Free SME server
Gateway to the Internet
To test the setup to see that it works, you can use a crossover cable to connect your configuration machine directly to the Ethernet card with the static IP. The DHCP server should assign an IP address to your client machine. Then you can use your browser to access the eBox dashboard, although you can't reach the Internet.
To access the Internet, you need to set up the second network adapter with your public IP address; your provider might assign this to you dynamically, or you might have a static address. In Network | Gateways, you need to enter your Internet provider's IP address, as well as the address of the second network card as the Interface.
Now that your machine is part of the wild and woolly web, click on Firewall to set it up, then enable the module. Next, create a new rule that supports all outgoing data traffic and enable the firewall service in the Module Status section. To connect all the machines on your local network to your eBox, you need to use a hub without a separate DHCP server. If everything goes well, the computers should be able to use eBox as their gateway to the Internet.
This short proof of concept simply scratches the surface of eBox's capabilities. The word is that the forum  will soon have part two of the HOWTO with more useful steps, and you can always refer to the eBox User's Guide  until that happens. The guide explains the many eBox functions, although in parts it is skimpy on detail. If worst comes to worst, you should be able to find answers to your questions on the forum  and from the mailing list .
- eBox User's Guide: http://ebox-platform.com/usersguide/en/html/ebox-userguide-book.html
- Stable eBox for Intrepid Ibex (8.10): https://launchpad.net/~ebox/+archive/ppa
- Tutorial on the eBox forum: http://forum.ebox-platform.com/index.php?action=printpage;topic=896.0
- eBox forum: http://forum.ebox-platform.com
- eBox mailing lists: http://ebox-platform.com/community/lists/
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems