Creating Disk Images

Some notes on partitioned disk images - how to create, initialize and mount them. This information can be quite handy when working with Virtual Machines.

Disabling Auto-Provisioning in Funambol

By default the Funambol server will automatically create new User, Device and Principal records for any user who attempts to use the server. This can be very helpful in some cases - but it can also be a problem. There are three ways to work around this problem.

How can I get my web site to show up at the top of the Google Search Results?

This is probably the most common question asked when a new web site is created - but it does not have a simple answer.

  • Some search engines will allow you to pay a fee to have your listing appear at the top of search results. Google allows you to get something similar through their AdWords service. However, they keep their search results separate from their advertisements.
  • There are several steps you need to take to move your search results higher. Some of them are very easy, some are easy but time consuming, some are not so easy.

How does the SPAM filter work?

The BNT Mail server is configured to automatically check each email that arrives to see if it is spam. This is done using a number of techniques.

How many lines and extensions can I connect to my PBX?

There is generally no restriction on the number of lines and extensions that you can connect. However, there are many factors that work together to determine the overall capacity of your system. You can build an expensive and powerful PBX and load it down by using a few heavy features so that it can't handle many calls - or you can build an inexpensive and weak PBX and connect it to lots of extensions that are only used for simple calls. Because of this flexibility it is not easy to make general comments about PBX capacity. In general you will want to determine your needs and build a PBX that fits both your requirements and your budget.

How secure is a VPN?

The technology involved is very secure. Crackers who wish to access your data without compromising your certificate files and/or passwords will find the task to be very difficult. The VPN will automatically generate new encryption keys every hour, so the cracker will have to record a copy of all your traffic throughout a period of one hour - then let a super computer work for a significant period of time to crack the encryption for that hour. Your traffic during the next hour will have to be cracked separately.

How to copy a Live ISO to a USB key

I have a Fedora Live ISO image and would like to write it to a USB key instead of a CD or DVD. Please remind me: which tool do I use to do this?

I have too many passwords; I can't remember them all!

It's impossible these days to keep track of all the passwords for all the different web sites we use. More seriously: Passwords that are easy to remember are a security threat. Fortunately, there's an easy solution to the problem.

Mail Configuration Information

This article contains somewhat technical information that you can use to configure your email software for both fixed and mobile access to your BNT Solutions mail service.

Mailing List Subscription Problems?

Have you found it difficult to subscribe to a BNT Solutions mailing list? Read this short note.

Pages