Blog Archives

Goodbye, clamav

Today I removed clamav from my VPS, which was built into the mail service I run. There are a small number of users and a few thousand messages a week - I liked that I was probably offering some small

Posted in Computing Tagged with: , ,

Adding fake ethernet headers to pcap files

Occasionally I see packet captures which have been saved as Raw IP, which can really mess up many of the tools developed to deal with pcap. Anything based on libnids, including the Perl module I maintain, cannot deal with it

Posted in Computing Tagged with: , ,

Better than grep

Anybody who has used command-line systems for a serious amount of time will love grep. But today I stumbled across ack, which (for many things) is better than grep and a whole lot nicer to use. The best bit? It's

Posted in Computing Tagged with: ,

Limiting command runtime in Linux

It is sometimes useful to limit the running time of a process, either to stop it from using up all resources or to make sure nightly cron jobs don't continue into working hours. I needed this for rsync, to let

Posted in Computing Tagged with: ,

dspam integration with dovecot

In a previous message I spoke about training dspam automatically. The script I posted there works, but it's not brilliant so I started looking for other ways of achieving spam training from the client.

Posted in Computing Tagged with: , ,

Training dspam from Thunderbird junk messages

Recently I have installed and configured dspam on my mailserver. It seems to work nicely but needs occasional training. I wanted to integrate this with Thunderbird so that users could automatically train dspam from their mail client.

Posted in Computing Tagged with: ,

Blocking SSH brute forcing using denyhosts

Tired of seeing repeated attempts to login to a Linux server you run?  There are a number of options, all with their own benefits and disadvantages.  The easiest way is to move the port that the SSH server runs on,

Posted in Computing Tagged with: ,

vim vs. Linux extended ACLs

Extended ACLs on Linux can be incredibly useful.  Permissions can actually be more secure whilst allowing a number of users or daemons access to a file, no longer are unwieldy groups necessary to allow reading or writing.  But for some

Posted in Computing Tagged with: ,