Open Source Solutions

Mail System - Antispam System - Backup System - Monitoring System - Ticket System - Content Management System - Firewall System - Cloud System - Storage System - File Sharing System - Application Server - LAMP System



Freelancer is a free bootstrap theme created by Start Bootstrap. The download includes the complete source files including HTML, CSS, and JavaScript as well as optional LESS stylesheets for easy customization.

Whether you're a student looking to showcase your work, a professional looking to attract clients, or a graphic artist looking to share your projects, this template is the perfect starting point!

Contact Me

Enterprise-class E-Mail collaboration suite

Zimbra is an enterprise-class email, calendar and collaboration solution built for the cloud, both public and private. With a redesigned browser-based interface, Zimbra offers the most innovative messaging experience available today, connecting end users to the information and activity in their personal clouds.

The most considerable thing when deploying system is open source technology allows user to save the maximum costs and still ensure the principles of respect for copyright.

Benefits if you are using Zimbra mail Software
  • Connect users to their personal clouds with a smarter mailbox that integrates email, tasks, address book, calendar, files and enterprise applications.
  • Integrated Antivirus system (CalmAV)
  • Integrated Antispam system (SpamAssassin)
  • Integrated Mail virus scanner
  • Integrated Policyd anti-spam policy daemon for Postfix that does Greylisting, Sender-(envelope, SASL or host / ip)-based throttling (on messages and/or volume per defined time unit), Recipient rate limiting, Spamtrap monitoring / blacklisting, HELO auto blacklisting and HELO randomization preventation.)
  • Integrated dnscache- cache server that can keep all the external DNS request, using it the MTA server only need to ask one time to obtain the DNS info of the external domains
  • Integrated logger includes tools for syslog aggregation and reporting
  • Integrated memcached is a high performance, distributed memory object caching system
  • Integrated snmp - implement server monitoring software in order to monitor system logs, CPU and disk usage, and other runtime information
  • Integrated proxy is a high performance proxy server that can be configured as a POP and IMAP proxy server and for reverse proxy HTTP requests
  • Integrated Web Mail Client based on AJAX technology
  • Integrated Web Admin Console for Administration
  • Integrated performance metrics and statistics to the world
  • Integrated English Spell checker
  • Secure Mail server administration with port knocking
  • Install zimilet add-ons
  • Z-Push - Active Sync synchronization of contacts, calendar, and tasks between Zimbra and ActiveSync enabled devices
  • Integrated internal chat to shorten time in exchange between members
  • Dropbox Integration or private cloud
  • Integrated Webex - The Zimlet allows you to list your upcoming WebEx meetings, as well as host and join a WebEx meeting with 1 click.
  • Undo send - define custom period by user
  • Easy way to keep messages in .eml format
  • Yahoo emotions
  • Create custom mail filter
  • Define custom Out of office template by user
  • Create and save custom Search
  • Sharing - Sharing mailbox, calendar, tasks
  • Theme - define custom theme and looks
  • Supported Languages - Arabic, Basque (EU), Chinese (Simplified PRC and Traditional HK), Danish, Dutch, English (AU, UK, US), French, French Canadian, German, Hindi, Hungarian, Italian, Japanese, Korean, Malay, Polish, Portuguese (Brazil), Portuguese (Portugal), Romanian, Russian, Spanish, Swedish, Thai, Turkish, Ukrainian
  • Authentications - The Internal authentication- Open LDAP directory server, The External LDAP and External Active Directory authentication methods.
  • Choose which extensions will blocked in attachment - exe, bat, htm, vbs, ...
  • User quota
  • Password Policy - If internal authentication is configured for the domain, you can configure ZCS to require users to create strong passwords
  • Failed Login Policy - You can specify a policy that sets the maximum number of failed login attempts before the account is locked out for the specified lockout time. This type of policy is used to prevent password attacks.
  • Email Retention Policy (Trashed mail lifetime) Number of days a message can remain in system before it is automatically purged after specific period. Message deleted from trash can be recovered with number of days/months specified by administrator
  • DKIM record
  • Protocol Support:MAPI, IMAP, POP, XML, HTTP / S, SOAP, LDAP, SIP, VoIP, iSync, RSS, Atom, iCal, CalDAV, WebDAV
  • 3rd Party Client Support: Microsoft Outlook and Entourage, Mozilla Thunderbird, Apple Mail, Apple iCal, Apple Address Book, Mozilla Sunbird, Novell Evolution
  • Browser Support:Microsoft Internet Explorer, Mozilla Firefox, Apple Safari for Microsoft Windows, Apple OS X, and Linux desktops
  • Server Operating Systems:Red Hat, SUSE, Ubuntu, Fedora, Debian, rPath Linux, Mac OS X, VMware Virtual Appliance
  • Support for all POP3 / IMAP4 Clients
  • Migration Wizards enable customers to rapidly and easily migrate from Microsoft Exchange and Domino environments to Zimbra
  • Migrating from different mail systems, any (POP3/IMAP) client or any OS
  • Backup from individual mailbox
  • Daily backup on second Zimbra Server with snapshots.
  • Unlimited number of domains
Daily mail report
  • Totals (number of messages: received, delivered, forwarded, deferred, bounced, rejected, reject,warnings, held, discarded)
  • Per-Hour Traffic Summary
  • Host/Domain Summary: Message Delivery (top 50)
  • Host/Domain Summary: Messages Received (top 50)
  • top 50 Senders by message count
  • top 50 Recipients by message count
  • top 50 Senders by message size
  • top 50 Recipients by message size
  • message deferral detail
  • message bounce detail (by relay)
  • message reject detail
  • message reject warning detail
  • message hold detail
  • message discard detail
  • smtp delivery failures
  • Warnings
  • Fatal Errors
  • Panics
  • Master daemon messages
Additional scripts and protection
  • Check status of services is started
  • Last login time - Last login time for all accounts
  • Block hacked account - detect if some account password is hacked, change the password and send mails to admin to inform.
  • Quota Warning
  • Export Users
  • Automatically Block IP on firewall - after 300 failed login attempts
  • Add user to mal system with automatically generated mail signature
  • Protect admin console and access to server with knocking on port and block port scanning
  • fail2ban for Zimbra to prevent "brute force attack"
System Requirements
  • Hard Drive: 10 GB free disk space for software and logs (SATA or SCSI for performance, and RAID/Mirroring for redundancy), Additional disk space for mail storage
  • Memory: minimum of 8GB of RAM is required
  • CPU: Intel/AMD 2.0 GHZ+ 64-bit CPU
  • Operating System: Red Hat Enterprise Linux 6 or 7 (64-bit), CentOS Linux 6 or 7 (64-bit), Ubuntu 12.04.4 or 14.04 LTS Server Edition (64-bit), SUSE Linux Enterprise Server (SLES) 11, SP3 (64-bit) is required


How to Create an Effective Backup Strategy for Your Company Data

There is no need to discuss now important backup and restore are today. And how accessible it is.Yet, a lot of companies either don't do complete backups or don't get notifications when their backups fail.It is our goal to make backup a commodity and available to anybody.

As we already know, the documents are very important in large corporations and businesses.There are many types of documents that are created by computer such as: invoice, offers, brochures, summaries, project offers, business (letters).

The problem is that sometimes documents are lost due to virus, mistake, hard drive crash and hardware errors. How can we prevent errors or loss of documents? We need to create copies of all official data and documents in physical locations.

Backup processes are categorized into:

  • Backup to an entire server -It is possible to restore a working computing environment with all data.
  • Backup data - Data is stored in a separate location, so it can be restored if the data is lost or compromised.
Backup data

When making a backup to an entire server, to recover data is something that is not so effective.The problem with the files is that it can have different versions, so if you want to return a file from a week ago it is not necessary to restore the full server. Also, when storing data, less disk space is used instead of creating a snapshot or image from the server you are using.

For Data Backup, in BDsystemswe use special software - Bareos (Backup Archiving REcovery Open Sourced), which is a disk drive backup, simple, efficient, integrated with Owncloud and File sharing.

Bareos (Backup Archiving Recovery Open Sourced) is a network based open source backup solution. It supports all well-established operating systems like Linux, Unix, Windows, Mac OS X are supported. Bareos can backup to disk and tape drives as well as tape libraries. Besides common backup strategies like full, incremental and differential, Bareos additionally offers migrations, copies, virtual full backups and deduplication by base jobs. By using migrations, a backup into the cloud is possible.

Bareos supports compression and encryption both hardware-based (like on LTO tape drives) and software-based. The included self-backup ensures that Bareos rapidly becomes operational again after a case of disaster.The whole software is open source and offers open interfaces so that it easily integrates into existing IT environments. Bareos supports IPv6, and thanks to the passive client feature, it can be easily integrated even into complex networks while complying with security guidelines (firewall policies).

Benefits if you are using BAREOS Backup Software
  • Reliable backup and quick restore in case of data loss
  • Support of all common operating systems (Linux, Unix, Windows, Mac OS X)
  • No license fees - no vendor lock-in - safe investment
  • Subscription, support and consulting for professional environments
  • Aimed at professional users and therefore fit for use in enterprise environments
  • Independence from providers through open source code and developer community
  • High degree of automation, possible integration into heterogeneous environments
  • Future-oriented due to continuous development
  • Web application for data recovery
  • Easy and fast data recovery over the Web
  • Full, Differential and Incremental backup. We recommend:
  • - Full Backup once a month,
    - Differential backup once a weekly,
    - Incremental (Growing) backup every day or every 1 hour, depending on how much data changes based on time in the company.
  • A small number of resources for installing. Bareos server works with RAM minimum 300 MB, etc.
  • Restore one file or whole folder/backup
  • Point-in-time-recovery, an opportunity to restore data from the exact selected time from a few days ago
  • Get notifications when there is a problem
System Requirements
  • Hard Drive: 10 GB free disk space for software and logs, Additional disk space for backup storage
  • Memory: Minimum 4GB of RAM for large-scale use (2GB is ok for small-scale)
  • CPU: 64-bit AMD64/Intel
  • Operating System: Red Hat Enterprise Linux 5, 6 or 7 (64-bit), CentOS Linux 5, 6 or 7 (64-bit), Ubuntu 12.04, 14.04 or 16.04 LTS Server Edition (64-bit), SUSE Linux Enterprise Server (SLES) 11 SP4 or 12 SP1, Debian 7 or 8, Fedora 23 or 24


Monitoring can save time, minimize time-to-resolve a problem and effectively diagnose problems within the IT infrastructure

NAGIOS - The open source industry standard in IT infrastructure monitoring and alerting customized with many plugins, presents a very powerful tool for every IT environment.

Nagios Core is open source computer-software application that monitors systems, networks and infrastructure.

It watches hosts and services that you specify, alerting you when things go bad and when they get better.Some of the many features of Nagios Core include:

  • Monitoring of network services (SMTP, POP3, HTTP, NNTP, PING, etc.)
  • Monitoring of host resources (processor load, disk usage, etc.)
  • Simple plugin design that allows users to easily develop their own service checks
  • Parallelized service checks
  • Ability to define network host hierarchy using "parent" hosts, allowing detection of and distinction between hosts that are down and those that are unreachable
  • Contact notifications when service or host problems occur and get resolved (via email, pager, or user-defined method)
  • Contact notifications when service or host problems occur and get resolved (via e-mail, pager, SMS, or any user-defined method through plugin system)
  • The ability to define event handlers to be run during service or host events for proactive problem resolution
  • Automatic log file rotation
  • Support for implementing redundant monitoring hosts
  • Support for implementing performance data graphing
  • Support for database backend (such as NDOUtils)
  • An web-interface for viewing current network status, notifications, problem history, log files, etc.
  • Ability to define event handlers to be run during service or host events for proactive problem resolution
  • Automatic log file rotation
  • Support for implementing redundant monitoring hosts
  • Optional web interface for viewing current network status, notification and problem history, log file, etc.

Nagios offers monitoring and alerting services for servers, switches, applications and services. It alerts users when things go wrong and alerts them a second time when the problem has been resolved.

  • Monitoring Windows machines
  • Monitoring Linux/Unix machines
  • Monitoring Netware servers
  • Monitoring routers/switches
  • Monitoring network printers
  • Monitoring publicly available services (HTTP, FTP, SSH, etc.)
Nagios Feautures
  • Comprehensive Monitoring - Core provides monitoring of all mission-critical infrastructure components in your IT infrastructure.
  • Visibility - Gain a centralized view of your entire IT operations and review detailed status information through the web interface.
  • Awareness - Alerts with escalation capabilities are delivered to IT staff via email and SMS to ensure fast detection of outages.
  • Problem Remediation - Event handlers can automatically restart failed applications, servers, devices, and services when problems are found.
  • Proactive Planning - Trending and capacity planning extensions allow you to proactively plan for upgrades.
  • Reporting-Availability reports ensure SLAs are being met and historical reports provide record of critical information.
  • Multi-Tenant Capabilities-Multi-user access and user-specific views can be configured to ensure clients see specific information.
  • Extendable Architecture - Multiple API's provide integration with in-house / third-party applications, and community-developed add-ons. Alerting by mail, define mail groups for alerting, alerting by SMS
Benefits to use Nagios Monitoring system
  • Monitoring - IT staff configure Nagios to monitor critical IT infrastructure components, including system metrics, network protocols, applications, services, servers, and network infrastructure.
  • Alerting - Nagios sends alerts when critical infrastructure components fail and recover, providing administrators with notice of important events. Alerts can be delivered via email, SMS, or custom script.
  • Response - IT staff can acknowledge alerts and begin resolving outages and investigating security alerts immediately. Alerts can be escalated to different groups if alerts are not acknowledged in a timely manner.
  • Reporting - Reports provide a historical record of outages, events, notifications, and alert response for later review. Availability Report -Create custom availability report for Host, Host Group, Services or Services Group with custom period (1 year, 1 month, 1 week, ... ). Trend (Legacy) Report - Create custom report for specific Host or Services state, Alerts History, Notifications, Current Event Log.
  • Maintenance - Scheduled downtime prevents alerts during scheduled maintenance and upgrade windows.
  • Planning - Trending and capacity planning graphs and reports allow you to identify necessary infrastructure upgrades before failures occur.
System Requirements
  • Hard Drive 20 GB
  • Memory 2 GB
  • CPU Dual core, 2.4 GHz
  • Operating System CentOS or Redhat Enterprise Linux (RHEL) versions 6, or 7
  • Database MySQL/MariaDB, plus PostgresQL if running versions less than XI 5 or if upgrading from a pre-5 version


How to Protect Mail Servers with Antispam / Antivirus Filtering

eFa is a cost-effective email virus & spam scanning solution. The entire communication of the email server with other email servers goes through antispam / antivirus that makes a mail server not directly connected on internet. It can be in private network and protected from attack.

Antispam and Antivirus Filtering
  • Integrated Spam Filter - Apache SpamAssassin is a mature, widely-deployed open source project that serves as a mail filter to identify Spam. SpamAssassin uses a variety of mechanisms including header and text analysis, Bayesian filtering, DNS blocklists, and collaborative filtering databases. SpamAssassin runs on a server, and filters spam before it reaches your mailbox
  • Integrated Virusscanner - Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways. . It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates. ClamAV supports multiple file formats, file and archive unpacking, and multiple signature languages.
    ClamAv Feautures:
    - Fast scanning
    - Detects over 1 million viruses, worms and trojans, including Microsoft Office macro viruses, mobile malware, and other threats
    - Built-in bytecode interpreter allows the ClamAV signature writers to create and distribute very complex detection routines and remotely enhance the scanner's functionality
    - Scans within archives and compressed files (also protects against archive bombs), built-in support includes: Zip (including SFX), Rar (including SFX), 7Zip, ARJ (including SFX), Tar, CPIO, Gzip, Bzip2, DMG, IMG, ISO9660, PKG, HFS+ partition, HFSX partition, APM disk image, GPT disk image, MBR disk image, XAR, XZ, MS OLE2, MS Cabinet Files (including SFX), MS CHM (Compiled HTML), MS SZDD compression format, BinHex, SIS (SymbianOS packages), AutoIt, InstallShield
    - Supports Portable Executable (32/64-bit) files compressed or obfuscated with: AsPack, UPX, FSG, Petite, PeSpin, NsPack, wwpack32, MEW, Upack, Y0da Cryptor
    - Supports ELF and Mach-O files (both 32- and 64-bit)
    - Supports almost all mail file formats
    - Support for other special files/formats includes: HTML, RTF, PDF, Files encrypted with CryptFF and ScrEnc, uuencode, TNEF (winmail.dat)
    - Advanced database updater with support for scripted updates, digital signatures and DNS based database version queries
  • Integrated Core Spam Filter - MailScanner scans email for viruses, spam, phishing, malware, and other attacks against security vulnerabilities and plays a major part in the security of a network
  • Integrated Webinterface - MailWatch for MailScanner is a web-based front-end to MailScanner written in PHP and MySQL and is available for free under the terms of the GNU Public License. It comes with a CustomConfig module for MailScanner which causes MailScanner to log all message data (excluding body text) to a MySQL database which is then queried by MailWatch for reporting and statistics.
    MailWatch Feautures:
    - Displays the inbound/outbound mail queue size (currently for Sendmail/Postfix/Exim users only), Load Average and Today's Totals for Messages, Spam, Viruses and Blocked Content on each page header.
    - Colour-coded display of recently processed mail.
    - Drill-down onto each message to see detailed information.
    - Quarantine management allows you to release, delete or run sa-learn across any quarantined messages.
    - Reports with customisable filters and graphs by JpGraph
    - Tools to view Virus Scanner status, MySQL database status and to view the MailScanner configuration files.
    - Utilities for Postfix and Sendmail to monitor and display the mail queue sizes and to record and display message relay information.
    - Multiple user levels: user, domain and admin that limit the data and features available to each.
    - XML-RPC support that allows multiple MailScanner/MailWatch installations to act as one.
  • Integrated Content Filter - The Distributed Checksum Clearinghouses or DCC is an anti-spam content filter that runs on a variety of operating systems. The counts can be used by SMTP servers and mail user agents to detect and reject or filter spam or unsolicited bulk mail. A DCC server totals reports of checksums of messages from clients and answers queries about the total counts for checksums of mail messages. A DCC client reports the checksums for a mail message to a server and is told the total number of recipients of mail with each checksum. If one of the totals is higher than a threshold set by the client and according to local whitelists the message is unsolicited, the DCC client can log, discard, or reject the message.
  • Integrated Grey listing - SQl grey is a postfix policy service implementing a grey-listing policy. Grey-listing is a mechanism implemented at the MTA (mail transfer agent) level. The goal is to prevent most junk mails (spams and virus alike) to reach the users' mailboxes. When a mailbox receives an email from an unknown contact (IP), it is first rejected with a "try again later"-message (SMTP 450 error). It gets delayed until the sender tries again. On the second try (after a configurable delay) the grey-listing mechanism accepts the email. SQLgrey has successfully been used on mail systems handling more than a million mails per day.
  • Integrated Spam detection network: Pyzor, Razor is a distributed, collaborative, spam detection and filtering network. Through user contribution, Razor establishes a distributed and constantly updating catalogue of spam in propagation that is consulted by email clients to filter out known spam. Detection is done with statistical and randomized signatures that efficiently spot mutating spam content. User input is validated through reputation assignments based on consensus on report and revoke assertions which in turn is used for computing confidence values associated with individual signatures.
  • Integrated Image Recognition - ImageCeberus is a plug-in for Spamassassin anti-spam software against image spam. ImageCerberus performs a "visual" analysis of the images attached to the e-mails , obtaining promising results for the spamming filtering.
  • Integrated System Management - Webmin

Benefits if you are using Antispam / Antivirus Filter Software:

  • Low hardware resources
  • No License / No cost
  • Easy Management / Web Management
  • User Management
  • Custom Blacklist and Whitelist
  • Grey List
  • Separate mail server (private network) from antispam keeps mail server more secure
  • Easy way to restore/release message from quarantine
  • Integrated Webmin for Administration
  • Integrated Mailgraph and Munin statistics
  • Integrated GeoIP database
  • Message Listing
  • Message Operations
  • Total Messages by Date
  • Top Mail Relays
  • Top Viruses
  • Virus Report
  • Top Senders by Quantity
  • Top Senders by Volume
  • Top Recipients by Quantity
  • Top Recipients by Volume
  • Top Sender Domains by Quantity
  • Top Sender Domains by Volume
  • Top Recipient Domains by Quantity
  • Top Recipient Domains by Volume
  • SpamAssassin Score Distribution
  • SpamAssassin Rule Hits
  • Audit Log
System Requirements
  • Hard Drive: 100 GB free disk space for software and logs
  • Memory: 2-8 GB of RAM depends of mailbox accounts and usage
  • CPU: 2 vCPUs
  • Operating System: VM with CentOS Linux 6 (64-bit)


Keep your files safe, secure, and private

Cloud BDsystems makes it easy to store, share and access your files from anywhere.

There are many ways to lose your files:

  • Virus
  • Mistake
  • Hard drive crash
  • Fire
  • Theft
  • Spilling coffee

Stay secure with sync and backup from Cloud BDsystems and never worry about losing your files. Advantages of using Cloud BDSystems are:

Sync and storage

Save files on your computer and keep them synchronized and accessible across all your computers and devices.

  • Easily access your files from any computer or device
  • - Desktop apps for Windows & Mac OS X (Windows XP, 7, Vista, 8, 8.1, 10 - Mac OS X 10.5.2+)
    - Mobile apps for iPhone, iPad and Android
  • Web browser access
  • Offline access
  • Selective sync
  • 10 GB storage always free (never expires)
  • Up to 100 GB of storage space for 10 euro per month per account (license for one user for a period of six months)
Automatic backup and sync

Back up your files all in one place, protect them from accidental deletion, and never lose your files again and keep them synchronized across all of your computers and devices. Restore any version of any file, any time.

  • Realtime backup (once a month full backup, once weekly differential backup and incremental backup purchase every day every half hour)
  • Deleted file recovery
  • File version history, preview and restore
Sharing and collaboration

Send files securely to anyone, even if they don't have a BDsystems account. Stay in control with password protection, notifications, expiry dates, and more. Invite your team members to work together on documents in the office or remotely, with multi-user administration tools, permissions, and access controls.

Improve productivity with file sharing designed to make internal and external document collaboration fast, secure, and 100% private.

  • Send files to anyone - even if they don't have a BDsystems account
  • Send large files fast
  • Allow anyone to securely send files to you
  • Create shared folders, and invite clients or team members to collaborate
  • Admin panel with multi-user access control
  • Set custom passwords for viewing shared content
  • Set expiry dates
  • Set permissions such as "read-only" or "read-write"
  • Set download limits and view download stats
  • Remote wipe data on any share
Security and privacy

Cloud BDsystems is unique, zero-knowledge storage platform guarantees your privacy by providing end-to-end encryption, and most importantly - only you have access to the encryption keys. We can't read your files.

  • Zero-knowledge, end-to-end encryption
  • Privacy guarantee (we can't access your files or file metadata)
  • 2048 bit RSA, 256 bit AES, SSL and TLS encryption
  • Files encrypted in transit and at rest
  • Share controls, permissions and user administration
  • Remote logout
  • Remote wipe
  • File audit logs
  • Account notifications
  • Two-factor authentication
Email Support

We're always here to help. For any questions and problems you can send the email.

System Requirements
  • Hard Drive: 10 GB free disk space for software and logs Additional disk space for storage for data
  • Memory: Memory requirements for running an ownCloud server depending on the numbers of users and files, and volume of server activity. ownCloud officially requires a minimum of 128MB RAM. But, we recommend a minimum of 512MB
  • CPU: Intel/AMD 64-bit CPU
  • Operating System: Ubuntu 16.04, Debian 7 and 8, SUSE Linux Enterprise Server 12 and 12 SP1, Red Hat Enterprise Linux/Centos 6.5 and 7
  • MySQL or MariaDB 5.5+, Oracle 11g, PostgreSQL, & SQLite, Apache 2.4 with prefork Multi-Processing Module (MPM) and mod_php, PHP (5.6+, 7.0, & 7.1)


Kerio Control next-generation firewall

Protect your network from viruses, malware and malicious activity with Kerio Control next-generation firewall capabilities. This firewall Software contains a network firewall and router, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filtering. These comprehensive capabilities and unmatched deployment flexibility make Kerio Control the ideal choice for small and mid-sized businesses.

Kerio Control Overview
  • Next-Generation Firewall, Router and Leading-Edge IPS - Preserve the integrity of your servers with deep packet inspection and advanced network routing capabilities -- including simultaneous IPv4 and IPv6 support. Create inbound and outbound traffic policies, restricting communication by specific URL, application, traffic type, content category and time of day. Kerio Control's IPS adds a transparent layer of network protection, with Snort-based behavior analysis, and a regularly updated database of rules and blacklisted IP addresses from Emerging Threats
  • Advanced Gateway Antivirus - Keep viruses, worms, trojans and spyware from infesting your network with integrated KerioAntivirus.The optional antivirus service scans all web and FTP traffic, email attachments and downloads, automatically updating itself with the latest virus definitions.
  • Industry-Leading Web, Content and Application Filtering - Selectively block, allow or log access to 141 categories of web content and applications using Kerio Control Web Filter with application awareness. Keep bandwidth-hogging traffic like streaming video off your network or block peer-to-peer networks. Keep your users from visiting malware sites that are known to contain viruses and spyware or to engage in phishing or identity theft.The optional Kerio Control Web Filter with application awareness limits legal liability, protects your network and boosts user productivity by limiting user access to dangerous or inappropriate sites or those that just plain waste time.
  • Unmatched Quality of Service - Easily prioritize and monitor network traffic to guarantee high-speed transmission for the most important traffic types. Internet Link Load Balancing optimizes Internet access by distributing traffic across multiple links. Kerio Control monitors link availability, and automatically disables or re-enables links to ensure continuous Internet access.Kerio Control QoS gives you fine-grained control over how much bandwidth each type of network traffic can consume. Cap lower priority traffic by setting a bandwidth maximum, or guarantee high priority traffic by assigning a minimum. Kerio Control also uses Internet Link Load Balancing to distribute Internet traffic across multiple links.
  • Productivity-Boosting Usage Reporting - Get detailed usage reporting with Kerio Control Statistics. This component lets managers and admins view the Internet and application activities of individual users -- from a list of all sites visited, to the specific search terms users enter on search engines and websites.Use granular usage insights to refine traffic-shaping rules, monitor employee performance, and more. Best of all, these highly granular reports can automatically run on a schedule and be emailed to you, ready for your review -- no need to actively pull reports each week.
  • Secure VPN - Link headquarters to remote users and branch offices securely and easily. Kerio's own VPN tunneling with dead-simple setup requires minimal configuration, and provides a high performance network connection. Or, use industry-standard IPsec/L2TP for connectivity from mobile devices or third-party firewalls. Enable 2-step verification for an extra layer of security on all forms of remote access.
  • Remote Management and Monitoring - Handle all administration and configuration activities from a customizable web-based console using your desktop or tablet. Quickly and securely access security settings, manage users and bandwidth, and set traffic policies from an intuitive interface.Stay in control of all your appliances from anywhere using MyKerio. Manage multiple Kerio Control deployments through a centralized web interface providing consolidated system information, automatic configuration backup, status monitoring, system notifications and complete remote configuration.Get notifications straight to your mobile device with the MyKerio app for Android, iPhone and Apple Watch. You can be confident your appliances are online and if the status changes, you will be the first to know.
  • Flexible Deployment - Bring secure operations to any IT environment, now and going forward.Deploy as a software appliance, a virtual machine, or a performance-optimized hardware appliance. Remote deployment of hardware appliances is easier and faster than ever before with self-provisioning through MyKerio. Kerio Control supports your organization's IPv6 strategy, whether you're transitioning from IPv4 or use both protocols. And you can use your favorite SNMP tools to monitor Kerio Control's status.
Kerio Control features

Firewall and Router

  • ICSA Labs certified corporate firewall
  • Deep Packet Inspection (DPI)
  • Stateful Packet Inspection (SPI)
  • Intrusion Detection and Prevention System (IDPS)
  • Application awareness
  • DHCP server
  • DNS forwarding
  • NAT mapping (inbound/outbound)
  • MAC filtering
  • GeoIP filtering
  • Zero-configuration networking
  • Service Discovery forwarding
  • Anti-Spoofing
  • Guest network with captive portal
  • 802.1Q VLAN support
  • Traffic rules configuration wizard
  • Time based rules
  • Connection limits (DoS protection)
  • Dynamic DNS
  • Customizable routing table
  • Reverse proxy
  • Simultaneous IPv4 and IPv6 support
  • IPv6 network prefix translation
  • IPv6 router advertisements
  • Multiple IP addresses on a single network interface (multihoming)


  • VPN client for Windows, Mac & Linux
  • Split tunneling
  • Multiple client-to-site and site-to-site tunnels
  • IPsec client-to-site/site-to-site
  • L2TP/IPsec for mobile devices
  • Persistent connection
  • SSL encryption
  • VPN tunnel failover
  • NAT support
  • Automatic or custom routing
  • User authentication via directory services

Reporting & Monitoring

  • Reporting via Kerio Control Statistics
  • Automated email reports
  • Android, Apple Watch and iOS app (notifications and monitoring)
  • Detailed usage reports (web sites, protocols, bandwidth, etc.)
  • Traffic categorization (multimedia, messaging, large file transfers, etc.)
  • Top visited websites & top users per web category
  • Filter reports by individual user, group, or entire network
  • Reporting of Google search keywords
  • Real-time host activity monitoring
  • Traffic charts of users and interfaces
  • System Health Monitor
  • SNMP monitoring
  • Email alerts for firewall events
  • External logging to syslog

Load Balancing and QoS

  • Internet link-load balancing
  • Policy-based routing
  • Automatic connection failover
  • Reserve bandwidth for high priority traffic
  • Restrict bandwidth for low priority traffic
  • User data transfer quotas
  • Bandwidth rules based on time intervals, traffic and content rules, traffic type, users, service, DSCP, etc.


  • MyKerio centralized web based management to monitor and manage multiple Kerio Control deployments
  • Remote web-based administration
  • Customizable administration dashboard
  • Zero-touch or self-provisioning
  • Share configuration (definitions) between appliances
  • Configuration export/import
  • Backup configuration to MyKerio or FTP server
  • Template for user configuration
  • Variable level administrative rights
  • Automatic software updates
  • Web-based debugging tools
  • Multi-language support

Content Filtering

  • URL categories with whitelist (Kerio Control Web Filter)
  • Content rules based on time intervals, users, applications, web categories, URL groups, file types, etc.
  • Forbidden words filtering
  • SafeSearch for search engines
  • HTTPS filtering
  • Pre-defined and custom URL groups
  • Regular expressions in URL rules
  • Proxy server with cache
  • P2P (peer-to-peer) traffic filtering
  • Antivirus filtering
  • Customizable denial page

User Authentication

  • Active Directory
  • Apple Open Directory
  • Local user database
  • 2-step verification for remote access
  • Proxy authentication for terminal servers
  • Kerberos and NTLM authentication
  • RADIUS server
  • Password guessing protection

Intrusion Prevention System

  • Snort-based packet analyzer
  • Emerging threats rules database
  • IP blacklist database
  • Multiple security levels
  • False positives exception handling

Application Awareness

  • Database of common applications (Skype, Facebook, BitTorrent, etc.)
  • Categories of applications
  • Real-time and detailed reporting of application activity
  • Content rules per applications by user, host or time interval (permit or deny)
  • Bandwidth rules per application (restrict or reserve)
System Requirements
  • Hard Drive: 8 GB HDD space for OS, product, logs and statistics data
  • Memory: 2 GB RAM
  • CPU: 500 MHz
  • Network: 2 Ethernet (10/100/1000 Mbit)
  • Operating System: Kerio Control is based on Linux kernel version 3.16. Hardware supported by this kernel is required.
  • HTTPS support - All HTTP(S)-compliant web browsers including mobile browsers are supported. Kerio Control may require browser to support certain version of encryption protocol.
  • Browser: Microsoft Internet Explorer 9 to 11, Microsoft Edge 20 and newer, Firefox 23 and newer, Google Chrome 31 and newer.
  • VMware Virtual Appliance (VMware Workstation/Player 11.0 or 12.0, VMware Fusion 7.0 or 8.0, VMware ESXi / vSphere Hypervisor 5.5 or 6.0) or Hyper-V Virtual Appliance (Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2)


Customer Support Ticket Management Software

osTicket is an open source customer support ticket management software. This software provides a open source customer support and ticket management product for businesses of all sizes, particularly medium and small businesses. This platform enables the creation of ticket via e-mail, web forms and phone calls in a simple, easy to use, multi-user platform to support online users. osTicket comes with more features and tools than the most complex ticketing systems on the market.

Centralize all project information in one place, so that everybody is clear about tasks, priorities and what has been done.

What are the benefits if you are using osTicket management software
  • Using custom version of the osTicket open source software, we bring you a very effective task management and issue tracking system.
  • The app enables you to collect all incoming enquirers from phone calls, email, and web forms into one platform. Users can then filter tickets and route them to the right executive.
  • The app can be used to gather tickets and delegate custom fields to each ticket, creating a list of data linked with each ticket that can be shared on the knowledgebase for clients.
  • Create custom fields. Listing and forms can be added to web tickets as well as specific help topics.
  • Ticket Filters: Utilize filters to route incoming tickets and set automatic actions such as canned responses, department assignment, and ticket rejection.
  • Agent Collision Avoidance: Users can lock tickets so that multiple agents do not reply to the same query. They can set the amount of time the ticket remains locked.
  • Create as many SLA plans as you need and link them with ticket filters, departments, and help topics. Get overdue notifications and alerts on due dates missed.
  • Customer Portal: All support requests and their responses are automatically stored and saved to a customer self-help portal. Users can utilize their email and ticket ID to access help pages.
osTicket Features
  • Agent collision avoidance - Ticket locking mechanism to allow staff to lock tickets during response and avoid conflicting or dual responses.Avoid multiple agents responding to the same ticket at the same time! You set the amount of time the lock remains on a ticket. When a ticket is locked, other staff can not respond to the ticket until the lock expires.
  • Assign and transfer tickets - Transfer tickets between departments to make sure it's being handled by the correct staff. Assign tickets to a staff or to a team.Tickets can be auto-assigned by help topics or departments when they arrive, but what if they need to be reassigned? No problem! You can reassign tickets to staff or a team of staff or transfer to a different department all together. Transfers and assignment notes are logged as internal notes in the ticket thread so you can keep track of where the ticket has been routed to for processing.
  • Autoresponder - Configurable automatic reply sent out when a new ticket is opened or a message is received.Auto responses can be formatted to pull information from the ticket to personalize the email. osTicket supports placeholder variables such as %{} which will become the user's first name when the automated response is sent. Auto responses can be edited and customized for each department and associated with help topics.
  • Help topic - Configurable help topics for web tickets. Route inquiries without exposing internal departments or priorities.Tickets can be streamlined for faster response times by being routed to pre-determined departments. Combined with custom forms, you can design a form for a specific help topics to gather additional information for specific requests.
  • Custom fields - Customize the data collected from users when submitting a ticket to help get straight to the issue.You can create custom lists of data to add to each ticket or specific help topics for clients to choose from when creating a ticket. Custom Fields/Forms/Lists can be added to each web ticket created or only show up when a specific help topic is chosen. They can be configured as best suits your business needs.
  • Customer support portal - All support requests and responses are archived online. User can login using email and ticket ID. No user account or registration required to submit a ticket.
  • Dashboard reports - Get system overview and basic historical statistics on tickets count and status per department, staff and help topics.Dashboard reports give you an at a glance view at the performance and functionality of your help desk. You can also download and export more ticket detail by performing an advanced search from the ticket queue.
  • Internal notes to tickets - Add internal notes to tickets for staff. Activity logs let you see events or actions that have been taken, when they took place, and by whom.
  • Rich text or HTML email - Rich text or HTML email, is supported and allows for rich text markup in staff replies and internal notes posted to the ticket thread.Auto-Response templates also contain the rich text which allows you to further brand your help desk to your customers by adding your logo. Pictures as well as video can be added to a ticket when responding. (Can you say, SCREEN SHOTS!)
  • Rules to route incoming tickets
  • Service Level Agreements - SLA Plans allow you to track tickets and due dates without the hassle.Get overdue alerts and notices on missed due dates, and priority escalation. Create an unlimited number of SLA Plans and assign them to help topics, departments or ticket filters.
  • Ticket filters - Define rules to route incoming tickets to the right departments or staff members, and action triggers.By using the filter system, osTicket empowers you to automate the creation and routing of tickets. Set actions such as ticket rejection, automatic department assignment or even send a canned response!
osTicket software support to many language
  • It supports many languages pack - Arabic, Azerbaijani, Indonesian, Bulgarian, Catalan, Czech, Danish, German, Greek, Spanish, Estonian, French, Croatian, Hungarian, Italian, Japanese, Korean, Lithuanian, Mongolian, Dutch, Norwegian, Persian, Polish, Portuguese, Portuguese, Slovak, Slovenian, Serbian, Finnish, Swedish, Romanian, Russian, Vietnamese, Thai, Turkish, Ukrainian, Chinese and Macedonian language
System Requirements
  • Authentication - LDAP and Active Directory
  • Authentication - HTTP Pass-Through
  • Storage - Attachments on the Filesystem
  • Storage - Attachments in Amazon S3
Authentication and Storage
  • Hard Drive: 20 GB free disk space for software and logs
  • Memory: Minimum 1GB of RAM
  • CPU: 64-bit AMD64/Intel
  • Operating System: Red HatR Enterprise LinuxR 5, 6 or 7 (64-bit), CentOS LinuxR 5, 6 or 7 (64-bit), Ubuntu 14.04 or 16.04 LTS Server Edition (64-bit), Debian9, Fedora 22


Content Management System

Portfolio Modal 8


LAMP System

Portfolio Modal 9


How to Samba (File Sharing) Using Active Directory For Authentication and Point-in-Time Recovery of Files

Samba is an implementation of the Server Message Block (SMB)/Common Internet File System (CIFS) protocol for Unix systems, providing support for cross-platform file and printer sharing with Microsoft Windows, OS X, and other Unix systems.

Samba can be used to:

  • File and print server - Act as a server for SMB clients: share folders and printers, including PDF pseudo-printers so all the computers in your network may write PDF files
  • Active Directory Integration - Act as a domain controller in a Windows network (authenticating users, etc.)
  • As a Domain Controller - Do some more complex things, such as using a Windows domain controller to authenticate the users of a Linux/UNIX machine

This solution describes File and Print Sharing using Active directory for authentication and point-in-time recovery.

Sharing data

Samba is a popular freeware program that allows end users to access and use files, printers, and other commonly shared resources on a company's intranet or on the Internet. Samba is often referred to as a network file system and can be installed on a variety of operating system platforms.

Samba is based on the common client/server protocol of Server Message Block (SMB) and Common Internet File System (CIFS). Using client software that also supports SMB/CIFS (for example, most Microsoft Windows products), an end user sends a series of client requests to the Samba server on another computer in order to open that computer's files, access a shared printer, or access other resources. The Samba server on the other computer responds to each client request, either granting or denying access to its shared files and resources.

Samba allows file and print sharing between computers running Microsoft Windows and computers running Unix.It is an implementation of dozens of services and a dozen protocols, including: NetBIOS over TCP/IP (NBT)

Samba is an open-source software suite that runs on Unix/Linux based platforms but is able to communicate with Windows clients like a native application. So Samba is able to provide this service by employing the Common Internet File System (CIFS).

At the heart of this CIFS is the Server Message Block (SMB) protocol. Samba does this by performing these 4 key things:
- File & print services
- Authentication and Authorization
- Name resolution
- Service announcement (browsing)

Samba can be run on many different platforms including Linux, Unix, OpenVMS and operating systems other than Windows and allows the user to interact with a Windows client or server natively. It can basically be described as the Standard Windows interoperability suite of programs for Linux and Unix.

Benefits if you are using SAMBA File Sharing Software:

  • Low hardware resources
  • No License / No cost
  • Point-in-Time Recovery
  • Swat - Samba's web-based GUI configuration utility
  • Authentication with Active Directory
  • Always Incremental backup every half hour or less, depending on how much data changes based on time in the company and hardware
  • A small number of resources for installing. Samba server works with RAM minimum 300 MB, etc.
  • Point-in-time-recovery, an opportunity to restore data from the exact selected time from a few days ago
  • User or Group Quota
  • Easy Management
System Requirements
  • Hard Drive: 10 GB free disk space for software and logs, Additional disk space for data storage
  • Memory: 2 GB of RAM for large-scale use (512 MB is ok for small-scale)
  • CPU: 64-bit AMD64/Intel
  • Operating System: Red Hat Enerprise Linux 5, 6 or 7 (64-bit), CentOS Linux 5, 6 or 7 (64-bit), Ubuntu 12.04, 14.04 or 16.04 LTS Server Edition (64-bit), SUSE Linux Enterprise Server (SLES) 11 SP4 or 12 SP1, Debian 7 or 8, Fedora 23 or 24


Active Directory System

Portfolio Modal 11


Openfiler your storage system

Openfiler provides a simple way to deploy and manage networked storage. Is an Linux based operating system that provides file-based network-attached storage (NAS) and block-based storage area network (SAN). Openfiler helps you to build the very powerfull & reliabe networked storage solution which is easily managed bu the Openfiler browser based management UI.

Openfiler helps the Storage administrators & IT Team to deploy, manage and utilize the storage efficiently within multi-platform network. It provides the range of the storage networking protocol which makes is excellent choise to use it. It also helps companies to save the cost of storage system because it is an open source solution.


Openfiler includes support for volume-based partitioning, iSCSI (target and initiator), scheduled snapshots, resource quota, and a single unified interface for share management which makes allocating shares for various network file-system protocols a breeze. The following are just some of the features currently available in Openfiler.

Powerful block storage virtualization

  • Full iSCSI target support, with support for virtual iSCSI targets for optimal division of storage
  • Fibre Channel target support
  • Extensive volume and physical storage management support
  • Support for large block devices
  • Full software RAID management support
  • Support for multiple volume groups for optimal storage allocation
  • Online volume size and overlying filesystem expansion
  • Point-in-time snapshots support with scheduling
  • Volume usage reporting
  • Synchronous / asynchronous volume migration & replication (manual setup necessary currently)
  • iSCSI initiator (manual setup necessary currently)

Extensive share management features

  • Support for multiple shares per volume
  • Multi-level share directory tree
  • Multi-group based access control on a per-share basis
  • Multi-host/network based access control on a per-share basis
  • Per-share service activation (NFS, SMB/CIFS, HTTP/WebDAV, FTP with read/write controls)
  • Support for auto-created SMB home directories
  • Support for SMB/CIFS "shadow copy" feature for snapshot volumes
  • Support for public/guest shares

Accounts management

  • Authentication using Pluggable Authentication Modules, configured from the web-interface
  • NIS, LDAP, Hesiod, Active Directory (native and mixed modes), NT4 domain controller
  • Guest/public account support

Quota / resource allocation

  • Per-volume group-quota management for space and files
  • Per-volume user-quota management for space and files
  • Per-volume guest-quota management for space and files
  • User and group templates support for quota allocation

Full industry-standard protocol suite

  • CIFS/SMB support for Microsoft Windows-based clients
  • NFSv3 support for all UNIX clients with support for ACL protocol extensions
  • NFSv4 support (testing)
  • FTP support
  • Linux distribution back-end for any other customizations
Deployment scenarios
Storage Area Networking (SAN) Network Attached Storage (NAS)
  • IP Storage Gateway
  • Disk-to-disk Backup
  • Video Surveillance
  • Oracle 10g raw volume
  • Virtual Machine migration
  • Continuous Data Protection
  • Heterogeneous File Sharing
  • Exchange Server backend
  • Virtual Machine storage backend
  • Network User home directories
  • Media archiving

Openfiler provides key features such as iSCSI target for virtualization, Fibre Channel target support, block level replication and High Availabilty that are the mainstay of any business critical storage environment. Openfiler addresses all the key data storage concerns:

  • Reliability - Openfiler supports both software and hardware RAID with monitoring and alert facilities; volume snapshot and recovery
  • Availability- Openfiler supports active/passive high availability clustering, MPIO, and block level replication
  • Performance - Linux 2.6 kernel supports the latest CPU, networking and storage hardware
  • Scalability - filesystem scalability to 60TB+, online filesystem and volume growth support
Protocol Rich

With a range of file-based and block-based storage export protocols, there is something in Openfiler for everyone. Openfiler provides both block-level and file-level storage networking capabilities.

At the block-level, storage can be exported via:

  • iSCSI
  • Fibre Channel

At the file-level, Openfiler supports:

  • NFS
  • CIFS
  • FTP
  • rsync

Openfiler presents a unified storage export paradigm by supporting both block-level and file-level storage networking protocols. Storage may be allocated across any or all protocols simultaneously allowing data to be accessed from a heterogeneous base of network clients - be they Unix, Windows or Mac.

Powerful Management Capabilities

Openfiler meets this challenge head-on with its powerful and intuitive web-based graphical user interface (GUI). All facets of the trove of storage networking capabilities in Openfiler are controlled via this management interface. Management capabilities are grouped into separate sub-interfaces in accordance with their functional domain; networking, physical volumes, user and group authentication/authorization, system configuration and status information are each given a scope. At the base level, allocation of disks or other block-level resources such as hardware RAID volumes into distinct components can be achieved within the physical volume management scope. Physical volume management is in turn a sub-domain of the overall volume management capabilities in the GUI which includes features such as dynamic volume aggregation, logical volume allocation and distribution and point in time copy (snapshot) management. Administrators will also appreciate the ability to perform resource limiting tasks with the excellent quota management tool. Openfiler supports quota management for both users and groups. The storage resource allocation rules allow the administrator to control the amount of disk capacity usage as well as as the number for filesystem objects, files and directories, that a user or group may take up. If a group is allocated a certain amount of resources, the administrator can further limit resources for particular users within that group. This level of granularity in resource management cannot be emphasized enough. Openfiler also presents the administrator with a view of system status - displaying system resource usage such as memory, processor and storage capacity. This allows the administrator to better plan for future resource allocation requirements.

System Requirements
  • Hard Drive: 10 GB free disk space for software and logs, Additional disk space for storage
  • Memory: Minimum 256 MB of RAM, Recommended 2 GB
  • CPU: Minimum 500 MHz CPU, Recommended 64 bit processor with 1.6 GHz or more
  • Operating System: Linux