- Web Server
- Control Panels
- Site Map/RSS Feeds
Using Ruby On Rails With Apache2 On Debian Etch
This article shows how you can install Ruby on Rails (RoR) and integrate it in Apache2 on a Debian Etch system (including a short section at the end showing how to use RoR in a web site created with ISPConfig). Ruby on Rails is a web application framework which is rapidly gaining popularity among web programmers. It aims to increase the speed and ease with which database-driven web sites can be created and offers skeleton code frameworks (scaffolding) from the outset. Applications using the RoR framework are developed using the Model-View-Controller design pattern.
Running ISPConfig On Port 80 Using Apache's Reverse Proxy Feature (Debian Etch)
This article shows how you can configure a Debian Etch system that has the webhosting control panel ISPConfig installed so that ISPConfig can be accessed on port 80. By default ISPConfig uses port 81 which is a non-standard port and is blocked by some firewalls and ISPs. By using Apache's mod_proxy module, we can avoid this problem. It lets us create a reverse proxy that can fetch the pages from ISPConfig on port 81.
Secure Websites Using SSL And Certificates
This how-to will guide you through the entire process of setting up a secure website using SSL and digital certificates. This guide assumes that you have already a fully functional (and configured) server running Apache, BIND, and OpenSSL. Just as a side note, this guide was written based on a Fedora Core 6 distribution, but should be the same for most other distros out there.
How To Set Up suPHP On A Debian Etch Based ISPConfig Server
When you've set up suPHP on your ISPConfig server, you are able to run the PHP scripts under the admin user of the website instead of www-data. In general, this howto is the same as my howto "How To Set Up suPHP On A Debian Sarge Based ISPConfig Server" at http://www.howtoforge.com/suphp_debian_ispconfig but it contains some small but important modifications for Debian Etch.
How to secure WebDAV with SSL and Two-Factor Authentication
This how-to documents how to configure a WebDAV resource using SSL and two-factor authentication and how to access that resource from Windows, Linux and Mac.
Speed Up Google Analytics
This method uses crontab to execute a shell script that downloads an updated urchin.js file every 24 hours and saves it into your local sites directory. Thats it! The problem occurs when google-analytics.com/urchin.js is requested by billions of web users all over the world at one time, it can cause your sites pages to load at a snails pace. Especially if you are using WordPress or a similar CMS.
How To Set Up suPHP On A Debian Sarge Based ISPConfig Server
With this howto I explain how to set up suPHP on a Debian based ISPConfig server with php4. Mainly, it is based on Falko's howto http://www.howtoforge.com/apache2_suphp_php4_php5. Within the forums on Howtoforge, lots of information about "setting up suphp" can be found. However, this information is spread all over the forums, so it is not very clear how to set up suphp on an ISPConfig server. It was the reason for me to write this howto. When you've setup suPHP on your ISPConfig server, you are able to run the PHP scripts under the admin user of the website instead of www-data.
How To Configure Web Access To Subversion Repositories Using Apache
This how to is going to describe the steps to get the mod_dav_svn module to work on an Apache web server. First I'll assume that we don't have Apache and Subversion installed on our FreeBSD box, in a second part I'll explain how to add the module using our current installation.
How to configure Apache to use Radius for Two-factor Authentication
This brief document shows how to configure Apache to use mod_auth_xradius to authenticate users with the WiKID Strong Authentication System. Adding two-factor authentication to Apache is a very simple process with this setup.
Install and Configure Auth Shadow on Debian/Ubuntu
Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.