Howtos / Articles

Advanced .PAC proxy auto config file example

The following example pac proxy auto config file will allow you to bypass the proxy server for all local IP addresses, and also set exclusions on specific domain names.   For information on what a PAC file is, please check out:   What is a .pac proxy auto config file     Advanced .PAC proxy auto config file example:   function FindProxyForURL(url, host) { var ProxyServer = “PROXY; DIRECT”; //Proxy server to use for HTTP/HTTPS. //var ProxyServer = “PROXY…

Read more [...]

What is a .pac proxy auto config file

A .pac (Proxy Auto Config) file is a file stored on a web server that contains instructions for the browser, to help automate the proxy server setting configuration in a web browser. The .pac proxy configuration file contains JavaScript code, and must contain one function called FindProxyForURL. This function accepts two parameters, a URL, and a Hostname. This function returns either “DIRECT” to tell the client to connect to the web server without using a proxy, or “PROXY” followed by…

Read more [...]

Change the Timezone in Ubuntu

To change the timezone on Ubuntu all you need to do is reconfigure the tzdata package. This can be done using the following command: sudo dpkg-reconfigure tzdata A menu prompt will then appear. Simply enter in your geographic area, and then the relevant city/timezone you want.…

Read more [...]

Generate new SSH keys

SSH allows the use of encryption keys to be used to allow logging into a system instead of having to remember a plain text password. This is great for use in scripts, and automated tasks, but can be a problem is anyone else ever gets the keys somehow. If the keys become compromised, you must generate new SSH keys. With the increasing use of virtual servers nowadays, if you are creating new servers based on a image file/backup, you may…

Read more [...]

Prevent DNS Amplification Attacks with BIND

DNS amplification attacks are a common form of DDoS that makes used of misconfigured DNS servers on the internet. The attack involves sending a request to the misconfigured DNS server, with a spoofed source IP address, so the response goes back to a third party (the target/victim). The attacker will use the largest DNS query possible, so that more data is sent to the target IP address, flooding their connection. To help prevent these attacks, always make sure your DNS…

Read more [...]

Page 6 of 41« First...234567891011...2030...Last »