September 7

AWS Strategy – Webpage Server

AWS Strategy – Webpage Server

SECURITY GROUPS – Create one for each service (isolate IPs accordingly) RDS instance (mysql – set security group to only MySQL) EFS instance (keep logs .conf and http files) EC2 instance (the engine that runs the show) Linux login – log in with new .pem file Linux update – sudo yum -y update Linux EFS.

October 13

VMWare ESXi — Try This At Home

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— For years now, I’ve been using VMWare Fusion for all of my home/lab virtual environments. It’s a wonderful way to create all of your experiments, or even real world servers, in the compact environment of your home desktop computer. At work, however, this type of virtual setup.

September 8

WordPress (Update Fail)

WordPress (Update Fail)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— Sometimes, during the smallest of routines, you can come across something that can take hours to figure out!  Fortunately, if you’ve been through the same situation in the past, you can come up with the solution within seconds and go along your way. This writing is for.

September 2

Apache or httpd (Accept Passphrase on Boot)

Apache or httpd (Accept Passphrase on Boot)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— This experiment was conducted on a CentOS 6 installation of Linux.  As always, with any other installations of Linux, there may be slightly different commands and directories to consider, but the theory is the same.  Try it out if you like the concept… WHY NOT?!? This experiment.

August 24

Fail2Ban vs. Firewall…. FIGHT!

Fail2Ban vs. Firewall…. FIGHT!

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— For months now, I’ve been dealing with customers calling about their email services being no longer available. By the time I troubleshoot the problem, their email has come back on line which created a ‘could not duplicate’ finality to the problem. As such, I got extremely curious.

December 1

MySQL Replication (the easy way)

MySQL Replication (the easy way)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— Recently, there was a hardware failure on my primary mail server, which left me (and my clients) without email for an entire day.  Although it was possible to use one of my backups to get us up and running again, I decided to take another route.  After.

August 11

Password Protect Your Web Directory (apache)

Password Protect Your Web Directory (apache)

Have you ever just wanted to protect something on your web server.  Perhaps there’s a sensitive web page that you created like a blog that you only want certain people to see.  Well, here’s how you do it!  This will be written for a Fedora/Red Hat/CentOS platform, but will work on any apache web server.

July 28

Sendmail rejected — Default CentOS Installation

Sendmail rejected — Default CentOS Installation

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— After completing a brand new minimal install of CentOS 6.4, I configured the installation to be a web server using apache, mysql and sshd for remote access.  After configuring a website on the box, I attempted to send an email from the local webpage, but never received.

May 22

Server Migration (httpd.conf & mysql)

Server Migration (httpd.conf & mysql)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— The following will be a small experiment to answer some questions that have peaked my curiosity. In this scenario, I have two separate CentOS servers with two different public IP addresses. Both have SSH enabled through the firewall and I need to move multiple websites from server.

May 15

IP Tables (explanation in efficiency)

IP Tables (explanation in efficiency)

——————————————————————— – OVERVIEW / THOUGHT PROCESS – ——————————————————————— IP Tables are a set of rules that you define to allow or reject network traffic from entering into your system. The ones that I am referring to are for a UNIX (Linux) type system.  As a default, the IP Tables specify what’s called an ‘implicit deny’.