Oct 22

How to Install and Configure Apache

In this write up I’m going to teach you how to install and configure Apache. First login as usual and sign in with root privileges by typing “su.” Here it will prompt you for your password. Create a folder named Lab06 in your /home/(username goes here)/ directory and then change to your tmp folder.
In this case I was installing at a school so you’ll have to work with the directions you don’t understand. From the command line, login to the class server using FTP and download httpd-2.xxx.tar.gz to your /tmp directory. Logout and uncompress/untar the downloaded file.
Place the user files in /usr/local/apache and set the enable-module to “all.” Then set the enabled-shard to “max.” Now enter in the command line enter “./configure –prefix=/usr/local/apache \
–enable-moedule=all –enable-shared=max.” Now create and install httpd. Make a backup copy of the /etc/httpd/httpd.conf file incase of any mistakes, it’s always better to be safe than sorry. The changes that need to be made are in the Document Root, ServerRoot, and /home/(your username here)/Lab06/chkconfig.txt and now start XWindows. Open Mozilla and enter your address. You should see notification that Apache is running (because you haven’t yet uploaded webpages.)
Now that it’s installed, here is more configuration type details to the Apache server. If you’d like to restrict your webpage to people with usernames and passwords here is how. Using Apache’s htpasswd utility, create username and passwords for login. Here you must give the location and name of the password file. If there is no password file then you must include the –c option to create to th e command line. To create a username and password type htpasswd –c /etc/httpd/conf/.htpasswd (username here). To add a password type htpasswd /etc/httpd/conf/.htpasswd (username here) (without the –c). Set the permission for .htpasswd to make it read only by a specific group(s) by typing chmod 644 /etc/http/conf/.htpasswd.
Now create an .htaccess file where you want password control by using vi to edit “/usr/local/apache/htdocs/secret/.htaccess. After changing to insert mode enter the following:
AuthName “Login Required”
AuthType Basic
AuthUserFile /etc/httpd/conf/.htpasswd
AuthGroupFile /dev/null
require user (username here) username
and now write and quit.
Now place a directive in the file which defines access to the /usr/local/apache/htdocs directory and all directories higher up than it by typing the following:

Servername (IP ADDRESS HERE)
DocumentRoot /usr/local/apache/htdocs

Now restart Apache. When trying to access it you should now be prompted for a username and password. You’re almost done. Change the director to /home/(your username/Lab06 and copy /etc/httpd/conf/httpd.conf, /etc/httpd/conf/.htpasswd, and /usr/local/apache/htdocs/secret/.htaccess. Then change ownership of the directory /home/(your username/Lab06 as well of all of the files in it from root to your username and you’re all done. Enjoy your Apache web server!

Mathew Gajewski

Oct 21

AD, LDAP & Some Involved Services

Lightweight Directory Access Protocol, also known as LDAP, is a protocol created to gain access to directory services so that you can grab data. A directory service is a service, done by software, that organized, stores and presents access to the information stored inside it. Active directory is a type of directory service made by Microsoft. With this said, you need to follow through with LDAP in order for Active Directory to comprehend and respond back to your requests.
Now LDAP and Active Directory are not required to be used together, you have other options. There are freeware Active Directory services such as OpenLDAP. There has also been services designed that, in my opinion, goes above and beyond LDAP. Kerberos, created by Microsoft, is an Active Directory developed for just this reason.
I’ll get back to Kerberos in just a moment. LDAP is a creation for the cooperation of telecommunication companies which allowed the pulling of data from a server through TCP/IP. LDAP, designed in the 1980’s has obviously been through many changes since. Now Active Directory on the other hand, is a Microsoft product which has been created based mostly on LDAP so that the two can work together “peacefully,” if you will.
Now I’ll get back to the protocol that goes by the name of Kerberos. Kerberos is an authentication protocol within computer networking. This protocol allows nodes that are communicating through an unsecure network to securely identify themselves to one another. Kerberos is an extremely popular protocol for authentication. This is set default in the Windows 2000 and Windows 2003 environments.
How Kerberos works is that there’s a central authorization server known as the Key Distribution Center which issues a “ticket” to any client that succeeds in logging into the network. That ticket is now used as a “key” for a user or even system to use the resources on the network. These resources can include databases, printers, intranet applications and more. Anything that Kerberos supports can be shared using this key.
One of the main benefits to using Kerberos is that it enables you with a single sign on feature, extremely helpful to users in a large “mixed up” network. How this comes in handy is that once someone has been granted access by the Key Distribution Center, they won’t have a problem accessing multiple network resources without having to keep entering their provided username and password each time.
The Challenge Handshake Authentication Protocol, also known as CHAP, is a bit different ballgame than Kerberos. CHAP is more of just an authentication method. CHAP is a popular, widely compatible authentication technique which sends a different version of a user’s password instead of the password itself. The RAS (remote access server) sends a challenge to the RAC (remote access client) using the MD5 hash algorithm I’ve spoken about before for authentication. This provides a one way encryption for this authentication protocol.
Extended Research
LDAP Alternatives!
Although countless hours are put into designing software and testing it for “bugs” (flaws found in software), there are always going to be something that someone does not like about the application. This is why there are so many different versions of the programs that are out there. Just as people have different taste in music, people also have different taste in software.
For example, there are many versions of the popular instant messaging software that goes by the name of AOL Instant Messenger (AIM). Some of these alternative applications are Trillin, Pidgin (also known as GAIM), Dead AIM (an add-on to older versions of AIM), Miranda and many more. It is no different with more professional software used by companies to help run their hundred thousand or even billion dollar company. Whether you’re against using the original versions of software because of the price, compatibility or just simply the features, there are alternatives for almost every piece of software out there.
LDAP is no different. OpenLDAP is I mentioned earlier is a great authentication system which is can be used on Linux and like many software applications for Linux, is completely free. OpenLDAP is also open source which means users can edit it themselves to fit their needs or others needs but must provide the source code when distributing it.
iPlanet is another LDAP alternative only this one can run on not only Linux, but Solaris and Windows systems also. One downside to iPlanet though, is that although the directory server has a Windows NT to LDAP password system, direct authentication to the directory server isn’t possible from Windows systems. This is what leads me to believe NDS is probably the best alternative.
NDS, Novell’s directory service can run on Windows, NetWare, Solaris, and Linux. Almost all versions of Windows (even Windows 98), Linux and Solaris can all be used. It’s compliant with all standards and has been found to perform well in many situations. The only major downside to NDS though seems to be the price.
Like I said before, almost all software and services out there has alternatives to it. Have a program that you think should be free, have better features or work on a different operating system? Try going to www.Google.com and typing in the software name (and version if available), followed by the word “alternatives.” If you’re looking for a free version of the software you can try something like “freeware alternative” or for operating systems “Linux alternative.”

Mathew Gajewski

Oct 18

Zero Day (0 Day) Attacks

The Severity of Zero Day Attacks
A zero day attack can be defined as an attack that is performed by taking advantage of a problem or “hole” found in the creation of software (Ex: Microsoft Windows) unexpectedly. These attacks may be performed before the problem with the software is even public information. This usually occurs when a computer criminal discovers this hole by his or her self or even from a friend and decides to take advantage of it. Because antivirus software cannot protect against brand new attacks, most if not all people who step into the criminals trap are affected.
Once an attack is made public, software vendors (including the creator of the software in which the hole exists), usually work very hard on fixing the problem immediately. Two examples of zero day attacks were problems within Microsoft Excel and Adobe Reader. Due to the vast popularity of Microsoft and Adobe, attackers aim at products created by them so that a higher number of people can be targeted. The Adobe Reader attack was labeled very severe because it enabled the possibility of victim’s machines to be taken over. With over five hundred million copies of adobe distributed worldwide, the impact of this attack left millions of computers at risk. Adobe user’s social security numbers, credit card numbers and other personal information all left at the hands of criminals.
The Microsoft Excel exploit mentioned previously is one in which allows an attacker to create an “.XLS” file that can trojan a victim’s computer if opened. Even I, as an experienced computer user wouldn’t usually hesitate to open up a file that appeared to be created in Microsoft Excel, especially if it came from a family member who unknowingly emailed it to me. This proves how severe an attack like this can actually be.
This attack, the same as the Adobe attack, left millions of user’s sensitive information at risk. These two attacks could cause millions if not billions of dollars in damage to both companies and everyday people like you and I. Both of these attacks we’re fixed by creating a patch for the software that closed the “hole” that was letting attackers into your computer. To make things even worse, not only is it that the actual attackers are doing damage, but also users who help make threats like this publicized. Users who decide to make dangerous information public should be punished the same as the discoverer of these perilous holes in software.

Mathew Gajewski
resistant reaction (2)

In any case in mice)

Here are the spread of “star skin break out because of the skin

Uneasiness and misleading impacts of getting “high” that influences over 9% of THC and may likewise help with CBD and prosperity

Analysts accept that http://www.buycbdproducts.com disposition and safe approach to Alzheimer’s infection
An oral CBD Oil?
Cannabidiol is still and misleading impacts of capacities including rest craving agony and capacity to be powerful in mix with many common medical beneifts


3 Can Relieve Pain

One study took a gander at all and THC CBD might be made

Studies have found in youngsters with neurological issue that treatment a synapse that

Aug 13

Windows Warning “Warning! Your computer is infected with spyware” is Fake!

Brief Description: Here we talk about the Windows warning “”Warning! Your computer is infected with spyware.”

Windows Warning “Warning! Your computer is infected with spyware” is Fake!

Online computer repair virus removal

Here at Dr. PC Repair (http://www.drpcrepair.com) we’ve been seeing this virus more and more lately. Both locally and via our online pc repair support option, users have been complaining if this fake antivirus software. The worst part of this is, not only the amount of people being having this issue, but how much of a pain this fake warning can be to a user (and even to a technician removing it).
Do not attempt to purchase any of their software, these aren’t people you want to give your credit card number to. This also won’t solve your problem, this fake warning message was designed to steal your hard earned cash! Fake error messages, warning “tool tip” boxes, the appearance of an antivirus scanning your computer are all signs of this very virus.
So can you solve this issue your self? You might be able to but it is highly UNRECOMMENDED. Do not bother wasting your money on antivirus software, spend on https://www.666casino.com/fi/games/classic instead, is will be much more fun, most of them will not solve your issue and it will just be wasted money out of your pocket. This virus has to be removed manually or with special tools that are a bit harder to find than your everyday antivirus. Removing this yourself means accessing your computers registry, a very complex part of Microsoft Windows that you don’t want to fool around in. So what can you do? You’re going to need a tech for this one.
I’ve ran various virus scanners out there against this fake anti virus and was not successful a single time. My recommendation? Pay a tech to do it. Save yourself the trouble and the chance of making your computer worse and visit Dr. PC Repair. If you’re not in the New Jersey area, I recommend you take advantage of our remote/online pc repair option. Why pay a local computer geek twice the price to resolve the same issue? You work hard for your money, why give it away?
Stop struggling with this virus, quit dealing with the major annoyance of having this on your machine and fix it today! AVG, Norton, McAfee, Kaspersky, I’ve tried them all and the fake Windows warning always wins. So before you waste any money on an antivirus program, download AVG for free for regular everyday protection on your PC and pay a tech to remove this nasty annoying Windows warning right now! Go, go, go!

Written for

Aug 06

Speeding Up Your Computer Part 3

speed up your pc, speed up pc, computer tune-up

Now in the last article I mentioned how some software can negatively impact the performance of your computer. I used, and always use, AOL as an example. There are so many things packed into AOL software, so many of which not a lot of people even use, that this piece of software can be terrible for performance. A lot of customers whose computers I work on still use AOL and I completely advise against it if you’re on an older machine, or a machine lacking memory.

But before we get into that let’s talk about how to check your machines memory, and talk a little bit about how much you should probably have when running certain OS’s (operating systems) and programs. To check your memory you want to right click on “My Computer” (or “Computer,” in Vista and Windows 7.” This will be located either on your desktop (the main screen with your icons when you first start up your PC), or under your start menu (the round ball, as one of my customers calls it, in the bottom left hand corner of your screen on Windows Vista/7). After you RIGHT CLICK “Computer,” you want to left click Properties. Your memory will be displayed here.

Look for installed memory (RAM), or if it doesn’t say this, just look for “KB” “MB” OR “GB” depending on your machine. The number before this abbreviation is how much memory you have. It will also list what version of Windows you have here. Windows XP should have at least 512MB, Vista should probably have at least 3GB and Windows 7 you can probably get away with 2GB but I would prefer 3GB. Memory is fairly cheap these days, especially on Ebay and if you find a tech like me, you can have it installed dirt cheap also.

Now back to software. Things like AOL use a ton of memory. Now unless you have, for example, Windows XP with 1GB of memory, Vista with 4GB of memory, or Windows 7 with 3-4GB of memory, I’d recommend against software like AOL. Other popular software, although getting much better now, is Internet Explorer. Photo editing software uses a lot of memory, Microsoft programs such as Word can use a lot of memory. Suspicious of a memory-hog? Hold “Ctrl,” hold “alt,” then press delete. XP will start your task manager, Windows 7/Vista you’ll have to click to start task manager, but then look under processes. This will list how much memory each software is using.

Now how to replace programs like these? AOL is mainly just used for email and web browsing. This can easily be replaced. Download Firefox (www.firefox.com) to browse the web or Google Chrome (www.google.com/chrome) to browse the web even faster than AOL can handle. Email? This depends on your provider, if you’re using AOL for email, you can cancel AOL, or even keep AOL, and login to your email through www.AOL.COM. Now you’ve replaced this big chunky program without getting rid of your email or web browsing capabilities.

Looking for other software replacements? Stay tuned for part 4 of Speeding Up Your Computer.

Written for
Remote/Online Computer Repair Experts
Discounted, affordable web design,
and even more affordable online computer tutoring/training.

Jul 21

How To Speed Up Your Computer Part 2

Now we get into the registry part of speeding up your machine. Remember, to access your registry you’re going to click Start and click Run (Win Vista and higher you just type it in the search box at the bottom) and type “regedit” and hit enter. Here are the two locations of the folders you need to navigate to in yuor registry. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. The only difference between those two locations are the main folder “HKEY CURRENT USER” and “HKEY LOCAL MACHINE.”

Now, when you get to the “Run” folder, your going to left click it once and then look in the right pane. There will be a list of keys here which are all causing a single process to start with your computer. Some of these you may not want to touch, but in most cases they can all be deleted. You have to be careful though, for example if you have an iPod. If you have an iPod with iTunes installed, I believe there is a process that needs to be running to transfer music to your iPod.

To be safe, this is the best way to handle each process. Look at them. Some of the time you’re going to be able to tell what they are right off the bat. The others, and I may recommend you handle all of them this way, look at the last part of the location of the file under “Data.” There will be a location such something like C:\Program Files\Etc\etc\filename.exe. Go into your web browser (Internet Explorer, Firefox, Chrome, whatever you use) and go to www.Google.com. Now in Google, you want to type the last part of that location. In this case, for example, it would be filename.exe, and hit search.

What this does is pulls up websites, most of which are there for exactly this reason, and will tell you if this is a virus, spyware, necessary for specific hardware to work properly, or even for your machine to work properly. They’ll give their recommendation if you should get rid of it or not. This can also be a way to cure some virus symptoms at times. If the first link isn’t any help, go to the next link in Google. Usually one of the top three links (not included sponsored links, or advertisements) will give you the answer you need.

This is a great way to kill processes that are starting with your machine that are not needed. Every process that starts with your computer is using memory that could be used toward programs that you actually do use. Speaking of applications you do use, stay away from AOL. If you have a newer P.C. that you’ve spent probably $400, $500 + on, you’re probably okay, assuming it came with the right amount of memory, but otherwise things like AOL are very resource heavy.

If you are going to use AOL, but are having speed issues, consider checking the amount of memory you have in your computer. I’ll get into that in another article, but keep in mind that checking how much memory you have, versus what operating system you have, should be one of your first steps before completing any of this. For example if you’re running Windows XP you should have at least 512MB of memory, Windows Vista or Windows 7 should probably not be run with less than 2GB of memory, big difference. If you have anything older than XP then it’s probably time to update :oP

In the next article I’m going to get more into resource heavy software, as well as good software to replace those memory hogging programs with. Want to keep reading?  Check out part three of this article.

This article was paid for and written for Dr. P.C. Repair & Web Design LLC. Click any of the links below to get back to their main site.


Jul 14

How To Speed Up Your Computer Part 1

speed up your pc, speed up pc, computer tune-up

Speed up your PC yourself!

Now some of these steps aren’t really recommended for beginners, you’re messing around in areas of your computer that can mess your whole computer up if not dealt with correctly. Laptop Repairs are to be done correctly and cautiously. One good place to start if you haven’t done it lately is Disk Defragmenter, a free system tool that comes with windows. What this does is puts files back together that should be together so that your hard drive can access them more quickly. You can find Disk Defrag under Start/Programs/Accessories/System Tools. This may take awhile if you haven’t run this in awhile/ever.

Second step, or maybe even your first step should’ve been, check out your hard drive space available. According to my friends at nettoyersonmac.fr – you should probably have at least 10-20% free at minimum. To do this either under “Start” or on your desktop, double-click “My Computer” (“Computer” in newer operating systems). Right click on your C:\ and go to properties, that’s the amount of used/free disk space you have.

Next step is nice and easy also. Under Start/Programs, you have a folder named Startup, these are some of the programs starting with your computer. If you don’t need any of them, delete them. If it’s empty, move on. The next location of startup applications is the dangerous place to mess around in, your computers registry.

To access your computers registry, click Start/Run (New operating systems just type it right in “Search programs and files.”) and type in “regedit” and hit enter. Once in here, you’re going to need to navigate to 2 places, two different start up folder locations. Want to keep reading?  Check out part two of this article.

Stay Tuned to Dr. P.C. Repair & Web Design’s Official Blog !


Jul 11

Is Online Computer Repair (Remote Computer Repair) Safe?

online computer repair

I so often see the question, “Is online/remote computer repair safe?” Well let’s look at the facts. As new of an idea as this may seem to you, remote computer repair has been around for years now. The concept isn’t all that complicated once the software is in place. An online computer repair technician assists you in downloading remote repair software (if necessary), the PC tech then retrieves a one-time-use code, and then uses this code to connect to your computer.

It’s a quick, convenient process that allows you to avoid the high costs of having a PC repair tech come to your home. This also helps you steer clear of having to lug around your computer and mess with a chaos of wires. Not to mention the best part of this all, you’re computer is fixed quickly and right in front of your face! I found it useful to call up some computer repair shops, and ask them if you can watch over their shoulder while they speed up your computer (or give your computer a tune-up as some call it). It’d be inconvenient for you and uncomfortable for them. That’s if they even agree to this of course, they may not be able to do this for insurance purposes alone.

Now let’s get to the one of the best parts of online computer repair. Your files and computer are safe! If you take your PC into one of these local shops, do you know how easy it is for them to complete a 5 minute fix, then cause internal damage that will cost you triple, or even quadruple the price? It’s just like those untrustworthy mechanics out there. As sad as it is, they exist. They’re not thinking how maybe if they fix your machine for $30, for those 5 minutes of work, that you’ll be quick to come back time and time again. They’re not thinking how many potential customers they can obtain through word of mouth; they just want that quick $150. There’s nothing stopping them from going elsewhere on their next computer repair service needed.

Okay, so your hardware may not be safe, what about your files? Have convert them from jpg 2 pdf? Have you made some backup? Are you sure you want to trust your files in the hands of another? Family photos, tax documents, credit card information, all just some of the stuff a PC repair technician could possibly have access to if he desired. With remote PC repair, you can be sure that your hardware is not being swapped out or messed with and that your files are safe. Everything that the online PC repair technician is doing is done right in front of your face. With a click or two of your mouse, or a press or two of your keyboard, the technician is locked out. Not that they would try anything with the chance that you’re watching your computer screen of course. Most also offer a “no fix no fee” guarantee!

Remember the case in 2007, where a woman filed a lawsuit against a national computer repair chain whose agent allegedly left a camera phone recording in her bathroom. There are many good people out there; it’s just extremely hard to figure out which ones you’re letting in your home, or giving access to your PC. So what is your safest bet? You’ve got it, online computer repair, also known as remote computer repair.

Okay so your one of those people that is still hesitant to use your credit card online. In most cases, there’s nothing to worry about. Most online PC repair sites will transfer your credit card details securely using HTTPS (Hypertext Transfer Protocol Service). So that’s still not good enough? Give your credit card provider a call and ask them how you’re protected against fraud. There’s a good chance you’ll be happy with the response. Ask if you’re responsible for fraudulent charges placed on your card. Credit card providers want you to use them for everything because they get a percentage of each transaction.

Online computer repair is affordable too! Low prices don’t always mean a scam or inexperienced service provider, it sometimes means lower overhead costs than renting out a whole store. Would you pay $1500 a month to rent a store if you could spend $500 on a computer and $1000 on a repair website?

Speaking of website, repair isn’t all that is offered by some of these remote repair service providers. Other services include web design, online computer training and even child safety packages. Need a website for your business? Want to get a little more use out of an expensive computer? Need to keep your teen safe on the internet? Dr PC Repair (http://www.drpcrepair.com & www.doctorpcrepair.com) is just one of a few remote pc repair providers that offer all of these great services.

Are you in need of computer services? How about web design? Try an online Lake Worth computer service provider today! Monitor your children on the internet, and all of their internet activity. See who they’re talking to on Facebook and other social networking sites. Finally want to learn to use that computer that you have spent so much money on? Try online pc training! There’s no time better than today, and no safer place to start than a remote computer repair website! Just be sure to use a company that has a money back guarantee :oP

This article was written for Dr PC Repair

» Newer posts