distro all over

Posted on 2005-05-08
Last Modified: 2010-04-20

1. Which linux distro is filled with web support (paid/unpaid) and is the easiest to build from scratch?
-plug in the cd select auto generate partitions and etc.

It will be used for internet caching (squid) and gateway for users to connect to the internet.

2. Is there a reporting software that can generate how many hour this IP surf the net, which site, etc. ?

3. Is there a software to block sites with this IP's, setting access list on who can browse the web?


Question by:EdwardPeter
    LVL 4

    Accepted Solution

    Hello EdwardPeter,

    1) The "which distro" question is quite hard... I believe that the free Fedora (, or the paid RedHat ( are the easiest to install, and are well documented. I have several servers that are running intensive applications, and ALL of them run flawlessly, for months now..

    2) If you plan to use squid, I suggest that you'll use a squid log analyzer such as You can find more here:

    3) If you wish to block a specific IP from surfing, I would suggest using a simple firewall, and block the outgoing traffic from that IP.
    If you wish to block a specific IP so your users will not be able to get to it (such as blocking porn sites) you can do it on the squid it self.

    In addition, please check out the following howto regarding firewall and proxy:

    If this doesn't answer your questions to your satisfactory, please provide more info on your network and design..

    Good luck,
    LVL 1

    Assisted Solution

    If you want website blocking I suggest you to choose squid + dansguardian + ClamAV it  provides you excellent control over your internet access. Squid provieds caching + dansguardian provides content filtering and antivirus solution if with the help of ClamAV.


    Author Comment


    can dansguardian block p2p downloading, IM, and etc per IP.

    LVL 1

    Expert Comment

    even squid alone can do this.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    In my business, I use the LTS (Long Term Support) versions of Linux. My workstations do real work, and so I rarely have the patience to deal with silly problems caused by an upgraded kernel that had experimental software on it to begin with from a r…
    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
    This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now