Ifconfig is used to configure the kernel-resident network interfaces. It is used at boot time to set up interfaces as necessary. After that, it is usually only needed when debugging or when system tuning is needed. To get a quick look at all the network cards on your system that are â€˜upâ€™ (meaning they are [...]
If you are looking for a way to speed up your PHP pages on Apache, this is the software you want to install. Huge performance gains can be had when using this software to precompile and cache your PHP pages, and it is very simple to install.
Subversion depends on a number of third party tools and libraries.Some of them are only required to run a Subversion server; others are necessary just for a Subversion client. This section explains what other tools and libraries will be required so that Subversion can be built with the set of features you want
Lots of programmers like PHP for its ability to code and develop web applications fast. Code-debugging is a lot easier than with PERL or C. However, there is one thing a lot of developers are puzzled about, â€œHow to run PHP Scripts with crontab?â€ Cron is normally available on all Unix and Linux distributions; if [...]
User accounting can be used to discover information about who is currently using the system. While you cannot necessarily verify the integrity of this information once your machine has been exploited, it can be a useful tool to track the systems a particular user has logged into, what time he or she logged in, when [...]
Sometimes it can be difficult to debug scripts. For example, a script only fails if itâ€™s being executed by an application and you have no way of telling the application how the script should be executed to redirect the output. Or you simply donâ€™t want to redirect the output of the script each time you [...]
syslog is a standard for forwarding log messages in an IP network. The term “syslog” is often used for both the actual syslog protocol, as well as the application or library sending syslog messages .
Syslog is a client/server protocol: the syslog sender sends a small (less than 1KB) textual message to the syslog receiver. The receiver is commonly called “syslogd”, “syslog daemon” or “syslog server”. Syslog messages can be sent via UDP and/or TCP. The data is sent in cleartext; although not part of the syslog protocol itself, an SSL wrapper can be used to provide for a layer of encryption through SSL/TLS.
When filtering is enabled and a request for content is directed through the security appliance, the request is sent to the content server and to the filtering server at the same time. If the filtering server allows the connection, the security appliance forwards the response from the content server to the client that originated the request. If the filtering server denies the connection, the security appliance drops the response and sends a message or return code that indicates that the connection is not successful.
Logging is rated on 8 different levels. â€œ0â€³ or Emergency is for catastrophic errors like shutdown or loss of connectivity to the inside. Level â€œ7â€³ is debugging information, REALLY in-depth information on even the smallest detail. Debugging should only be used for short periods of time to isolate an issue because it generates so much information. Whatever logging level you use, it will automatically log the lower levels as well. For example, a good place to start is logging level 4 or the warning level. A good thing to remember is when you set logging 4, you get levels 3, 2, 1 and 0, as well.
Windows Internet Explorer 8 Beta 2 Windows Internet Explorer 8 is the next version of the worldâ€™s most popular browser that optimizes developer and end-user experiences to provide a window to the Web of online services. Moreover, Internet Explorer 8 offers new features and functionality that enable customers to reach beyond the page in more [...]
SquidGuard is a URL redirector and content filter addon that restricts proxy clients from accessing particular and/or banned site(s), IP addresses, URLs, website patterns using the proxy server.Â SquidGuard can be used in conjunction with Squid proxy to implement website content filter from the proxy server. Here’s a run down on how to install and [...]
Normally from my experience if we take the most â€˜expensiveâ€™ 10 queries and we optimize them properly (maybe running them more efficiently, or maybe they are just missing a simple index to perform properly), then we will immediately see the result on the overall mysql performance. Then we can iterate this process and optimize the [...]
Introduction This configuration allows a central Cisco Secure PIX Firewall to communicate with networks behind two other PIX Firewall boxes through VPN tunnels over the Internet or any public network using IPsec. The two outlying networks have no need to communicate with each other, but there is connectivity to the central network. The two outlying [...]