U-Boot

Ever since I was a young boy, I have been fascinated by submarines. Especially by the German u-Boot from World War 2. I don’t know why, but there is something about this sinister, deadly warship that really attracts me. Yes, I know there have been major advances in submarine technology. I know that today’s submarines are far more potent and deadly and I know that the U-Boot was not even a proper submarine but a submersible warship. Regardless of that, the German U-Boot Waffe achieved some amazing feats during the course of the war. So much so that Winston Churchill wrote that the only thing that ever really frightened him during the war, was the U-boat peril.

Continue reading “U-Boot”

Prius

One of the things I have always wanted to do, ever since Toyota launched the Prius, was drive one. Not too long ago, “thanks” to an accident, I had the opportunity to drive a Prius. It was a new model, which Toyota touts as the most advanced car in the world. That raises a person’s expectations. The question is, does the Prius deliver? Continue reading “Prius”

Migrating spamassassin from db files to MySQL

In this post, we’ll take a look at how to migrate spamassassin from the default db files to a MySQL database. The assumption is that you have a working mail server that already does spam scanning and where spamassassin stores its information in the default db files. In order to improve speed, especially for auto-expiry but certainly also for spam filtering itself, it is advisable to store the data in a faster database. Continue reading “Migrating spamassassin from db files to MySQL”

The ssh files (2)

Welcome to the second instalment of the ssh files. In this instalment, we’ll be taking a look at logging in without a password, using public key authentication. The major benefit of logging in through public key authentication, is that you will only have to remember the pass phrase of your key and no longer a dozen or more passwords on different servers. Also, setting your ssh daemon to only allow public key authentication will foil any attempts by script kiddies to brute force your password…because there isn’t one. Continue reading “The ssh files (2)”

Door to door spam

Online or offline, we are constantly bombarded with all kinds of messages trying to convince us to buy this or give money to that. I tend to be a little allergic to advertising messages.I tend to be a bit careful with the kind of information I want to allow in.  Well, I’ve got that pretty well covered…except for one last area. Continue reading “Door to door spam”

The ssh files (1)

If you have ever had to administer Linux (or Unix) servers, you are probably familiar with ssh, the secure shell client. For those of you not familiar with ssh, think “telnet on steroids”. For those of you not familiar with telnet or ssh…what are you doing administering servers? Ssh is like the Swiss army knife of remote connectivity. It can do so much that I think that no one has ever used all of the features it offers. This article is an exploration of the basics of ssh, future articles will explore its functionality in more depth. Continue reading “The ssh files (1)”