We feature technical articles across the entire IT spectrum - Networking, security, operating systems, cloud, and programming.

What is a umask ?

The Umask (User Mask) is a UNIX function that is used to control the permission bitmask applied to newly created files and folders.The Umask value is subtracted from the default permission value. The resulting value is then assigned as the permission bitmask to the newly created file or folder. Note : The default permission values … Read more

Django – Static Files

Static Files is a Django app that helps with serving static content. This tutorial is meant as a short and quick guide on how to configure your Django project to serve static based content.To achieve this we will configure Django (via settings.py) and Apache. Our example will be based on serving static content from the … Read more

How do I configure Apache to serve my Django website ?

Summary In order for Apache to serve your Django website WSGI is configured. The Web Server Gateway Interface (WSGI) defines a simple and universal interface between web servers and web applications or frameworks for the Python programming language (wikipedia). Note : The following steps are based on a Linux Centos based distro. The following steps within … Read more

Brocade ADX: Insert X-Forwarded-Proto & X-Forwarded-For Headers

Within this article we will look at the configuration steps required adding headers to your HTTP based traffic. The 2 headers we will look at are X-Forwarded-Proto and X-Forwarded-For. These headers are described below. X-Forwarded-Proto – Inserts the protocol used between the client and the intermediary device (such as the LoadBalancer). Typically used when protocol … Read more

Cisco ASA – Group-policy assignment based on OU

Purpose The purpose of this document is to explain the configuration methods required to assign to a group-policy to a user based on their OU group. Summary The Cisco ASA firewall includes the ability to assign a user to a group policy based on their OU group. This is achieved via the use of the … Read more

How to define a passive FTP port range in IIS 7

Within this article we will describe the required steps for defining a specific passive FTP port range within IIS 7. First of all permit the necessary ports through your edge firewall. Typically you will only need to allow FTP (rather then the data channel ports as well) as most firewalls include a FTP inspection engine … Read more

Brocade ADX – Debugging CSW

The Brocade ADX offers a range of options for troubleshooting CSW (Content Switching) policies.Within this article we will look the main troubleshooting feature URL Debug and also provide the various show commands available when troubleshooting CSW. URL Debug The URL debug option allows you to debug the CSW policy flows based on a given IP. … Read more

F5 LTM – Configuration Files

Configuration Files /config/bigip.conf main configuration file containing objects for local application traffice such as pools, virtuals servers, pools etc. /config/bigip.license system licenses /config/bigip_base.conf networking components (bigpipe base load) not sync`d for HA setups. /config/bigip_local.conf stores virtuals servers for GTM /config/bigip_sys.conf stores the Linux/UNIX configuration objects /etc/alertd/alert.conf defines custom SNMP OID`s. UCS (User Configuration Set) A … Read more

BigIP F5 LTM – High Availability (v10.x)

The F5 LTM provides the ability to configure a HA (High-Availability) based setup. Configuring HA ensures that traffic is still processed even in the event of a failure (such as a software or hardware). Within this article we will explain and discuss a Active / Standby HA F5 setup. This allows one unit to pass … Read more

Juniper SRX Commands

Below shows some of the main Juniper SRX commands available. All commands are provided with the necessary mode in which they should be run from. Configuration Commands replace pattern expr1 with expr # configuration mode find and replace string within configuration show | compare rollback {1..5} # configuration mode compare the current configuration against roll … Read more