Viewing 11 to 20 of 23 items
Archive | Configuration/Installs RSS feed for this section

Configure Logical Volume Manager

This article describes a basic logic behind a Linux logical volume manager by showing real examples of configuration and usage. Although Debian Linux will be used for this tutorial, you can also apply the same command line syntax with other Linux distributions such as Red Hat, Mandriva, SuSe Linux and others Step 1: Create Partitions  Full Article…

0

Configuring RAID

  We are now ready to begin our first Linux software RAID configuration.  The following steps will walk you through creating a RAID 5 array created from 2 physical disks.  Let’s get to it! STEP1: First we need to check whether there is any free disks are awailable in the server, it can be checked  Full Article…

0

DDOS attack prevention in linux servers

  A distributed denial-of-service (DDoS) attack is one in which a bunch of compromised systems attack the target machine/server, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The  Full Article…

0

Installation of some of the PHP modules.

Some of the PHP modules can be easily installed from one of the cPanel default script. ♦ /scripts/phpextensionmgr Modules which can be installed are: Available Extensions: EAccelerator IonCubeLoader Zendopt Xcache SourceGuardian PHPSuHosin Follow the steps: Login as root in to the server. ♦ /scripts/phpextensionmgr list if you want to install EAccelerator in your server. ♦  Full Article…

0

Disable Direct root access

Disable Direct root access in Linux Server Disabling direct root access provides two levels of security. The login needs to be performed as a normal ssh user first and then switch to root user.  This necessitates two valid logins and passwords. Also  only privileged users are permitted to switch to root, that too provides another  Full Article…

0

Custom SSH port

Custom SSH port in Linux Server Changing the SSH port to a custom one will increase security. This can be performed by changing the default value assigned to the directive “Port” in the configuration file /etc/ssh/sshd_config Port 22666 Once the modification is completed,  restart the sshd server and check whether you are able to connect  Full Article…

0

Apache error “Error retrieving pid file logs/httpd.pid”

In some cases, the server won’t allow you to restart the apache service in it. If you are getting the following error while trying to restart the Apache service. =====================> -bash-3.2# /etc/init.d/httpd start (20014)Internal error: Error retrieving pid file logs/httpd.pid Remove it before continuing if it is corrupted. =====================> Solution :- Just move/rename the httpd.pid  Full Article…

0

SSH Security

As we know, the security of a server is quite essential as long as it is active. In most cases, a mistake happens during the initial server set up will lead to a disaster at later period of time. In this post I am trying to prepare a check list for the initial server hardening  Full Article…

0