On most Linux systems services install logrotate configuration files in /etc/logrotate.d/. Sometimes you want to temporarily disable log rotation for a service without deleting the configuration file. So how do you do that? A look at the man page shows us this option:
linux server administration
Getting an SSL certificate with SHA256 hash
A hash function takes arbitrary sized data and outputs a number in a fixed range. It always outputs the same number for the exact same data. If the data changes by even one bit the hash also changes. Hashes are used to ensure data integrity by creating “fingerprints” of data.
SFTP Chroot In Debian Wheezy
SFTP is a secure alternative to FTP. Authentication is done via SSH and a secure tunnel is established for the entire file transfer session. In this article I look at how to restrict a user’s access to SFTP only and to a specific directory on the server.
Linux Screen Quick Start Guide
Screen is a great tool for running multiple shell instances using a single SSH connection or virtual console. Here’s a quick start guide to screen.
Continue reading
Apache authz_host: Order Deny,Allow vs. Order Allow,Deny
authz_host is an Apache module used to restrict access based on the client’s IP address or hostname. Order Allow,Deny and Order Deny,Allow are two of its directives that determine how the following Allow from and Deny from statements are interpreted. This post hopes to explain in simple terms how to use these properly.