Tag Archives: Networking

Setting up a pptp vpn server

Share Button

It’s always been very useful to be able to vpn in to your network and access file-shares or internal websites as you would be able to do on your computer at work. PPTP VPN is very easy and fast to set up and it works for most of the devices and operating systems out there without additional software necessary. The pptpd service listens on port 1723 and your firewall needs to be adjusted to let it pass to the internal server that handles this. This video below demonstrates the install and configuration of a simple pptpd server on a Ubuntu Server 12.04LTS edition. I hope you enjoy this video and don’t forget to leave a comment here or on my youtube channel.

Thanks MSJ 😉


Enable SSL on Apache2

Share Button

Apache Web Server works great out of a box but in some cases you like to secure your site with a certificate and this Article will walk you through it step by step enabling SSL and generating a certificate. The only down site with self-signed certificates is that they are not trusted in the public internet and the customer will see a certificate warning. This doesn’t mean it’s not working it’s just that the certificate could not be verified but if you continue with the certificate it still secures your connection.

Let’s get started and install Apache2 enter:

sudo apt-get install apache2

type in ps ax |grep apache and you should see something like that:

23783 ? Ss 0:00 /usr/sbin/apache2 -k start
23787 ? S 0:00 /usr/sbin/apache2 -k start
23788 ? Sl 0:00 /usr/sbin/apache2 -k start
23789 ? Sl 0:00 /usr/sbin/apache2 -k start

that means the installation worked and apache is running. Now start firefox and enter the address of your web server in the URL and you should see this:



Great everything work the way it should. Now let’s create a certificate. First of all create a directory where we place our certificate. Type in:

sudo mkdir /etc/apache2/ssl

now create a certificate with the following command (it’s all in one line):

sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/apache2/ssl/apache.key -out /etc/apache2/ssl/apache.crt

now openssl will ask you a bunch of questions. Let’s go over those together:

Generating a 2048 bit RSA private key
writing new private key to ‘/etc/apache2/ssl/apache-test.key’
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter ‘.’, the field will be left blank.
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:New Mexico
Locality Name (eg, city) []:Albuquerque
Organization Name (eg, company) [Internet Widgits Pty Ltd]:UbuntuVideoCast
Organizational Unit Name (eg, section) []:IT Department
Common Name (e.g. server FQDN or YOUR name) []:www.ubuntuvideocast.com
Email Address []:mstjohn1974@gmail.com

this above should give you a good idea what you should fill in on those questions. Now that this is done lets prepare Apache to use it. Type in:

sudo nano /etc/apache2/sites-available/default-ssl

and now go down till you see the SSLEngine on directive. Now below that you should see the following two directives:

SSLCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem
SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key

we have to change it to match our new certificate, it should something like that:

SSLCertificateFile /etc/apache2/ssl/apache.crt
SSLCertificateKeyFile /etc/apache2/ssl/apache.key

save it and enable ssl on apache by issuing this commands:

sudo a2enmod ssl

sudo a2ensite default-ssl

and last but now least restart or reloading the new configuration. Type:

sudo service apache2 restart

and try to hit it with your browser. If everything works you should see something like this:



This is the warning I was talking about earlier. Click on the link “I understand the risk” and you will see this:



Click on the button “Add Exception” and you will see this:



Click on the “View” button to verify it is really our certificate that we set up. You should see something like that:



Everything is there ..great…click on close and on the remaining screen click on “Confirm security exception” and we are done and should see this:



Cool…..that’s it…I hope it helped you in getting an SSL Certificate installed and running with your Web Server. Let me know if you have any further questions. Please comment on this article.


How to tell who is logged in on your Linux Server

Share Button

In this short video I demonstrate how you can figure out who is logged in on your Linux Servers. I am going over 4 commands that should be available for your Linux System. In my case I needed to install the command finger since it was not pre-installed. In order to install the command finger just type in:

sudo apt-get install finger

and hit enter. This will install it and it should be available right away. The other commands I am using in this video are: who, last and lastlog. If you like to know more about those commands just type in man <name of command> and hit enter and it should present you with the manual page for the command.

Enjoy watching this video and leave comments if you know other ways of accomplishing this task. Thanks


1 2 3 21