Blog

Bowhunter Haven

Posted by on Jun 13, 2014 in hosting, non-hunting, portfolio | Comments Off on Bowhunter Haven

Bowhunter Haven

Bowhunter Haven is a premier hunting ranch in Southeast Nebraska, overlooking the Missouri River . The ranch features archery-only Whitetail Deer hunts, as well as archery/shotgun hunts for Eastern and Merriam Turkey. Nebraska is trending toward a coveted Top-10 Boone & Crocket state, sitting at #13 as of 2010 , climbing from #18 in the previous decade (source). With the trend of high-scoring bucks moving ever-westward from Illinois and Missouri, Bowhunter Haven produces regular jaw-dropping kills and will likely continue to do so in the future....

read more

Batchler Manufacturing

Posted by on Jun 13, 2014 in hosting, non-hunting, portfolio | Comments Off on Batchler Manufacturing

Batchler Manufacturing

Batchler Manufacturing’s All-In-One Castrator, Docker, and Ear Marker Tool  is a staple in the lives of ranchers across the United States. Dating back to 1933, and now in its 4th generation of Batchler family ownership, the company still manufactures each professional-grade tool by hand. Batchler Manufacturing began in the early 1920′s as a small machine shop doing fabrication and repair of farm equipment.  By 1933, W. H. Batchler had invented many items including the All-In-One Castrator, Docker and Ear Marker Tool. Today the business is run by Jim and Darla Batchler....

read more

Generating certificate for postfix

Posted by on Jun 11, 2014 in hosting, non-hunting | Comments Off on Generating certificate for postfix

I spent way too much remembering how to do this several months ago, so when it once again took me an hour to figure it out last night I thought it best to document both for myself and for anyone googling their way here. I’m assuming you already have postfix installed and running, so I’ll skip to just the relevant bits. Generating a self-signed certificate for postfix on CentOS 6.5 1) Get SSL yum install openssl 2) Generate a certificate First make sure /etc/ssl/private and /etc/ssl/certs exist and create them if not. The “-p” argument creates parent directories as needed and suppresses errors if the directories already exist. mkdir -p /etc/ssl/private mkdir -p /etc/ssl/certs Then run the openssl command: openssl req -new -x509 -key /etc/ssl/private/ssl-cert-snakeoil.key -out /etc/ssl/certs/ssl-cert-snakeoil.pem -days 1826 The -x509 flag specifies the certificate signing utility. This command will issue a 5-year certificate, which of course you can adjust to your preference. For a 10-year key just feed it 3652 days instead of 1826. 3) Do security You don’t want anyone but root to be able to open your private key, so pull out the default o+r permission on the key file. chmod o= /etc/ssl/private/ssl-cert-snakeoil.key 4) Restart postfix Postfix looks for keys in /etc/ssl/ by default, so in most cases all that’s needed is a restart of postfix for SSL to begin working. /etc/init.d/postfix restart If not, try specifying the location of your keys manually. You can also use this if you prefer to maintain your keys elsewhere. postconf -e smtpd_tls_cert_file=/etc/ssl/certs/snakeoil.pem postconf -e smtpd_tls_key_file=/etc/ssl/private/snakeoil.key Of course now that I’ve written it down I’ll instinctively remember how to do this for every future server, but hopefully this save someone an hour one of these...

read more