background preloader

VirtualHost Examples

VirtualHost Examples
This document attempts to answer the commonly-asked questions about setting up virtual hosts. These scenarios are those involving multiple web sites running on a single server, via name-based or IP-based virtual hosts. Running several name-based web sites on a single IP address. Your server has a single IP address, and multiple aliases (CNAMES) point to this machine in DNS. You want to run a web server for and on this machine. Note Creating virtual host configurations on your Apache server does not magically cause DNS entries to be created for those host names. # Ensure that Apache listens on port 80Listen 80<VirtualHost *:80> DocumentRoot /www/example1 ServerName # Other directives here</VirtualHost><VirtualHost *:80> DocumentRoot /www/example2 ServerName # Other directives here</VirtualHost> The asterisks match all addresses, so the main server serves no requests. Name-based hosts on more than one IP address. Note:

Related:  Synology WebServerProgrammingStuff

Configuration Files This document describes the files used to configure the Apache HTTP server. Main Configuration Files Apache is configured by placing directives in plain text configuration files. The main configuration file is usually called httpd.conf. The location of this file is set at compile-time, but may be overridden with the -f command line flag. In addition, other configuration files may be added using the Include directive, and wildcards can be used to include many configuration files. RSA Algorithm The RSA algorithm is named after Ron Rivest, Adi Shamir and Len Adleman, who invented it in 1977 [RIVE78]. The basic technique was first discovered in 1973 by Clifford Cocks [COCK73] of CESG (part of the British GCHQ) but this was a secret until 1997. The patent taken out by RSA Labs has expired. The RSA cryptosystem is the most widely-used public key cryptography algorithm in the world. It can be used to encrypt a message without the need to exchange a secret key separately. The RSA algorithm can be used for both public key encryption and digital signatures.

Hébergement cloud - Serveurs dédiés flexibles en infrastructure cloud Language choice 10GB to 1TB of storage up to 5M pageviews Up to 100 domains unlimited databases Datacenter choice: USA or Europe PaaS? Platform as a Service means that you create your hosting environment by simply choosing the services that you want. How To Set Up Apache Virtual Hosts on Debian 7 What the Red Means The lines that the user needs to enter or customize will be in red in this tutorial! The rest should mostly be copy-and-pastable. Virtual Hosts Virtual Hosts are used to run more than one domain off of a single IP address.

Using the Apache web page access controls From SynologyWiki What is this Wiki about Apache is the application that runs on your Synology NAS providing the webserver functionality, i.e. AES encryption of files in Python with PyCrypto [Updated 15.11.2013: passing IV is required in the new PyCrypto] The PyCrypto module seems to provide all one needs for employing strong cryptography in a program. It wraps a highly optimized C implementation of many popular encryption algorithms with a Python interface. PyCrypto can be built from source on Linux, and Windows binaries for various versions of Python 2.x were kindly made available by Michael Foord on this page. My only gripe with PyCrypto is its documentation. The auto-generated API doc is next to useless, and this overview is somewhat dated and didn’t address the questions I had about the module.

Using Docker to host this WordPress blog We use a tool called Docker to host this blog on a DigitalOcean server. Docker allows you to run processes on your server that are included in a pre-built image. It runs these programs in a contained environment, with no danger of harming other processes and files. We used a pre-built WordPress image for Docker to install this blog. Basic commands to get around the Synology Box using the CLI From SynologyWiki File Management To edit a text file (using vi) For info on how to use vi see Basic commands for Linux vi Editor To go to a directory Make a directory

Python and cryptography with pycrypto We are going to talk about the toolkit pycrypto and how it can help us speed up development when cryptography is involved. Hash functionsEncryption algorithmsPublic-key algorithms Hash functions A hash function takes a string and produces a fixed-length string based on the input. The output string is called the hash value. Ideal hash functions obey the following: How to run your own e-mail server with your own domain, part 1 E-mail is old and complex. It's the oldest still-recognizable component of the Internet, with its modern incarnation having coalesced out of several different decades-old messaging technologies including ARPANET node-to-node messaging in the early 1970s. And though it remains a cornerstone of the Internet—the original killer app, really—it's also extraordinarily hard to do right. We most often interact with e-mail servers through friendly Web-based front-ends or applications, but a tremendous amount of work goes into hiding the complexity that allows the whole system to work. E-mail functions in a poisoned and hostile environment, flooded by viruses and spam.

mysql « Bobobobo’s Weblog First, recognize that THERE ARE several ways you can connect to a MySQL database from an application. click for larger The 3 main ways are: Native C api – compile and link-in code that can talk to MySQL WITHIN your app. This is ALMOST like making MySQL “part of your program” ODBC (this article).