You may install “avconv” which has almost the same usage as “ffmpeg”. The two commands often use the same syntax, but features such as srt subtitles may only work with ffmpeg.
sudo apt-get install libav-tools
Brain's Workbench
What’s Stunnel
The Stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the program’s code.
What Stunnel basically does is that it turns any insecure TCP port into a secure encrypted port using OpenSSL package for cryptography. It’s somehow like a small secure VPN that runs on specific ports.
Step 1: Create an Ubuntu Droplet
So far I have tested it on Ubuntu 12.04 x32/x64, Ubuntu 12.10 x32/x64, Ubuntu 13.04 x32/x64.
Step 2: Update and Upgrade Ubuntu
Using these commands update your Ubuntu’s package list and also upgrade the existing packages to the latest version:
apt-get update apt-get upgrade
If you want to build a PPTP server graphically build using pfsense nice looking interface, then please do follow the steps below. Here I assume, a proper NAT firewall is already running in the pfsense configuration.
Step-1
Assuming you are planning to setup your server infrastructure behind firewall- pfsense. You have a Public IP- 114.130.56.x to be pointed to your private lan server with 192.168.14.x.
Let’s begin-
Step-1
Adding public IP to the WAN interface “Firewall > Virtual IPs ” as below-
Step-2
Now move on the “Firewall > NAT > 1:1” menu as below-
PFSense is a very strong firewall as my alternative for Endian (BSD Vs. Redhat-Linux)
Here’s the direct download link-
http://files.nl.pfsense.org/mirror/downloads/pfSense-LiveCD-2.2.4-RELEASE-amd64.iso.gz
How to extract?
gzip -d pfSense-LiveCD-2.2.4-RELEASE-amd64.iso.gz
Voila! your unzipped ISO is now available. 🙂
Type the following command, enter:
$ ip link show
Sample outputs:
First Install Debian minimal
Update the repository sources and add the contrib and non-free repositories.
nano /etc/apt/sources.list
It should look something like this:
deb http://ftp.us.debian.org/debian/ wheezy main contrib non-free deb-src http://ftp.us.debian.org/debian/ wheezy main contrib non-free
deb http://security.debian.org/ wheezy/updates main contrib non-free deb-src http://security.debian.org/ wheezy/updates main contrib non-free
# wheezy-updates, previously known as 'volatile' deb http://ftp.us.debian.org/debian/ wheezy-updates main contrib non-free deb-src http://ftp.us.debian.org/debian/ wheezy-updates main contrib non-free
Small Deployments (1 to 250 Monitored Devices)
Medium Deployments (250 to 500 Monitored Devices)
Large Deployments (500 to 1000 Monitored Devices)
For this guide SELinux and IPtables were completely disabled and CentOS 6 was up-to-date!
To ensure proper resolving FQDN entries in DNS or /etc/hosts must exist and please configure NTP time synchronization for services to run properly.
Firstly you need to allow incoming ICMP ping request since this is the way Zenoss checks if the system is online.
Go to:
Server Manager -> Configuration -> Windows Firewall with Advanced Security -> Inbound Rules
Do the following:
Enable rule “File and Printer Sharing (Echo Request – ICMPv4-In)”.
Dynamic ports cannot be protected by port filtering firewalls such as iptables. First, you need to configure NFS services to use fixed ports. Open /etc/sysconfig/nfs, enter:
# vi /etc/sysconfig/nfs
Modify config directive as follows to set TCP/UDP unused ports:
# TCP port rpc.lockd should listen on. LOCKD_TCPPORT=lockd-port-number # UDP port rpc.lockd should listen on. LOCKD_UDPPORT=lockd-port-number # Port rpc.mountd should listen on. MOUNTD_PORT=mountd-port-number # Port rquotad should listen on. RQUOTAD_PORT=rquotad-port-number # Port rpc.statd should listen on. STATD_PORT=statd-port-number # Outgoing port statd should used. The default is port is random STATD_OUTGOING_PORT=statd-outgoing-port-number