IT-Tips

free tips on windows, linux. sql, mysql,apache,antivirus, virus, security, database, software, hardware

Fedora 9: How to change Linux Hostname or Computer System Name

One of the basic requirement of identifying your computer system besides from its IP and MAC address is by its system host name. These host names are used by many of the networking programs to identify the machine. To view your current computer host name, simply type as root # hostname Now, to change your(…)

Sendmail: How To Queue Mails based Server Load Average

There has been a lot of web debates and arguments which STMP email server works better, safer and faster. Not to discredit any other SMTP armies on the field, but I do often hear people debating about how difficult for them to configure Sendmail on time. Probably sendmail should be repackaged with a little teaspoon(…)

How To Configure Sendmail for DNS-based Blacklisting

As soon as a host connects to SMTP port running a sendmail MTA, sendmail can also be configured to check and block IP addresses of incoming emails that are found to be listed on one or more DNS blacklists. This is possible by configuring sendmail directive dnsbl or DNS blacklists. During the SMTP handshake and(…)

How To Configure Sendmail For Queueing Delay Time

Normally, when delivering mails to destination host by any mail transfer agent (MTA), MTA keeps track of delivery details such as delivery item location, delivery time stamps, particular mail IDs, and delivery attempt status. If a problem occurs when sending mails, normally an attempt should be made a later time and MTAs should queue up(…)

How To Check Squid Logs for Possible Tunnelled STMP via HTTP Injection

If MTAs are gettings smarter and better each new stable releases, spammers are also keeping up with them. Email spammers tend to undergo adaptive learning process from these commonly laid out standard and advanced email defense and antispam mechanism. If antispam features of MTAs are getting more centralized, effective and efficient, email spammers too are(…)

How to verify firewall ACLs and router rule sets using Linux

Core routers and firewall gateways are usually comprised of basic and extended access control lists including rule sets that define local network security level and control access. They are commonly implemented on gateway routers restricting hosts, protocols and port access to other host or networks located after their default gateways. Basically, routers and default gateways(…)

How To Enable Control Power Saving Mode for AMD Processors

Is your desktop being powered by Fedora? Does AMD Athlon/Duron processors powers your system? Here’s a quick tip on how to have management and control over your AMD Athlon/Duron powered processors using Fedora 9. Athcool is a small utility, enabling/disabling Powersaving mode for AMD Athlon/Duron processors.  By installing Athcool into you desktop, you can benefit(…)

How to Enable Support for Advanced Power Management (APM) BIOS on Laptops

Fedora repo supports a wide variety for desktop, server and laptop rpm packages. One of them is APMD rpm package. APMD is a set of programs for controlling the Advanced Power Management daemon and utilities found in most modern laptop computers. APMD can watch your notebook’s battery and warn users when the battery is low.(…)

How to Monitor Your Laptop’s Remaining Battery Time and Usage

Another dockable application that keeps track of your laptop’s battery usage. Most common feature in windows world is keeping track of laptop’s battery usage. This is also supported in Fedora Linux and comes with more feature. WmACPI also supports how long your laptop is running on battery mode, including the remaining batter charges shown time(…)

How To Connect and Transfer Music Files from PC to Apple Ipods Files using Fedora

iPod is a popular brand of portable media players designed and marketed by Apple Inc. With the current line if IPods, worldwide Apple IPod users get to listen from their favorite music and sounds files stored from their very own personal Apple Ipods, As IPods comes as a music portable storage and media player, it(…)

How To Make Use of UMask

Changing file permission is a file security thing. Any file owned by another user with improper file permissions could grant file access for free to any system users. This could also lead to super user access to the whole operating system in the case of improper default umask value with shadow and password files. Introducing(…)

How To Add and Install Alternative Liberation Fonts

Fedora project endorses liberation fonts. Fedora encourages to install liberation fonts as one of alternative linux fonts that also comes with Fedora installer images. By default X installation, liberation fonts are installed by default. The Liberation Fonts are intended to be replacements for the three most commonly used fonts on Microsoft systems namely Times New(…)