How to configure virtual hosts in Linux Apache

Assume that the VPs IP address is 58.130.17.168 and there are two domain names pointing to this IP Address: domain1.com and domain2.com, Modify/etc/httpd/CONF/httpd. conf and add it to the end of the file: Servername 58.130.17.168

How to solve the problem of changing Linux pallets

This is probably caused by the inconsistency between the system tray and the Network Status display of Hongqi 6sp1. The solution is to delete the Network Status display module. The Network Status display module is netconfigstatus. You can find

Remote logon to Windows XP desktop in Linux rdesktop

We found that there were also new ones available for download: sudo apt-Get install rdesktop Or to download rdesktop, download and install: $ Tar-zxvf rdesktop-1.5.0.tar.gz $ Rdesktop-1.5.0 CD $./Configure $ Make $ Make install Terminal

Linux shared memory

Overview To support shared memory in Apache/eapi, you need to create a mm shared memory library. In this case, it will allow mod_ssl to use an efficient Ram-based session cache instead of a disk-based session cache. Notes All the following commands

Summary of personal Linux learning page 1/4

1. Slow logon via telnet: CD/etc VI resolv. conf clears the content 2. the root user cannot log on remotely. For details, see CD/etc CD Pam. d vi login to comment out this line # auth required pam_securetty.so // comment out this line 3. Mount

The second battlefield of Linux Transfer

The second battlefield of Linux Transfer On August 1, February 21 (Beijing Time on August 1, February 21), the second battlefield of Linux transfer began to emerge in the Enterprise Desktop market when people focused on the shift from UNIX data

Modify file encoding in batches in Linux

Assume that all PHP files under the ipaddr directory need to be encoded from gb2312 to utf8 CD ipaddrFind./-type F-name "*. php" | while read line; doEcho $ lineIconv-F gb2312-T UTF-8 $ line >$ {Line}. utf8MV $ line $ {Line}. gb2312MV $ {Line}.

Page 1/4 of system security commands required for Linux

Although Linux is a multi-user system like Windows NT/2000, there are many important differences between them. For many administrators who are used to windows, there are many new challenges to ensure the security and reliability of the Linux

Detailed analysis of password file security issues in Linux

Almost all password files of Unix-like operating systems are in the same format, and Linux is no exception. Password security is one of the traditional security issues in Linux. Traditional passwords and shadow passwords /Etc/passwd is a

User and group configuration management guide in Linux

The main task of user management is to create a legal user account, set and manage user passwords, modify user account attributes, and delete obsolete user accounts when necessary. 1. Add a new user In Linux, only the root user can create a

Summary of Dual-nic configuration in Linux

Prerequisites: 1. Do not configure it on the VM. Whether it is vm5 or vm6, I have tried it many times and it seems to be successful each time, But I will find the truth when I use machine ping for a network disconnection test; 2. NICs of the

Linux Apache Web Server (part 3)

. In this case, the only authentication mechanism that can be used on WWW is provided by HTTP itself. This authentication is implemented on the standard Apache server, which can control which hosts may access a specific site or a part of the site

How to add a new hard disk in Linux

# Fdisk/dev/SDB Enter the fdisk mode: Command (M for help): P // view the partition of the New Hard Disk Command (M for help): N // create a new partition Command action E extended // input e to create an extended partition P primary

How to view and modify file read/write permissions in Linux

Statement for viewing file permissions: Enter at the terminal: Ls-l XXX. XXX (XXX. XXX is the file name) Then similar information will appear, mainly including: -RW-r -- A total of 10 digits The first one indicates the type. The three RW in the

Linux Command: comm

Function Description: Compares two sorted files. Syntax: comm [-123] [-- help] [-- version] [1st files] [2nd files] Note: This command compares the differences between two sorted files in a column and displays the results. If no parameters are

Set up the simplest VPN System in linux

This article is based on the actual application of our company, but it can be applied to many places with a slight modification. The system has been running for two months and proved to be safe, reliable, and stable... My company is located in

3-8 simple analysis of the firewall framework in Linux

Netfilter provides an abstract and universal framework. The implementation of a sub-function defined by this framework is the packet filtering subsystem. The Netfilter framework consists of the following five parts: 1. define a set of hook functions

How to: get started with UNIX and Linux Server intrusion

Before discussing this knowledge, you need to know that the website intrusion is illegal. However, it is welcome to find the website intrusion vulnerability on the Internet and notify the website. Why do we need to look for intrusion vulnerabilities

Using Linux as a router in Enterprise Networks

Now, because the Internet connection speed between cables and DSL has exceeded T1 (communication lines with a transmission rate of up to 1.544 Mb/s ), therefore, these two connection methods have been widely used in the commercial field. For DSL and

Advantages of linux vs linux

Linux machines do not need to organize hard disks at all, which is why Linux users have never seen hard disks. Linux file systems are much better than Windows's FAT, FAT32, and NTFS file systems. They can not only set permissions for files, but also

Total Pages: 5467 1 .... 3405 3406 3407 3408 3409 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.