Living in the “information highway” era, we must all connect our computers to the Internet to be able to send e-mail, read newsgroups, browse the Web and communicate with the world in general.
Configuring your machine to connect to the Internet via your ISP can be an easy or difficult process, depending on your choice of operating system and tools.
Since Linux is our platform of choice, we are left to select the tools to use. Using X-ISP to configure our machine insures that we can connect our Linux boxes to the Internet in a short time, without any problems and with the advantage of using an X-based interface.
X-ISP is a visual, X11/XForms-based, user-friendly interface to pppd/chat. It offers an X11 dialup networking tool that can also act as a small ISP and phone company (PTT) database manager, and also as a tool to log dialup costs and usage. In addition to that, it provides maximum feedback from the dialing and login phases on a message browser (Figure 1), versatility in interrupting a call in progress, a manual login terminal window as well as call-back and DNS server selection capabilities.
The user interface of X-ISP is very simple, intuitive and user friendly. It consists of a form with four buttons (Connect, Interrupt, Disconnect and Quit), three menus (Options, Logging and Help) and a drop-choice list of ISP entries (in case the user wants to configure the machine to dial more than one ISP). The “Options” menu contains the five items discussed below.
Information: The user can create ISP entries, set the default ISP, set auto-dial and re-dial on disconnect options and the authentication protocol (none, PAP, PAP-Secrets or CHAT-Secrets). In Figure 2, X-ISP is configured to connect to any of the three ISPs: Cyberia, Data Management or IncoNet (actual ISPs in Lebanon) with Cyberia as the default ISP.
Dialing and Logging: From the dialing and logging window, the user controls several options such as the Dialer Options (number of maximum dialing trials, inter-dialing delay, maximum wait time for connection to be established, etc.), and the Manual and Automatic Logging options. The script section, for both dial-in and call-back, is divided into Expect and Send sections, as used by the call to the chat command. Here, the user must enter the script lines employed by chat to negotiate a successful login for the particular ISP.
Communication Options: These control the settings of the modem device and its properties (Reset and Init strings, baud rates and flow control), dialing method and asyncmap, software compression, serial port baud rate and flow control. All of these options have an initial default value.
TCP/IP Options: controls the settings of dynamic local and remote addresses, netmask and DNS.
Paths Setup: enables editing the paths to the pppd daemon, the location where pppd saves its process ID files, the chat utility, the xispdial and xispterm utilities, and where XISP will keep the named pipe node used for communicating with its components.
The “Logging” menu contains the following two items:
PTT Editor: This form enables editing of phone company information maintained by X-ISP. The user can add his local phone company to the compiled list and set up its rates. This way, when the user retrieves on-line statistics, he will receive a report of the actual cost.
Statistics: This displays time/cost information and also makes a bar chart of costs for each period (weekly, monthly and bimonthly).
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide