- Web Server
- Control Panels
- Site Map/RSS Feeds
Mirror Your Web Site With rsync
This tutorial shows how you can mirror your web site from your main web server to a backup server that can take over if the main server fails. We use the tool rsync for this, and we make it run through a cron job that checks every x minutes if there is something to update on the mirror. Thus your backup server should usually be up to date if it has to take over.
The Perfect Setup - Fedora Core 5 (64-bit)
This is a detailed description how to set up a Fedora Core 5 based server that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/IMAP, Quota, Firewall, etc.). This tutorial is written for the 64-bit version of Fedora Core 5, but should apply to the 32-bit version with very little modifications as well.
The Perfect Setup - CentOS 4.3 (64-bit)
This is a detailed description how to set up a CentOS 4.3 based server that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/IMAP, Quota, Firewall, etc.). This tutorial is written for the 64-bit version of CentOS 4.3, but should apply to the 32-bit version with very little modifications as well.
Simple Apache 2 Tomcat 5 mod_jk Integration
The whole tutorial is based on many tutorials, but I made a very simple one, with no virtual hosts.
The main source of info can be found here:
Removing A User
Employee turnover in most organizations runs high. So unless you run a small shop with a stable user base, you need to learn how to clean up after an employee leaves. Too many so-called system administrators do not understand the stakes involved when they manage users. Disgruntled former employees can often cause significant trouble for a company by gaining access to the network.
Syncing Websites to Your Palm for Offline Reading
This is a brief tutorial on how to sync websites to your palm for offline reading. The websites are stored in Plucker format. You will need to install the Plucker viewer for palm which can be found at the Plucker website. The software you will use to grab the websites and convert them into Plucker format is called Sunrise. To transfer the Plucker files to a Palm you will need pilot-link.
DSPAM is a scalable and open-source content-based spam filter designed for multi-user enterprise systems. It's great at filtering out spam but on busy mailservers the pruning of the MySQL databases takes way too long time. This small tutorial/hack can speed up the pruning of old data considerably.
How To Install A Custom Iptables Firewall
This guide is to show you how to edit your iptables if you're running on a server. This guide info came from iptables rocks, but I edited a bunch of data to make it suitable for what I want it to do
How To Set Up A Load-Balanced MySQL Cluster
This tutorial shows how to configure a MySQL 5 cluster with three nodes: two storage nodes and one management node. This cluster is load-balanced by a high-availability load balancer that in fact has two nodes that use the Ultra Monkey package which provides heartbeat (for checking if the other node is still alive) and ldirectord (to split up the requests to the nodes of the MySQL cluster).
The Perfect Xen 3.0.1 Setup For Debian
This tutorial provides step-by-step instructions on how to install Xen (version 3.0.1) on a Debian Sarge (3.1) system.
Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one.