Home Carla Schroder Bio
Image of Carla Schroder
Carla Schroder

1

Build A Linux-Based Wireless Access Point (Part 1)
For ultimate control and customizability, building your own Linux wireless access point is the way to go. You may use an old recycled PC, or build a sleek attractive power- and space-saving unit from new parts. It may save a small pot of money, because...
Make Sense of SNMP/MRTG Alphabet Soup
In SNMP for Everybodywe got the high-level view of what SNMP is, and a quick introduction on how to use it. Today we’re going to learn how to find MIB and OID values, which will be handy when you have to do a bit of manual configuration on various...
How to Install & Configure WICD for Linux WiFi
Wireless management on Linux is a bit of a hodge-podge, especially for roaming users. NetworkManager, KWifiManager, and various other utilities that have come and gone all attempt to make managing different network connections easy. NetworkManager and...
VoIPowering Your Office: Siproxd Trumps NAT
Getting SIP (session initiation protocol) traffic through NAT (network address translation) firewalls is a beastly problem, and Siproxd is a good, easy-to-use SIP proxy that conquers the beast. There are many SIP proxies, but these tend to be complex and...
Wireless Authentication and Encryption with Zeroshell Linux (Part 2)
In part 1 we got our FreeRADIUS server up and running on Zeroshell Linux, and learned how to configure wireless access points to pass authentication requests to FreeRADIUS. Zeroshell eases the process considerably by streamlining user management, encryption...
Wireless Authentication and Encryption with Zeroshell Linux
Zeroshell, if you haven’t heard of it yet, is a robust specialized Linux distribution for embedded routers and network gateways. It does: Routing Firewalling Proxying Wireless access point Captive portal VPN (virtual private network) Network...
Dropbox FTP: How to Access Dropbox Over FTP
Last week we looked at setting up simple FTP dropboxes for secure-enough uploads and downloads, using file system permissions and simple vsftpd access controls to control who may use your server. This week we’ll look at how to configure FTP clients on...
Run a Business Network on Linux
Run a Business Network on Linux, Part One:Linux oldtimers have known for years that it’s not necessary to go into hock for expensive, proprietary networking gear, because Linux comes with a powerhouse networking stack. It also comes with a host of...
Create Encrypted Volumes With Cryptmount and Linux
Cryptmount is a friendly front-end to a batch of Linux utilities used to create encrypted volumes, such as device mapper, dm-crypt, and the kernel’s loopback device. It requires root privileges to create encrypted files or partitions, and then once...
Manage Linux Hardware with udev (Part 2)
Last weekwe learned the basics of the udev filesystem, and how to dig up device names. Today we dive into writing custom udev rules. Why would you want to acquire this strange knowledge? Because, believe it or not, computers are not yet perfect, so sometimes...