How to Remove APF Firewall
# service iptables stop
# chkconfig apf off
# /bin/rm –rfv /etc/apf
# /bin/rm –fv /etc/cron.daily/fw
# /bin/rm –fv /etc/init.d/apf
# iptables –L –n
|
||||||
How to Remove APF Firewall # service iptables stop # chkconfig apf off # /bin/rm –rfv /etc/apf # /bin/rm –fv /etc/cron.daily/fw # /bin/rm –fv /etc/init.d/apf # iptables –L –n Tomcat listen on Server IP Address Connector Connector address=”192.168.1.10″ port=”8080″ protocol=”HTTP/1.1″ maxHttpHeaderSize=”8192″ Connector executor=”tomcatThreadPool” Change Tomcat default port to 80 and 443 Tomcat by default runs on port number 8080, However there is high chance get a port conflict with others program. Sometime we just need to change the Tomcat port number. 1) Locate server.xml in {Tomcat installation folder}\ conf \ 2) Find following similar statement Define a non-SSL HTTP/1.1 Connector on port 8180 or A “Connector” represents an endpoint by which requests are received Connector port=”8080″ protocol=”HTTP/1.1″ 3) About Tomcat’s server.xml file cites it’s runs on port 8080. Change the Connector port=”8080? port to any other port number. For example Connector port=”80″ protocol=”HTTP/1.1″ Above statement instruct Tomcat server runs on port 80 and 443. 4) Edit and save the server.xml file. Restart Tomcat. Done LMD (Linux Malware Detect) on centos server Homepage: http://www.rfxn.com/projects/linux-malware-detect/ Step 1: Downloading, Installing LMD cd /usr/local/src installation completed to /usr/local/maldetect Creating a self-signed SSL Certificate How to Enable SSL FOR YOUR OWN WEBSITE. For this you will need the openssl package. First we want to start by generating a private key. root@localhost# openssl genrsa -out www.rmohan.com.key 1024 Then, we need to generate the certificate request and fill in the appropriate information. Make sure that the “Common Name” matches the domain you want to protect via SSL, so if you domain was www.rmohan.com, use that. If you wanted to protect rmohan.com (without the www.) then use that. root@localhost# openssl req -new -key www.rmohan.com.key -out www.rmohan.com.csr Please enter the following ‘extra’ attributes Next, generate the self-signed certificate. You can specify the number of days the cert is valid for. root@localhost# openssl x509 -req -days 365 -in www.rmohan.com.csr -signkey www.rmohan.com.key -out www.rmohan.com.crt Next, move the certificate and keyfile into apache’s SSL directory. mv www.rmohan.com.key /etc/httpd/conf/ssl.key/
JBOSS operations script The scripts are tested on RHEL 5 start_jboss.sh (for clustered environment) MULTICAST_ADDR={specify multicast addr} $JBOSS_HOME/bin/run.sh -b $BIND_ADDR -c $SERVER -g $PARTITION -u $MULTICAST_ADDR -Djboss.messaging.ServerPeerID=$SERVER_PEER_ID $JAVA_OPTS getip.sh getserverpeerid.sh Logging on Jboss Make your logging choices in the file App logs location can be defined in For example, rollover can be done for each hour by uncommenting JBOSS Admin Console urls JBOSS SSL ON JBOSS SSL Setup is same as Tomcat Procedure 1) Create a keystore using keytool utility #keytool can be found from Java runtime – /opt/jre1.6.0_18/bin/keytool mkdir $JBOSS_HOME/ssl $ keytool -genkey -alias jboss -keyalg RSA -keystore jboss.keystore -validity 3650 Enter key password for A .keystore file will be created in the current directory. 2) Update /opt/jboss-eap-5.0/jboss-as/server/default/deploy/jbossweb.sar/server.xml with correct keystore values. 3) Restart the server. Test using https://{ip_address}:8443/context-root/filename.jsp Apache commands #!/bin/sh echo “————————” /opt/apache/bin/httpd -f /opt/apacheconf/httpd.conf -k start echo “————————” Custom script to stop Apache (stop_apache.sh) echo “————————” echo “————————” rm /opt/apachelogs/* List statically compiled modules Which mpm is used by apache? List all loaded modules |
||||||
Copyright © 2025 - All Rights Reserved Powered by WordPress & Atahualpa |
Recent Comments