This how-to explains how to install the current version of Squid Proxy on a CentOS 7 VM with Webmin, Apache, and SARG with update support from repositories. As well as how to include easy to use whitelists and blacklists. It also covers how to enforce the use of the proxy server via Group Policy and for Internet Explorer and third party browsers such as Firefox. There are no formatting options, but I tried to make it as readable as possible. Pound symbols (#) mean to enter what's after it in the terminal. Hyper-V -a. Insert LIS disc -b.
# mount /dev/cdrom /mnt -c. # cp –r /mnt /root/lis -d. # chmod –R 0775 /root/lis -e. # cd /root/lis/RHEL71 -f. #./install.sh -g. Note: If you install the incorrect version, you can remove it by performing the following: -1.
# rpm -qa grep microsoft -2. VMWare Tools: (requires perl and net-tools so skip ahead and do steps 4, 5, 6, 7, and 8 first then come back to here) -a.
Do steps 4, 5, 6, 7, and 8 first. Insert vmware tools disc. # mount /dev/cdrom /mnt -d. # cp -r /mnt /root/vmwaretools -e.
# cd /root/vmwaretools -f. # tar -xvf VMwareTools-9.0.tar.gz (adjust if needed) -g.
# firewall-cmd -reload 8. # chkconfig webmin on 9. Now you can access Webmin via -a. If for some reason you cannot access via https and you get an error like: SSL rxrecord size error message. Then do this: -1. # nano /etc/webmin/miniserv.conf -2.
Change ssl=1 to ssl=0 -3. Save changes -4. # /etc/init.d/webmin restart -5. Now you can connect via.Note: In most of the 'firewall-cmd' commands, there are double-dashes (-). Note: Apache is needed to host the.pac file for proxy clients. Normally, you'd host this on a web server separate from your proxy server.
That way, if your proxy server goes down, the.pac file can still be accessed by clients. The.pac file tells client computers what to do proxy-wise. Like, if proxy goes down, use a different proxy server or bypass proxy. That said, for the purposes and ease of this How-to, I'll say how to install on the proxy server: 1. # yum -y install httpd 2. # firewall-cmd -permanent -zone=public -add-service=http 3. # firewall-cmd -permanent -zone=public -add-service=https 4.
# firewall-cmd -reload 5. # systemctl start httpd.service 6. # systemctl enable httpd.service.Note: In most of the 'firewall-cmd' commands, there are double-dashes (-). Log in to webmin 2. Under “Others”, click Java File Manager (or File Manager) 3. Browse to /etc/squid 4.
Make a /etc/squid/blacklists directory 5. Upload your Squid Black Lists: (whatever blacklists you may have, I just use the first one) -a. Squid-all.tar.gz -b. Bigblacklist.tar.gz 6. Extract bigblacklist.tar.gz in the /etc/squid directory (this will make a blacklists directory if you haven’t done so) 7. Extract squid-all.tar.gz in the /etc/squid/blacklists directory.Note: I cannot post links to the blacklists I use because we're paying for them.
However, what you can do, if you want, is block all top-level domain names such as.com, etc. This will effectively block all websites except what you explicitly white-list in the steps below.
I find this route easier. It's easier block everything except what's needed, which you'd just easily and simply add the domain you want to allow in the white-list. It's also easy to allow whatever you want, and manually block it using the manual block list we set up.
If you follow this how-to, you'll have a working white list and block list you can easily configure, even if you don't use any squid-black-lists in the above steps. It is easier to edit the squid config file in a text editor such as notepad first, and then just copy and paste everything to the config file using Webmin and saving it there. Below is the squid configuration file (squid.conf): Go over each line in the squid.conf file. Edit it to fit your environment needs. Log in to Webmin 2.
Click Servers Squid Proxy Server 3. Click “Edit Configuration Files” 4. Edit config file as desired -a.
Edit as necessary and/or copy/paste the above linked config file. The above config file incorporates the paid “squid-all.tar.gz” block list. In Miscellaneous Options, set “Default domain” to “.your.domain.” 7. Save (do NOT turn squid on yet) 8. Do NOT NOT NOT turn on squid yet.Note: (important!) In the above squid.conf file, if are not using one of the.acl block lists, you MUST comment it out along with it's associated httpaccess entry further down in the config file. For example, if you are not using any of the pre-configured blocklists I included in my squid.conf file, then you need to comment out everything in the section labeled 'Custom ACL DOMAINS Block Lists' on line 34. You will also need to comment out the ones listed under the section labeled 'Custom ACL EXPRESSIONS Lists' below line 69 (just line 72 since there's only one entry).
Then you also need to comment out the associated httpaccess lines further down in the config file. Do not comment out the squid manual blacklist and whitelist lines. For some reason, the cachemgr.cgi file is not installed with latest version of squid (3.5.16 at the time of this writing). So we’ll need to manually copy that file to the squid proxy server.
Below is the file, you need to rename it to cachmgr.cgi. If anyone knows a better place to host it, please let me know! In webmin, upload cachemgr.cgi to /usr/lib64/squid 2.
Click on Webmin Squid Proxy Server “Module Config” (it's a text link located in top left corner) 3. Change “Squid cachemgr.cgi executable” to the following path: /usr/lib64/squid/cachemgr.cgi 4. Get pre-requisites: # yum install –y gcc gd gd-devel make perl-GD wget httpd 2. Get the latest sarg source tarball, compile it, and install it: -a. Download latest version from here: -b. # mkdir /root/sarg -c. Upload it via Webmin to /root/sarg directory -d.
# tar -xvzf sarg-2.3.10.tar.gz -e. # cd sarg-2.3.10 -f. #./configure -g. # make -h.
# make install.Note: If make install command doesn't work, you may need to edit the 'configure' and 'config.status' files in the /root/sarg/sarg-2.3.10/ directory: Search for '0.19' and change them to '0.18' in both files. Edit Sarg config file: /usr/local/etc/sarg.conf -a. Uncomment/set the following lines: -1. Accesslog /var/log/squid/access.log -2. Outputdir /var/www/html/squid-reports -3.
Dateformat u -4. Overwritereport yes -b.
Configure for Webmin: -a. In webmin, click “Un-used Modules” on left -b.
Click “Squid Report Generator” -c. Click the “module configuration” link -d. Change path to SARG config to: /usr/local/etc/sarg.conf -e. Click “Refresh Modules” on bottom left of browser. Refresh Webmin page.
Squid Report Generator should now be listed under Webmin Servers category on left. This group policy will be responsible for configuring the automatic use of the proxy.pac script for client computers and users who are in the “PROXY Users” and “PROXY Computers” groups.
Go to User Configuration Preferences Control Panel Settings Internet Settings Create new Internet Explorer 10 preferences 2. In each tab, make sure there is a red underline under everything: Highlight an option, and press the F8 key. This will put a red underline under each configurable option, which makes it not apply. We want to do this in each tab, for all settings we don’t want to preference. In the “Connections” tab, click LAN Settings.
Highlight an option and press the F5 key, which puts a green underline under each option. This sets these options as a preference. UNCHECK “Automatically detect settings”. CHECK “Use automatic configuration script” 6. In the Address: field, type: (change to the name of your server (or web server) and domain) 7.
Make sure “Use a proxy server for your LAN.” Is UNCHECKED. Explained below, make these settings apply only to Users and Computers in the “PROXY Users” and “PROXY Computers” groups: 1. In the common tab, CHECK “Item-level targeting” and click the “Targeting.” button.
Add both “security groups”: “PROXY Users” and “PROXY Computers”: 3. Make sure it’s configured to say “the COMPUTER is a member of the security group DOMAIN PROXY Computers” “OR the USER is a member of the security group DOMAIN PROXY Users” 4. Click OK, then APPLY/OK. Repeat all above steps for each version of IE you use in your environment. I have mine configured for IE 11, 10, and 8 and 9.
This group policy contains User settings, so it needs to be scoped in such a way that it will hit all users it will be targeted to. You can stick it in the root of your domain, or the root of where your users are in AD. The Item-level targeting will take care of the rest. This group policy is going to “grey out” and restrict the “Automatic Configuration Settings” and “Proxy Settings” in the LAN Settings area of the Connections tab in “Internet Options”. This basically prevents users from changing the settings we are trying to restrict through Internet Options. Go to Computer Configuration Policies Administrative Templates Windows Components Internet Explorer 2.
Set the following policies to “ENABLED”: a. “Disable changing Automatic Configuration settings” b. “Prevent changing proxy settings” 3. Do the exact same thing in User Configuration Policies Administrative Templates Windows Components Internet Explorer 4. In the “Scope” tab of the GPO, remove the “Authenticated Users” entry and add the “PROXY Computers” and 'PROXY Users' groups instead.
Stick this GPO wherever it will hit all users and computers you plan on affecting with this GPO. You can place it in the root of your domain, and will only apply to the users and computers you have in the PROXY Computers/Users groups. This GPO forces users and computers in the two AD groups you created to use the configured proxy settings, and does not allow users to change them within Firefox. This took some serious creativity, but I got it working.
This first part of the step sets the permissions for 4 files below. Go to: Computer Configuration Policies Windows Settings Security Settings File System - Right-click File System Add File. Copy in the following:%ProgramFiles% (x86) Mozilla Firefox defaults pref local-settings.js 2. Set the permissions like in the photo above. The idea is to remove all access to the files so they cannot be changed by users.
So remove all permissions from those files via this GPO except what's pictured above. This includes removing local admins and users groups from the file permissions. We only want what's pictures. Do the same thing for the following other files: a.%ProgramFiles% (x86) Mozilla Firefox mozilla.cfg b.%ProgramFiles% Mozilla Firefox defaults pref local-settings.jss c.%ProgramFiles% Mozilla Firefox mozilla.cfg Only two files, but this GPO will place them in both 32 and 64 bit program files. This second part of the step overwrites or places these files on client computers. First part does permissions, this one places the files.
Go to: Computer Configuration Preferences Windows Settings Files - Right-click Files New File Configure like this: Action: Update Source file(s): your.domain SYSVOL your.domain files firefox mozilla.cfg Destination file:%ProgramFiles% (x86) Mozilla Firefox mozilla.cfg Suppress errors on individual file actions: Enabled Read-only: Enabled Hidden: Disabled Archive: Disabled 2. Also do the above for each of the following entries: Source file(s): your.domain SYSVOL your.domain files firefox local-settings.js Destination file:%ProgramFiles% (x86) Mozilla Firefox defaults pref local-settings.js Source file(s) your.domain SYSVOL your.domain files firefox mozilla.cfg Destination file%ProgramFiles% Mozilla Firefox mozilla.cfg Source file(s) your.domain SYSVOL your.domain files firefox local-settings.js Destination file%ProgramFiles% Mozilla Firefox defaults pref local-settings.js. Note: Change the scope of this Group Policy. In the “Scope” tab of the GPO, remove the “Authenticated Users” entry and add only the “PROXY Computers” group instead.
This GPO only contains Computer settings. Place this GPO in the root of the domain, or where it will effect all computers you plan on placing in the PROXY Computers group. Now you should have a proxy server up and running, accessible via, and a shortcut to access it via. I have set up a bunch of proxy servers this way, some two at a time for redundancy, and they work. This has been tried and tested for a long time. If you cannot get something to work following my steps, it's possible I have a typo or missed something from my notes. Please let me know so I can fix it so others don't run in to the same issue.
I appreciate receiving feedback, good or bad, and will do my best to help with issues and questions. TimG I was recommended to use ICAP as an add-on for Squid. The documentation I was pointed to is located at I would consider myself an intermediate Linux guy.
I've messed around with a few desktop distros, and spun up a few Debian, Ubuntu, and CentOS servers. Do you know anything about ICAP. If you were to glance at the link provided, do you feel the guidance is accurate and/or would produce a working web filter server? I know you must be very busy, and I'm not expecting any kind of full on awesomely detailed report like the one you posted here. Any kind of intel or guidance you could provide would be appreciated. Thank you Sir.
Install Sarg Squid Log Analyzer in Linux In this article I will guide you on how to install and configure SARG – Squid Analysis Report Generator on RHEL/ CentOS/ Fedora and Debian/ Ubuntu/ Linux Mint systems. Installing Sarg – Squid Log Analyzer in Linux I assume that you already installed, configured and tested Squid server as a transparent proxy and DNS for the name resolution in caching mode. If not, please install and configure them first before moving further installation of Sarg. Important: Please remember without the Squid and DNS setup, no use of installing sarg on the system it will won’t work at all. So, it’s a request to install them first before proceeding further to Sarg installation. Follow these guides to install DNS and Squid in your Linux systems: Install Cache-Only DNS Server.
Install Squid as Transparent Proxy. Step 1: Installing Sarg from Source The ‘ sarg‘ package by default not included in RedHat based distributions, so we need to manually compile and install it from source tarball. For this, we need some additional pre-requisites packages to be installed on the system before compiling it from source. On RedHat/CentOS/Fedora # yum install –y gcc gd gd-devel make perl-GD wget httpd Once you’ve installed all the required packages, download the latest or you may use the following wget command to download and install it as shown below. # wget # tar -xvzf sarg-2.3.10.tar.gz # cd sarg-2.3.10 #./configure # make # make install On Debian/Ubuntu/Linux Mint On Debian based distributions, sarg package can be easily install from the default repositories using apt-get package manager. $ sudo apt-get install sarg Step 2: Configuring Sarg Now it’s time to edit some parameters in SARG main configuration file. The file contains lots of options to edit, but we will only edit required parameters like:.
Access logs path. Output directory. Date Format. Overwrite report for the same date. Open sarg.conf file with your choice of editor and make changes as shown below. # vi /usr/local/etc/sarg.conf On RedHat based systems $ sudo nano /etc/sarg/sarg.conf On Debian based systems Now Uncomment and add the original path to your squid access log file.
# sarg.conf # # TAG: accesslog file # Where is the access.log file # sarg -l file # accesslog /var/log/squid/access.log Next, add the correct Output directory path to save the generate squid reports in that directory. Please note, under Debian based distributions the Apache web root directory is ‘ /var/www‘. So, please be careful while adding correct web root paths under your Linux distributions. # TAG: outputdir # The reports will be saved in that directory # sarg -o dir # outputdir /var/www/html/squid-reports Set the correct date format for reports. For example, ‘ dateformat e‘ will display reports in ‘dd/mm/yy‘ format.
# TAG: dateformat # Date format in reports: e (European=dd/mm/yy), u (American=mm/dd/yy), w (Weekly=yy.ww) # dateformat e Next, uncomment and set Overwrite report to ‘ Yes’. # TAG: overwritereport yes no # yes - if report date already exist then will be overwritten. # no - if report date already exist then will be renamed to filename.n, filename.n+1 # overwritereport yes That’s it! Save and close the file. Step 3: Generating Sarg Report Once, you’ve done with the configuration part, it’s time to generate the squid log report using the following command. Proxy Authentication Failures Step 5: Automatic Generating Sarg Report To automate the process of generating sarg report in given span of time via. For example, let’s assume you want to generate reports on hourly basis automatically, to do this, you need to configure a Cron job.
# crontab -e Next, add the following line at the bottom of the file. Save and close it./1. /usr/local/bin/sarg -x The above Cron rule will generate SARG report every 1 hour.
Reference Links That’s it with SARG! I will be coming up with few more interesting articles on Linux, till then stay tuned to TecMint.com and don’t forget to add your valuable comments. I got this error after configuring SARG. SARG: sarg version: 2.3.1 Sep-18-2010 SARG: Reading access log file: /var/log/squid/access.log SARG: Records in file: 3711, reading: 100.00% SARG: Records read: 3711, written: 3396, excluded: 0 SARG: Squid log format SARG: Period: 01 Jan 1970 SARG: pre-sorting files SARG: Making file: /tmp/sarg/18705 SARG: Making file: /tmp/sarg/accountsgooglecom443 SARG: getwordatoll loop detected after 0 bytes. SARG: Line=' 05:34 CONNECT' SARG: Record='TCPMISS/200 172.16.0.13 +0500 ' SARG: searching for 'x9' SARG: getword backtrace: SARG: 1:sarg 0x4054b7 SARG: 2:sarg 0x405668 SARG: 3:sarg 0x40d41f SARG: 4:sarg 0x40c183 SARG: 5:/lib64/libc.so.6(libcstartmain+0xfd) 0x3e8de1ed5d SARG: There is a broken record or garbage in file /tmp/sarg/accountsgooglecom443.log.
. UPDATE. Official up-to-date version, periodically updated:. END UPDATE. Hello all, I thought I would share my thoroughly tested and working step-by-step instructions on setting up, from scratch, a CentOS 7 basic gui-less and Squid Cache Proxy server. Also Apache and Webmin installation.
I hope to save others a week of work with this. If anyone needs any help with my instructions or if they weren't clear enough somewhere, let me know and I'll reply!. Install CentOS 7: (basic install, no GUI). Run updates: a. yum -y update b. Reboot. (shutdown –r now). Install Hyper-V or VMWare tools: a. Hyper-V: 1. Insert LIS disc 2.
mount /dev/cdrom /mnt 3. cp –r /mnt /root/lis 4. chmod –R 0775 /root/lis 5. cd /root/lis/RHEL71 6./install.sh b. VMWare Tools: (vmware requires perl and net-tools so skip ahead and do steps 4, 5, 6, 7, and 8 first then come back to here) 1. Do steps 4, 5, 6, 7, and 8 first.
2. Insert vmware tools disc. 3. mount /dev/cdrom /mnt 4. cp -r /mnt /root/vmwaretools 5. cd /root/vmwaretools 6. tar -xvf VMwareTools-9.0.tar.gz (adjust if needed) 7. cd vmware-tools-distrib 8./vmware-install.pl -d c. Reboot.
Standard Modules The following modules are included as standard with release 1.870 of Webmin. You can also download and re-install any modules from this page that you may have deleted from Webmin on your system. Name Download Description Supports ADSL Client Set up a PPP client with the RP-PPPoE package. Only Linux Apache Webserver Configure almost all Apache directives and features. Most operating systems BIND DNS Server Create and edit domains, DNS records, BIND options and views.
Most operating systems BSD Firewall Configure a BSD firewall using IPFW, by creating and editing rules. FreeBSD and Mac OS X Backup Configuration Files Perform manual or scheduled backups and restores of configuration files managed by Webmin modules. All operating systems Bacula Backup System Configure Bacula to perform backups and restores manually or on schedule, for one or many systems. All operating systems Bandwidth Monitoring View reports on bandwidth usage by host, port, protocol and time on a Linux system. All except Windows Bootup and Shutdown Setup scripts to be run at boot time from /etc/init.d or /etc/rc.local.
Most operating systems CD Burner Burn data CDs from ISO images or selected directories. All except Windows Change Language and Theme Allows the current Webmin user to change his language, theme and possibly password.
All operating systems Change Passwords Change the password of any user on the system. All except Windows Cluster Change Passwords Change passwords on multiple systems in a Webmin cluster at once.
All except Windows Cluster Copy Files Schedule the transfer of files from this server to multiple servers in a Webmin cluster. All operating systems Cluster Cron Jobs Create scheduled Cron jobs that run on multiple servers simultaneously. Most operating systems Cluster Shell Commands Run commands on multiple servers at once. All operating systems Cluster Software Packages Install RPMs, debian and solaris packages across multiple servers from one source.
Most operating systems Cluster Usermin Servers Install and manage modules and themes across multiple Usermin servers. All except Windows Cluster Users and Groups Create, update and delete users and groups across multiple servers. Unlike NIS, each server has its own passwd and group files which are remotely updated by this module. Most operating systems Cluster Webmin Servers Install and manage modules, themes, users, groups and access control settings across multiple Webmin servers.
All operating systems Command Shell Execute shell commands and view their output. All operating systems Custom Commands Create buttons to execute commonly used commands or edit files on your system. All operating systems DHCP Server Manage shared networks, subnets, hosts and groups for ISC DHCPD.
Most operating systems Disk Quotas Setup and edit user or group disk quotas for local filesystems. Most operating systems Disk and Network Filesystems Mount filesystems and swap files usually configured in /etc/fstab or /etc/vfstab. Most operating systems Dovecot IMAP/POP3 Server Configure the Dovecot IMAP and POP3 mail retrieval server. All except Windows Fail2Ban Intrusion Detector Fail2ban protects your system from brute force attacks by detecting them and blocking their source IPs. All operating systems Fetchmail Mail Retrieval Configure the popular fetchmail program for automatically retrieving mail from other servers. All except Windows File Manager Schneller, kleiner Datei Manager geschrieben in Perl.
All operating systems Filesystem Backup Backup and restore filesystems using the dump and restore family of commands. Most operating systems Filter and Forward Mail Create rules to filter and forward incoming email. All operating systems FirewallD Configure a Linux firewall using FirewallD, by editing allowed services and ports. Only Linux GRUB Boot Loader Configure the Linux GRUB boot loader to allow the selection of various operating systems and kernels at boot time. Linux and SmartOS HTTP Tunnel Connect to another HTTP server via a tunnel through the Webmin server.
All operating systems Heartbeat Monitor Configure the Heartbeat package for automatic server failover in a cluster. Linux and FreeBSD IPFilter Firewall Configure a firewall using the IPFilter package, by creating and editing rules. Only SmartOS IPsec VPN Configuration Set up a client or server for an IPsec VPN using FreeSWAN. Only Linux Initial System Bootup Configure low-level services to be run at boot time, and select the initial runlevel.
Most operating systems Jabber IM Server Configure the multi-protocol Jabber messaging server. All except Windows Java File Manager View, edit and change permissions on files and directories on your system with a Windows-like file manager. All operating systems Kerberos5 Configure the Kerberos 5 client on your system.
Only Linux LDAP Client Configure your system as an LDAP client for users and groups. Only Linux LDAP Server Manage the OpenLDAP server and objects in its database All operating systems LDAP Users and Groups Manage users and groups stored in an LDAP database, used for Unix, Samba and Cyrus IMAP authentication.
All except Windows Linux Firewall Configure a Linux firewall using iptables. Allows the editing of all tables, chains, rules and options. Only Linux Linux IPv6 Firewall Configure a Linux firewall using ip6tables.
Allows the editing of all tables, chains, rules and options. Only Linux Linux RAID Create RAID 0, 1, 4, 5, 6, 10 and linear devices on a Linux system. Only Linux Log File Rotation Set up the automatic rotation of Apache, Squid, Syslog and other log files. All except Windows Logical Volume Management Configure volume groups, physical volumes and logical volumes for Linux LVM.
Only Linux MIME Type Programs Edit the /etc/mailcap file, which maps MIME types to handler programs All except Windows MON Service Monitor Setup MON, a powerful service monitor and alerting system. Need 4 speed most wanted pc crack. Only Linux MySQL Database Server Setup databases, tables and permissions in your MySQL database server. All operating systems NFS Exports Edit file shares as defined in the Irix /etc/exports file Only SGI Irix NFS Exports Edit file shares from the FreeBSD /etc/exports file. Most operating systems NFS Exports Edit NFS file shares defined in /etc/exports.
Most operating systems NFS Exports Edit file shares as defined in the HPUX /etc/exports file. Only HP/UX NFS Shares Edit file shares as defined in the /etc/dfs/dfstab file. SmartOS and SCO UnixWare NFS v4 Exports Edit NFS v4 file shares defined in /etc/exports. Most operating systems NIS Client and Server Setup a system as an NIS client, master or slave server. Note that NIS+ is not supported.
Debian Squid Install
Most operating systems Network Configuration Configure boot time and active interfaces, DNS, routing and /etc/hosts. Most operating systems Network Services Edit servers handled by Xinetd, a replacement for inetd. All operating systems Network Services and Protocols Edit services in /etc/inetd.conf, /etc/services and /etc/rpc.
Most operating systems OpenSLP Server Configure the service location protocol server. All except Windows PAM Authentication Configure the PAM authentication steps used by services such as telnet, POP and FTP. Most operating systems PHP Configuration Configure PHP settings for the whole system or individual Apache virtual servers. All except Windows PPP Dialin Server Set up a dialin server using mgetty and PPP.
Most operating systems PPP Dialup Client Configure the WV-Dial package to connect to the Internet with a modem PPP connection Only Linux PPTP VPN Client Configure and establish connections to a VPN server using the PPTP protocol. Only Linux PPTP VPN Server Set up your system as a PPTP server so that Linux or Windows VPN clients can connect. Linux and FreeBSD Partitions on Local Disks Create and edit paritions on local disks on Solaris. Only SmartOS Partitions on Local Disks Create and edit paritions on local SCSI and IDE disks on FreeBSD. Only FreeBSD Partitions on Local Disks Create and edit partitions on local SCSI, IDE and SATA disks on Linux.
Only Linux Perl Modules Install new Perl modules on your system, and view those already installed. All except Windows Postfix Mail Server Configure the Postfix mail server. All except Windows PostgreSQL Database Server Manage databases, tables and users in your PostgreSQL database server. All operating systems Printer Administration Create and edit local and remote printers.
Supports Windows print servers and Ghostscript print drivers. Most operating systems ProFTPD Server Configure the powerful ProFTPD FTP server. Supports all options in most of the standard modules. All except Windows Procmail Mail Filter Edit recipes in the global /etc/procmailrc file, which apply to all incoming email.
All except Windows Protected Web Directories Create.htaccess and htpasswd files to protect web-acessible directories. All operating systems QMail Mail Server Configure the QMail mail server, a simpler alternative to Sendmail. All except Windows RBAC and Projects Manage RBAC user attributes, profiles and authorizations.
Only SmartOS Read User Mail Read email in users' mailboxes. All except Windows Running Processes List, kill and renice running processes on your system. Most operating systems SMART Drive Status Check the status of IDE and SATA drives to detect problems and potential failures. Linux, FreeBSD and Mac OS X SSH Login Login to your system with SSH or telnet.
Concrete evidence. Online Resource Centre The book is accompanied by an Online Resource Centre, which contains: * Supporting documents and multimedia resources for the two fictional cases, including* Prosecution and defence case papers* Police interviews (incl. Transcripts, audio, and video)* Witness statements* Criminal procedure forms* Civil claim forms* A range of multiple-choice questions enabling students to test their knowledge * A list of useful web links.
All operating systems SSH Server Setup the SSH server for remote secure logins. All operating systems SSL Tunnels Setup SSL tunnels to encrypt services like POP3 and IMAP, using stunnel run from inetd. All except Windows Samba Windows File Sharing Create and edit samba file and print shares. Most operating systems Scheduled Commands Schedule the execution of one-off commands or scripts. Most operating systems Scheduled Cron Jobs Create, edit and delete Cron jobs. Most operating systems Scheduled Webmin Functions Define Webmin module functions that are called on a regular schedule by the Webmin webserver All operating systems Sendmail Mail Server Manage sendmail aliases, masquerading, address rewriting and other features.
Most operating systems Service Management Facility Configuration Edit services under control of Service Manangement Facility SMF(1). Only SmartOS Shoreline Firewall Lets you edit the most useful tables of the Shoreline Firewall Only Linux Shorewall6 Firewall Lets you edit the most useful tables of the Shorewall6 Firewall Only Linux Software Package Updates Displays available package updates from YUM, APT or other update systems Most operating systems Software Packages Manage software packages on your system, and install new packages. Most operating systems Solaris Zones Create and manage Solaris 10 zones. Only SmartOS SpamAssassin Mail Filter Set up and configure SpamAssassin to filter email received by your system.
All except Windows Squid Proxy Server Configure Squid options, ACLs, caching parameters and proxy users. Most operating systems Squid Report Generator Configure and schedule SARG, a tool for generating reports from Squid access logs. Athena cad software. All except Windows System Documentation View man pages, HOWTOs and other package documentation.
Most operating systems System Logs Configure the syslog server on your system and view its log files. Most operating systems System Logs NG Configure the Syslog-NG server on your system and view its log files. All operating systems System Status Background system status collection libraries All operating systems System Time Set the system and hardware time either manually or from a time server. Most operating systems System and Server Status View the status of services on your system and on remote systems.
All operating systems TCP Wrappers Configure the TCP wrappers networking access control files All operating systems Text Login Access the shell on your system without the need for a separate SSH client, using Ajaxterm All operating systems Upload and Download Upload multiple files to the server, and download multiple URLs either immediately or in the background at a scheduled time. All operating systems Usermin Configuration Configure global options for the Usermin user account management server. All except Windows Users and Groups Create and edit Unix users and groups from the /etc/passwd and /etc/group files.
Most operating systems Voicemail Server Set up your system as an answering machine using vgetty Only Linux WU-FTP Server Configure the access control, anonymous FTP and other options of WU-FTPd. Most operating systems Webalizer Logfile Analysis Generate reports from webserver, proxy server and FTP log files All except Windows Webmin Actions Log View detailed logs of actions by Webmin users. All operating systems Webmin Configuration Configure Webmin itself, such as allowed hosts, SSL, installed modules and themes. All operating systems Webmin Servers Index Displays an index of other Webmin servers for easy linking. All operating systems Webmin Users Create Webmin users and configure which modules and features they are allowed to access. All operating systems iSCSI Client Access disk devices across the network using the iSCSI protocol.
Only Linux iSCSI Server Share disk devices across the network using the iSCSI protocol with the netbsd-iscsi package. Linux and FreeBSD iSCSI TGTd Share disk devices across the network using the iSCSI protocol with the TGTd package. Only Linux iSCSI Target Share disk devices across the network using the iSCSI protocol with the iscsitarget package. Only Linux idmapd daemon Manage the NFS ID mapping daemon.