Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for OpenVZ On Debian Etch For Webservers

Debian

Protect Your Files With TrueCrypt 5.1a On Debian Etch (GNOME)

Post date: May 13, 2008, 10:05 Category: Desktop Views: 3165 Comments
Tutorial quote: This document describes how to set up TrueCrypt 5.1a on Debian Etch (GNOME). Taken from the TrueCrypt page: "TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc)."
Debian

Upgrading Debian Etch (Stable) to Lenny (Testing)

Post date: October 3, 2008, 03:10 Category: System Views: 2808 Comments
Tutorial quote: Lenny is updated everyday with the most recent software available, however the software may not be stable which is what Debian is really all about. However if like me you can’t stand the thought of having outdated software, heres how to upgrade.
Debian

Set Up A High-Availability Load Balancer With Perlbal/Heartbeat On Debian Etch

Post date: January 13, 2009, 12:01 Category: Installing Views: 3237 Comments
Tutorial quote: This article explains how to set up a two-node load balancer in an active/passive configuration with Perlbal and heartbeat on Debian Etch. The load balancer sits between the user and two (or more) backend Apache web servers that hold the same content. Not only does the load balancer distribute the requests to the two backend Apache servers, it also checks the health of the backend servers. If one of them is down, all requests will automatically be redirected to the remaining backend server. In addition to that, the two load balancer nodes monitor each other using heartbeat, and if the master fails, the slave becomes the master, which means the users will not notice any disruption of the service. Perlbal is session-aware, which means you can use it with any web application that makes use of sessions (such as forums, shopping carts, etc.).
Debian

High-Availability Load Balancer With HAProxy/Wackamole/Spread On Debian Etch

Post date: January 6, 2009, 12:01 Category: Installing Views: 3554 Comments
Tutorial quote: This article explains how to set up a two-node load balancer in an active/passive configuration with HAProxy, Wackamole, and Spread on Debian Etch. The load balancer sits between the user and two (or more) backend Apache web servers that hold the same content. Not only does the load balancer distribute the requests to the two backend Apache servers, it also checks the health of the backend servers. If one of them is down, all requests will automatically be redirected to the remaining backend server. In addition to that, the two load balancer nodes monitor each other using Wackamole and Spread, and if the master fails, the slave becomes the master, which means the users will not notice any disruption of the service. HAProxy is session-aware, which means you can use it with any web application that makes use of sessions (such as forums, shopping carts, etc.).
Debian

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Heartbeat On Debian Etch

Post date: November 7, 2007, 11:11 Category: Network Views: 4439 Comments
Tutorial quote: This article explains how to set up a two-node load balancer in an active/passive configuration with HAProxy and heartbeat on Debian Etch. The load balancer sits between the user and two (or more) backend Apache web servers that hold the same content. Not only does the load balancer distribute the requests to the two backend Apache servers, it also checks the health of the backend servers. If one of them is down, all requests will automatically be redirected to the remaining backend server. In addition to that, the two load balancer nodes monitor each other using heartbeat, and if the master fails, the slave becomes the master, which means the users will not notice any disruption of the service. HAProxy is session-aware, which means you can use it with any web application that makes use of sessions (such as forums, shopping carts, etc.).
Debian

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Keepalived On Debian Etch

Post date: October 29, 2007, 09:10 Category: Network Views: 4640 Comments
Tutorial quote: This article explains how to set up a two-node load balancer in an active/passive configuration with HAProxy and keepalived on Debian Etch. The load balancer sits between the user and two (or more) backend Apache web servers that hold the same content. Not only does the load balancer distribute the requests to the two backend Apache servers, it also checks the health of the backend servers. If one of them is down, all requests will automatically be redirected to the remaining backend server. In addition to that, the two load balancer nodes monitor each other using keepalived, and if the master fails, the slave becomes the master, which means the users will not notice any disruption of the service. HAProxy is session-aware, which means you can use it with any web application that makes use of sessions (such as forums, shopping carts, etc.).
Debian

How To Enable Multiple HTTPS Sites For One IP On Debian Etch Using TLS Extensions

Post date: November 19, 2007, 11:11 Category: Software Views: 3598 Comments
Tutorial quote: This guide is Debian specific but could be ported to other distributions since the concept is the same. In order to use TLS Extensions we have to patch and recompile Apache2 and recompile OpenSSL with the enable-tlsext directive. Since TLS extensions are relatively new, some Internet browsers will not work so the Apache2 server will deliver just the default site as http 1.0 does on an http 1.1 server.
Debian

How to set up an encrypted filesystem in several easy steps

Post date: December 10, 2006, 08:12 Category: Security Views: 3319 Comments
Tutorial quote: There's been a lot of talk lately about encrypted partitions, and Debian is proud to offer a feature to easily create them in the etch installer since beta3. But what about existing systems? This guide walks you through setting up an encrypted partition using cryptsetup and LUKS.
Debian

Stack Smashing Protection for Debian

Post date: June 23, 2006, 22:06 Category: Security Views: 2820 Comments
Tutorial quote: Since we last covered the use of Stack Smashing Protection (SSP) the default compiler for Debian Sid has been upgraded to include it, with no need for custom patching. Read on for a brief demonstration of how it can be used to prevent attacks.

The default C compiler for Sid, which will be used in Etch too, is GCC v4.1. This releasecontains the SSP patch which previously needed to be applied manually (we demonstrated applying this patch for GCC v3.4 a long time ago).

Since the SSP patch is included in the compiler by default it is suddenly a lot easier to start working with it.
Debian

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

Post date: May 3, 2009, 10:05 Category: Miscellaneous Views: 3360 Comments
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.
Web-based applications and online marketing solutions - LumoLink