Fun at work!

Archive for the ‘System Administration’ Category

Repost: 5 Common Server Setups For Your Web Application

Introduction

When deciding which server architecture to use for your environment, there are many factors to consider, such as performance, scalability, availability, reliability, cost, and ease of management.

Here is a list of commonly used server setups, with a short description of each, including pros and cons. Keep in mind that all of the concepts covered here can be used in various combinations with one another, and that every environment has different requirements, so there is no single, correct configuration.

Read more…

Repost: How to Password Protect a Directory on Your Website

Password protecting a directory on your site is actually fairly easy. Webmasters typically want to protect a directory if they have information that they want to make available only to a selected number of people. This guide teaches how you can make a folder on your website accessible only to people with the appropriate password.

Read more…

Repost: HOWTO: IPTables on Debian/Ubuntu

Contents

Read more…

StackOverflow Forum Repost: Redirecting the output of svnadmin dump to another server

StackOverflow: Redirecting the output of svnadmin dump to another server

Repost: Install svn server on centos 6

SVN – Apache subversion

SVN – Subversion is a versioning and revision control system used by developers to track and keep up earlier versions of their source codes.

In this article we can see how to setup svn server on centos 6.

 

Read more…

Repost: CentOS SSH Installation And Configuration

How do I install and configure ssh server and client under CentOS Linux operating systems?

You need to install the following packages (which are installed by default until and unless you removed it or skipped it while installing CentOS)

  • openssh-clients : The OpenSSH client applications
  • openssh-server : The OpenSSH server daemon

Read more…

Repost: How to compute the MD5 or SHA-1 cryptographic hash values for a file

You can use the File Checksum Integrity Verifier (FCIV) utility to compute the MD5 or SHA-1 cryptographic hash values of a file. For additional information about the File Checksum Integrity Verifier (FCIV) utility, click the following article number to view the article in the Microsoft Knowledge Base:

To compute the MD5 and the SHA-1 hash values for a file, type the following command at a command line:
> FCIV -md5 -sha1 path\filename.ext

For example, to compute the MD5 and SHA-1 hash values for the Shdocvw.dll file in your %Systemroot%\System32 folder, type the following command:

> FCIV -md5 -sha1 c:\windows\system32\shdocvw.dll

Tag Cloud