Gospel. Culture. Technology. Music.

Category: Technology Page 10 of 17


HMailServer – Update Your Spam Protection Configuration for Spamhaus.org

I realized recently that Spamhaus.org had discontinued its use of the spam protection parameters set within HMailServer based upon “DNS” errors I started seeing in my log files. It made no sense. So I went to their site and did some investigating and found they have consolidated the three spam databases into one, called “zen.spamhaus.org”.

So within your HMailServer admin console, go in and delete the current spamhaus.org configurations you have in place (should only be two). Then add a new “DNS Blacklist” with the following parameters: for the “DNS host” enter “zen.spamhaus.org”; for the “Expected result,” enter “127.0.0.*”; and then for the “Rejection Message” enter “Rejected by Spamhaus”. It appears to have cut down spam even more since I have set this. About 5-10 messages a day were getting through before and now none are (so far at least).

http://www.spamhaus.org/zen/

PHP Code for Remote IP Address Detection on a Web Page

I wrote this code today to return the IP address of a remote host when either the host hits the web server directly or accesses it through a web proxy (as in my situation). Thought someone might find it useful.

function writeIPAddress() {
if (isset($_SERVER[‘HTTP_X_FORWARDED_FOR’]) == ”) {
return $_SERVER[‘REMOTE_ADDR’];
}

else {
return $_SERVER[‘HTTP_X_FORWARDED_FOR’];
}
}

Then, if you want to return the IP address as text on the page, simply do this:

echo writeIPAddress();

In addition, if you want to return the reverse DNS address of the IP, do this:

echo @gethostbyaddr(writeIPAddress());

Custom Web Site Searches from Google

Apparently this is a relatively new function, but Google has now made it possible to add a customized search to your web site (though some form of this has been around for a while). The major difference now is that you can actually show the result on your own web site versus going off to another site (like Google). In addition, you have the ability to do custom color layouts, show relevant content first, amongst several other configuration options. So now, as you can see above, I have added a Google search bar that will bring results up from my blog. I have also added this functionality to my other site, www.westerfunk.net to make it easier to find content. So check it out! The search function works much better than the built-in search function for this site to find blog entries, performing a better job of pulling up relevant results (because, well, it’s Google).

“Anonymous” Posts New Video Explaining Who They Are

Apparently, February 10 is their day of action … so they say at least … I’m starting to wonder now if this is a giant marketing campaign for some company?

Anonymous Consortium of Hackers Declares Cyber-War on Scientology

Allegedly these are hackers, that is, not sure how this has been verified …

Update @ 2:07 pm

Well apparently, they are already working on it … http://www.foxnews.com/story/0,2933,325586,00.html

OpenVPN

http://openvpn.net/

Man this is cool. I finally spent the time learning how to set this up, and it was quite some work, but appears to be well worth it. I have a PPTP VPN already setup, but I wanted to set something else up because the Microsoft encryption algorithm just isn’t that secure (when compared with the top level AES-256 encryption). OpenVPN is awesome, because for one, it’s free. And two, it is unbelievably secure (when set up properly). The one downside is its lack of user-friendliness. I had to read a lot of the manual to get various functions to finally work. Also, everything, both on the server and client sides, is text file based. I can handle that, but many people cannot and I can understand that. But before you even start with this, you need a good networking foundation of how VPN networking works because many of the concepts will be alien to you if you don’t. So for those who just want a quick and easy VPN to connect into their home network, just stick with Microsoft’s PPTP VPN. But for those who really want tight security between their network and a remote location and who don’t have any money :), this is the solution for you. Be ready to do some reading and banging your head against your keyboard at times though. It took me a couple of days to finally get it working. Keyword is patience …

AJAX Chat – Replacing Morevil Chat

For my old chatroom, I was using a Java applet chatroom that had no real authentication, called Morevil Chat, the unregistered version. You have to pay for it, and it really isn’t that good, compared to the open-source one I have found. Now I’m using Ajax Chat that utilizes javascript, PHP, MySQL and XML to trasmit and receive messages. I’m very very impressed. The response time is phenomenal and you can setup registered users as well as allow anyone in as a guest with a username of their choice. Anyway, check it out! https://www.westerfunk.net/chat/

Also, here is the site I obtained AJAX Chat from: https://blueimp.net/ajax/

MojoPak – This is Awesome! But What About Organizational Security?

http://www.mojopac.com/portal/content/hellomojo.jsp

This free program makes it possible to install all your favorite applications on a thumb drive or iPod and take it anywhere with you. You can then connect your device to any Windows XP machine (like a public machine) and utilize all of your apps with no trace of it left on the host machine (including all of your browsing). Totally awesome! Haven’t tried it out at all, so I don’t know how it actually works in practice. And for the person using it, it is very secure. And that’s the problem I see. For me personally, it is a great way to be secure wherever I am. But what about for the hacker? The concern I have is for people who utilize this that desire to do harm to a company or organization. It’s super secure for the person using it, and that’s the problem; maybe it’s a little too secure. With the recent wave of Chinese corporate espionage taking place, this is just one more tool in their arsenal to obtain sensitive information. If this app leaves no trace of activity on the host machine (other than leaving a log of a device connecting via USB), it opens up organizations for the potential to get hacked hard and have no way to find out what the person actually did on the host machine. So this is incredible technology, and yet also opens the door for some serious holes.

Dude, You’re Getting a Dell … Some Day

Well, I ordered Courtney, my wife, a laptop from Dell on December 7th and it’s still not here. Not only that, the arrival date has been changed, once again, to January 8th. One month! That’s a long time for an order to come through. And considering the fact that I can get a comparable laptop for $150 less than this Dell laptop at Best Buy just down the street (and get it right now, as opposed to one month later), Dell is showing to me at least how much their service has gone down hill over the years. They apparently did not logistically plan for the number of orders they received this Christmas season and now they are paying for it. I logged in to the Dell support chat to see if they could give me an extra GB of memory for having to wait and they refused. When I asked why, he just told me they couldn’t without any real reason. But when I called into support, they told me the laptop was almost finished being assembled and was close to being shipped so that’s why they couldn’t add anything to the order. So that made a little more sense. Oh well, I mean it’s not a huge deal … but if someone can get a cheaper laptop with almost the exact same specs right now, why would they want to order a Dell at all? I’m thinking this may be the last time I order a Dell. Tell that to Dell’s CEO.

Something Better than LCD TV On the Horizon?

Page 10 of 17

Powered by WordPress & Theme by Anders Norén