.htaccess is a configuration file for use on web servers running the Apache Web Server software. When an htaccess file is placed in a directory which is in turn ‘loaded via the Apache Web Server’, then the htaccess file is detected and executed by the Apache Web Server software. This htaccess files can be used to alter the configuration of the Apache Web Server software to enable/disable additional functionality and features that the Apache Web Server software has to offer. These facilities include basic redirect functionality, for instance if a 404 file not found error occurs, or for more advanced functions such as content password protection or image hot link prevention.

Basic Usages of a .htaccess file:


Redirects

Redirects enable us to direct web site visitors from one document within your web site to another. This is useful for example, if you have moved your web site content and would like to redirect visitors from old links to the new content location.

To set-up redirects, create an htaccess file following the main instructions and guidance which includes the following text:

Redirect /old_dir/ http://www.yourdomain.com/new_dir/index.html

The above line tells the Apache Web Server that if a visitor requests a documents located in the directory ‘old_dir’, then to display the document ‘index.html’ located in the directory ‘new_dir’.

Error documents

Creating custom error pages is very useful, it allows you to show web site visitors a friendly error message, for instance if a URL on your web site does not work. This avoids the unfriendly ’404 File Not Found’ error and allows you to display a friendly error, explaining possible solutions and guiding the visitor back into your web site content, rather than leaving them frustrated and lost.

To set-up custom error documents, create a .htaccess file following the main instructions and guidance which includes the following text:

ErrorDocument 404 /error_pages/404.html

The above line tells the Apache Web Server to display the document located at /error_pages/404.html (under your domain name/web site address) whenever a 404 (file not found) error occurs.

In this example, we have assumed you have created the error document and called it ’404.html’ and that you have placed it in a directory called ‘error_pages’ under your domain name. For example, http://www.yourdomain.com/error_pages/404.html

The document 404.html is a normal HTML document like the others in your web site and can display whatever content you wish, however we recommend including a ‘File Not Found’ message.

To setup further error documents, for example for ’401 Unauthorised’, ’403 Forbidden’, and ’500 Internal Server’ error messages, create a (dot)htaccess file following the main instructions and guidance which includes the following text:

ErrorDocument 401 /error_pages/401.html
ErrorDocument 404 /error_pages/404.html
ErrorDocument 500 /error_pages/500.html

Password protection

The password protection and authentication systems offered by the Apache Web Server are probably the most important use of .htaccess files. Very easily, we can password protect a directory (or multiple) of a web site which require a username and password to access. The login procedure for these secure directories is handled automatically by the web browser using a pop-up login interface (you’ve probably seen these before). Passwords are also encrypted using one of the best encryption methods available which ensures login credentials are kept secure.

To begin, decide which directory you would like to password protect (note that all files and subdirectories within the directory will be password protected), then create an .htaccess file following the main instructions and guidance which includes the following text:

AuthName “Member’s Area Name”
AuthUserFile /path/to/password/file/.htpasswd
AuthType Basic
Require valid-user

The first line tells the Apache Web Server the secure directory is called ‘Member’s Area Name’, this will be displayed when the pop-up login prompt appears. The second line specifies the location of the password file. The third line specifies the authentication type, in this example we are using ‘Basic’ because we are using basic HTTP authentication and finally the fourth line specifies that we require valid login credentials, this line can also be used to specify a specific username, e.g. ‘require user username’ would require the username ‘username’. You would use this if you were password protecting an administration area, rather than setting up a public password protected directory.

The location of the password file can be anywhere on your web server, the ‘/location/of/password/file/’ must be replaced with the full/absolute path to the directory containing the password file, and the ‘.htpasswd’ file must exist, this can however be called anything. We use the filename ‘.htpasswd’ because the server will recognise the filename and will hide it from visitors. Note, some servers do require the password file be located in the same directory as the .htaccess file. It is also important to use a full/absolute server path for the location of the password file, a relative path, or any variation of a URL will not work.

The password file would contain something similar to the following text:

username:encryptedpassword
fred_smith:oCF9Pam/MXJg2

Now, you cannot just make up the password, on Unix/Linux servers they must be encrypted by the server, on Windows servers you do just use a plain text password as Windows does not offer any encryption methods. You can have any number of user records in your password file, one account per row, separating the username and password with a colon. If you don’t have the Server access, please ask your Service provider to enable this feature. Please control Panel has this inbuilt feature.

Deny visitors by IP address

The visitor blocking facilities offered by the Apache Web Server enable us to deny access to specific visitors, or allow access to specific visitors. This is extremely useful for blocking unwanted visitors, or to only allow the web site owner access to certain sections of the web site, such as an administration area.

To set-up visitors restrictions and blocking, create a .htaccess file following the main instructions and guidance which includes the following text:

order allow,deny
deny from 255.0.0.0
deny from 123.45.6.
allow from all

The above lines tell the Apache Web Server to block visitors from the IP address ’255.0.0.0′ and ’123.45.6.’, note the second IP address is missing the fourth set of digits, this means any IP address which matches the firth three set of digits will be blocked, e.g. ’123.45.6.10′ and ’123.45.6.255′ would be blocked.

To set-up blocking of all visitors except yourself, create a .htaccess file following the main instructions and guidance which includes the following text:

order allow,deny
allow from 255.0.0.0
deny from all

The above lines tell the Apache Web Server to block all visitors except those with the IP address ’255.0.0.0′, which you should replace with your own IP address.

You may add any number of ‘deny from’ and ‘allow from’ records after the ‘order allow,deny’. Note the change from ‘allow from all’ to ‘deny from all’ on the bottom line, this is important and must be changed depending on your requirements. If you want to allow your visitor access, you would use ‘allow from all’ and place ‘deny from’ lines above.

Blocked visitors will be shown a ’403 Forbidden’ error message.

Hot link prevention techniques

Hot link prevention refers to stopping web sites that are not your own from displaying your files or content, e.g. stopping visitors from other web sites. This is most commonly used to prevent other web sites from displaying your images but it can be used to prevent people using your JavaScript or CSS (cascading style sheet) files. The problem with hot linking is it uses your bandwidth, which in turn costs money, hot linking is often referred to as ‘bandwidth theft’.

Using htaccess we can prevent other web sites from sourcing your content, and can even display different content in turn. For example, it is common to display what is referred to as an ‘angry man’ images instead of the desired images.

Note, this functionality requires that ‘mod_rewrite’ is enabled on your server. Due to the demands that can be placed on system resources, it is unlikely it is enabled so be sure to check with your system administrator or web hosting company.

To set-up hot link prevention for ‘.gif’, ‘.jpg’ and ‘.css’ files, create a (dot)htaccess file following the main instructions and guidance which includes the following text:

RewriteEngine on
RewriteCond %{HTTP_REFERER} !^$
RewriteCond %{HTTP_REFERER} !^http://(www\.)?yourdomain.com/.*$ [NC]
RewriteRule \.(gif|jpg|css)$ – [F]

The above lines tell the Apache Web Server to block all links to ‘.gif’, ‘.jpg’ and ‘.css’ files which are not from the domain name ‘http://www.yourdomain.com/’. Before uploading your htaccess file ensure you replace ‘yourdomain.com’ with the appropriate web site address.

To set-up hot link prevention for ‘.gif’, ‘.jpg’ files which displays alternate content (such as an angry man image), create a (dot)htaccess file following the main instructions and guidance which includes the following text:

RewriteEngine on
RewriteCond %{HTTP_REFERER} !^$
RewriteCond %{HTTP_REFERER} !^http://(www\.)?yourdomain.com/.*$ [NC]
RewriteRule \.(gif|jpg)$ http://www.yourdomain.com/hotlink.jpg [R,L]

The above lines tell the Apache Web Server to block all links to ‘.gif’ and ‘.jpg’ files which are not from the domain name ‘http://www.yourdomain.com/’ and to display the file ‘http://www.yourdomain.com/hotlink.jpg’ instead. Before uploading your (dot)htaccess file ensure you replace ‘yourdomain.com’ with the appropriate web site address.

These are the general features of htaccess file; you can find more information from your Website developer and Server Administrator.

Posted by hriday under Linux, Web Hosting
0 Comments

If you have been wondering on what would happen to the emails saved in your Gmail account if ever Gmail crashed and or your account gets locked out by Google (yes, they can block access to your account if it violates the Gmail TOS), then GmailVault could be the solution you need!

GmailVault is a utility that allows you to backup your Gmail emails and chat on your local computer, along with all the labels, that are present in your Gmail account. This makes it a local replica of your gmail account, that works at a blazing fast speed. Whenever you connect to internet, it will automatically connect and get emails from your Gmail account. Even if you have mistakenly deleted an important email from your Gmail account, you still find and restore that from your local archive. The extended search features of GmailVault also makes it extremely easy to find an old email from potentially millions of archived emails.
GmailVault comes with innovative mail storage technology developed by DigitalGlue which drastically compresses the storage space required for archiving very large amount of emails. GmailVault is free software and meant for personal use and you can go ahead and download this application from http://gmailvault.com/download/.

BTW, If you are a business and are looking for a simple, yet effective solution to backup and archive all your email communication on the cloud, have a look at the Diadem MailVault email monitoring and archiving solution, which is developed by the same crew behind GmailVault.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Posted by jayabrata under Apps
0 Comments

We are pleased to announce that we have successfully completed the acquisition of the hosting and domain registration division of Showtime Media Pvt. Ltd, India.

This acquisition will bring in corporate clients such as BATA, VISA Steel, NCS Computech, Dhunseri Tea, Anmol Biscuits to name a few, into the fold of the already existing 1500+ clients in India and worldwide that Diadem Technologies provides web hosting services to.

Based in Kolkata, India, Showtime Media Pvt. Ltd is a part of a full service media and content creation studio which focuses on providing original, vibrant, and effective design solutions. Some of the services provided by them include Web site development, online reputation management, Search engine optimization, interactive content, copywriting, films, and product photography, among many other services. Showtime Media have been providing web hosting and domain registration services to some of the major corporate in Kolkata.As such, their web hosting business perfectly complements ours and this will provide  further boost to our presence in the web hosting domain in India and worldwide.

The acquisition was successfully completed on July 1st.Not only will this bring many more clients, we will continue to build on our existing services. We look forward to continue to bring quality and excellence to each and every one of our clients by providing them 24X7 support, reliable network infrastructure and more diverse hosting services along with several other hosting and email related services in the near future.

Keep checking this blog for more updates on our web hosting services, special offers and more.

You can visit our website for information on web hosting solutions.

Posted by jranjana under News & Updates
1 Comment

ASP.net hosting on Windows 2008 R2With ASP.net application development gaining more popularity with web developers, there are significant advantages of ASP.net hosting on Windows server 2008.

Although ASP.net web hosting was available since Windows Server 2003, Windows 2008 Web Hosting has certain advantages in this area, which forced almost every webhost into switching to Windows Server 2008 R2 platform for ASP.net hosting. The main advantage lies in fact that Windows 2008 R2 comes ready with IIS 7.5, out-of-the-box. IIS 7.5 is the default application version, when web server role is added to the server.

  • Windows 2008 ASP.net Web hosting benefits from the fact IIS 7.5 supports any version of dotnet framework between ASP.net version 2 and 4. Hence a wider range of web application development technologies are supported in Windows 2008 R2 hosting service for ASP.net.
  • The next point of advantage remains in the detailed IIS Application settings available in IIS 7.5. ASP.net settings can be fine tuned quickly, per web application basis, meeting the requirements of the ASP.net application developer, in IIS 7.5 on Windows 2008 hosting.
  • The third big advantage is the availability of Integrated Pipeline mode for ASP.net applications, which induces significant performance boost for the ASP.net applications running there. Still you can choose to run certain sites or applications, under Classic mode, for compatibility with legacy web applications, that do not support Integrated Pipeline mode.
  • Since IIS 7.0 onwards, one can choose to install a new or completely remove or replace installed modules, including Microsoft’s built-in modules. One can disable a module at the server, site, or application level.  Adding a very advanced application level firewall module like mod_security, at server level is a easy task on Windows 2008 hosting server, still this can be disabled for certain sites or applications, which may conflict with its rule sets.
  • Windows 2008 R2 is inherently more secure than Windows 2003 server. The detailed firewall rules of Windows Advanced Firewall in Windows Server 2008 R2 let server administrators to fine tune the server’s firewall against a host of malicious hacking attacks from the public network. Various anti intrusion tools takes advantage of this advanced firewall and effectively blocks any brute-force attack from the internet.

All the above advantages of Windows 2008 hosting, have contributed to a near total shifting of ASP.net hosting services, to this platform in last two years. As a leading web hosting service provider in India, Diadem Technologies has never lagged behind, when new technology arrived. Diadem Technologies has completely switched to Windows 2008 R2 hosting platform for hosting its ASP.net webhosting offerings, almost two years ago. We are currently in the process of launching the Windows 2012 hosting platform with IIS 8 / ASP.net 4.5 and SQL Server 2012 support, which is expected to be launched within a few months.

Posted by jayabrata under Windows Server
1 Comment

These days, nearly all junk emails messages carry fake sender addresses. The victims whose addresses are being abused often suffer from the consequences, because their reputation gets affected and they have to waste their time sorting out misdirected bounce messages.

You probably have experienced one kind of abuse or another of your e-mail address yourself in the past, e.g. when you received an error message saying that a message allegedly sent by you could not be delivered to the recipient, although you never sent a message to that address. Or you nay have received spam mails which have been sent from your e-mail ID.

These types of SPAM technique are called Sender address forgery or Spoof Mail. It is a threat to users and companies.

There is a Solution for that!

SPF: Sender Policy Framework

The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery. More precisely, the current version of SPF — called SPFv1 or SPF Classic — protects the envelope sender address, which is used for the delivery of messages.

Even more precisely, SPFv1 allows the owner of a domain to specify their mail sending policy, e.g. which mail servers they use to send mail from their domain. The technology requires two sides to play together:

(1) The domain owner publishes this information in an SPF record in the domain’s DNS zone, and when someone else’s mail server receives a message claiming to come from that domain, and then,

(2) The receiving server can check whether the message complies with the domain’s stated policy. If, e.g., the message comes from an unknown server, it can be considered a fake.

Once you are confident about the authenticity of the sender address, you can finally “take it for real” and attach reputation to it. Furthermore, additional kinds of policies are planned for a future version of SPF, such as asserting that all of a domain’s outgoing mail is S/MIME or PGP signed.

An Example Policy

Let’s look at an example to give you an idea of how SPF works. Bob owns the domain domain.com. He also sometimes sends mail through his otherdomain.com account.

example.net.  TXT  “v=spf1 mx ip4:10.100.110.201 mx:domain.com  a:pluto. domain.com include:mail.otherdomain.com -all”

The parts of the SPF record mean the following:

v=spf1 : this identifies the TXT record as an SPF string. SPF version 1.

mx : the incoming mail servers (MXes) of the domain are authorized to also send mail for domain.com. If you add more MX servers in the future, they’ll automatically be allowed, too.

ip4:10.100.110.201: 10.100.110.201 is allowed to send mail from domain.com.

mx:domain.com: The MX servers for domain.com are allowed to send mail from domain.com.

a:pluto.domain.com: the Host pluto.domain.com is authorized, too send mail

include:mail.otherdomain.com: everything considered legitimate by mail.otherdomain.com (outside mail server) is legitimate for domain.com, too

-all : No other servers are allowed to send mail from domain.com. This is a good default for sites particularly concerned about forgery.

This example demonstrates but a small part of SPF’s expressiveness. Do not take it as a guideline for building your own record — things might not work out as you expect and legitimate messages might get blocked! Instead, learn more about the record syntax, or get the complete picture by studying the full specification or contact your hosting service provider.

Today Gmail, Hotmail, Rediffmail, Microsoft, Redhat, IBM, Citi Bank and most of the leading Service Providers and Companies use SPF and so do we for blocking out unwanted junk emails from reaching our clients inboxes.

Read More about SPF at:

http://www.openspf.org
http://en.wikipedia.org/wiki/Sender_Policy_Framework
http://www.microsoft.com/mscorp/safety/technologies/senderid/overview.mspx

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...

Posted by hriday under Mail Service
0 Comments

It has been a while since we have recommended a service or solution on this blog, so I am excited to share with you one of the truly wonderful things to happen in the city for a while. If you are like me and are an avid reader of books on management, biographies, self-help and magazines you are probably making a nice little hole in your pocket and running out of storage space to store your books and journals. As an alternative, I had been signing up for the digital versions of the books and magazines on my iPad but I have always found the touch and feel of paper to be a more soulful experience then to squint and stare at a digital screen and develop some very sore hands in the process.

So, I was walking by my office a couple of weeks back and out of some overgrown creepers, I was able to spot the signage of Just Books CLC and out of curiosity I walked in to find out more about this place. Once inside, I was met with some very courteous staff at Just Books and they walked me through the entire process of what makes Just Books community library chain, different and better then most standalone libraries. All the details are available on the Just Books CLC website – http://justbooksclc.com/how_it_works and I would like to summarise some of the key benefits which appealed to me:

  • The library is just a short walk from my office, which makes it very convenient for me to change my books at ease. However for clients who would like to avail of a doorstep delivery service, its available across the city for a very nominal fee of Rs. 50 pm.
  • Their membership plans pricing is surprisingly low, when you consider their total collection of over 0.5 million books across all their locations and the quality of those books.
  • The technology behind issuing, returning and searching for books is truly innovative and convenient for the members. There are no queues for returning or issuing new books and the staff are always ready to help if you are stuck in the process.
  • If a book is not available at this library you can request for it from any of their other libraries and it will be made available to you within a week or two and you will be notified about it over SMS and email.
  • The library is tidy, well organised and the books are well maintained by an efficient team.

It came as a surprise to me that this is the only JustBooks CLC in Kolkata and I truly hope that this would be the first of many such libraries in the days ahead as this is a truly innovative concept and a win-win model for all people concerned.

As for me, I am making the most of this opportunity to catch up on some of the books I most wanted to read and I would strongly recommend this place as one of the best kept secrets in the city!

Just Books CLC Kolkata Centre:

Contact :
033 – 40012211; 8981853672

Working Hours :
Hours 10:00 AM TO 9:00 PM, MONDAY HOLIDAY

Address :
PPF ENTERPRISES BD 30 (1st. FLOOR), SECTOR 1, SALT LAKE, KOLKATA 700064.

Email:
ppfenterprises1@gmail.com

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Posted by hriday under Experiences
0 Comments

Applies to:

Windows 2008 R2 Parallels Virtuozzo Containers

Description:

While logging into Administrator account through RDP on a VPS after a reboot, a blank screen or recycled svchost.exe property page is shown. Rebooting the VPS does not resolve the issue.

Cause:

This problem is caused by corruption of the Administrator account profile.

Solution:

On the hardware node run the following command from command prompt, in order to enter the container.

vzctl enter <Container_ID>

(Conatiner_ID can be obtained by running the vzlist –a command.)

Now you will get the C:\Windows\system32> prompt in the terminal, indicating that you have entered the container. In the C:\Windows\system32> prompt run the following commands, in order to create another account and make it a member of Administrators group on the container.

net user <username> <password> /add
net localgroup administrators <username> /add

Now RDP into the affected container, using this new username and password.

After you successfully login into the container, make sure from task manager that Administrator account is not logged into the container. If Administrator account is still logged into the container, then log off Administrator from Task Manager, running with elevated privilege.

Then copy all important files from C:\Users\Administrator folder to another folder for safekeeping and delete the C:\Users\Administrator folder.

Next login into the Administrator account. This account will use a temporary profile path due to absence of C:\Users\Administrator folder. Now create the C:\Users\Administrator folder again.

Then go to the windows Control Panel. Inside control panel select Small Icon view and click the User Accounts icon or link.

Inside User Accounts click on the Configure advanced user profile properties link on the left panel. It will popup User Profiles dialog.

Inside User Profiles dialog, select the Default Profile and then click Copy To button. It will pop up the Copy To dialog.

In Copy profile to section, browse and select the path C:\Users\Administrator and in Permitted to use section click change and select the Administrator user. Then click Ok.

Now the Confirm Copy message box will pop up with the message – “C:\Users\Administrator already exists. The current contents of this directory or this file will be deleted during this operation. Are you sure you want to continue?”. Click Ok to confirm.

Now logoff from Administrator account and login again. Now the account will use the permanent profile path C:\Users\Administrator and everything should be fine.
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...

Posted by jayabrata under Virtualisation, Windows Server
0 Comments

We were facing an httpd process overload problem that was occurring frequently every week on our server. The server is a shared hosting server holding Over 300 domains with Apache 2.2.3, MySql 5.0.45 and PHP 5.2.6. Occasionally httpd process were getting timed out, consuming 90% to 100% CPU load alone.  Some PHP or Perl script that may be using too much of memory and CPU, but it was not possible or to check each and every script or put 300 domains offline one by one or remove any suspicious scripts because of that, since this was a production server.

“top” command returns only Apache’s child process, which is not as much helpful because it does not provide website name.  But there is a way or a tool to trace down the name of the website that is causing the overload.

The Status module (mod_status) allows a server administrator to find out how well their server is performing. A HTML page is presented that gives the current server statistics in an easily readable form. If required this page can be made to automatically refresh.

The details given are:

* The number of children serving requests.
* The number of idle children.
* The status of each child, the number of requests that child has performed and the total number of bytes served by the child (*)
* A total number of accesses and byte count served (*).
* The time the server was started/restarted and the time it has been running for
* Averages giving the number of requests per second, the number of bytes served per second and the average number of bytes per request (*).
* The current percentage CPU used by each child and in total by Apache (*).
* The current hosts and requests being processed (*).

Details marked “(*)” are only available with ExtendedStatus On.

Configure Apache mod_status

Open your httpd.conf file:

# vi /etc/httpd/conf/httpd.conf

Append / modify (or uncomment) directives as follows:

ExtendedStatus On

<Location /server-status>

SetHandler server-status

Order deny,allow

Deny from all

Allow from 10.0.0.0/8

</Location>

Replace 10.0.0.0/8 with your Network IP range or workstation IP address. Save and close the file. Restart httpd server:

# service httpd restart

For full status report type:

# service httpd fullstatus

To view status report type URL – http://Server IP/server-status

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Posted by hriday under Linux
0 Comments

Continuous intrusion attempts on RDP and SQL server in Windows dedicated and VPS environment is a big issue for system admins. They may drain a considerable amount CPU time and Memory resource of any server as thousands such attempts can be made within a span of few minutes by the automated attacking bots. Changing RDP and SQL port to a custom one can solve this issue, but these require client side configuration changes, which may be uncomfortable for the client due to many reasons. Also the modified port number again can get exposed to the attacking bots, due to presence of a Trojan or Malware on the client system.

IPBan software written by Jeffrey N. Johnson (jjxtra) comes to a great relief in tacking this nagging issue on Windows servers. IPBan is installed as a service under Windows operating system and listens for a failed logon event on the server. Whenever an failed logon attempt is made, it starts tracking the source IP and when number of such events reach a certain predefined threshold for that IP, within a specified time span, it Block that IP in the Windows Advanced Firewall using a Blocking rule there. The IP remains banned for a predefined amount of time after this. All these time and threshold values are configurable through the configuration file of the IPBan software. IPBan is a free tools which can be downloaded from jjxtra’s website Digitalruby.com and is updated often.

Now let us follow the steps that are required to install IPBan software on a Windows server:

1. IPBan software can be downloaded from the URL – https://github.com/jjxtra/Windows-IP-Ban-Service/downloads. This software only works on Windows Server 2008/R2.

2. The IPBan software requires .net framework v.4, which can be installed from the URL – http://www.microsoft.com/en-us/download/details.aspx?id=17851 , if not already present in the system.

3. In order to enable the Remote Desktop Service to properly log the intruder’s IP addresses in the windows event log, perform the following configuration changes in Remote Desktop Session Host Configuration.

a) Run the Remote Desktop Session Host Configuration tool on Windows Server 2008/R2.

b) Double-click the connection RDP-Tcp to change encryption settings to native RDP encryption.

c) In order to do so change the Security Layer value to RDP Security Layer from the drop-down list in the General tab and click OK.

d) Now reboot the server to bring this change to effect.

4. Extract and copy all the files from the downloaded IPBan software zip archive to the folder C:\IPBan

5. The IPBan.exe.config file in the folder contains all the configuration settings for IPBan software.

6. The following section configures the number of failed audits in the event viewer before banning the IP address:

<add key="FailedLoginAttemptsBeforeBan" value="5" />

Change the value setting according to your requirement.

7. The following section configures the duration of time to ban a failed IP address:

<add key="BanTime" value="00:00:30:00" />

Change the value setting according to your requirement in DD:HH:MM:SS format.

8. IPBan Log Rotation can be configured in the following section:

<target name="logfile" xsi:type="File" fileName="${basedir}\logfile.txt" archiveNumbering="Sequence" archiveEvery="Day" maxArchiveFiles="28" />

Change the archiveEvery and maxArchiveFiles according to your requirement and availability of storage space for the same.

9. If a named instance of SQL server is in use, then change MSSQLSERVER to MSSQL$ (e.g. MSSQL$SQLEXPRESS) in the following section:

<XPath>//Provider[@Name='MSSQLSERVER']</XPath>

10. Now open the Command prompt and the run the following commands there to create and start the IPBAN Service –

sc create IPBAN type= own start= auto binPath= C:\IPBan\ipban.exe DisplayName= IPBAN
net start IPBAN

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...

Posted by jayabrata under Windows Server
10 Comments

Diadem MailVault Hosted Email Archiving

We are pleased to announce the launch of our newest service – the Diadem MailVault Universal Email Archiving and recovery solution for SME’s and mid-sized businesses who need a central email archiving service to backup and keep a log of all incoming and outgoing emails for their domain.

The MailVault email archiving software has been developed by DigitalGlue and its founder, Mr. Sharad Popli is a pioneering Internet technologist and had also co-founded QLC which had developed the Postmaster email gateway software and had been a great success, still in use by thousands of businesses as a LAN based email server and gateway.

The Diadem MailVault email archiving solution is a cloud hosted email backup and recovery service which allows businesses to log all incoming and outgoing emails for compliance, email recovery and business continuity purposes. Since email is the single most critical IT investment for businesses, worldwide, the missing or deleted emails can have a major impact for a business when communicating with clients and vendors. Similarly, as e-mail messages increasingly take center stage in headlines and lawsuits, it has become the electronic equivalent of DNA evidence. Having a system in place that takes this risk into account is crucial for businesses that don’t want to end up at the center of one of these disreputable and potentially damaging situations.

Key features of the Diadem MailVault email archiving solution is given below:

  • Automated email collection and archiving
  • Cloud enabled storage solution which expands as per your mail archival needs
  • Compatible with all leading mail server software in Linux and Windows OS
  • Quick, powerful search system to retrieve archived mails
  • Flexible retention policies for archived email
  • Litigation Support
  • No long term commitments or contracts.
  • Quick and seamless implementation with no downtime of your existing mail service

The Diadem MailVault email archiving service comes bundled with user licenses, cloud storage, data backups and technical support which ensures that there are no hidden costs or usage charges.  You can read more about our cloud email archiving solution on our website and also signup for a 15 Day Free Trial of our email archiving service.

Questions? Visit our email archiving FAQ page or contact our sales team for a quick response.

Posted by hriday under Hosted Solutions
0 Comments