Posted on Leave a comment

Amahi Server Install

Yesterday, one of my work colleagues gave me an old cannibalized computer case. After a good clean-up of the case, I replaced the motherboard’s CMOS battery, added a new hard disk, and installed Amahi Server. The memory battery (aka motherboard, CMOS, real-time clock (RTC), clock battery) is generally a CR2032 lithium coin type cell. Amahi is a media, home and app server software known for its easy-to-use user interface. Amahi has the best media, backup and web apps for small networks.

This is not my first Amahi install. I’ve have installed and tested this home-server software several times. My first Amahi server install was through a virtual console, it worked flawlessly. The second time around it was directly into a pc and this third time around into another pc.

The installation is straight forward, once configured, it will reboot several times until it gets all of its dependencies and packages installed. Once all that its completed then you access the server via a clients web browser. The rest is history as the server is very easy to configure. I’ll come back later with more on this install and how it will end up.

Posted on Leave a comment

Cyber Attacks

One of the most scary things about running a home-server are cyber attacks. According to Jeff Melnick, another blogger from (netwrix blog) he defines cyber attacks as: “cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems.

Exposing a server or any type of device to the Internet is subject to disgruntled individuals or rouge organizations that have only one interest in mind. That interest is to get “illegal access” to your device (in this case your home-server). On a daily basis my server is getting somewhere around a thousand plus attacks. Attacks like “Authentication failure for root via sshd from,” “Failed login attempt for invalid user fake from (ssh2)” etc. This means that one has to be on our toes when it comes to our home-server security. Unfortunately, in my case, most of the attacks originate from hackers of Chinese origin. There are few from India and Vietnam. However, I’m sure that my listing have attacks from from other various world locations.

I recommend several things that one must do in order to stay on top of these cyber attacks. To stay on top of cyber attacks, ensure that you have downloaded and installed the latest attack detector, intrusion detection system, and intrusion prevention system. Those software packages will help a lot with the systems security. For e-mail use Anti-malware software package. These software packages in some cases and depending on the operating system you are using are open-source. Some software packages have an IP blocking feature. In my case the security software packages are part of a download and install system provided by ClearOS.

Additionally, routinely change your password, use passwords that are a bit difficult to figure-out. Routinely check and download the latest security patches. Routinely, update the server OS to the latest stable version. The point is that running a home-server does require some extra work.

There are many ways to track and seek out information of your attackers. You can directly google “whois” the IP and you’ll get a lot information from various legit sources. There are thousands of Internet sources with a lot of good information about types of attacks and types of counter measures you can take. I suggest you do some reading about the types of attacks and preventative measures. One of my favorite sites to track malicious IP’s is “Black Hat Directory.” However, most of the times I prefer a direct google search using the term “whois followed by the IP address.” You’ll be surprise how much information is uncovered.

The list is of attackers and IP’s is indeed large. However, below is a list of the most frequent attackers to my server, their IP’s and some identifying information with locations. Note that the acronyms ISP is followed by a either a company or domain. The ISP may not be necessarily involved in the attacks, it’s either the individual(s) or organization(s) that hide behind the Internet Service Providers (ISP). The IP shown may not be the attackers own IP as they can be spoofing their IP’s. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source.

List of most frequent visitors:, ISP, ChinaNet Jiangsu Province Network Zhenjiang, Jiangsu, AS4837 CHINA UNICOM China169 Backbone, ISP, ChinaNet Jiangsu Province Network, ISP, DigitalOcean LLC, Bangalore, Karnataka, India, ISP, V6Yun (Beijing) Network Co. Ltd ,, China, ISP, ChinaNet Jiangsu Province Network, China, ChinaNet Jiangsu Province Network,, Zhenjiang, Jiangsu, China, ISP, Hypernet Vietnam Technology Company Limited, Hanoi, Ha Noi , Vietnam

The latest attack (Oct 5) comes from Russia, Authentication failure for root via sshd from

As I previously mentioned the list of attacking IP’s is large, I cannot sit here all day write IP after IP. The one’s mentioned above are the most frequent attackers to my server. There are ways to extract information out of Linux OS into text files that I could use to write-up a comprehensive listing, but that would be something to do another day.

Posted on Leave a comment

Should You Run A Server-Home?

This is the question that many of you initially have when you start thinking about running a server is: Should You Run A Server At Home? Certainly, it’s a serious question and lots of thoughts go behind this question. I’m not going to meddle on this aspect a lot, because there’s no sense from my point-of-view to write about it when others have already done that. Thus, I’m going to point you to three good on-lines articles I found about this subject. Perhaps reading those articles will give you and idea if you want to run your own server from home.

List of Articles:

Should You Run A Sever at Home? Cost & Benefit Compared

How to have a Linux Home Server on the Cheap

How to Build a Linux Web Server with an Old Computer

Posted on 1 Comment

Hello and Welcome to the Home Server blog!

Welcome to this new blog. This is my first post, and I hope it won’t be the last. I’ve been wanting to do this for a long time. Actually, it’s not my frist time, I’ve blogged while pursuing my college degrees and had a good following.

However, this is the firs time I’ll be blogging about my personal hobby. Unfortunately, I have been living in a Linux silo, all by my lonesome and it’s time I get out and meet others. This blog is about the Linux Operating system, mainly about running your Linux own home server or a workstation. Running a home server is not an easy task but certainly it’s a reward one.

Yes, there are many bloggers and blogs out there. They all probably write about the same thing, however, this is my blog. I hope to discuss and bring something interesting to the table that you all can benefit from it.

I will be using this blog sort of a diary, writing about my exploits of running my own home server and a Linux workstation. Currently, I have two servers on-line, one it’s my own personal Plex server, which I keep in private mode. I have no business relationship with Plex, except of being a customer, however, I do recommend their software.

The other server is Internet connected using ClearOS. The ClearOS is an operating system marketed by the software company ClearCenter. Like with Plex, I have no business relationship with ClearOS, except of being a customer, however, I do recommend their software.” ClearOS its based on CentOS and Red Hat Enterprise Linux. ClearOS was designed for use in a home environment, a small to medium enterprises as a network gateway or as a network server with a web-based administration interface. You can also use this Linux based OS for a home environment. If you ask me? It’s quite easy to manage.

On the desktop (i.e., workstaiton) My efforst are mainly concentrated on Debian and openSUSE. Out of this Linux circle I have limited knowledge, however, Linux is Linux, with some exceptions all distributions have nearly similar type of modus-operandi.

I close this article, by thanking your for taking time to visit this blog and for reading my articles. I hope that this is not the first and last, and especially that we can establish a friendship, and get to discuss our favorite hobby. If you see any strange writing, misspelled words, missing words, or typographical errors, please drop me a note. I manage several languages in my head and some times have issues writing my thoughts into a paper or a printed from like this one.