Remove any the previous installation of Apache if it is installed from yum command in the target system. Installation procedure To proceed with the installation procedure, run the below command which installs all the required packages for the source code compilation of Apache and press y to continue with the installation. [root@linuxtips ~]# yum […]
It has been sometime since I’ve seen an updated SonarQube tutorial here on DZone, so I thought that I would go through a jump start guide for you. I’m assuming that you are working in one of the common Linux distros (most of this tutorial works as well for Windows, […]
On Red Hat Linux /CentOS 7 or 8, install dig and nslookup using the dnf command. or yum command # yum install bind-utils Upon successful installation, verify the version using the command below. # dig -v
We can compare a filesystem to a refrigerator, or any other storage with multiple shelves that is used for storing different items. These shelves or compartments help us to organize grocery items in our refrigerator by certain characteristics, such as shape, size, type, and so on. The same analogy is applicable to a filesystem, […]
Install Lempp If Don’t how install Lampp server see this tutorial Creating WordPress MySQL Database Our WordPress will require a database and a database user. To create one, simply use the following commands. Feel free to replace the database name, user and password as per your preferences: # mysql -u root -p […]
Step 1: Log in to your WHM. Step 2: Click the Package icon. You can also find this section by searching for the word “package” in the search bar Step 3: Go to Add a Package. Step 4: Type a name for Package. Step 5: Select the desired amount of resource in Package. Step […]
About cPanel cPanel is a convenient application that allows users to administer servers through a GUI interface instead of the traditional command line. Although the installation for cPanel is relatively simple, the script does take several hours to run. Notes Setup Before installing cPanel on our droplet, we need to […]
Introduction Like most other Linux distributions, CentOS 7 uses the netfilter framework inside the Linux kernel in order to access packets that flow through the network stack. This provides the necessary interface to inspect and manipulate packets in order to implement a firewall system. Most distributions use the iptables firewall, which uses the netfilter hooks to […]
Introduction Any service that is exposed to the internet is susceptible to attacks from malicious parties. If your service requires authentication, illegitimate users and bots will attempt to break into your system by repeatedly trying to authenticate using different credentials. A common example of this is with SSH, which will […]
Introduction While connecting to your server through SSH can be very secure, the SSH daemon itself is a service that must be exposed to the Internet to function properly. This comes with some inherent risk and offers a vector of attack for would-be assailants. Any service that is exposed to […]