How do I install PHP as a CGI?

./configure –without-apache –without-apxs –with-other-options It will tell you that as you are building it without Apache support, it is building it as a CGI binary. Then do make ; make install and it should then be installed (/usr/local/bin/php by default)

How To install Sablotron with PHP

You need to first install expat, followed by Sablotron. Then you need to reinstall PHP. This is the method we used :- Get source for expat http://sourceforge.net/projects/expat/ (check for latest) wget http://telia.dl.sourceforge.net/sourceforge/expat/expat-1.95.5.tar.gz tar -pxzf expat-1.95.5.tar.gz cd expat-1.95.5 ./configure make make install cd .. rm �r expat-1.95.2* *Make sure that /etc/ld.so.conf contains /usr/local/lib then run ldconfig(…)

Performing Backups XAMPP

So, your XAMPP installation has been up and running for a couple of weeks and you’ve amassed quite a sizeable set of data that you don’t want to be at risk from a hard drive crash. What do you do about backups? This is quite simple with XAMPP. Change your current working directory to /opt/lampp(…)

How to install XAMPP

XAMPP is a full-featured AMPP (Apache MySQL, PHP, Perl) package that is one of the few non-commercial AMPP middleware stacks available on Linux. With its tight integration, XAMPP makes it possible to run anything from a personal home page to a full-featured production site (though only for development purposes; XAMPP is not meant to be(…)

How to Configure Rsync

Part 1 – Setting up SSH key authentication First, we need to make sure the DESTSERVER has the ability to use key authentication enabled. Find your sshd configuration file (usually ‘/etc/ssh/sshd_config’) and enable the following options if they are not already set. RSAAuthentication yes PubkeyAuthentication yes AuthorizedKeysFile .ssh/authorized_keys If you edit the file be sure(…)

How To Install PHP

Generally, the installation process of Apache with PHP is very similar to the process of installing Apache without PHP, as described in the previous article. The only difference is the use of two additional modules: mod_php and mod_security. As in the previous article, we will start by creating an account and group called “apache”. Then(…)

Easy way to Chroot the Apache server

The first step of securing the server is to prepare a chrooted environment for the Apache server with PHP module. At this point, we should perform all the steps described in the “Chrooting the server” section of the previous article. In addition, before running Apache in chrooted environment for first time, we must also copy(…)

How to Defend against CSS and SQL Injection attacks

The last step of securing the server is implementing the logging of the GET and POST payloads, and implementing protection against Cross-Site-Scripting and SQL Injection attacks. In order to perform that, we will use the mod_security module, which we enable by adding the following line into httpd.conf: AddModule mod_security.c To enable logging of the GET(…)

How to Disable mod_security in .htaccess file

1. If you do not have one yet, an .htaccess file in the folder of your web application 2. To disable mod_security COMPLETELY, add the following line to the .htaccess file: SecFilterEngine Off OR, to disable HTTP POST scanning only, use the following instead: SecFilterScanPOST Off 3. Save the file and test your web application(…)

Secure your Apache2 with mod-security

Installation: In order to install mod-security with apache2, you need libapache2-mod-security: $sudo apt-get install libapache2-mod-security and then enable mod-security and reload apache2 $sudo a2enmod mod-security $sudo /etc/init.d/apache2 force-reload Once this is done, you will be able to filter GET, POST urls …. and apply different rules depending on what the page/variables/url contain Configuration: Apache running(…)

20 ways to Secure your Apache Configuration

First, make sure you’ve installed latest security patches There is no sense in putting locks on the windows, if your door is wide open. As such, if you’re not patched up there isn’t really much point in continuing any longer on this list. Go ahead and bookmark this page so you can come back later,(…)

A Guide to Internet Security Terms

Every Internet user should at least have a basic understanding of the terms used in regard to online security and so I have collected a few of the popular ones and put them in this article with a brief explanation of each. Adware means “Advertising Supported Software”. It refers to placing adverts in software or(…)