es larger than 2GB on modern
32-bit Unix systems"
source: http://httpd.apache.org/docs/2.2/new_features_2_2.html
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
On 19 juil. 2011, at 07:36, Patrick Proniewski wrote:
>> Patrick, Do you know of any examples on how to configure this?
>
> I'm going to take a look at my old config files, I've done that years ago,
> may be I've still some valuable pointers.
I was not able t
ww.hello.com to server1, and www.test.com to server2. That's
>> not an unusual setup.
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
h mod_proxy, setup to forward client
>> requests for www.hello.com to server1, and www.test.com to server2. That's
>> not an unusual setup.
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
t
requests for www.hello.com to server1, and www.test.com to server2. That's not
an unusual setup.
That could also be a Layer 7 switch, but it's very expensive, doing exactly the
same job (somewhat easier to configure).
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Univ
ailable through the apache server (ie. http://webmail/.hidden/userdb.txt)
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
ould really investigate,
gather evidence and technical facts before we continue to enumerate every kind
of possible compromise :/
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
On 12 juil. 2011, at 18:49, Sander Temme wrote:
>
> On Jul 12, 2011, at 1:37 AM, Patrick Proniewski wrote:
>
>> Hi,
>>
>> Apache servers are not victims of phishing attacks.
>> Users are victims of phishing attacks.
>>
>> As the OP is french, I
that, posting in english, but absolutely off topic now.
good luck,
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
> maybe some hacked DNS or Internet routers has been compromised/used ?
>
> I would be VERY interrested by ANY documentation about that kind
> of phising techniques and HOW to fight them ( if possible ) also
> I would be interrested by any apache gurus advices ...
> Would it be pos
d
totally forgot about it. Thank you !
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
in/suexec"
-D DEFAULT_PIDLOG="/var/run/httpd.pid"
-D DEFAULT_SCOREBOARD="logs/apache_runtime_status"
-D DEFAULT_LOCKFILE="/var/run/accept.lock"
-D DEFAULT_ERRORLOG="logs/error_log"
-D AP_TYPES_CONFIG_FILE="etc/apache22/mime.types"
-D SERVER_CONFIG_FI
5
MaxSpareServers 10
MaxClients 128
MaxRequestsPerChild 1
I expect Scoreboard to display 128 slots, but it displays 256. Does it come
from the fact I'm running Apache on ports 80 AND 443?
regards,
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumi
ords...) that makes this kind of
script more tricky than you would think.
Wilson: you should really consider externalizing your master DNS. Running a
local secondary DNS is fine, but your primary should be remote (on your backup
server for example).
Patrick PRONIEWSKI
--
Administrateur Systè
oSed, can be hacked... The
infrastructure supporting the VPS can crash, loose data, etc.
Speaking of limiting downtimes, it's of course safer to have a virtual server
in the cloud (say amazon for example), because they provide a very strong
infrastructure, and redundancy.
Patrick PRONIE
l dump and rsync files every
hour for example).
This is mostly handcrafted solution, but it's the cheapest.
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
Hello,
After further experimentations, I've found out that, on FreeBSD, RLimitNPROC
takes into account every httpd processes. So it's a big contradiction of the
official documentation, and it makes RLimitNPROC absolutely useless.
On 25 mai 2011, at 11:18, Patrick Proniewski wrote
php no go. Does anyone have this working?
Works for me :
ErrorDocument 404 /404.php
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
;Bad Gateway" error. You might want to check that there is
absolutely no "man in the middle" between your client and your server.
> -Original Message-
> From: Patrick Proniewski [mailto:patrick.proniew...@univ-lyon2.fr]
> Sent: 25 May 2011 14:20
> To: user
ks.' This holds true even when I am logged in as a user other than
> root.
What do you see in access/error logs?
Do you use a proxy?
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
name when running with RLimit's
enabled. How is it possible that forking uname will go beyond "RLimitNPROC 10
50"?
Any idea is welcome.
Patrick PRONIEWSKI
--
Administrateur Système - DSI - Université Lumière Lyon 2
smime.p7s
Description: S/MIME cryptographic signature
21 matches
Mail list logo