<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / falko / tag / apache</title>
<link>http://netvouz.com/falko/tag/apache?feed=rss&amp;pg=7</link>
<description>falko&#39;s bookmarks tagged &quot;apache&quot; on Netvouz</description>
<item><title>Integrating XCache Into PHP5 (Debian Etch &amp; Apache2)</title>
<link>http://www.howtoforge.com/xcache-php5-apache2-debian-etch</link>
<description>This guide explains how to integrate XCache into PHP5 on a Debian Etch system (with Apache2). From the XCache project page: &quot;XCache is a fast, stable PHP opcode cacher that has been tested and is now running on production servers under high load.&quot; It&#39;s similar to other PHP opcode cachers, such as eAccelerator and APC.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Thu, 03 Apr 2008 12:22:55 GMT</pubDate>
</item><item><title>Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity</title>
<link>http://www.howtoforge.com/remo_modsecurity_apache</link>
<description>Say you have a nasty application on your Apache webserver that has been installed by some people from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach. It has all you need to lock down the application.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 08 Jun 2007 10:09:50 GMT</pubDate>
</item><item><title>Intrusion Detection For PHP Applications With PHPIDS</title>
<link>http://www.howtoforge.com/intrusion-detection-for-php-applications-with-phpids</link>
<description>This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Tue, 24 Jun 2008 14:22:49 GMT</pubDate>
</item><item><title>Make Browsers Cache Static Files With mod_expires On Apache2 (Debian Squeeze)</title>
<link>http://www.howtoforge.com/make-browsers-cache-static-files-with-mod_expires-on-apache2-debian-squeeze</link>
<description>This tutorial explains how you can configure Apache2 to set the Expires HTTP header and the max-age directive of the Cache-Control HTTP header of static files (such as images, CSS and Javascript files) to a date in the future so that these files will be cached by your visitors&#39; browsers. This saves bandwidth and makes your web site appear faster (if a user visits your site for a second time, static files will be fetched from the browser cache). This tutorial was written for Debian Squeeze.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Thu, 10 Mar 2011 11:52:33 GMT</pubDate>
</item><item><title>Preventing Brute Force Attacks With Fail2ban On Debian Etch</title>
<link>http://www.howtoforge.com/fail2ban_debian_etch</link>
<description>In this article I will show how to install and configure fail2ban on a Debian Etch system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Tue, 01 May 2007 17:45:47 GMT</pubDate>
</item><item><title>Running ISPConfig On Port 80 Using Apache&#39;s Reverse Proxy Feature (Debian Etch)</title>
<link>http://www.howtoforge.com/apache_reverse_proxy_ispconfig</link>
<description>This article shows how you can configure a Debian Etch system that has the webhosting control panel ISPConfig installed so that ISPConfig can be accessed on port 80. By default ISPConfig uses port 81 which is a non-standard port and is blocked by some firewalls and ISPs. By using Apache&#39;s mod_proxy module, we can avoid this problem. It lets us create a reverse proxy that can fetch the pages from ISPConfig on port 81.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 25 May 2007 09:10:49 GMT</pubDate>
</item><item><title>Running Vhosts Under Separate UIDs/GIDs With Apache2 mpm-peruser On Debian Etch</title>
<link>http://www.howtoforge.com/running-vhosts-under-separate-uids-gids-with-apache2-mpm-peruser-on-debian-etch</link>
<description>This article explains how you can install and configure apache2-mpm-peruser on a Debian Etch server. apache2-mpm-peruser is an MPM (Multi-Processing Module) for the Apache 2 web server, very similar to apache2-mpm-itk, but faster (almost as fast as apache2-mpm-prefork). mpm-peruser allows you to run each of your vhosts under a separate UID and GID - in short, the scripts and configuration files for one vhost no longer have to be readable for all the other vhosts. It is based on metuxmpm, a working implementation of the perchild MPM. The result is a sane and secure web server environment for your users, without kludges like PHP&#39;s safe_mode.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Sun, 24 Aug 2008 11:37:45 GMT</pubDate>
</item><item><title>Secure Websites Using SSL And Certificates</title>
<link>http://www.howtoforge.com/secure_websites_using_openssl_and_apache</link>
<description>This article will guide you through the entire process of setting up a secure website using SSL and digital certificates. This guide assumes that you already have a fully functional (and configured) server running Apache, BIND, and OpenSSL. Just as a side note, this guide was written based on a Fedora Core 6 distribution, but should be the same for most other distros out there.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 18 May 2007 09:46:20 GMT</pubDate>
</item><item><title>Securing Your ISPConfig 3 Installation With A Free Class1 SSL Certificate From StartSSL</title>
<link>http://www.howtoforge.com/securing-your-ispconfig-3-installation-with-a-free-class1-ssl-certificate-from-startssl</link>
<description>This tutorial shows how you can use a free Class1 SSL Certificate from StartSSL to secure your ISPConfig 3 installation and get rid of self-signed certificate warnings. The guide covers using the SSL certificate for the ISPConfig web interface (both Apache2 and nginx), Postfix (for TLS connections), Courier and Dovecot (for POP3s and IMAPs), and PureFTPd (for TLS/FTPES connections). If you&#39;ve installed monit and use HTTPS for its web interface, I will show you how to use the StartSSL certificate for it as well. This guide assumes you use Debian or Ubuntu; the principle is the same for other distributions supported by ISPConfig 3, but paths might differ.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Thu, 19 Jan 2012 11:10:32 GMT</pubDate>
</item><item><title>Setting Up A Subversion Repository Using Apache, With Auto Updatable Working Copy</title>
<link>http://www.howtoforge.com/apache_subversion_repository</link>
<description>Subversion is a free/open-source version control system. That is, Subversion manages files and directories over time. A tree of files is placed into a central repository. The repository is much like an ordinary file server, except that it remembers every change ever made to your files and directories. This allows you to recover older versions of your data, or examine the history of how your data changed. In this regard, many people think of a version control system as a sort of time machine.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Wed, 20 Jun 2007 12:35:27 GMT</pubDate>
</item></channel></rss>