how to configure OPEN LDAP SERVER in centos

Step #1. Requirements

compat-openldap.i386 0:2.1.30-6.4E
openldap-clients.i386 0:2.2.13-6.4E
openldap-devel.i386 0:2.2.13-6.4E
openldap-servers.i386 0:2.2.13-6.4E
openldap-servers-sql.i386 0:2.2.13-6.4E
yum install *openldap* -y
Step #2. Start the service

chkconfig –levels 235 ldap on
service ldap start
Step #3. Create LDAP root user password

# slappasswd

New password:
Re-enter new password:
{SSHA}cWB1VzxDXZLf6F4pwvyNvApBQ8G/DltW

Step #4. Update /etc/openldap/slapd.conf for the root password

vi /etc/openldap/slapd.conf

#68 database bdb
#69 suffix “dc=adminmart,dc=com”
#70 rootdn “cn=Manager,dc=adminmart,dc=com”
#71 rootpw {SSHA}cWB1VzxDXZLf6F4pwvyNvApBQ8G/DltW

Step #5. Apply Changes

service ldap restart
Step #6. Create scalebuzz users

useradd scalebuzz1
passwd scalebuzz1

Changing password for user scalebuzz1.
New UNIX password:
Retype new UNIX password:
passwd: all authentication tokens updated successfully.

useradd scalebuzz2
passwd scalebuzz2
Changing password for user scalebuzz2.
New UNIX password:
Retype new UNIX password:
passwd: all authentication tokens updated successfully.
Step #7. Migrate local users to LDAP

grep root /etc/passwd > /etc/openldap/passwd.root
grep test1 /etc/passwd > /etc/openldap/passwd.test1
grep test2 /etc/passwd > /etc/openldap/passwd.test2

Step #9. Convert passwd.file to ldif (LDAP Data Interchange Format) file

/usr/share/openldap/migration/migrate_passwd.pl /etc/openldap/passwd.root /etc/openldap/root.ldif
/usr/share/openldap/migration/migrate_passwd.pl /etc/openldap/passwd.scalebuzz1 /etc/openldap/scalebuzz.ldif
/usr/share/openldap/migration/migrate_passwd.pl /etc/openldap/passwd.scalebuzz2 /etc/openldap/scalebuzz2.ldif

Step #10. Update root.ldif file for the “Manager” of LDAP Server

vi /etc/openldap/root.ldif

#1 dn: uid=root,ou=People,dc=adminmart,dc=com
#2 uid: root
#3 cn: Manager
#4 objectClass: account
Step #11. Create a domain ldif file (/etc/openldap/adminmart.com.ldif)

[[email protected] ~]# cat /etc/openldap/adminmart.com.ldif

dn: dc=adminmart,dc=com
dc: adminmart
description: LDAP Admin
objectClass: dcObject
objectClass: organizationalUnit
ou: rootobject
dn: ou=People, dc=adminmart,dc=com
ou: People
description: Users of adminmart
objectClass: organizationalUnit
Step #12. Import all users in to the LDAP

Add the Domain ldif file

[[email protected] ~]# ldapadd -x -D “cn=Manager,dc=adminmart,dc=com” -W -f /etc/openldap/adminmart.com.ldif

Enter LDAP Password:
adding new entry “dc=adminmart,dc=com”
adding new entry “ou=People, dc=adminmart,dc=com”
Add the users:

[[email protected] ~]# ldapadd -x -D “cn=Manager,dc=adminmart,dc=com” -W -f /etc/openldap/root.ldif

Enter LDAP Password:
adding new entry “uid=root,ou=People,dc=adminmart,dc=com”
adding new entry “uid=operator,ou=People,dc=adminmart,dc=com”
[[email protected] ~]# ldapadd -x -D “cn=Manager,dc=adminmart,dc=com” -W -f /etc/openldap/test1.ldif

Enter LDAP Password:
adding new entry “uid=test1,ou=People,dc=adminmart,dc=com”
[[email protected] ~]# ldapadd -x -D “cn=Manager,dc=adminmart,dc=com” -W -f /etc/openldap/test2.ldif

Enter LDAP Password:
adding new entry “uid=test2,ou=People,dc=adminmart,dc=com”

Step #13. Apply Changes

[[email protected] ~]# service ldap restart
Step #14. Test LDAP Server

It prints all the user information:

[[email protected] ~]# ldapsearch -x -b ‘dc=adminmart,dc=com’ ‘(objectclass=*)’

How to use Unix and Linux curl command with proxy

curl command with proxy

The syntax is given below:

export http_proxy=http://your-ip-address:port/

## http proxy with username and password
export http_proxy=http://user:[email protected]:port/

## HTTPS version ##
export https_proxy=https://your-ip-address:port/
export https_proxy=https://user:[email protected]:port/

Another option is to pass the -x option to the curl command. To use the specified proxy:
curl -x <[protocol://][user:password@]proxyhost[:port]> url
–proxy <[protocol://][user:password@]proxyhost[:port]> url
–proxy http://user:[email protected]:Port url
-x http://user:[email protected]:Port url

Examples

First set the http_proxy:
export http_proxy=http://foo:[email protected]:3128/
export https_proxy=$http_proxy
## Use curl command ##
curl -I www.cyberciti.biz
curl -v -I www.cyberciti.biz

Sample outputs:

* Rebuilt URL to: www.cyberciti.biz/
* Trying 202.54.1.1…
* Connected to 1202.54.1.1 (202.54.1.1) port 3128 (#0)
* Proxy auth using Basic with user ‘foo’
> HEAD HTTP://www.cyberciti.biz/ HTTP/1.1
> Host: www.cyberciti.biz
> Proxy-Authorization: Basic x9VuUml2xm0vdg93MtIz
> User-Agent: curl/7.43.0
> Accept: */*
> Proxy-Connection: Keep-Alive
>
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Server: nginx
Server: nginx
< Date: Sun, 17 Jan 2016 11:49:21 GMT
Date: Sun, 17 Jan 2016 11:49:21 GMT
< Content-Type: text/html; charset=UTF-8
Content-Type: text/html; charset=UTF-8
< Vary: Accept-Encoding
Vary: Accept-Encoding
< X-Whom: Dyno-l1-com-cyber
X-Whom: Dyno-l1-com-cyber
< Vary: Cookie
Vary: Cookie
< Link: <http://www.cyberciti.biz/wp-json/>; rel=”https://api.w.org/”
Link: <http://www.cyberciti.biz/wp-json/>; rel=”https://api.w.org/”
< X-Frame-Options: SAMEORIGIN
X-Frame-Options: SAMEORIGIN
< X-Content-Type-Options: nosniff
X-Content-Type-Options: nosniff
< X-XSS-Protection: 1; mode=block
X-XSS-Protection: 1; mode=block
< X-Cache: MISS from server1
X-Cache: MISS from server1
< X-Cache-Lookup: MISS from server1:3128
X-Cache-Lookup: MISS from server1:3128
< Connection: keep-alive
Connection: keep-alive

<
* Connection #0 to host 10.12.249.194 left intact

How to Use Proxies with SENuke XCr ?

SENuke XCr is a application which is used to access the web by using proxies. You can also use passwordless proxy.Its too good application to access the web by using proxy.

How to use it:
just open the SENuke XCr application see there is a little pencil and ruler at the top click on that.
senukexcr-seo-proxy

Now find Proxy tab into SENuke XCr application
senukexcr-seo-proxy2

 

Now you will see the following screen, here you have to set username and password of the proxies and also assign the proxies by which you have to access the web.The important sections are highlighted.
senukexcr-seo-proxy3

 
so how to enter proxies in this application? It support both password protected and public proxies.Make sure that you have one proxy IP per line.Password protected proxies you will need to enter in the IP,port,username and password as shown below.
senukexcr-seo-proxy4

In this way you can add proxies million of times. if you have proxies click on save button.the good thing is that this software will automatically check saved proxies
In this way you can check your proxies username and password is working or not.

Offer access to the net to computer network folks with this specific proxy server

proxies 14

For many program and network managers, it’s essential to secure the network. Besides secret writing and code application, you’ll conjointly place up non-public proxy for security goal. offer access to the net to computer network folks with this specific proxy server and have place up proxy server, all wants from central computers could win the proxy server within the starting. Host you’ve got place up. As associate degree example, throughout working-time, not capable to access internet whereas no restriction for added time.Web choice could offer many positive blessings for each businesses and finish users that go considerably on the far side the basic execution of stopping access to named websites or specific varieties of websites. interference technology is principally a security device, one that has a very important level of central, server-side safety from security risks before they reveal on client devices.The advantages and options of internet filtering choices fall into four regions.Efficiency net filtering makes it attainable for a business to manage excessive utilization of non-function websites by either stopping or limiting usage of services like as an example social media, on-line auctions, on-line diversion, non-public web-based e-mail, star news, torrents, document transfer sites and then on. this is {often|this can be} often completed in many ways in which, that vary from associate degree overall total obstruction of access demands, down non-public proxy service to permitting work groups and specific folks, or simply permitting access occasionally like as an example lunch period or before and once regular in operation hours. as an example, website info that appears ridiculous with a may be deemed racially or sexually-explicit, offensive or discriminatory by others. Case-law during a range of nations has established the corporate accounts for Infobahn activities of its workers, specially once these activities embody black or offensive content. By applying internet filtering technology, not simply will a business avoid access to lots of this content before it’s used, however through connected internet following technology, it may also keep correct and comprehensive records to exhibit World Health Organization attemptedto access inappropriate content and once, sanctionative applicable action to be studied PRN and for proof to be created to assist claims of inappropriate IT use within the workplace.

SOCKS proxy servers over HTTP proxy servers is that they use only secure connection

proxy-1

Actually SOCKS and HTTP proxy severs, both behave in the same way. They are forwarding your requests to the destination host (address). With help of SOCKS or HTTP proxy servers you could bypass any firewall restriction and access any web site like: facebook.com, myspace.com, bebo.com, youtube.com and etc.The main advantage of SOCKS4 and SOCKS5 proxy servers over HTTP proxy servers is that they use only secure connection between client and the proxy server. That means nobody; including your internet provider or administrator of local area network cann’t see what you are actually sending or receiving. That is why SOCKS servers are so popular! They guarantee that your private information is secure and kept private.As we already said, all SOCKS proxy servers work as open relay. That means there are no limitations for which protocols SOCKS proxy server will be used. Such no limitations allows us to use SOCKS proxy servers for creating ‘proxy chains’. If you ever heard term ‘proxy chain’ then SOCKS is that type of proxy servers which are used to create them. Here is the principle how it works, one proxy establishes connection to another one, that proxy in turn establishes connection to the next one and so on… so you could have several proxy servers chained.As more SOCKS proxy servers are involved in proxy chain as higher the security and privacy level. Just imagine, if someone will somehow manage to get client’s IP by checking last SOCKS4’s log file (if such exist) it will points to the IP of SOCKS3 proxy servers instead of your IP 😉 SOCKS3’s log file will point to the IP of SOCKS2 and so on.Also SOCKS proxy servers could create reverse connections. In some cases your local administrator could block all outgoing connections for security reasons. At the same time incoming connections could be kept open. In that case instead of establishing connection from your PC to SOCKS proxy server, you can ask SOCKS proxy server to establish connection with your PC. After that, communication between client and SOCKS proxy server will remain the same as if use establishes connection by his/her own.

We are honoured to be providing and upholding fast, secure and highly anonymous proxy

proxies 14

Shared proxy use 4 to 5 person easily.Shared proxy use mostly gaming purpose.We provide shared proxy speed is 10 mbps.Our proxy 100% working proxy if our proxy is not working then we provide new list or refund.We provide proxy only USA and INDIA.Our live chat option and support 24/7 available.Proxiesforent has been ranked as one of the best proxy service world-wide due to our easy user interface, lightning fast servers, smooth account management and amazing support center.Proxiesforent staff members have tremendous experience developing and maintaining the fastest, most secure proxy servers on the web. We are honoured to be providing and upholding fast, secure and highly anonymous proxy server connections, unsurpassed within the industry, with very happy users. The proxy service supply will offer secure, protected access through networks of supreme velocity. We are also able to offer proxy connections which work seamlessly with almost any form of web application, thus creating an effortless and efficient correlation between you and the web content you develop, search and utilize. At proxiesforent, a professional approach to the preservation of your web anonymity and security is always our primary focus!Google says the number of paying organizations actively using Google drive crossed a million earlier this year. The company is taking steps to improve security and privacy protection for drive as well as Google Apps for Work and Google Apps for Education.For one, Google Drive is getting enhanced ediscovery for Google Apps Vault, which gives businesses more visibility and control over employee files. In other words, Drive will fall under the same retention policies and legal hold capabilities available for email and chat. Google says these capabilities will help businesses meet their legal obligations and ensure employee files are archived and available as long as needed, even if employees delete them from their Drive. This is in limited roll out and will be generally available in the coming months.Google has also updated the Mobile Device Management (MDM) for Google Drive business customers, enabling businesses to monitor usage, enforce strong passwords, and enable device encryption. If a worker loses their phone or leaves the company, the data can be wiped. Business data can we wiped without wiping their personal data.A paid proxy server where you can be able to watch whatever you want with their high speed connection and without throttling by your internet service provider.

Proxy server offer security to internal networks

 

86482892_XS

Private proxy is best proxy because this proxy speed is good and use only one person that secure proxy.Finally, there are some things you need to keep in mind when using proxies. First, remember that while a proxy server will provide you with security and anonymity, the proxy itself has to decode your traffic to send it through. This means it can see everything you are doing, unless you use SSL connections. So you need to trust it. A lot of people use TOR, which is a free anonymity network run by volunteers, or some go to underground channels to get so called Private proxies, but the problem is you never know if you can trust those servers. It may end up being worse than not using a proxy at all. Popular commercial services like Hide My Ass base their business on providing this service, so personally I have more faith in them. Don’t think of using them for criminal acts however, since they do state clearly that they cooperate with law enforcement.Because again, the proxy server is the one party that knows what your real IP address is. Also, using proxies will typically slow your connection down, since you’re basically transferring all your data to another location around the world before it goes out to the Internet. As you attempt to connect to various proxy servers, you may find very big differences in speed, so it is a good idea to try them out. Whether you want security, anonymity, or both, proxies provide a good way to surf the net.Basically, a proxy is a point to point connection between you and a remote location on the Internet.Most people use a proxy to keep their searches private or hide their online personality, unblock their country’s censorship or open services, unavailable for their country.Most person use proxy for gaming purpose,social media site like Facebook,Twitter,youtube and many more site.Many country ban social site best way to use proxy.Proxiesforent is best proxy provider in the world.Proxy server generally use different different location but main important many site like facebook and other social media site ban many country. So use proxy better for every person.Proxy server offer security to internal networks.

What is SSL and How it work?

SSL Proxy

SSL is known as secure socket layer which is an application level protocol provides encryption technology over the internet. It is also known as transpirt layer security(TLS) because it is used for secure data transmission between server and client.SSL exchange the private and public keys between server an client for secure data transmission.SSL proxy work as transparent proxy in between the client and server.

For the serevr :
SSL proxy acts a client because SSL generate the pre master key which determines the keys to encrypt and decrypt.

For the client :
SSL proxy first check the original server. If it find the original server then it replace the public key into original server certificate. now it generates the new certificate by replacing the original issuer of the certificate with its own identity and signs this new certificate with its own public key.when client accepts such certificate it sends a shard pre master key encrypted with public key on the certificate.Now it will sends pre-master key encrypted with public key on the certificate.because SSl proxy replaced the original key with its own key.

ssl2

See the example :
We have Client X connecting to website W in https connection.
X———–>W

Somehow between X and W there is proxy P.
X——————–>P———————>W

In this case P will able to get the certificate which X previously got from W becuase webserver will send to anyone who connects to it.
But P cannot be able to decrypt the data.

Helpful Pointers to Unblock Facebook

download (33)

You need to get to Facebook, yet it is blocked. There are couples of ideas we have to comprehend before we get into how to unblock Facebook:

An IP location is the first idea. Everything that is on the net has an IP (Intellectual Property) location, even your own particular PC. It is the means by which the things get sent to you over the web as this location is essentially exactly what it sounds like your location. Your Internet Service Provider allots to you this location [ISP] System. The location may be truly hard to change, or you may not even have the capacity to change it. What’s the purpose behind this being so essential? At the point when your IP location is blocked, you can be hindered from Facebook and to be unblocked, you ought to change your IP address on a way.

One system for using so as to block access to Facebook is a Firewall. A flame divider is only a system or equipment that screens and controls web exercises of a PC. Along these lines, in case you’re at work, using a library PC, or are at school or elsewhere where another person is accountable for the web association, they may set the firewall to obstruct all movement to and from the long range informal communication site. In this way, you won’t have the capacity to unblock Facebook; be that as it may you may have the capacity to maintain a strategic distance from the firewall.

A few terms how would us Unblock Facebook and those we know now:

To discover a site, for example, Facebook Proxy is the most straightforward approach. These sites uproot the piece on person to person communication sites by permitting you to hole up behind them. While asking for the data you need, the intermediary site demands it for you and the site itself never sees your IP address as Facebook is firewalled.

A negative part of these sites is that it’s truly basic for the firewall to just piece the intermediary site. It is important to have a technique which has more quality to unblock Facebook. You can endeavor to discover a rundown of running intermediary servers and physically teach or arrange your program to utilize them or you can utilize a product like Barracuda Proxy which will discover and change the intermediaries from an intermediary database consequently and spare you from the bother to go searching for a web intermediary server

Proxy Servers And Their Functionality

download (31)

A proxy server goes about as a middle person between a web server and the customer PC. They line all web movement existing between the Internet and the Intranet.

These web servers can execute every single key capacity as much following Internet convention addresses, different URL, time and date of operation, and number of bytes downloaded. Every one of these points of interest can be truly substantive while breaking down any sort of assault against a system. With the help of proxy servers, Intranet chairmen can set up better get to and give better administrations to their workers.

At whatever point a PC on the Intranet asks for the Internet to recuperate certain subtle elements or a page from the web server, the inward PC reaches the proxy PC. At that point it associates with the Internet server, which gives the wanted page to the proxy. The proxy then passes this subtle elements or site page back to the machine on the Intranet.

A few proxy servers require the utilization of certain extraordinary proxy customers. Numerous gatherings take after the mainstream methodology of utilizing arranged customers with servers. In any case, while utilizing such a customer, guarantee that the proxy customer is exceptionally arranged to work from a design menu and with servers.

Proxy servers can likewise be utilized to execute security plans. For example, document transference convention server can permit the obliged records to be sent to the PC on the Intranet from the Internet. It can likewise keep the transmitting of documents from the Net to the composed system, and the other way around. Along these lines, the Intranet executives can impediment any disposable individual exceptionally from outside the association from getting imperative corporate information.

Numerous organizations additionally utilize proxy servers to accelerate the execution of certain Internet administrations by concealing information keeping duplicates of the needed information. For instance, a web proxy server can conceal various pages.

Along these lines, if any individual from the Intranet needs to get entrance one of the concealed website page, he/she can without much of a stretch get it from the proxy server crosswise over rapid lines of the Intranet, as opposed to going out crossways the Internet and access the site page at a slower pace from the Net lines. These are a few structures in which the proxy servers work to advantage the managers.