.tgz
- x using cvsup
- x newbies could use cvsupit (not what it really does..)
- :# pkg_add -r cvsupit.tgz
- - cvsupit will proberly ask you for the default values it
- place at /etc/cvsupfile, which is used by cvsup
- - after that it will start cvsup to update your system
- x if /etc/cvsupfile already exists and you know what you do,
- this command will update your system (maybe run it via cron...):
- :# /usr/local/bin/cvsup -g -L 2 /etc/cvsupfile
- o whats about daemon start-stop scripts (like at linux: /etc/init.d/) ?
- x configure and compile custom kernel:
- x read http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/kernelconfig-building.html
- x create custom kernel conf-file
- - cd usr/src/sys/i386/conf/
- - copy default kenrnel GENERIC to eg MYKERNEL
- - edit/modify MYKERNEL
- x configure sources(really?)
- - run /usr/sbin/config MYKERNEL
- x build kernel
- - cd ../../MYKERNEL
- - make depend
- - make
- - make install
- x use packet fiters (firewall):
- x read http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls.html
- x some options at the kernel have to be enabled:
-
- options IPFIREWALL #Compiles into the kernel the code for packet filtering.
- options IPFIREWALL_VERBOSE #Enables code to allow logging of packets through syslogd.
- # Without this option, even if you specify that packets should be logged in the filter rules,
- # nothing will happen.
- options IPFIREWALL_VERBOSE_LIMIT=10 #Limits the number of packets logged through syslogd on a per entry basis.
- # You may wish to use this option in hostile environments in which you want to log firewall activity,
- # but do not want to be open to a denial of service attack via syslog flooding.
- # When a chain entry reaches the packet limit specified, logging is turned off for that particular entry.
- # To resume logging, you will need to reset the associated counter using the ipfw(8) utility:
- # ipfw zero 4500
- # Where 4500 is the chain entry you wish to continue logging.
- options IPFIREWALL_DEFAULT_TO_ACCEPT #This changes the default rule action from ``deny'' to ``allow''.
- # This avoids the possibility of locking yourself out if you happen to boot a kernel with IPFIREWALL support but have not configured your firewall yet.
- # It is also very useful if you often use ipfw(8) as a filter for specific problems as they arise.
- # Use with care though, as this opens up the firewall and changes the way it works.
-
- x firewall is enabled at /etc/rc.conf (or /etc/rc.conf.local)
- firewall_enabled = "YES"
- firewall_type = ""
- x is either a case at /etc/rc.firewall (/etc/rc.firewall6 for ipv6)
- or some custom file to read rules from.
- x Use firewall_type = "OPEN" for default policy 'OPEN' (allow all)
-
-
+
- QoS (Quality of Services)
o check it out !
@@ -89,7 +31,6 @@
x integrated new FormProcessing classes from phphtmllib (released one day after interface to binaryclouds Formbuilder was written ;)
x refactored DataItem to use now phphtmllib form processing instead of interface to binarycload
o review code and move to phphtmllib
-
o XOOPS (http://xoops.org)
XOOPS is a dynamic OO (Object Oriented) based open source portal script written in PHP.
It is the ideal tool for developing small to large dynamic community websites, intra company portals,
@@ -120,7 +61,7 @@
- ldap will check your ticket pricipial against its acl's !
o 'libpam-ldap' from Turbo is bad, don't use it !! (remember at 'apt-get upgrade' !!)
o write this down in some (existing e.g. sendmail?) howto
-
+
- Sendmail
o research some about sendmail-cluster, 2 mx records, howto to set up second mx/cluster?
x backup mx:
@@ -150,8 +91,8 @@
- Create Database
:# mysqladmin create
- Set Privileges on databases(creates user too, if not exists...):
- mysql>grant all on .* to identified by "";
- mysql>grant all on .* to @ identified by "";
+ mysql>grant all on {database}.* to {user} identified by "{pass}";
+ mysql>grant all on {database}.* to {user}@{domain} identified by "{pass}";
- Document saving:
@@ -164,11 +105,16 @@
o convert all howto's to LaTex format ( look at 'nfo/doc/computing/sysadmin/linux/example_latex_howto.lyx' )
+ - news.netfrag.org:
+ o create remote functions to implement e.g.:
+ o a mozilla button for creating new newsgroups
+
+
future:
o build 'black box' to trace for 'spys' at a isdn/internet connection ;)
-$Id: notes_2003-02.twingle,v 1.1 2003/03/09 16:36:37 jonen Exp $
+$Id: notes_2003-02.twingle,v 1.9 2003/04/07 01:29:52 jonen Exp $
\ No newline at end of file