ICT Knowledgebase
This category is used to document topics I am working on and to offer solutions for IT issues. Here you will find technical how-to’s and installation- and configuration instructions. Mostly, only high level steps are documented, because I think that some processes are self explanatory.
The easiest way to follow this “copy & paste” how-to’s is to use a command line SSH client (like putty) and simply copy and paste the commands (except where you have to provide your own information.
This document provides you a solution to gain control of website overload during extreme traffic peaks by offloading visitors into an online waiting room. With this solution you provide your website visitors a good experience and the stability of your website maintained. Continue reading
This tutorial shows the installation of vsftpd (VerySecureFtpDeamon) on Linux to act as a FTP server. It supports some features as SSL and locking users to their home directories.
Continue reading
VMware can be protected by using Array-Based Replication at the storage layer by replicating VMware datastores to a Recovery Site.
This document will show you how to put the site into a maintenance mode, during site updates, without restarting Apache. In this document it’s assumed you already have a custom maintenance page to inform your visitors the site is down for maintenance.
Encryption
If you want to prevent reading your password in your script at first glance, you can use encryptwed passwords.
Create encrypted password
echo “password_to_set” | base64
Decrypt password
MYPASS=’echo “your_encrypted_password” | base64 –decode’
To see some login statistics.
Shows… Continue reading |
In this article the working modes of vi , the standard text editor in Unix and Linux systems, is explained.
A file can be edited using vi by typing vi at command line and passing the file name as an… Continue reading
This article explains tail command with most common options. The linux tail command does something like its name. It displays the last few lines of a file. It is mostly used for viewing log file updates as these updates are appended to the log files.
Linux Sed command is a stream editor that can perform basic text transformation on input stream. It can be used for editing in shell scripts for non-interactive editing. Sed can be used to find and replace a pattern on the input.
This document shows some example rules to filter network traffic with the iptables firewall. Iptables uses the concept of IP addresses, protocols (tcp, udp, icmp) and ports and places rules into predefined chains (INPUT, OUTPUT and FORWARD) that are checked against any network traffic (IP packets) relevant to those chains and a decision is made about what to do with each packet based upon the outcome of those rules, i.e. accepting or dropping the packet.
This tutorial will help you to sync data between two (web) servers with “Rsync“ for example to minimize/eliminate downtime/data loss of your web servers.
Rsync (Remote Sync) is a command tool to copy and synchronize data locally across directories, across disks and remotely across systems to perform data backups and mirroring between two Linux systems.