Archive

Monthly Archives: March 2009

Hey friends..here s ma list of tunes..and if u re interested in tryn out anythn you can download it..i am linking each one to its torrents…

Jens Gad:

Achillea series :-

Tha Nine Worlds – download torrent

Amedas Estrellas – download torrent

Le Spa Sonique – download torrent

Enigma Series:-

Seven Lives Many faces – download torrent

A posteriori – download torrent

Massive Attack:-

Download all the 4 Albums:

Massive Attack - Blue Lines

    1. Safe From Harm
    2. One Love
    3. Blue Lines
    4. Be Thankful For What You've Got
    5. Five Man Army
    6. Unfinished Sympathy
    7. Daydreaming
    8. Lately
    9. Hymn Of The Big Wheel

Massive Attack - Protection

    1. Protection
    2. Karmacoma
    3. Massive Attack
    4. Weather Storm
    5. Spying Glass
    6. Better Things
    7. Eurochild
    8. Sly
    9. Heat Miser
   10. Light My Fire (Live)

Massive Attack - Mezzanine

    1. Angel
    2. Risingson
    3. Teardrop
    4. Inertia Creeps
    5. Exchange
    6. Dissolved Girl
    7. Man Next Door
    8. Black Milk
    9. Mezzanine
   10. Group Four
   11. (Exchange)

Massive Attack - 100th Window

    1. Future Proof
    2. What Your Soul Sings
    3. Everywhen
    4. Special Cases
    5. Butterfly Caught
    6. A Prayer For England
    7. Small Time Shot Away
    8. Name Taken
    9. Antistar

Massive Attack - Unleashed (Soundtrack)

    1. Opening Title
    2. Atta' Boy
    3. P is for Piano
    4. Simple Rules
    5. Polaroid Girl
    6. Sam
    7. One Thought at a Time
    8. Confused Images
    9. Red Light Means Go
   10. Collar Stays On
   11. You've Never Had a Dream
   12. Right Way to Hold a Spoon
   13. Everybody's Got a Family
   14. Two Rocks and a Cup of Water
   15. Sweet is Good
   16. Montage
   17. Everything About You is New
   18. The Dog Obeys
   19. Danny the Dog
   20. I am Home
   21. The Academy
   22. Baby Boy (by Thea)
   23. Unleash Me (by RZA feat. Prodigal Son and Christbearer Of Northstar)



Advertisements

(You will have to do this through WHM if you want to make the changes permanent, otherwise any changes will be overwritten during the next WHM/Cpanel update Main >> Service Configuration >> Exim Configuration Editor >> Advanced Editor. You may want to make a copy from the command line first just in case you mess things up ‘cp /etc/exim.conf /etc/exim.conf.bak’)

RBL, or Real-time Blackhole Lists, are lists of IP addresses from known spammers. You can use these lists in Exim to reject email from said spammers using the steps below;

Scroll down to the three text input boxes just below “begin acl”
In the *middle* box find the line ” accept hosts = :” and just after that line insert the following

#**# RBL List Begin
#**#
#
# Always accept mail to postmaster & abuse
#
accept domains = +local_domains
local_parts = postmaster:abuse
#
# Check sending hosts against DNS black lists.
# Reject message if address listed in blacklist.
deny message = ${sender_host_address} is listed at ${dnslist_domain}; See ${dnslist_text}
!hosts = +relay_hosts
!authenticated = *
dnslists = zen.spamhaus.org : bl.spamcop.net
!domains = +local_domains
#**#
#**# RBL List End

Spamassasin
————————

# vi /etc/mail/spamassassin/local.cf ‘ you will see the line;

# trusted_networks 212.17.35.

You can uncomment that line and add the IP address of your mailserver and localhost (and whatever other IPs you want to trust);

trusted_networks 127.0.0.1
trusted_networks 66.249.0.28

The other setting I found was whitelist_auth. You can add this anywhere in the /etc/mail/spamassassin/local.cf. ‘whitelist_auth’ will only work if you are using SPF, DKIM, or DomainKeys to verify senders.

whitelist_auth dave@example.com
whitelist_auth *@spry.com

For more info type ‘perldoc Mail::SpamAssassin::Conf’ from the command line.

These settings will help lower the amount of mail that Spamassassin has to process by ignoring all mail coming from your server and any other trusted IP.

——————————————————————————————–

Change all default/catchall addresses from :blackhole: to :fail:

Then to change all default addresses to :fail: we’ll need to run two commands, one to change any :blackhole: settings and the other to change any default addresses that forward to another email address. First run this command in SSH …

Quote:
replace ‘:blackhole:’ ‘:fail:’ — /etc/valiases/*

… this will change any :blackhole: setting to the desired :fail: setting.

Change all default/catchall addresses to :fail:

Then the second command …

Quote:
sed -i ’s/^\*: [^ ]*$/*: :fail: ADDRESS DOES NOT EXIST/g’ /etc/valiases/*

… this will change any setting which sends the unrouted mail to another email address to the desired :fail: setting.

Now, running this command again should reveal no results because we have just changed all settings to :fail: …

Quote:
grep ‘*:’ /etc/valiases/* | egrep -v ‘:fail:’

Close Open DNS Servers

For those of you who check your nameservers and other DNS related issues using the popular site dnsreport you’re probbaly seeing Fail Open DNS Servers. We’ll show you have to fixed named to close open dns servers.

How do I check my system?
Go to http://www.dnsreport.com and enter your domain name, eg webhostgear.com

You’re safe if you see:
PASS Open DNS servers

You need to follow this tutorial if you see:
FAIL Open DNS servers

Closing Open DNS Servers Tutorial

1) Login to your server and su to root.

2) Edit the /etc/named.conf file such as:# vi /etc/named.conf

Look for:

key “rndckey” {
};

After this add the following, replacing mainIP and secondaryIP with your systems nameservers.

acl “trusted” {
mainIP;secondaryIP;127.0.0.1;
};

3) After that’s done you want to add the section that says only the trusted is allowed for certain functions. Check your options area and make sure you add the following:

allow-recursion { trusted; };
allow-notify { trusted; };
allow-transfer { trusted; };

So the final result looks something like:

options {
directory “/var/named”;
allow-recursion { trusted; };
allow-notify { trusted; };
allow-transfer { trusted; };
dump-file “/var/named/data/cache_dump.db”;
statistics-file “/var/named/data/named_stats.txt”;
/*
* If there is a firewall between you and nameservers you want
* to talk to, you might need to uncomment the query-source
* directive below.  Previous versions of BIND always asked
* questions using port 53, but BIND 8.1 uses an unprivileged
* port by default.
*/
// query-source address * port 53;
};

4) Save the changes and restart the named service: service named restart

5) Recheck your site at dnsreport.com, you should be good!

Cheers