Ideally, you should use the “Quick Instances” and other VM templates provided by our Xen Orchestra Dashboard when creating virtual servers for your project. These have been optimised with tools and drivers designed to get the best performance from your virtual machine, and to access advanced features such as safe shutdown in the event of power outage. But what if your VM was built from scratch, can you still access these tools?
DHCP Filters are primarily used to further shield an infrastructure by allowing or denying specific clients based on their MAC addresses. Setting up DHCP Filters is quite simple and works at the server level, not at Scope level.
This tutorial documents the steps to get Samba 4 working as a Active Directory Domain Controller using Ubuntu 16.04.
Certbot offers a variety of ways to validate your domain, fetch certificates, and automatically configure Apache and Nginx. In this tutorial, we’ll discuss Certbot’s standalone mode and how to use it to secure other types of services, such as a mail server or a message broker like RabbitMQ.
Using VirtualBox, HyperV or similar in the labs is a great way to fire up Virtual Machines. However, this method pretty much ties you to that lab machine, unless you are willing to do a (pretty big) export/import of your VM on a regular basis… not very realistic. What if you could access your VMs from anywhere in the college… or even outside… using just a browser? Well now you can!
- Creates a virtual encrypted disk within a file and mounts it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time(on-the-fly) and transparent.
- Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
- Encryption can be hardware-accelerated on modern processors.
- Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.
SSL is based on the mathematical intractability of resolving a large integer into its also-large prime factors. Using this, we can encrypt information using what’s called a “private-public key pair”. Certificate authorities can issue SSL certificates that verify the authenticity of such a secured connection, and on the same note, a self-signed certificate can be produced without third-party support. By the end of the tutorial, you will have a web server accessible via HTTPS using a self-signed certificate.
The basic building block in all computers is the binary number system.
This system is chosen since it consists of 1s and 0s only. Since computers contain millions and millions of tiny ‘switches’, which must be in the ON or OFF position, this lends itself logically to the binary system. A switch in the ON position can be represented by 1; a switch in the OFF position can be represented by 0.