Language Selection

English French German Italian Portuguese Spanish

Today's Howtos:

Filed under
HowTos

Apache HTTP Server is a free software/open source web server for Unix-like systems, Microsoft Windows, Novell NetWare and other platforms. Apache is notable for playing a key role in the initial growth of the World Wide Web,and continues to be the most popular web server in use, serving as the de facto reference platform against which other web serversare designed and judged.

Apache features configurable error messages, DBMS-based authentication databases, and content negotiation. It is also supported by several graphical user interfaces (GUIs) which permit easier, more intuitive configuration of the server.

Install apache2 in Ubuntu server

sudo apt-get install apache2 apache2-common apache2-mpm-prefork apache2-utils ssl-cert

Apache2 web server Installation with php4 and php5 support in Ubuntu.


sysrqd is a tiny daemon aiming to control sysrq over network.SysRq stands for System Request, and this are functions mapped to keyboard shortcuts by the kernel. You can use them by pressing Alt+SysRq+[key] (SysRq might be named “Print Screen” on your keyboard),Permits to execute usual SysRq commands by network, like: sync, umount, reboot, poweroff, sak, term, etc. where key can be s (sync), k (sak), 0 to 9 (logging level), b (reboot), etc.

The goal of this keyboard sequences is too be available even if you can’t do anything on your box, because you screwed up everything, or because it’s crashed or under very heavy load.

sysrqd can help you to use SysRq keys when you are not in front of your box,and you need to do Emergency Sync, R/O remount and reBoot.

Manage Linux SysRq over network Using sysrqd


In this howto we will learn how to build a Dynamic DNS Server. Normally when we configure DNS, we use static entries to resolve any FQDN. If we are using DHCP in our network which gives dynamic IPs to every computer that turns on or requests one, then it is not possible to configure DNS statically. For that we should configure our DNS with DHCP in a manner that whenever a computer gets a new IP, its FQDN will be automatically updated with the new IP in DNS.

How To Configure Dynamic DNS on Fedora Core 4


Want to give your IT security or administrator staff access to Windows applications right in their preferred Linux desktop environment? Follow this tip and you can easily do this without needing to set up an expensive and complex Citrix environment. Also, did I mention that the following solution can be set up using free software?

Many network and security administrators want to use Linux as their operating system of choice due to the abundance of open source security tools available for Linux. But they still may need to run some Windows-only applications. So, their choices are to run a separate physical system or run Windows XP as a VM on VMware Virtual Server for Linux.

Running Windows as a VM on Linux with VMware Server


To install RPM files with Yast, simply type the following at the command line :

yast -i file.rpm

Afterwards you can easily remove these packages from within Yast.
If you downloaded source code from a program (tar.gz files) you can quickly make an RPM file from it to install it later on your or another pc (if dependencies are OK).

To do this...

Rpm Program Installation - Tips for openSuse10.2


More in Tux Machines

The Fairphone 2 Running Ubuntu Will Be On Show at MWC17

Mobile World Congress 2017 kicks off next month, and Canonical is, once again, going to be in attendance. But although there are unlikely to be any shiny new Ubuntu phones and tablets to show off, Ubuntu Touch won’t be entirely absent. Read more

Linux Devices, Raspberry Pi, and Tizen

  • Rugged, customizable POS system runs on Braswell
    Advantech’s rugged “UBX-310D” POS computer offers a quad-core, 2.0GHz Celeron J1900, plus SATA, mSATA, and mini-PCIe. Advantech’s UBX-310D is a fanless point of sale computer intended for small countertops and limited-space installations. The shock and vibration resistant device has a modest, 245 x 185 x 45mm footprint. The system runs Windows 7 or 8 as a default, with optional Linux 3.13, and supports applications such as retail, self-service, digital signage, and store management.
  • Open spec, $29 COM shrinks Pine A64 to SODIMM dimensions
    Pine64’s open spec, 67.9 x 31mm “SoPine A64” COM has a quad-core -A53 Allwinner A64 and 2GB RAM, plus an optional baseboard that mimics a Pine A64+ SBC.
  • RetroPie, NES Classic and Bluetooth peripherals
    I wanted to write a more in-depth post about RetroPie the Retro Gaming Appliance OS for Raspberry Pis, either technically or more positively, but unfortunately I don't have much positive to write. What I hoped for was a nice appliance that I could use to play old games from the comfort of my sofa. Unfortunately, nine times out of ten, I had a malfunctioning Linux machine and the time I'd set aside for jumping on goombas was being spent trying to figure out why bluetooth wasn't working. I have enough opportunities for that already, both at work and at home. I feel a little bad complaining about an open source, volunteer project: in its defence I can say that it is iterating fast and the two versions I tried in a relatively short time span were rapidly different. So hopefully a lot of my woes will eventually be fixed. I've also read a lot of other people get on with it just fine. Instead, I decided the Nintendo Classic NES Mini was the plug-and-play appliance for me. Alas, it became the "must have" Christmas toy for 2016 and impossible to obtain for the recommended retail price. I did succeed in finding one in stock at Toys R Us online at one point, only to have the checkout process break and my order not go through. Checking Stock Informer afterwards, that particular window of opportunity was only 5 minutes wide. So no NES classic for me!
  • Raspberry Pi Compute Module 3 Extends IoT
    Raspberry Pi Foundation updates embedded Compute Module with faster ARM processor to help developers and businesses build new IoT devices. The Raspberry Pi Foundation announced its new Compute Module 3 (CM3) on Jan. 16, providing internet of things (IoT) device makers with a powerful new option for embedded compute capabilities. The CM3 should not be confused with the Raspberry Pi's namesake device, which had its last major update in February 2016 with the debut of the Raspberry Pi 3 device. The Raspberry Pi is a small form-factor ARM-powered computer that was originally developed in 2012 as a way to help both kids and adults learn about computer science.
  • Smartphone App: Saavn Music app hits the Tizen Store
    Saavn Music app, which lets you listen to music online, is now available on your Tizen Store via Openmobile World Wide Inc. Previously Indian Z2 smartphone users got JioMusic app for it’s 4G & Jio support feature. Now, the online music Saavn app is available for the Samsung Z1 & Z3, as well as the Samsung Z2.

Debian News (manpages and TeX Live)

  • manpages.debian.org has been modernized (2017-01-18)
    https://manpages.debian.org has been modernized! We have just launched a major update to our manpage repository. What used to be served via a CGI script is now a statically generated website, and therefore blazingly fast. While we were at it, we have restructured the paths so that we can serve all manpages, even those whose name conflicts with other binary packages (e.g. crontab(5) from cron, bcron or systemd-cron). Don’t worry: the old URLs are redirected correctly.
  • Debian/TeX Live January 2017
    As the freeze of the next release is closing in, I have updated a bunch of packages around TeX: All of the TeX Live packages (binaries and arch independent ones) and tex-common. I might see whether I get some updates of ConTeXt out, too.

Security News

  • Wednesday's security updates
  • Secure your Elasticsearch cluster and avoid ransomware
    Last week, news came out that unprotected MongoDB databases are being actively compromised: content copied and replaced by a message asking for a ransom to get it back. As The Register reports: Elasticsearch is next. Protecting access to Elasticsearch by a firewall is not always possible. But even in environments where it is possible, many admins are not protecting their databases. Even if you cannot use a firewall, you can secure connection to Elasticsearch by using encryption. Elasticsearch by itself does not provide any authentication or encryption possibilities. Still, there are many third-party solutions available, each with its own drawbacks and advantages.
  • Resolve to Follow These 8 Steps for Better Data Security in 2017
    Getting physically fit is a typical New Year's resolution. Given that most of us spend more time online than in a gym, the start of the new year also might be a great time to improve your security “fitness.” As with physical fitness challenges, the biggest issue with digital security is always stagnation. That is, if you don't move and don't change, atrophy sets in. In physical fitness, atrophy is a function of muscles not being exercised. In digital fitness, security risks increase when you fail to change passwords, update network systems and adopt improved security technology. Before long, your IT systems literally become a “sitting duck.” Given the volume of data breaches that occurred in 2016, it is highly likely that everyone reading this has had at least one breach of their accounts compromised in some way, such as their Yahoo data account. Hackers somewhere may have one of the passwords you’ve used at one point to access a particular site or service. If you're still using that same password somewhere, in a way that can connect that account to you, that's a non-trivial risk. Changing passwords is the first of eight security resolutions that can help to improve your online security fitness in 2017. Click through this eWEEK slide show to discover the rest.
  • Pwn2Own 2017 Takes Aim at Linux, Servers and Web Browsers
    10th anniversary edition of Pwn2Own hacking contest offers over $1M in prize money to security researchers across a long list of targets including Virtual Machines, servers, enterprise applications and web browsers. Over the last decade, the Zero Day Initiative's (ZDI) annual Pwn2Own competition has emerged to become one of the premiere events on the information security calendar and the 2017 edition does not look to be any different. For the tenth anniversary of the Pwn2Own contest, ZDI, now owned and operated by Trend Micro, is going farther than ever before, with more targets and more prize money available for security researchers to claim by successfully executing zero-day exploits.
  • 'Factorio' is another game that was being hit by key scammers
    In another case of scammers trying to buy keys with often stolen credit cards to sell on websites like G2A, the developers of 'Factorio' have written about their experience with it (and other stuff too).