Booting with OCZ Vertex 60GB SSD

I recently got i nice piece of hardware and I love it. It is intended for a VoIP asterisk server but I took the liberty of testing it first with common operating system (Windows XP, Ubuntu). Here is what I got.



Beginning subversion - svn for the n00b

I compiled a small set of commands for the svn newbie like me. I will update this post whenever needed as I am still learning it myself.

# Create a repository
svnadmin create d:\repos\dbf2009

# Import initial files to repository
svn import -m "Initial Import" DBF2009 svn://ip.address/dbf2009 --username harry

# Checkout
svn co svn://ip/reponame

#checkout from same machine
svn co file:///e:/repos/dbf2009

# Update working copy (local copy)
svn update

# See overview of changed files (comparison from .svn)
svn status

# See defailed info of cahnged files (comparison from server)
svn status -u -v

# Commit changes to svn server
svn commit -m "testing lang"

# See defailed diff
svn diff

# Schedule addition of a file or directory
svn add 

# Rename a repository
# There is no rename command, create a new repo, create a dump file from the old repo,
# load the dump file to the new repo. Don't forget to fix permissions in config directory
svnadmin create /path/to/new/repository/
svnadmin dump /the/path/to/old/repository/ > old-repo.dump
svnadmin load /the/path/to/new/repository/ < old-repo.dump

Basic IPTABLES Firewall Script

Here is a basic firewall script for servers running HTTP and FTP. The script is commented so its easy to put in additional rules. Also note that you have to put your own DNS server in $dnsIP variable. Additional ports (tcp or udp) to be opened may placed in allow_tcp and allow_udp variables. Before using the script make sure to do chmod +x iptables.sh first.

Usage:


./iptables.sh start
or
./iptables.sh stop

and now the script:

#!/bin/sh
# John Homer H Alvero
# [email protected]
# March 9, 2010

set -e

iptables="/sbin/iptables"
modprobe="/sbin/modprobe"
dnsIP="8.8.8.8"         #IP Address of DNS server
allow_tcp="80 22"       #This will allow SSH and HTTP, add more ports as needed
allow_udp=""

load () {
        echo "Loading Kernel modules"
        $modprobe ip_tables
        $modprobe ip_conntrack
        $modprobe iptable_filter
        $modprobe ipt_state
        echo "Kernel modules loaded."

        echo "Loading rules"

        #Set Default policy
        $iptables -P FORWARD DROP
        $iptables -P INPUT DROP
        $iptables -P OUTPUT DROP

        #Allow RELATED and ESTABLISHED connections
        $iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

        #Allow traffic to localhost
        $iptables -A INPUT -s 127.0.0.1 -j ACCEPT

        #Allow DNS Queries to DNS Server
        $iptables -A INPUT -p udp -s $dnsIP/32 --source-port 53 -d 0/0 --destination-port 1024:65535 -j ACCEPT
        $iptables -A OUTPUT -p udp --destination $dnsIP --dport 53  -j ACCEPT

        if [ -n "$allow_tcp" ]; then
        for i in $allow_tcp
        do
                $iptables -A INPUT -p tcp -m tcp --destination-port $i -j ACCEPT
        done
        fi

        if [ -n "$allow_udp" ]; then
        for i in $allow_udp
        do
                $iptables -A INPUT -p udp --destination-port $i -j ACCEPT
        done
        fi


        #Add additional rules here.

        echo "Rules loaded."
}

flush () {
        echo "Flushing rules..."
        $iptables -P FORWARD ACCEPT
        $iptables -P OUTPUT ACCEPT
        $iptables -P INPUT ACCEPT
        $iptables -F
        echo "Rules flushed."
}

case "$1" in
        start|restart)
                flush
                load
                ;;
        stop)
                flush
                ;;
        *)
                echo "usage: start|stop|restart"
                ;;
esac
exit 0