meditation group in
In late September, Professor Salvador Rincón has opened a new Christian meditation group at the University, on Monday from 12:00 noon to 12:30 pm, in the Chapel of Our Lady of Wisdom in Basic Sciences. are always welcome everyone!
Saturday, October 31, 2009
Tuesday, October 27, 2009
Vezon And Kardas Directions
Javeriana in Colombia Father Laurence Freeman
Father Laurence Freeman OSB, director of the Community for Christian Meditation, joined us in April this year in Bogota, gave two workshops at the Pontificia Universidad Javeriana. The University has a meditation group from 2007 that takes place every Friday from 1:00 pm to 1.30 pm in the Pastoral Center Chapel.
Father Laurence Freeman OSB, director of the Community for Christian Meditation, joined us in April this year in Bogota, gave two workshops at the Pontificia Universidad Javeriana. The University has a meditation group from 2007 that takes place every Friday from 1:00 pm to 1.30 pm in the Pastoral Center Chapel.
Thursday, October 15, 2009
Keratin Before And After
A new danger DENGUE
SUMMER predicted a "very complicated" resigned
chief medical officer for fighting "light" against dengue
Luis Lita was health minister and director of the hospital Chaco June 4. It was due to lack of budget and reported pressure not to talk. 14.10.2009
"I was told to shut up, and as I am an adult, I have nothing to be silent or withhold information," charged the former director of the city hospital Chaco Presidency Roque Sáenz Peña.
The director of the hospital June 4 Dr. Ramon Carrillo Chaco city Presidencia Roque Sáenz Peña, Luis Lita, resigned in disagreement with health policies ordered by the Jorge Capitanich governorate to prevent dengue hermorrágico.El gynecologist revealed DyN agency that was due to lack of budgetary support. "This hospital operated 96 beds in pediatrics, while the 78 and pediatricians have a much larger budget than ours, which is only 1.2 million a year." Former Minister of Health between 1983 and 1987 Chaco said that since the provincial government "ligth measures were taken" to prevent a new outbreak of dengue, whereupon he said that "we must pray that the strain is the same as circulated months ago, if not many cases bleeding may occur." Lita has 50 years of experience in health care. Office, he also held between 1973 and 1976, had taken on 28 November last year, during the administration of former provincial official and first lady Sandra Mendoza in Health. Citing the same budget problems last January Lita was denied care at health center locations derived from patients santiagueño as Monte Quemado, Pirpintos, Pampa de los guanacos, which caused a controversy among health authorities of Santiago del Estero and Chaco. "I have approximately 320 beds and I'm slapping places to see where we can accommodate patients. The hospital is a very unequal struggle, and I should have 12 intensive care beds, and there are four now," described and noted as an example of the lack the lack of a CT scanner and the tools necessary to make studies of high pressure complejidad.Ante, former medical director preferred to talk. "I was told to shut up, and as I am an adult, I have no reason to keep quiet or hide information." To Lita no health policy in the province, "stress is not really have" and so decided to "go home" without prior warning that this summer's battle against dengue "is going to be complicated."
SUMMER predicted a "very complicated" resigned
chief medical officer for fighting "light" against dengue
Luis Lita was health minister and director of the hospital Chaco June 4. It was due to lack of budget and reported pressure not to talk. 14.10.2009
"I was told to shut up, and as I am an adult, I have nothing to be silent or withhold information," charged the former director of the city hospital Chaco Presidency Roque Sáenz Peña.
The director of the hospital June 4 Dr. Ramon Carrillo Chaco city Presidencia Roque Sáenz Peña, Luis Lita, resigned in disagreement with health policies ordered by the Jorge Capitanich governorate to prevent dengue hermorrágico.El gynecologist revealed DyN agency that was due to lack of budgetary support. "This hospital operated 96 beds in pediatrics, while the 78 and pediatricians have a much larger budget than ours, which is only 1.2 million a year." Former Minister of Health between 1983 and 1987 Chaco said that since the provincial government "ligth measures were taken" to prevent a new outbreak of dengue, whereupon he said that "we must pray that the strain is the same as circulated months ago, if not many cases bleeding may occur." Lita has 50 years of experience in health care. Office, he also held between 1973 and 1976, had taken on 28 November last year, during the administration of former provincial official and first lady Sandra Mendoza in Health. Citing the same budget problems last January Lita was denied care at health center locations derived from patients santiagueño as Monte Quemado, Pirpintos, Pampa de los guanacos, which caused a controversy among health authorities of Santiago del Estero and Chaco. "I have approximately 320 beds and I'm slapping places to see where we can accommodate patients. The hospital is a very unequal struggle, and I should have 12 intensive care beds, and there are four now," described and noted as an example of the lack the lack of a CT scanner and the tools necessary to make studies of high pressure complejidad.Ante, former medical director preferred to talk. "I was told to shut up, and as I am an adult, I have no reason to keep quiet or hide information." To Lita no health policy in the province, "stress is not really have" and so decided to "go home" without prior warning that this summer's battle against dengue "is going to be complicated."
Friday, October 9, 2009
Lobster Boat Designs Plans
iptables iptables
hello, today after many days without going over here (lack of time) have been writing about a subject that intrigues us all (when I say everyone I mean those who manage Linux servers that have one way or another connection to the internet) is the subject security.
always thought the safest thing to implement is a firewall, but as I implement?
some distributions of Linux and bring pre Iptables based Firewall and allow us to open one port to another when needed.
others use operators such as Firestarter, Shorewall or others.
but in my opinion these are limiting for advanced settings that require very rarely implemented.
so when it comes to installing a firewall prefer to create 1 to 1 iptables rules ejectable in bash.
1. I have my server that will make your proxy server instead of router between Internet and LAN. I also hope that users do not have your browser set ip
the server is on LAN (hub) ip 192.168.0.1 and the WAN the
200.1.2.3 eth0 is the LAN and the WAN eth1
Firewall
comiezon my file $ sudo vi
firewall.sh
# / bin / sh # Firewall
by th3doctor
# # FLUSH
rules iptables-F
iptables-X iptables-Z
iptables-t nat-F
# # Set default policies iptables-P INPUT
ACCEPT iptables-P OUTPUT ACCEPT iptables-P FORWARD
ACCEPT iptables-t nat-P PREROUTING ACCEPT
iptables-t nat-P POSTROUTING ACCEPT # #
started to filter
# # # Note: eth0 is the interface connected to the LAN
# # # and eth1 is the WAN interface
# # allow everything to localhost
iptables-A INPUT-i lo
ACCEPT # # allow access from the LAN
proxy iptables-A INPUT-s 192.168.0.0/24-p tcp - dport 3128-j ACCEPT # # allow
the
output HTTPS iptables-A INPUT -S 192.168.0.0/24-p tcp - dport 443-j ACCEPT
iptables-A FORWARD-s 192.168.0.0/24-p tcp - dport 443-j ACCEPT # # allow
FTP for LAN
iptables-A INPUT-s 192.168.0.0/24-p tcp - dport 21-j ACCEPT
iptables-A FORWARD-s 192.168.0.0/24-p tcp - dport 21-j ACCEPT # # #
disclaim the rest, if number is required for someone in the lan, you need to access
# # # any port should be put before the next rule
iptables-A FORWARD-s 192.168.0.0/24-i eth0-j DROP iptables-A
INPUT-s 192.168.0.0/24-i eth0-j DROP
iptables-A OUTPUT-s 192.168.0.0/24-i eth0-j DROP # #
oblige everyone to go through the proxy
# # with the exception ! we indicate do not use proxy for addresses
LAN iptables-t nat-A PREROUTING-i eth1-s 192.168.0.0/24-d! 192.168.0.0/24-p tcp - dport 80-j REDIRECT - to-port 3128 # Now we
masking local network
# and sets the bit FORWARDING (imprescindible! !!!!)
iptables - t nat-A POSTROUTING-s 192.168.0.0/24-o eth1-j MASQUERADE #
This allow to forward packets in the firewall, or
# other machines can go through the firewall.
echo 1> / proc/sys/net/ipv4/ip_forward # Removed
pings.
/ bin / echo "1"> / proc/sys/net/ipv4/icmp_echo_ignore_al
end echo ------ the configuration
now only add enough with the start of the machine to be taken before any changes are
reboots on Debian (used for the vast majority of distros)
simply edit the file / etc / rc .
local
and before placing
exit 0 sh / location / firewall.sh (change "location" for the path where your firewall)
there we have the basis to start building a firewall in accordance with our requirements.
hello, today after many days without going over here (lack of time) have been writing about a subject that intrigues us all (when I say everyone I mean those who manage Linux servers that have one way or another connection to the internet) is the subject security.
always thought the safest thing to implement is a firewall, but as I implement?
some distributions of Linux and bring pre Iptables based Firewall and allow us to open one port to another when needed.
others use operators such as Firestarter, Shorewall or others.
but in my opinion these are limiting for advanced settings that require very rarely implemented.
so when it comes to installing a firewall prefer to create 1 to 1 iptables rules ejectable in bash.
first thing I remember is that going to open ports.
start with something simple: 1. I have my server that will make your proxy server instead of router between Internet and LAN. I also hope that users do not have your browser set ip
the server is on LAN (hub) ip 192.168.0.1 and the WAN the
200.1.2.3 eth0 is the LAN and the WAN eth1
Firewall
comiezon my file $ sudo vi
firewall.sh
# / bin / sh # Firewall
by th3doctor
# # FLUSH
rules iptables-F
iptables-X iptables-Z
iptables-t nat-F
# # Set default policies iptables-P INPUT
ACCEPT iptables-P OUTPUT ACCEPT iptables-P FORWARD
ACCEPT iptables-t nat-P PREROUTING ACCEPT
iptables-t nat-P POSTROUTING ACCEPT # #
started to filter
# # # Note: eth0 is the interface connected to the LAN
# # # and eth1 is the WAN interface
# # allow everything to localhost
iptables-A INPUT-i lo
ACCEPT # # allow access from the LAN
proxy iptables-A INPUT-s 192.168.0.0/24-p tcp - dport 3128-j ACCEPT # # allow
the
output HTTPS iptables-A INPUT -S 192.168.0.0/24-p tcp - dport 443-j ACCEPT
iptables-A FORWARD-s 192.168.0.0/24-p tcp - dport 443-j ACCEPT # # allow
FTP for LAN
iptables-A INPUT-s 192.168.0.0/24-p tcp - dport 21-j ACCEPT
iptables-A FORWARD-s 192.168.0.0/24-p tcp - dport 21-j ACCEPT # # #
disclaim the rest, if number is required for someone in the lan, you need to access
# # # any port should be put before the next rule
iptables-A FORWARD-s 192.168.0.0/24-i eth0-j DROP iptables-A
INPUT-s 192.168.0.0/24-i eth0-j DROP
iptables-A OUTPUT-s 192.168.0.0/24-i eth0-j DROP # #
oblige everyone to go through the proxy
# # with the exception ! we indicate do not use proxy for addresses
LAN iptables-t nat-A PREROUTING-i eth1-s 192.168.0.0/24-d! 192.168.0.0/24-p tcp - dport 80-j REDIRECT - to-port 3128 # Now we
masking local network
# and sets the bit FORWARDING (imprescindible! !!!!)
iptables - t nat-A POSTROUTING-s 192.168.0.0/24-o eth1-j MASQUERADE #
This allow to forward packets in the firewall, or
# other machines can go through the firewall.
echo 1> / proc/sys/net/ipv4/ip_forward # Removed
pings.
/ bin / echo "1"> / proc/sys/net/ipv4/icmp_echo_ignore_al
end echo ------ the configuration
now only add enough with the start of the machine to be taken before any changes are
reboots on Debian (used for the vast majority of distros)
simply edit the file / etc / rc .
local
and before placing
exit 0 sh / location / firewall.sh (change "location" for the path where your firewall)
there we have the basis to start building a firewall in accordance with our requirements.
Subscribe to:
Posts (Atom)