Tag Archives: CentOS

Update to PHP 5.6 on CentOS 6 using remi repository

With CentOS being a conservative distribution, security patches are still applied to CentOS 6, but no new versions are available. When running some websites – like Virtualmin – on CentOS 6, the old PHP version 5.3.3 can cause problems. Updating to a newer … Continue reading

Posted in PHP, Web technologies | Tagged , , | Comments Off on Update to PHP 5.6 on CentOS 6 using remi repository

Monit restart not working on CentOS – no pid-file after restart

Monit is a monitoring tool that can monitor processes, files and more. In the event of a failed monitor, monit is able to alert or trigger an action. Often the action triggered is to restart the monitored daemon. With the … Continue reading

Posted in Linux Administration, Monitoring | Tagged , | Comments Off on Monit restart not working on CentOS – no pid-file after restart

Setup Dovecot with PAM authentication and SSL on CentOS

Dovecot will act as the IMAP server for this setup. If you need POP3, this can also be provided by dovecot, but in this article I’m just going to show how to setup IMAP with SSL to protect the transfer of emails. Installation … Continue reading

Posted in Mailserver | Tagged , , , | Comments Off on Setup Dovecot with PAM authentication and SSL on CentOS

Access a service without direct internet connection

When two servers are connected to each other but only one server has access to the internet, services on the server that is not connected directly to the internet cannot be accessed directly. The server connected to the internet has to forward the ports to the services you want to reach on the second server. This will show you how to configure that. Continue reading

Posted in Linux Administration | Tagged , , | Comments Off on Access a service without direct internet connection

Setup gitosis to manage git repositories

With git you can have a repository on your client working independently and even not having any remote repository. But if you wane share your work with others, a remote repository will be needed. Such a remote repository can be easy set up. Continue reading

Posted in Version control system | Tagged , , , | Comments Off on Setup gitosis to manage git repositories

Show installed yum packages by size

When you pay for every GB of disc space on your server as it is with an Amazon EC2 instance, you want to make sure that the installed packages are at a minimum. Besides the actual user data, you can as well try to remove packages you don’t need but have been installed for some reasons. Here is how to find the biggest installed packages. Continue reading

Posted in Linux Administration | Tagged , , , | Comments Off on Show installed yum packages by size

PHP Unable to load library module.so

If you see in the Apache error_log log-file an error like “Unable to load dynamic library /usr/lib/php/modules/module.so”, you probably have CentOS 6.4 which has a configuration issue in the mcrypt configuration file. Continue reading

Posted in Linux Administration, PHP | Tagged , | Comments Off on PHP Unable to load library module.so

Set up apache and the log path with SELinux

Depending on your backup strategy you might run into troubles of backup the entire /etc directory. Running a default installed Apache on CentOS will have the log directory of Apache linked from within the /etc/httpd/ directory. If you backup solution would backup those as well, the backups would contain the logs and get huge. Continue reading

Posted in Linux Administration, Security | Tagged , , | Comments Off on Set up apache and the log path with SELinux

Restrict SSH login using SSH keys to a particular IP address

Because most passwords are quite short so you can remember them as well as it is annoying to type the password all the time, You might have already considered creating SSH-keys and configured the SSH passwordless login with SSH-key for your server. But how to secure the access with SSH-key? Continue reading

Posted in Linux Administration, Security | Tagged , , , | Comments Off on Restrict SSH login using SSH keys to a particular IP address

Secure SSH server access

With a server running, SSH is one of the services nearly instantly gets checked out. Only after a couple of hours of going live with your server, you might already notice someone trying to login with passwords from a dictionary. There are some things you can do to reduce those hacking attempts to your SSH server. Continue reading

Posted in Linux Administration, Security | Tagged , , | Comments Off on Secure SSH server access