Tag: CentOS
How to Create a Self-Signed SSL Certificate on CentOS
An SSL certificate is an electronic ‘document’ that is used to bind together a public security key and a website’s identity information (such as name, location, etc.) by means of a digital signature. The ‘document’ is issued by a certificate provider such as GlobalSign, Verisign, GoDaddy, Comodo, Thawte, and others. For more information, visit the article: What is an SSL Certificate?
List Which Apache 2 Modules are Enabled on CentOS 6
The Apache web server is one of the most popular and powerful web servers in the world due to its ease of administration and flexibility. This flexibility comes Apache’s modular design, and allows for such features as: URL rewriting for SSL encryption natively, and Outlook Anywhere passthrough support in reverse proxy setups. Modularity allows Administrators to modify Apache to meet their needs; adding modules that are needed and removing ones that are not.
FTP (File Transfer Protocol) is probably the most popular method of uploading files to a server; a wide array of FTP servers, such as vsftpd, and clients exist for every platform.
How to Install Logwatch on CentOS 6
Logwatch is a Perl-based log management tool for analyzing, summarizing, and reporting on a server’s log files. It is most often used to send a short digest of server’s log activity to a system administrator.
- These instructions are intended specifically for installing the MongoDB PHP Driver (Extension) on CentOS 6.
- I’ll be working from a Liquid Web Core Managed CentOS 6.5 server, and I’ll be logged in as root.
How to Add a User and Grant Root Privileges on CentOS 6.5
- These instructions are intended specifically for adding a user on CentOS 6.5.
- I’ll be working from a Liquid Web Core Managed CentOS 6.5 server, and I’ll be logged in as root.
How to View Logs for a Docker Container
II. How To List and Attach to Docker Containers
III. How to Commit Changes and Create Docker Images
IV. How to View Logs for a Docker Container
What is OpenSSL?
OpenSSL is a common cryptographic library which provides encryption, specifically SSL/TLS, for popular applications such as Apache (web), MySQL (database), e-mail, virtual private networks (VPNs), and more.
Updating the kernel on Red Hat Linux or CentOS Linux is a very simple process. Most commonly you will use the following command in the case of a security vulnerability, or perhaps just to verify that you’re running the most up-to-date kernel:
A vulnerability found in the Linux kernel, specifically a flaw with the pseudo tty (pty) device, allows an unprivileged user to cause a denial of service (system crash) or potentially gain administrator privileges. A small number of CentOS and Ubuntu versions are vulnerable, thus we want to highlight the following information:
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.