Balancing network traffic over multiple connections

Turning redundant Internet connections into bandwidth…

Say you have access to multiple links to the Internet, such as several wireless networks in range. Wouldn’t it be nice to combine all that bandwidth into one big fat pipe for your downloading pleasure?

Unfortunately it’s not so easy. You can’t just trunk them together because they each have a different public IP address, gateway, etc.

What you can do however, thanks to some nifty Linux NetFilter extensions, is assign outgoing connections to different interfaces. This will allow protocols such as BitTorrent to utilize bandwidth from each of the links.

read more…

Firewall logs to MySQL

This article covers quick and easy firewall logging to your database.

Security is a journey, not a destination. One good step along the way is to review and analyze your firewall logs and syslog messages on a regular basis. Unfortunately, the plain text logs produced by syslog are not in a form that is easily analyzed. Also, unless you are using syslog-ng, your firewall logs are probably scattered all over the various system message log files.

This article will show you how to move your firewall logs from syslog text files to a MySQL database in 10 minutes or so. read more…

Secure your Apache Configuration

Here are twenty ways to make Apache more secure…

By default many Apache installations tell the world what version of Apache you’re running, what operating system/version you’re running, and even what Apache Modules are installed on the server. Attackers can use this information to their advantage when performing an attack. It also sends the message that you have left most defaults alone.
read more…

Follow

Get every new post delivered to your Inbox.