By Tarquin (Own work) [CC-BY-SA-3.0 (], via Wikimedia Commons

Twitter Bootstrap Links

318 “useful” resources @ bootstrap hero containing:


WATable a jQuery table plugin
NOD! a frontend-validation plugin
Messenger a messenger plugin


multisuggestplugin extends type ahead
jQRangeSlider a range-slider jQuery plugin


Button generator with famfamfam icons


bootstrap-IE7 adding support for IE7 in Bootstrap 3.x
Screencheck displaying web sites in various formats
Elusive-Icons webfont
Games-Icons svg & png icons
Font Awesome More more icons
Animate.less cross-browser animations


Initializer generates HTML4+ bootstrap templates

By Sebastian Hartlaub (Own work) [CC-BY-SA-2.5 (], via Wikimedia Commons

Apache with Security Enhanced Linux (SELinux)

From Quick HOWTO : Ch20 : The Apache Web Server:

Fedora Core 3 introduced the concept of security contexts as part of the Security Enhanced Linux (SELinux) definition. A Web page may have the right permissions, but the Apache httpd daemon won’t be able to read it unless you assign it the correct security context or daemon access permissions. Context-related configuration errors will give “403 Forbidden” browser messages, and in some cases, you will get the default Fedora Apache page where your expected Web page should be.

… to view the security context:

ls -Z

… to set web context for the current folder and its sub folders:

chcon -R -h -t httpd_sys_content_t .
By Attribution to "", please. (Image was uploaded by Didepo on their behalf) (Own work) [GFDL ( or CC-BY-SA-3.0-2.5-2.0-1.0 (], via Wikimedia Commons

Controlling Access to Services

Controlling Access using ntsysv

ntsysv is a text-based application that allows you to configure which services are started at boot time for each runlevel. Non-xinetd services can not be started, stopped, or restarted using this program.

Controlling Access using chkconfig

chkconfig is a command line utility that allows you to turn services on and off for the different runlevels. Non-xinetd services can not be started, stopped, or restarted using this utility.

[excerpt from Red Hat Enterprise Linux Deployment Guide]



If you have not known SpamAssassin yet

As it name might already say, it deals with spam (unwanted emails).

It can (and actually does quite often without your knowledge) run directly on your mail server. Which has the big advantage that the spam mails can be eliminated already on your server and you do not have to download it to your computer.

However, it is very flexible. e.g. you might also want to receive spam, which SpamAssassin has marked as such and move it manually to your trash can.

More about SpamAssassin at its homepage.