just started using digitalocean. a 512MB SSD VPS for $5 a month? oh yes. sign up with this URL and i get a tiny bit of commission. they offer various sizes of VPS but i’m sticking with the small one as it’s just going to be used for NTP. once you’ve created an account you can spin up your first server (or ‘droplet’ as they call them). choose your size…choose your location…choose your OS… (i went with 64 bit in case it’s to be scaled up at a later date).and that’s it. mine spun up in 58 seconds and was ready to go. get your DNS settings in place and then get logged in as root. then create a new user and disable root login. install ntp and denyhosts. done. splendid.
should you upgrade to lightroom 5 from lightroom 4? the big question that you probably haven’t been asking yourself. i had been asking myself this since june 2013. i finally caved in this month and bought version 5 (upgrade version) and it cost me £55.49 from amazon.co.uk. install was fine though after it had completed it downloaded a 978MB update. why adobe insist on combining the windows and mac installers in one file i have no idea. bloated. it seems faster than version 4 (i’m running it on an SSD) but for me that’s about it. there are a couple of tweaks that i’ve found to be useful (the healing brush seems much more effective and the perspective tools are good) but on the whole, for me, it wasn’t worth the money. if your camera’s RAW images weren’t supported before they may be now. i’m by no means a professional photographer so those who are might find lots to like in version 5. i wish i’d waited for version 6. maybe i’ll use my camera more now, though, to justify the expense.
used to run denyhosts on all my servers. for some reason i switched to fail2ban (really can’t remember why) but on one server it started generating iptables errors and i couldn’t get to the bottom of it. so back to denyhosts, then. install with apt-get install denyhosts edit the config file nano /etc/denyhosts.conf to your liking. i’ve set it to block known accounts after 5 failed login attempts, unknown accounts after 3 attempts and root failures after 1 attempt. then restart the service /etc/init.d/denyhosts restart within 10 minutes of enabling it the IP addresses started rolling in (these are from a 5 minute period…5 minutes!) 18.104.22.168 (unknown) 22.214.171.124 (unknown) 126.96.36.199 (unknown) 188.8.131.52 (unassigned) 184.108.40.206 (unknown) 220.127.116.11 (18.104.22.168.dial.wz.zj.dynamic.163data.com.cn) 22.214.171.124 (customer-187-174-116-250.uninet-ide.com.mx) 126.96.36.199 (unknown) 188.8.131.52 (usj-5-182.tm.net.my) 184.108.40.206 (253.152.broadband9.iol.cz) 220.127.116.11 (unknown)
how to get webmin running on the raspberry pi. i’m using raspbian. first let’s get some dependencies sorted. as root (or use sudo if you must) issue an apt-get install perl python libio-pty-perl openssl libpam-runtime libnet-ssleay-perl libauthen-pam-perl apt-show-versions once that’s done head to the webmin download page and grab the appropriate .deb binary (which is webmin_1.670_all.deb) as i type this. download it to your pi with wget http://prdownloads.sourceforge.net/webadmin/webmin_1.670_all.deb (note that your URL may differ) and then install it with dpkg -i webmin_1.670_all.deb this will take a while. once it’s ground away for a bit it’ll display a message that the install has been completed and give you the URL to access the interface. it’ll be something like https://IP_OF_YOUR_PI:10000 make sure you use https and then accept the webmin generated certificate if prompted.
a while back i wrote a post about running an NTP server and adding it to the NTP server pool. it’s been running fine but after the recent NTP amplification attacks i made a small change to the config to prevent my server being involved. so how do you access your stats with monlist disabled and noquery set. as root issue a ntpdc -c iostats this gives me something similar to this: time since reset: 865722 receive buffers: 10 free receive buffers: 9 used receive buffers: 0 low water refills: 1 dropped packets: 185 ignored packets: 0 received packets: 4803214 packets sent: 4748603 packets not sent: 0 interrupts handled: 4822087 received by int: 4822087 so you can ensure that things are ticking along nicely and packets aren’t disappearing into the ether. and a general list of connections can be seen with a ntpq -p which gives me…remote refid st t when poll reach delay offset jitter ============================================================================== +ntp.exact-time. .GPS. 1 u 336 1024 377 55.057 1.999 35.992 ec2-54-246-100- 18.104.22.168 2 u 965 1024 377 37.866 26.913 22.199 -ntppub.le.ac.uk 22.214.171.124 2 u 228 1024 377 9.206 49.951 35.966 +126.96.36.199 .PPS. [...]