segunda-feira, 17 de agosto de 2015

Download Windows 10

Pessoal segue o link para baixar o Windows 10 / atualizar, assim não precisa esperar o agendamento.

https://www.microsoft.com/pt-br/software-download/windows10

só escolher 32 ou 64.


Instalação e configuração de certificados SSL no seu servidor Zimbra

/opt/zimbra/bin/zmcertmgr createcsr comm -new -keysize 2048 -subject "/C=BR/ST=SIGLADOESTADO/L=NOME DA CIDADE/O=NOME DA EMPRESA/OU=TI/CN=seudominio.tld"

Uma vez recebido seu e-mail com os arquivos de certificado você receberá os seguintes arquivos:

  1. AddTrustExternalCARoot.crt
  2. SSLRSAAddTrustCA.crt
  3. SSLSADomainValidationSecureServerCA.crt
  4. seudominio_tld.crt
Efetuando a instalação do certificado

Crie o bundle dos certificados  CA da seguinte maneria, copie o conteúdo dos arquivos acima 1,2,3 para o arquivo

/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt

dentro do seu Zimbra.
Copie o arquivoseudominio.tld.crt
para este mesmo diretório ficando da seguinte maneira
/opt/zimbra/ssl/zimbra/commercial/seudominio.tld.crt
Execute como #ROOT o seguinte comando para validar o certificado a ser instalado, lembre-se de estar dentro do diretório/opt/zimbra/ssl/zimbra/commercial
/opt/zimbra/bin/zmcertmgr verifycrt comm ./commercial.key ./seudominio.tld.crt ./commercial_ca.crt
Você deverá receber isto como saída do comando:
** Verifying ./mail_frtec.com.br.crt against ./commercial.key
** Certificate (./mail_frtec.com.br.crt) and private key (./commercial.key) match.
** Valid Certificate: ./mail_frtec.com.br.crt: OK
Uma vez testado, efetue a instalação do certificado da seguinte maneira:
/opt/zimbra/bin/zmcertmgr deploycrt comm ./mail_frtec.com.br.crt ./commercial_ca.crt
A saída do comando deverá ser similar a abaixo:
** Verifying ./mail_frtec.com.br.crt against /opt/zimbra/ssl/zimbra/commercial/commercial.key Certificate (./mail_frtec.com.br.crt) and private key (/opt/zimbra/ssl/zimbra/commercial/commercial.key) match. Valid Certificate: ./mail_frtec.com.br.crt: OK **
Copying ./mail_frtec.com.br.crt to /opt/zimbra/ssl/zimbra/commercial/commercial.crt **
Appending ca chain ./commercial_ca.crt to /opt/zimbra/ssl/zimbra/commercial/commercial.crt cp: `./commercial_ca.crt' and `/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt' are the same file ** Importing certificate /opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt to CACERTS as zcs-user-commercial_ca...done. ** NOTE: mailboxd must be restarted in order to use the imported certificate. **
Saving server config key zimbraSSLCertificate...done. ** Saving server config key zimbraSSLPrivateKey...done. **
Installing mta certificate and key...done. **
Installing slapd certificate and key...done. **
Installing proxy certificate and key...done. **
Creating pkcs12 file /opt/zimbra/ssl/zimbra/jetty.pkcs12...done. **
Creating keystore file /opt/zimbra/mailboxd/etc/keystore...done. **
Installing CA to /opt/zimbra/conf/ca...done.

Para verificar o certificado instalado, utilize o comando:
/opt/zimbra/bin/zmcertmgr viewdeployedcrt

sexta-feira, 10 de abril de 2015

Endian Firewall Community 3.0.5-beta1 released


Endian Firewall Community 3.0.5-beta1 has been released and is now available for download. This new minor release contains many improvements and closes more than 350 issues.
The most prominent improvements in this new release are:
  • "Network types" have been added to the network wizard and uplink editor to be able to distinguish between firewall setups in different network topologies.
  • Support for transparent implementations through a new bridge mode has been added.
  • With the new TPROXY support in the HTTP proxy it is now possible to create firewall rules, routing policies and other rules based on the source IP address even if the proxy is being used.
  • The complete rewrite of the event management engine results in better performance when analyzing log files and sending notifications.
  • The anti-virus engine has been updated.
  • Many security vulnerabilities have been fixed.
  • Hardware support has been improved.