The Linux Page

Help other users realize that everything is possible, especially avoiding Windows for their own personal use.

Welcome to The Linux Page


Fox Trot by Bill Amend. Click to enlarge.
Click to enlarge

This site is a collection of my own work with Linux. Certain things are easy, others take time to decipher and if I ever need to repeat the work (which usually happens!), then I need to remember everything by memory or... have a site with all the steps taken and to take again.

The following are my most recent posts:

Got to setup a new server and first got the firewall to where I wanted it to be:

  • Block everything except ssh, Apache, SMTP, a few other things, but really not much more than that.
  • Block everything with IPv6 since we don't use it.

Then I installed Apache and a couple of websites.

The first one finally started to work, but it was so very slow to show up. I checked the code, the database, nothing wrong... And the database is lightning fast! ( in comparison to our previous server that is.)

So I wondered and thought maybe that my Apache firewall is in the way. I turned it ...

If you are running a webserver, you should use a webserver firewall. This prevents many attacks from being perpetrated on to your servers without the need to make your own applications more complex than necessary.

The idea is very simple, if you have a few people who can edit your data from the Internet and those have a static IP address, you can check that the editor pages are only accessible to those IP addresses. Any other access can simply be blocked.

[toc hidden:1]

I suppose we could talk about security all day and only barely touch the tip of the iceberg, if even more than a spec of it.

Yet, I wanted to mention that in many instances, there are such limits to the characters you can use in a password that already the provider prevents you from creating a string password in the first place!

So... what is it I'm talking about?

I have one company I work with that does not support anything more than letters and digits. Not only that, they limit your password between 6 and 10 characters. Everyone knows that 6 characters is cracked very very quickly and

If you don't work on creating web pages, you are probably not much aware of the creativeness necessary to make them work in Internet Explorer 6.0 and older.

Today, I had to make PNG images work in IE 6.0 since one of my customers still has that version of the browser and his website has several PNG images that require to have a working alpha channel.

[toc hidden:1]

It is often that I want to hide a sub-folder so whenever I do an svn status I don't actually see that sub-folder in my list of files that are not available in the repository. It is otherwise quite annoying to see that folder again and again.

The command to do so uses a property on the parent folder as follow:

Each customer has a different tool and at times the same customer changes the tools they are using to a better one.

Here I now have to use Perforce. In general, it is fine, but this system is much more complicated to use than any other source control system I've used before. Does that make it better? It certainly makes me waste a lot more time!

For one thing, I have to use it under MS-Windows and that does not make it any simpler.

There are two ways to make use of the system: (1) with the GUI interface, which simply helps you with handling long lists and paths and offering most of ...

Lists are most of the time used to create menus. These menus can easily be shown vertically on one side or another of your website.

Now, most of the time, you will want to have one or two menus showing horizontally (like the top menu on this site, although that one is very specific to the Cute menu module.)

If you are reading this, you probably already know how to create such menus. The HTML code looks like this:

<ul>
  <li>Item 1</li>
  <li>Item 2</li>
  <li>Item 3</li>
</ul>

Note that sub-menu items are possible too, ...

I use Drupal for most of my sites. I use it in many different ways and it has been working real good for me.

On one of the sites, I use the ThemeKey module to select a different theme once you are logged in. This means, when I want to switch themes, that one theme selected for logged in users sticks, whether you disable it or not, it remains selected by the system.

And?

Well... one thing sticks from themes, their .info file. You just cannot refresh the cache properly unless you disable the theme, then re-enable it. (By the way, when disabled, don't go to the Blocks administration screen ...

I always have had problems with the <p> tag in HTML.

Now, I was happy to find the solution to a problem I hit several times and finally solved with a big smile.

In most cases I use <div> (division) tags to create web pages. That's easy because those don't generally use any padding or margin. So you build all sorts of complex tree with that and the result is just perfect.

[toc hidden:1]

Yesterday I had a customer sending me emails from a different account from last time. That different account is a Yahoo! account so in general there is no problems with that.

Yet, this one time it did not make it. One of my email filters failed. Namely, the DKIM filter. It uses the dkim library to check mail messages and make sure that they indeed originate from where they say they are from.

It is an interesting concept. In the following figure I show the standard scenario of a hacker sending me spam and a valid domain sending me an email:

As you can see, if I communicate with the ...

Thank you for visiting my website.