Month: August 2014

Install and Configure mod_perl for Apache 2

If you are running any web based open source application that is written in perl, you should be using mod_perl with Apache instead of running it as CGI. mod_perl is way faster than running a web application using CGI. This article explains how to install mod_perl …

Install Or Upgrade LAMP using Yum

Installing LAMP stack using yum is very easy and takes only minutes. This is a good option for beginners who don’t feel comfortable installing from source. Also, Installing LAMP stack using yum is a good choice, if you want to keep things simple and just use …

Tips to Secure Your Apache Web Server on UNIX / Linux

If you are a sysadmin, you should secure your Apache web server by following the 10 tips mentioned in this article. 1. Disable unnecessary modules If you do ./configure –help, you’ll see all available modules that you can disable/enable. userdir – Mapping of requests to user-specific …

Rotate Apache Log Files in Linux

Question: I would like to automatically rotate the apache access_log and error_log files. Can you explain with an example on how to do this? Answer: This can be achived using logrotate utility as explained below. Add the following file to /etc/logrotate.d directory. # vi /etc/logrotate.d/apache /usr/local/apache2/logs/access_log …

Install Apache 2.4.2 from Source on CentOS 6.2 with SSL

Make sure you have gcc and openssl-devel installed. # yum install gcc # yum install openssl-devel You also need “Apache Portable Runtime Library” APR to install Apache from source. You’ll already have “apr” and “apr-util” package installed. Install the apr-devel and apr-util-devel packages. # yum install …

Setup Samba as Primary Domain Controller in Linux

Samba is used by sysadmin to overcome the problem of interoperability in a mixed environment where you have both Linux and Windows. It provides a common platform for both Windows and Linux to have a common sharing space. Domain controller is a service which is used …

Install and Configure Linux NTP Server and Client

NTP stands for Network Time Protocol. It is used to synchronize the time on your Linux system with a centralized NTP server. A local NTP server on the network can be synchronized with an external timing source to keep all the servers in your organization in-sync …

Tweak PuTTY with 12 powerful plugins

Play around with these add-ons and choose the one that suites your need. 1. PuTTY Connection Manager PuTTYCM gives a nice feature to arrange several PuTTY sessions in tabs . While starting PuTTYCM for the first time, you should specify the location of the original PuTTY. …

15 Awesome Google Search Tips and Tricks

You may be using Google search multiple times per day to locate something on the web. Learning how to use Google search effectively can boost your productivity instantly. 1. Identify Local Time for Any City in the World using Google If you want to know current …

Customize Google AdSense responsive ad units

When people started to build responsive websites, primary concern was advertising. And between all possible advertisers network of course Google AdSense is most popular. So finally last month Google have made available Responsive AdSense unit for publisher. Responsive ad units are still in beta, but from current experience if …

Things that every Drupal website needs to improve

Things that every Drupal website needs to improve: better URL alias (not default node/ID or taxonomy/term/ID) better title tags adding meta tags / keywords - not so important for Google, but for me is must have additional tags, e.g author, publisher redirect what is wrong  sitemaps …

Update OpenSSL

Please find the below steps to update openssl on your server: 1. Check your openssl version # openssl version You will get an output like this: OpenSSL 1.0.Xx XX Xxx 20XX 2. Download the latest version of openssl from: http://www.openssl.org/source/ ... and upload it to your …

SSH Connection Security

Encrypted Keys   The use of encrypted private keys is one of the strongest defense methods you can use to protect your server from attack by brute force password hacking. By enabling the use of encrypted keys and disabling the use of passwords to connect to …