December 1

MySQL Replication (the easy way)

MySQL Replication (the easy way)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— Recently, there was a hardware failure on my primary mail server, which left me (and my clients) without email for an entire day.  Although it was possible to use one of my backups to get us up and running again, I decided to take another route.  After.

September 7

VMWare Networking (eth0 vs eth1)

VMWare Networking (eth0 vs eth1)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— One of the best and most efficient ways to have a test network is to use VMWare (or any virtual machine) software to create test computers. In this particular case, I was creating a CentOS 6.4 machine similar to my active webserver to test against. As is.

August 11

Password Protect Your Web Directory (apache)

Password Protect Your Web Directory (apache)

Have you ever just wanted to protect something on your web server.  Perhaps there’s a sensitive web page that you created like a blog that you only want certain people to see.  Well, here’s how you do it!  This will be written for a Fedora/Red Hat/CentOS platform, but will work on any apache web server.

July 28

Sendmail rejected — Default CentOS Installation

Sendmail rejected — Default CentOS Installation

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— After completing a brand new minimal install of CentOS 6.4, I configured the installation to be a web server using apache, mysql and sshd for remote access.  After configuring a website on the box, I attempted to send an email from the local webpage, but never received.

May 22

Server Migration (httpd.conf & mysql)

Server Migration (httpd.conf & mysql)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— The following will be a small experiment to answer some questions that have peaked my curiosity. In this scenario, I have two separate CentOS servers with two different public IP addresses. Both have SSH enabled through the firewall and I need to move multiple websites from server.

May 15

IP Tables (explanation in efficiency)

IP Tables (explanation in efficiency)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— IP Tables are a set of rules that you define to allow or reject network traffic from entering into your system. The ones that I am referring to are for a UNIX (Linux) type system.  As a default, the IP Tables specify what’s called an ‘implicit deny’.