by lifeLinux on March 28, 2013
This extension implements PHP bindings for Subversion (SVN), a version control system, allowing PHP scripts to communicate with SVN repositories and working copies without direct command line calls to the svn executable. In this tutorial, I will show you How to install Subversion (SVN) extension working with PHP 5.3.
by lifeLinux on March 7, 2013
I have setup an web server using Apache on CentOS. How do I configure firewall using iptables to allow or block access to the web server under CentOS ? In Tutorial I will show you How do I do it.
by lifeLinux on February 23, 2013
Today, I got following MySQL error in a PHP application: Host ‘host_name’ is blocked because of many connection errors; unblock with ‘mysqladmin flush-hosts’. It means that mysqld has received many connection requests from the given host. Default max_connect_errors value is 10, that is remote host will be blocked if there is more than 10 connection […]
by lifeLinux on January 31, 2013
The virsh command is an alternative command to manage a Red Hat Enterprise Linux 5 KVM environment using a Command Line Interface(CLI). The virsh command is provided as part of the libvirt API which provides a common API to applications requiring standardized access to interact with KVM using a stable interface.
by Linux Killer on January 31, 2013
Protect the server from Flood attacks , Using the property Port Flood Protection In firewall CSF . After doing the necessary settings will be able to determine the number of allowed connections Same time for each IP tries to connect to the server.
by Linux Killer on January 29, 2013
There are a lot of people do not know what these variables and how they can be used , this Variables exist in php.ini file , the php.ini file is contains settings PHP on server , and for each variable in the php.ini file have a special role and can be disabled and activated with ON and […]
by lifeLinux on January 31, 2012
I run CentOS on my server, and I often find that my server is being attacked by other computers. Brute force SSH attacks, port scanning, viruses scanning for the ability to spread, things like that. In this article, I’ll show you how to block an IP address on Linux server using IPTables.