Simple Steps to setup OpenSSH server on Ubuntu 10.10

One of Linux’s more useful features is its ability to permit secure, encrypted remote access. Secure Shell technology (SSH) permits you to control a remote computer without having actual physical access to the machine.
SSH’s network traffic is encrypted, and assuming you configure SSH correctly, quite secure.
You can use an SSH implementation called OpenSSH Server to remotely, securely access your machine.
Here’s how to install and perform a basic security configuration of OpenSSH Server on Ubuntu 10.10
First, you’ll need to install OpenSSH Server. To do so, open up a Terminal window and type the following command:

sudo apt-get install openssh-server


apt-get will then download and install OpenSSH Server. Depending upon the speed of your computer and Internet connection, the installation may take several minutes.
Once the installation has finished, return to the Terminal. We’ll need to make a few changes to your /etc/ssh/sshd_config file in order to increase SSH’s security. First, however, we’ll want to make a backup copy of your sshd_config file in case anything goes wrong. Type this command into the Terminal:
sudo cp /etc/ssh/sshd_config ~

This will make a backup copy of the sshd_config file in your home directory.
Next, we’ll need to edit the sshd_config file itself:

sudo gedit /etc/ssh/sshd_config



Once you’re editing the file, you’ll want to change the following directive as follows:
PermitRootLogin no
This will keep anyone from attempting to log into your server via SSH as root.

Next, add this direct to the end of the file:

AllowUsers USERNAME

AllowUsers adds an additional layer of protection by only allowing specific users to connect via SSH. For instance, if you wanted only users test1 and test2 to have SSH access, you would set AllowUsers as AllowUsers user1 user2
You may also want to consider changing the Ports directive. By default SSH runs over TCP/IP port 22, which means that any malware bot autoscanning port 22 can target it. Changing the Ports directive to something different will make SSH run over a different, blocking some of those automated cracking attempts.
Once you have finished changing your settings, save the sshd_config file, and restart the SSH daemon with this command:
sudo /etc/init.d/ssh restart
You should now be able to SSH into your Ubuntu 10.10  machine from another system with an SSH client (if windows use putty ., if ubuntu use openssh client)

How to Grow your Small Business with Yahoo

How to Grow your Small Business with Yahoo
Note:  this is not a yahoo campaign , I just try to  informed yahoo give some flexibilities for National Small Business Week. You can also go to best alternative : Giant Google. Google is a co-sponsors for National Small Business Week (according to SBA)
Yahoo is the world famous and most recognized internet based company. Small Business owners (especially in America) also can grow with giant yahoo company.
Yahoo says as follows for National Small Business Week May16-20 ;
This National Small Business Week, Yahoo! Small Business is celebrating our nation’s current and future entrepreneurs by offering:
  • A fun and interactive quiz on our Facebook page for would-be entrepreneurs to test their small business IQs. See if you’re ready to start a business!
  • A special discount for entrepreneurs thinking about starting a business or thinking about bringing their existing businesses online. With Yahoo! Small Business’ easy-to-use services, launching your company website or online store can be greatly simplified. You can build your website yourself or hire one of our experienced partners to do it for you.
During this National Small Business Week, we thank and celebrate the many inspiring entrepreneurs who define the American dream.

You can get a yahoo domain very easily.
Use business level email
Get a customized yahoo website.
Sell online with yahoo .

KOHA Best Open Source Library Managment System

KOHA is the best and free library managment system for any scale library.

Koha installation is little challange for system administrators.
It written by perl language and run on apache server with mysql backend databasse.
latest stable version is v3.4

following is their announcement

Koha 3.4

Koha 3.4 Released
by Chris Cormack

Kia ora tatou
The Koha development team is happy to announce the release of Koha 3.4.0.
Koha 3.4.0 is a major feature release that contains major changes to underlying architecture (adoption of Template::Toolkit for templating) and performance enhancements (removal of item data from biblio records).
These changes, in addition to the inclusion of many new features, mean a lot of new strings for translators to translate.
For these reasons we recommend that people who are already running Koha inproduction delay their upgrade until 3.4.1, due May 22, to give the translators time to finish, and for the removing of item data to be streamlined. If you do wish to upgrade please make sure you read the UPGRADE section of the INSTALL document.
The development team would like to thank all the people who have made this release possible. Please take time to read the release notes.

http://koha-community.org/koha-newsletter-volume-2issue-4-april-2011/#release


What is the best to buy Keyboard [ USB Keyboard or PS2 keyboard ]!!

Many people want to know whether to buy or use a PS/2 or a USB keyboard .so please consider following factors before buy your new keyboard.

Convenience
The USB interface supports hot swapping meaning you can disconnect and reconnect devices while the system is powered on. The PS/2 connector does not technically support hot swapping, if you connect or disconnect a PS/2 device you may be forced to reboot. That said, most newer computers are tolerant of this and continue to work. But even so there are sometimes issues.

Another benefit to the USB connector is it is easier to connect when you can not see the plug (reaching around behind a computer). The PS/2 connector being round is harder to connect without bending the pins. Also, many computers have USB connectors on the front for convenience.

USB Allows for multiple keyboards at one time
This is convenient for keyboard co-op games or if you just like having multiple keyboards to swap for different tasks (gaming versus typing)


PS/2 implemented poorly on many modern motherboards

Availabilty of Keyboards
Quite simply it is getting harder and harder to FIND a PS/2 keyboard as Logitech/Microsoft/HP/Dell move to exclusively USB keyboards. And if you want a Realforce, a Happy Hacking, or a Razer Mechanical there IS no PS/2 choice or ability to work with a simple purple PS/2 adapter

Resale Value
USB keyboards are more popular and therefore easier to sell. Unless you have a IBM M15 of course.


source:[geekhack.org]

Little Introduction about SPAM

What Is Spam?

When referring to emails, according to the NCES (National Centre for Education Statistic), "Spam refers to electronic junk mail or junk newsgroup postings. Some people define Spam even more generally as any unsolicited e-mail. In addition to being a nuisance, Spam also eats up a lot of network bandwidth. Because the Internet is a public network, little can be done to prevent Spam, just as it is impossible to prevent junk mail. However, the use of software filters in e-mail programs can be used to remove most Spam sent through e-mail."

Some search engines use the term to describe websites that try to attain a high listing rank by submitting identical or mirror pages. In this article I am going to give you a few tips about email Spam.

If we give a too general definition to the word, we might end up taking for Spam perfectly legitimate emails. Not "any" unsolicited mail is Spam. Spam means unsolicited bulk email.

If a message is unsolicited that doesn't make it Spam. The same goes for bulk. A message is Spam only if it is both unsolicited and bulk. When you receive an unsolicited job enquiry, you do receive an uncalled-for email. But is that Spam? No. What about a newsletter? That is bulk, but no Spam if you are a subscriber.

Why Do You Get Spam?

Have you posted your email address online in forums, chat rooms, on your website? Than why do you marvel? Spammers gather the addresses from the Internet; so no wonder your own found its way onto a spammer's list. Besides, spammers use different other means to get what they want: viruses, Trojans, buying from other spammers.

Spam Scams

How many times have you received an "update your account" email from paypal, a bank or ebay? How many times have you received a "warning message"? Maybe it didn't look suspicious to you as it came from an institution you work with, but was it really that way? This kind of emails is referred to as "phishing scam". There is not much you can do when this happens. Just don't click on any links in that email, don't give away any confidential information such as social security number, bank account or credit card number. There are some free tools that can protect you against known phishing websites. For example download the free EarthLink toolbar and report the scam to the Anti-Phishing Working Group.

What about the emails from different Nigerian (or other nationalities) citizens offering you a percentage of a vast sum of money? Yes, you've got that right: scam. You'll only loose your money on this one. Better don't be curious. They will ask you to pay a fee in advance – a so called transfer tax, and guess what: some complications will appear, you have to pay more and more and end up with nothing. And don't believe the "you won money" lottery sweepstakes either. You'll only spend. The same goes for the Nigerian purchase scam: they want to buy something from you, pay by check and they wish the goods to be sent in Lagos, Nigeria.

A Major Don't

Don't reply to spammers… ever! Don't send any "remove me" message. By doing so you confirm your address is active, you show you read bulk messages, you prove your ISP doesn't use Spam filters. You are the perfect candidate. You will never be removed. On the contrary…

(SOURCE: freeskills)

© 2010 Best IT Tips | Designed by Sudathkg