We are pleased to announce that our ZeroBin service is available for testing.

You can find the service at: HBCOM Technologies ZeroBin service.

For those who still wonder what is ZeroBin service:

“ZeroBin is a minimalist, opensource online pastebin/discussion board where the server has zero knowledge of hosted data. Data is encrypted/decrypted in the browser using 256 bits AES.”

The service is provided free of charge, please do not abuse it. Since it is still in testing mode we cannot gurantee if information will not be erase prior to expiration.

In case you find any unappropriated material posted there, please let us know.

If you need hosting we can provide you with web hosting, virtual or dedicated server. Contact us for details.

Probably most of you already had to log in the VMWare console to reinstall vmware tools after kernel update.

Usually we do that by simply running:


After doing it few times I’ve decided to find an automated way of doing it. After quick search on Internet I found an article giving acceptable solution to my problem.

I’ll share the solution here (with two small fixes πŸ˜‰ as bonus).

– Open terminal and create new file

vi /etc/init.d/vmware-check-tools

– Paste following inside:

# Following lines auto-recompile VM Tools when kernel updated
VMToolsCheckFile="/lib/modules/`uname -r`/misc/.vmware_installed"
VMToolsVersion=`vmware-config-tools.pl --help 2>&1 | awk '$0 ~ /^VMware Tools [0-9]/ { print $3,$4 }'`

printf "\nCurrent VM Tools version: $VMToolsVersion\n\n"

if [[ ! -e $VMToolsCheckFile || `grep -c "$VMToolsVersion" $VMToolsCheckFile` -eq 0 ]]; then
[ -x /usr/bin/vmware-config-tools.pl ] && \
printf "Automatically compiling new build of VMware Tools\n\n" && \
/usr/bin/vmware-config-tools.pl --default && \
printf "$VMToolsVersion" > $VMToolsCheckFile && \
rmmod pcnet32
rmmod vmxnet
depmod -a
modprobe vmxnet

Then make it executable:

chmod 755 /etc/init.d/vmware-check-tools

And finally create symlink:

cd /etc/rc.d/rc3.d
ln -s ../init.d/vmware-check-tools S09vmware-check-tools

Recently Shorewall (Shoreline Firewall) released new version 4.5.0.

This version introduced new packing. From this version you have follwoing packages:

  • Shorewall Core – Core libraries installed in /usr/share/shorewall/
  • Shorewall – Requires Shorewall Core. Together with Shorewall Core, provides IPv4 firewalling.
  • Shorewall6 – Requires Shorewall. Provides IPv6 firewalling.
  • Shorewall Lite – Requires Shorewall Core. As before.
  • Shorewall6 Lite – Requires Shorewall Core. As before.
  • Shorewall Init – As before.

Since we have Core package now to upgrade from 4.4.x version you need to update at least 2 packages – core and shorewall.

To do that in CentOS 5 the spteps are follwoing (in your case probably versions will be different):

1. Download new packages

wget http://www.invoca.ch/pub/packages/shorewall/RPMS/ils-5/noarch/shorewall- http://www.invoca.ch/pub/packages/shorewall/RPMS/ils-5/noarch/shorewall-core-

2. Upgrade shorewall

rpm -Uvh shorewall-core- shorewall-
error: Failed dependencies:
perl(Digest::SHA1) is needed by shorewall-

In my case additional package was required so I have to install it:

yum install perl-Digest-SHA1

and update again

3. Check configuration

shorewall check

4. Restart shorewall

shorewall restart

To upgrade you Debian installation usually you use:

apt-get update
apt-get upgrade

This should upgrade all installed packages. But sometimes there is a message that some packages are kept back. This means that dependencies have changed on one of the packages you have installed so that a newer package must be installed to upgrade.

To fix this you must execute:

apt-get dist-upgrade

This will do the trick.

robots.txt is a file that you can use to instruct where web crawlers should look for information and where they should not.

How it works?

Good web crawler first accesses root of a domain and looks for robots.txt file.

For example if robot wants to check www.example.com/welcome.html it will first check if www.example.com/robots.txt exists.

And again for example it finds:


# No robots, Please
User-agent: *
Disallow: /

In above file:

User-agent: * means this section applies to all robots and
Disallow: / instructs the robot that it should not visit any pages on the site.

Note: It is important to know that robots can ignore your /robots.txt and robots.txt file is a publicly available file.

First consideration is really important to know since the robots who ignore the instructions are usually malicious.

What to put inside?

robots.txt is a plain text file. Here are few examples:

To allow all robots to visit all files:
User-agent: *

And opposite disallow all robots out:
User-agent: *
Disallow: /

If you need to disallow a specific agent to visit specific folder
User-agent: SpecificBot # replace the 'SpecificBot' with the actual user-agent of the bot
Disallow: /notimportant/

Above example shows also how you can put comments in the file.

In addition you can tell robots where your sitemap is located
User-agent: *
Sitemap: http://www.example.com/sitemaps/sitemap.xml

Where to put it?

The short answer: in the top-level directory of your web server.

A bit longer: it should be located after your domain name. For example www.example.com/robots.txt not www.example.com/robot_file/robots.txt

If you just got your new CentOS server.

After a while you notice that timestamps in your logfiles are shifted with few hours. So what could be wrong?
Actually is really simple – most probably your timezone is not correct. To check run “date” from command line, this will show what is the time for your server.
Then you find that the timezone is not correct?!

How do you set the correct one?

Unfortunately, this is not an easy thing to figure out. Official documentation states that you can use system-config-date, but it has a bunch of dependencies (when I ran yum install system-config-date on one of my servers it asked to install 84 packages).

So is there an alternative way to do it?

All timezone files are located in /usr/share/zoneinfo. To select the appropriate named timezone for your location. For my location, Montreal, Canada, I actually have to select: America/Montreal. For you it could be different so make note of the appropriate folder and file for your timezone.

The active timezone used on your system is in the /etc/localtime file.

The default will vary depending on your server host and it depends on the value that was provided during installation.
We simply need to replace this file with the file we selected in the previous step.
Even I say replace, actually is recommended to create a link to the pertinent file rather than actually replacing the file.

Here are the steps to follow:

First, backup the existing localtime file (it is always good practice to make backups of original config files).

mv /etc/localtime /etc/localtime.bak

Next, create the link:

ln -s /usr/share/zoneinfo/ /etc/localtime

Test your change.
Run β€œdate” from the command line, and ensure that the appropriate time, date, and timezone are reported.

hosts file is a text file used to map IP addresses to hostname before DNS was in place. So you will ask why to edit it?

Simple – sometimes is required to have map if specific host to different IP ( for example: testing ).

In general is not recommended to edit hosts file. Even some viruses are using it to map popular antivirus sites to localhost and hence deny access to them.

The file is located in %systemroot%\system32\drivers\etc\ (which for most of computers translate to C:\windows\system32\drivers\etc\)

In Windows XP and lower if you are logged as administrator you can edit the file directly, but to increase security (since most of ordinary users log as administrators) Microsoft decided to add in Windows Vista (and newer) additional layer of security so you are unable to edit the file directly.

Here is how to do it:

  1. In Start menu type Notepad
  2. Right click on Notepad and select run as Administrator
  3. Continue as usual – edit the file and save it

Note: Some antivirus products “protect” hosts file so you might need to disable that protection before editing.

Note: For newbies the format of the file is following:

x.x.x.x FQDN

Where x.x.x.x is IP address in numeric form

and FQDN is Fully Qualified Domain Name

Example:  localhost

If you are using telnet to test and troubleshoot services you will be “surprised” that telnet is not installed by default.

'telnet' is not recognized as an internal or external command,
operable program or batch file.

To to enable it back follow this procedure:

  1. Go to Start – > Control Panel -> Programs -> Turn Windows Features On and Off
  2. Check Telnet Client and click OK (See screenshot below)
  3. After a while it is ready
  4. Enjoy

Screenshot of Microsoft features showing how to enable Telnet

When testing e-mail server one of the tools that are proven to be useful is plain old telnet.
Actually this is not a surprise since SMTP protocol function is similar.

Here is how to use it:

1. Start from command prompt
2. Type
telnet mailhost 25
Note: Replace mailhost with your email server.

3. Type:
HELO server.com

Note1: depending on the server HELO have to be replaced with EHLO
Note2: Replace server.com with your domain

4. Type
MAIL FROM:you@server.com

Note: Again replace you@server.com with your e-mail address

5. Type

RCPT TO: recipient@server2.com

Note: Replace recipient@server2.com with recipient e-mail address
6. Type

after that optionally
SUBJECT: Your subject
then type your message
to finish place dot at new line.
6. To exit type

It happens that sometimes when connecting to misconfigured Windows Terminal server (TS) client receives following error message:

“Your temporary license about to expire in… days”

This is usually dye to misconfiguration on the server side, but here is the trick to get additional 90 days temporary license:

WARNING: This requires editing of Windows registry. Use it on your own risk.

  1. Launch regedit – Start -> Run… -> regedit
  2. Go to HKLM\Software\Microsoft\MSLicensing\
  3. Delete hardwareID entry.
  4. Enjoy another 90 days, but not forget to plan for fixing the issue πŸ™„

← Previous PageNext Page →