This is default featured slide 1 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 2 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 3 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 4 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 5 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
Rabu, 06 Maret 2013
Proxy Server
Instalasi dan Konfigurasi Samba di Centos 5
# cp smb.conf smb.conf.ori
# == Global Settings ==
[global]
# -- Network Related Options --
workgroup = WORKGROUP
server string = Samba Server
netbios name = Samba
interfaces = lo eth0
hosts allow = 127. 192.168.1.
# -- Logging Options --
log file = /var/log/samba/%m.log
max log size = 5000
# -- Standalone Server Options --
security = share
passdb backend = tdbsam
# -- Domain Controller Options --
domain master = yes
domain logos = no
os level = 33
preferred master = yes
# -- Name Resolution --
wins support = yes
# -- Printing Options --
load printers = yes
cups options = raw
[homes]
comment = Home Directories
browseable = no
writable = yes
; valid users = %S
; valid users = MYDOMAIN\%S
[boy]
comment = Boy Directories
path = /home/boy
browseable = yes
writable = yes
valid users = boy
[printers]
comment = All Printers
path = /var/spool/samba
browseable = no
guest ok = no
writable = no
printable = yes
- Workgroup: Menentukan nama identitas workgroup atau domain dan tidak dibedakan apakah itu huruf besar atau kecil. Biasanya, Windows menggunakan nama Workgroup sebagai domain sehingga harus disesuaikan oleh file samba.
- Server string: Menetukan isi pesan yang ditampilkan pada saat klien pada saat berhasil login dalam domain.
- netbios name: Menentukan nama yang dipakai server SMB dalam jaringan. Nama yang dipakai tidak boleh melebihi 16 karakter dan tidak boleh ada karakter spasi serta tidak mempedulikan apakah itu huruf besar atau kecil.
- interfaces: Menentukan interface mana yang akan digunakan oleh server samba
- host allow: Menentukan alamat IP host yang diperbolehkan mengakses server SMB
- log file: Menentukan direktori untuk log samba
- max log size: Menentukan ukuran maksimal ukuran log yang seharusnya dapat dicapai
- security:
menentukan level keamanan server SMB yang juga menentukan bagaimana
cara server SMB menanggapi permintaan klien. Ada 3 level yaitu:
b. user : Klien SMB harus melakukan login supaya dapat menggunakan sumber daya jaringan.
c. server : Server SMB menggunakan server SMB lain untuk melakukan validasi klien SMB dan klien SMB harus melakukan login supaya dapat menggunakan sumber daya jaringan. Pada level ini, diperlukan pengaturan nama NETBIOS server password untuk autentifikasi (password server = nama_netbios)
- passdb backend: informasi tentang user disimpan di dalam file ini
- domain master: Menentukan apakah server SMB dapat berfungsi sebagai browser master domain. Supaya dapat berfungsi sebagai server domain, server SMB harus dapat berfungsi sebagai browser master domain
- domain logos: Menentukan apaka server SMB dapat berfungsi sebagai server logon domain untuk klien Windows 95 atau PDC (primary Domain Controller) bagi Windows NT dan windows 2000.
- preferred master: Menentukan supaya server SMB dapat memaksa browser lokal pada startup dan memberi kesempatan lebih tinggi untuk memenangkan persaingan pemilihan server domain.
- wins support: Menentukan apakah server SMB dapat berfungsi sebagai server WINS
- load printers: Membiarkan kita me-load daftar printer-printer secara otomatis dibandingkan menyetting printer-printer tersebut secara sendiri-sendiri
- cups options: Mengijinkan kita untuk masuk ke option cup, misalnya memilih raw yang akan mengijinkan kita menggunakan driver-driver di klien windows
- comment: Menentukan teks yang akan terlihat oleh klien pada saat login
- browseable: Menentukan akses browse bagi user lain
- writable: menentukan akses tulis pada masing-masing user
The specified network password is not correct.
Hal ini karena windows masih terhubung dengan server samba dan masih menyimpan password user samba yang lama. Untuk mengatasi hal tersebut, maka di dalam windows pada area toolbar pilih Tools lalu pilih Disconnect Network Drives.
Setelah itu, seharusnya user samba dapat memasukkan passwordnya yang baru.
Referensi:
Jumat, 01 Maret 2013
Load Balancing over Multiple Gateways
sumber : http://wiki.mikrotik.com/wiki/Load_Balancing_over_Multiple_Gateways
The typical situation where you got one router and want to connect to two ISPs:
Of course, you want to do load balancing! There are several ways how to do it. Depending on the particular situation, you may find one best suited for you.
Policy Routing based on Client IP Address
If you have a number of hosts, you may group them by IP addresses. Then, depending on the source IP address, send the traffic out through Gateway #1 or #2. This is not really the best approach, giving you perfect load balancing, but it's easy to implement, and gives you some control too.Let us assume we use for our workstations IP addresses from network 192.168.100.0/24. The IP addresses are assigned as follows:
- 192.168.100.1-127 are used for Group A workstations
- 192.168.100.128-253 are used for Group B workstations
- 192.168.100.254 is used for the router.
Now, when we have workstations divided into groups, we can refer to them using subnet addressing:
- Group A is 192.168.100.0/25, i.e., addresses 192.168.100.0-127
- Group B is 192.168.100.128/25, i.e., addresses 192.168.100.128-255
If you do not understand this, take the TCP/IP Basics course, or, look for some resources about subnetting on the Internet!We need to add two IP Firewall Mangle rules to mark the packets originated from Group A or Group B workstations.
For Group A, specify
- Chain prerouting and Src. Address 192.168.100.0/25
- Action mark routing and New Routing Mark GroupA.
It is a good practice to add a comment as well. Your mangle rules might be interesting for someone else and for yourself as well after some time.
For Group B, specify
- Chain prerouting and Src. Address 192.168.100.128/25
- Action mark routing and New Routing Mark GroupB
All IP traffic coming from workstations is marked with the routing marks GroupA or GroupB. We can use these marks in the routing table.
Next, we should specify two default routes (destination 0.0.0.0/0) with appropriate routing marks and gateways:
This thing is not going to work, unless you do masquerading for your LAN! The simplest way to do it is by adding one NAT rule for Src. Address 192.168.100.0/24 and Action masquerade:
Test the setup by tracing the route to some IP address on the Internet!
From a workstation of Group A, it should go like this:
C:\>tracert -d 8.8.8.8 Tracing route to 8.8.8.8 over a maximum of 30 hops 1 2 ms 2 ms 2 ms 192.168.100.254 2 10 ms 4 ms 3 ms 10.1.0.1 ...From a workstation of Group B, it should go like this:
C:\>tracert -d 8.8.8.8 Tracing route to 8.8.8.8 over a maximum of 30 hops 1 2 ms 2 ms 2 ms 192.168.100.254 2 10 ms 4 ms 3 ms 10.5.8.1 ...You can specify the DNS server for workstations quite freely, just make it can be reached (test it by tracing the route to DNS server's IP address)!
Kamis, 28 Februari 2013
Cara Block Situs di Mikrotik Lewat Winbox
Setelah
kemarin Saya bahas tentang cara blokir situs pada komputer yang
menggunakan sistem operasi Microsoft Windows, kali ini Saya akan
tuliskan juga tutorial untuk cara blokir situs di sistem operasi
Mikrotik Router dengan menggunakan tool Winbox. Baik langsung saja pada
tutorial caranya, silahkan di simak....- Buka winbox yang berada pada desktop.
- Klik tanda ( … ) atau isi alamat Mikrotik pada kolom Connect To :
- Maka akan muncul gambar seperti di bawah ini, kemudian pilih salah satu.
- Setelah itu isi Username dan Passwort Mikrotik
- Kemudian klik tanda connect.
- Dan akan terbuka jendela Mikrotik seoerti gambar di bawah ini.
- Untuk block situs klik menu IP pilih Web Proxy
- Kemudian Setting Web Proxy dengan mengeklik tombol Setting.
- Maka akan muncul jendela seperti gambar di bawah ini. Setting Web Proxy sepeti gambar di bawah ini, kemudian di klik tombol OK.
- Sekarang kita mulai buat settingan website yang akan di block.Klik tanda ( + ), Maka akan muncul jendela, dan kemudia setting seperti gambar di bawah ini.
- Kemudian klik OK, maka akan muncul catatan pada jendela Web Proxy.
- Coba cek settingan tersebut dengan mengetikan kata “porno” pada google.
- Dan kemudian enter, jika muncul tampilan seperti gambar di bawah ini maka settingan block situs Anda berhasil.
Rabu, 27 Februari 2013
Install phpMyAdmin in CentOS 5
wget http://packages.sw.be/rpmforge-release/rpmforge-release-0.5.1-1.el5.rf.i386.rpm rpm -Uhv rpmforge-release-0.5.1-1.el5.rf.i386.rpm |
wget http://packages.sw.be/rpmforge-release/rpmforge-release-0.5.1-1.el5.rf.x86_64.rpm rpm -Uhv rpmforge-release-0.5.1-1.el5.rf.x86_64.rpm |
yum update
|
yum install phpmyadmin
|
To do so, open up /etc/httpd/conf.d/phpmyadmin.conf using:
nano /etc/httpd/conf.d/phpmyadmin.conf |
<Directory "/usr/share/phpmyadmin"> Order Deny,Allow Deny from all Allow from 127.0.0.1 </Directory> |
Press Ctrl+O followed by Enter to save and Ctrl+X to exit nano.
service httpd restart |
Error
The configuration file now needs a secret passphrase (blowfish_secret).
nano /usr/share/phpmyadmin/config.inc.php |
$cfg['blowfish_secret'] = ''; /* YOU MUST FILL IN THIS FOR COOKIE AUTH! */ |
$cfg['blowfish_secret'] = 'mysecretpassphrase'; /* YOU MUST FILL IN THIS FOR COOKIE AUTH! */ |
Error
#2002 – The server is not responding (or the local MySQL server’s socket is not correctly configured)
yum install mysql-server
|
service mysqld start |
mysqladmin -u root password PASSWORD_HERE
|
yum remove phpmyadmin
|
yum install phpmyadmin
|
$cfg['Servers'][$i]['host'] = 'localhost'; |
Kamis, 21 Februari 2013
How To Install Clam Antivirus On Cent OS 5
Download and Install Clam Antivirus on Cent OS 5
[root@ravisaive ~]# yum install clamd2. After Sucessfull installation start the clamd service by using below command.
[root@ravisaive ~]# /etc/init.d/clamd start
Starting Clam AntiVirus Daemon: Bytecode: Security mode set to "TrustSigned".
LibClamAV Warning: **************************************************
LibClamAV Warning: *** The virus database is older than 7 days! ***
LibClamAV Warning: *** Please update it as soon as possible. ***
LibClamAV Warning: **************************************************
[ OK ]
3. If you get error similar to below shown while starting ClamAv Service. Then follow our solution below to fix this error.[root@ravisaive]# /etc/init.d/clamd start
Starting Clam AntiVirus Daemon: ERROR: Can't open /var/log/clamav/clamd.log in append mode (check permissions!).
ERROR: Can't initialize the internal logger
[FAILED]
4. To fix this error you must set the owner and group to clamav to
the file /var/log/clamav/clamd.log. here is the below command to set.[root@ravisaive]# chown clamav:clamav /var/log/clamav/clamd.log5. Then try to start the service again with below command.
[root@ravisaive]# /etc/init.d/clamd start
Starting Clam AntiVirus Daemon: Bytecode: Security mode set to "TrustSigned".
LibClamAV Warning: **************************************************
LibClamAV Warning: *** The virus database is older than 7 days! ***
LibClamAV Warning: *** Please update it as soon as possible. ***
LibClamAV Warning: **************************************************
[ OK ]
6. Now update Clam Virus Database by using below command, It will
download latest ClamAV update. If you get same permission error like
above then set the owner and group as clamav to the file
/var/log/clamav/freshclam.log with chown command as shown below.[root@ravisaive]# chown clamav:clamav /var/log/clamav/freshclam.log [root@ravisaive ~]# freshclam7. Now test and Scan Clam Antivurs with below command to see results.
[root@ravisaive ~]# clamscan LibClamAV Warning: ****************************************************** LibClamAV Warning: *** Virus database timestamp in the future! *** LibClamAV Warning: *** Please check the timezone and clock settings *** LibClamAV Warning: ****************************************************** /root/install.log.syslog: OK /root/.bash_profile: OK /root/anaconda-ks.cfg: OK /root/.bash_logout: OK /root/.tcshrc: OK /root/.dmrc: OK /root/.bash_history: OK /root/.bashrc: OK /root/.cshrc: OK /root/install.log: OK ----------- SCAN SUMMARY ----------- Known viruses: 1000080 Engine version: 0.97.1 Scanned directories: 1 Scanned files: 10 Infected files: 0 Data scanned: 0.05 MB Data read: 0.02 MB (ratio 2.00:1) Time: 3.765 sec (0 m 3 s)
How To Install MailScanner On Cent OS 5

Lets install required packages through RPMforge a third party RPM repository for Red Hat Enterprise Linux or CentOS. Adding the RPMforge repository will give you access to an extensive library of precompiled binaries. This article describes how to add the RPMforge repository in Red Hat Enterprise Linux or CentOS 5.
Download and Install RPMforge
[root@ravisaive yum.repos.d]# wget rpm -Uhv http://apt.sw.be/redhat/el5/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.el5.rf.i386.rpm [root@ravisaive home]# rpm -ivh rpmforge-release-0.3.6-1.el5.rf.i386.rpm warning: rpmforge-release-0.3.6-1.el5.rf.i386.rpm: Header V3 DSA signature: NOKEY, key ID 6b8d79e6 Preparing... ########################################### [100%] 1:rpmforge-release ########################################### [100%]2. Install RPMforge Repo by using YUM properties using yum command.
[root@ravisaive home]# yum install yum-priorities3. Now Open file /etc/yum.repos.d/rpmforge.repo and add below line at the end.
priority=104. Test your configuration by using below command. You get a priority protections message in the output.
[root@ravisaive home]# yum check-update
Download and Install MailScanner
[root@ravisaive home]# wget http://www.mailscanner.info/files/4/rpm/MailScanner-4.83.5-1.rpm.tar.gz2. Now extract the download file by using below command.
[root@ravisaive home]# tar -xvf MailScanner-4.83.5-1.rpm.tar.gz3. After extracting you will get a folder MailScanner-4.83.5-1 use cd command to go inside the folder like shown below.
[root@ravisaive home]# cd MailScanner-4.83.5-14. Now install required Perl modules from RPMforge using YUM command like shown below
[root@ravisaive MailScanner-4.83.5-1]# yum install perl-Archive-Zip perl-DBI perl-DBD-SQLite perl-Filesys-Df perl-Net-CIDR perl-OLE-Storage_Lite perl-Sys-Hostname-Long5. Now install Mailscanner with below command.
[root@ravisaive MailScanner-4.83.5-1]# yum install --nogpgcheck mailscanner*
Thats It! Your Mailscanner is installed....























