Posts

Showing posts from August 5, 2012
Image
External Proxy Server for Mikrotik - fazar.net External Proxy Server for Mikrotik Mikrotik routerboard has a built-in proxy in it, but it has main constraint : very limited storage capacity. Therefore, most network administrators whom using mikrotik will use an external proxy to overcome this constraint. Here you can found an easy ways to implementing external proxy server for Mikrotik. Squid is the most widely used proxy daemon for linux (including its derivative such as lusca). Some several advantages in the implementation of external proxy are : Easy to adjust the configuration to suite your needs The use of access control lists (ACLs) that can be used for specific purposes Squid (especially version 2.7) can be “armed” with a url redirector. In some condition, url redirector can be used to force squid to cache dynamic content (such as Youtube videos). Greater storage capacity as the general computer or server use the harddisk as data storage. In this p
How To Remove Ubuntu’s Password Keyring UPDATE: This post is almost 2 years old now and the method described below is somewhat obsolete (but still works). Borrowing from the comments posted below, do the following to remove the keyring in a more simple fashion: 1) Go click Applications > Accessories > Passwords and Encryption keys 2) The should be entries there listing an array of keyring password. 3) Right click on them and select change password 4) Enter the old password if you have one then leave the new password blank. (A warning message should appear) I’ve not done this personally (I haven’t had to) but if I’m guessing correctly, the “warning message” mentioned above in step 4 is likely the same warning message pictured below, asking if you are sure you want to use “Unsafe Storage”. You can read more about what this means below. —————-[Begin old post]—————- I would have made the title of this post “How to remove the Keyring password manager in Ubuntu Linux” b