The Reliable, High Performance TCP/HTTP Load Balancer. Quick News.
Linux. Webserver - How to avoid using sudo when working in /var/www? Kevindeleon/centos65-x86_64-LAMP. This is my base dev setup.
Includes PHP, MySQL, Ruby, Python and phpMyAdmin Install VirtualBox Install Vagrant (Requires 1.5+ for Vagrant Cloud) Setup a New Vagrant VM. PuTTY SSH / Windows Clipboard Integration. Getting text out of your SSH sessions can be annoying.
If it fits in a screen, I usually just select the text in PuTTY to copy it– no big deal. Otherwise, I have to either email it to myself or put it in a file, log in with WinSCP, and download the file. Way too much trouble. GitHub does dotfiles - dotfiles.github.io. Question: something wrong with my config? gulpjs is 7% slower than my original grunt config. · Issue #239 · gulpjs/gulp · GitHub. Package - gulp-usemin. Repository - Writing a git post-receive hook to deal with a specific branch. Fabric — Fabric 1.0 documentation.
SSH Port Forwarding in Linux: Configuration and Examples. During the mid 90's (1995 to be precise) one researcher named Tatu Ylönen, at the university of Helsinki (Finland) designed a protocol, that eventually replaced all remote login programs.
The primary objective behind Tatu Ylönen's design of the new protocol was to stop password sniffing attacks. In other words, remote login programs prior to 1995 used to send login credentials and other critical information in clear text format through the wire. Due to this, anybody with a little bit technical knowledge can sniff the packets and read the password. The new design and implementation made by Tatu Ylönen, is called as SSH (Secure Shell.). System administrators use this tool day and night to gain access to their remote systems. Read: How Does Secure Shell Work SSH secured our primary task of remote login, by authenticating both the client and the server and also securing the data transmitted with powerful encryption algorithms. What are the recommended directory permissions?
My practice around creating a new Drupal site on a server is to have a user that is a part of the web server (typically Apache) group, and have that user own all the Drupal files.
What's the best way of handling permissions for apache2's user www-data in /var/www? Installing Python 2.7.2 on Centos 5.2 - Junk Food for the Brain. Centos / RHEL5 come with Python v2.4.3, which was relased in 2006 and is as ancient as you can get nowdays.
Even other application build scripts require Python >= 2.5 for building, e.g node.js & Spidermonkey 1.8.5. Zsh: 14. Expansion. The following types of expansions are performed in the indicated order in five steps: History Expansion This is performed only in interactive shells.
Alias Expansion Aliases are expanded immediately before the command line is parsed as explained in Aliasing. Process Substitution Parameter Expansion Command Substitution Arithmetic Expansion Brace Expansion. Avoiding CPU Speed Scaling – Running CPU At Full Speed. If you have a server on collocation with the super-fast CPU, that doesn’t mean that you get it running at full power.
Here is a preamble. When doing inventory of Linux servers, that I’m administering, I’ve found that some of them are running on lower CPU speed, then they could. This can be easily checked with this command: How To Configure Virtual Memory (Swap File) on a VPS. Table of Contents & Preface Preface This article will cover the pros and cons of using virtual memory or a swap file (paging), determining if your droplet already uses virtual memory or paging, the differences between a swap partition and a swap file, information on how to create a swap file, and how to configure the system's "swappiness" (how likely it is to use virtual memory as well as determining the appropriate size to use).
Background Processes in Unix/Linux. The & is an important little character in UNIX; it means "run the command in the background"; i.e., detach it from the window it was started from, so it does not block the command line.
Should the program ever try to read from the terminal window, it will be suspended, until the user "brings it to the foreground"; i.e., brings it to the state it would have had without the & to begin with. To bring a program to the foreground, use "fg" or "%". If you have more than one background job to choose from ("jobs" will show you), then use for example "%2" to choose the second one. Daniel Nashed's Blog. How to set / change the I/O scheduler (elevator) on a CentOS 6 host. FilePermissionsACLs. POSIX Access Control Lists (ACLs) are more fine-grained access rights for files and directories. An ACL consists of entries specifying access permissions on an associated object. ACLs can be configured per user, per group or via the effective rights mask. These permissions apply to an individual user or a group, and use the same as rwx found in regular permissions. For an explanation of rwx, see FilePermissions.
Cross-domain messaging made easy.