 9, 2014: You should be aware of the possible security problems of blowfish and it is suggested not to be used. Instead, you may consider ChaCha20 as suggested by Tony Arcieri. To use this with OpenSSH, you need to specify the Ciphers in your .ssh/config files as chacha20-poly1305@openssh.com possibly with another default…

How to Activate Windows 7 using MAK Activation

The Windows 7 Multiple Activation Key (MAK) can be used to activate Windows 7 Enterprise installed with the Windows 7 Volume Licence DVD provided by Microsoft to enterprise/university customers. How to activating Windows 7 with MAK: Make sure your system is connecting to the Internet. During Windows 7 activation, Windows will connect to Microsoft.com for…

CloudFlare with DreamHost

CloudFlare is a very nice service that provides CDN / optimizer / security protection and more. Good news is that DreamHost turns to be a partner with CloudFlare. The free account on CloudFlare is enough for sites such as Fclose.com. I enabled CloudFlare yesterday and it works smoothly and boosts the site’s performance. Overall, I…

|

How to Install Xen on Fedora as Domain-0 (Fedora 17)

The new development of Xen and Linux kernel make it easy to install Xen on Fedora as the Domain-0 now. This post uses Fedora 17 as an example platform to introduce how to set up Domain-0 on Fedora Linux. Compared to our old method (https://www.systutorials.com/setting-up-stable-xen-dom0-with-fedora-xen-3-4-3-with-xenified-linux-kernel-2-6-32-13-in-fedora-12/) which requires manually compiled Xen and patched kernel, the current…

|

Introduction to Xen Source Code Structure

The Xen hypervisor is a powerful virtualization solution that provides virtualization capabilities for x86, x86-64, and ARM architectures. The source code structure of Xen is organized into several directories, each of which contains a specific set of files. The backend and frontend drivers are an important part of the Xen hypervisor, and they provide a…