public marks

PUBLIC MARKS from camel with tag apache2

2008

mod_security et apache2 - lindev.fr

by 1 other (via)
Comment sécuriser un peut plus un serveur web Nous allons dans cet article , expliquer comment installer un module qui permet d'accentuer le filtrage des entrées sorties avant même qu'apache n'interprète quoi que ce soit

Running Vhosts Under Separate UIDs/GIDs With Apache2 mpm-peruser On Debian Etch | HowtoForge - Linux Howtos and Tutorials

by 1 other (via)
This article explains how you can install and configure apache2-mpm-peruser on a Debian Etch server. apache2-mpm-peruser is an MPM (Multi-Processing Module) for the Apache 2 web server, very similar to apache2-mpm-itk, but faster (almost as fast as apache2-mpm-prefork). mpm-peruser allows you to run each of your vhosts under a separate UID and GID - in short, the scripts and configuration files for one vhost no longer have to be readable for all the other vhosts. It is based on metuxmpm, a working implementation of the perchild MPM. The result is a sane and secure web server environment for your users, without kludges like PHP's safe_mode.

Installing ModSecurity2 On Debian Etch | HowtoForge - Linux Howtos and Tutorials

by 2 others
This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!

How To Block Spammers/Hackers With mod_defensible On Apache2 (Debian Etch) | HowtoForge - Linux Howtos and Tutorials

mod_defensible is an Apache 2.x module intended to block spammers/hackers/script kiddies using DNSBL servers. It will look at the client IP and check it in one or several DNSBL servers and return a 403 Forbidden page to the client. This guide shows how to install and use it with Apache 2 on a Debian Etch server.

Apache2 mod_fastcgi suexec on debian etch - Chty blog

I know it's difficult to find good documentation to configure apache2 with mod_fastcgi and suexec to make php websites works. This configuration works well with Debian Etch (4.0). Here an example of configuration.

Installing mod_geoip for Apache2 On Debian Etch | HowtoForge - Linux Howtos and Tutorials

by 1 other
This guide explains how to set up mod_geoip with Apache2 on a Debian Etch system. mod_geoip looks up the IP address of the client end user. This allows you to redirect or block users based on their country. You can also use this technology for your OpenX (formerly known as OpenAds or phpAdsNew) ad server to allow geo targeting.

Manage Apache Download Speed And Traffic Limits With mod_cband | HowtoForge - Linux Howtos and Tutorials

by 2 others
In this tutorial I will describe how to install and configure mod_cband on an Apache2 web server. mod_cband is an Apache 2 module which provides bandwidth quota and throttling. It solves the problem of limiting users' and virtualhosts' bandwidth usage. The current version can set virtualhosts' and users' bandwidth quotas, maximal download speed, requests-per-second speed and the maximal number of simultanous IP connections.

2007

Et la marmotte ... - Sysadmin en herbe

On vous a toujours dit qu'il n'était pas possible de faire des virtualhost en https. En gros vous devriez avoir une ip par site. Mais réveillez vous camarade, on vous ment, on vous spolie ... En effet tout est possible en informatique, ou presque, c'est juste une question de temps passé à mettre à jour les navigateurs du monde entier.

Garder l'autorité - Sysadmin en herbe

En général une autorité de certification permet de garantir à un utilisateur lambda que le certificat que vous allez lui présenter correspond bien à ce que vous prétendez et ce sans devoir chercher à le vérifier lui-même. Pour que cela fonctionne, il faut que le client en question fasse déjà confiance à cette autorité. Or si vous êtes votre propre autorité, personne ne vous fera confiance. En fait ceci n'est utile que dans deux cas. Le premier pour faire des tests sans devoir payer (relativement cher). Le deuxième pour avoir des certificats SSL sur un parc de clients que vous pouvez maitriser. Par exemple sur un intranet pour pouvez exiger des clients qu'ils installent votre autorité.

serveurweb:mod_evasive_avec_apache2 [Wiki.UnElectronLibre.Info]

serveurweb:mod_evasive_avec_apache2 [Wiki.UnElectronLibre.Info]

serveurweb:mod_security_avec_apache2 [Wiki.UnElectronLibre.Info]

serveurweb:mod_security_avec_apache2 [Wiki.UnElectronLibre.Info]

serveurweb:installer_apc_sous_apache [Wiki.UnElectronLibre.Info]

serveurweb:installer_apc_sous_apache [Wiki.UnElectronLibre.Info]

2005

Debian GNU/Linux System Administration Resources

(via)
I've setup my own system monitoring. I'm monitoring: * Apache2 * Bind * ClamAV * Exim4 * MySQL * OpenSSH

Zope behind an Apache 2 webserver

How to set up an apache 2 webserver as proxy with disk caching and deflating (compressing like mod_gzip) for zope