PERL MODULES What is Perl? Perl is a high-level programming language with an eclectic heritage written by Larry Wall and a cast of thousands. It derives from the ubiquitous C programming language and to a lesser extent from sed, awk, the Unix shell, and at least a dozen other tools and languages. Perls process, file, and text manipulation facilities make it particularly well-suited for tasks involving quick prototyping, system utilities, software tools, system management tasks, database access, graphical programming, networking, and world wide web programming. These strengths make it especially …
August 2009
PHP DSO DSO – Dynamically Shared Objects Apache with PHP can be installed in two different ways. Statically embed the PHP binary into the Apache binary. This is probably the fastest and best way to run PHP Install Apache and PHP is by using Apaches DSO module Why DSO? Apache supports adding modules on instead of embedding them in the httpd binary. This works well when you dont want to re-compile Apache each time a module is updated, or if you want to add on numerous modules for development purposes …
QMAIL Qmail is an MTA similar to Exim INSTALLATION Installation involves the following steps: 1.Installing Qmail itself 2.Installing EZmlm and EZmlm-idx 3.Installing Autoresponder 4.Installing Vpopmail 5.Installing maildrop 6.Uninstalling Sendmail 7.Starting up qmail
Installation Steps : preparing step : Edit or create a file /etc/yum.repos.d/dag.repo. Add lines below at the end of the file: [dag] name=Dag RPM Repository for Red Hat Enterprise Linux baseurl=http://apt.sw.be/redhat/el$releasever/en/$basearch/dag gpgcheck=1 enabled=1 Add line below at the end of the file /etc/ld.so.conf: /usr/local/lib
Mod_Security 2.5 Need for a Webserver Security Module It is pretty difficult to secure application softwares. Common targets are Open Source software like PHPNuke. An attacker can easily find out vulnerabilities in the code. If your application is vulnerable to SQL injection, invoking the URL above may very well delete all user data from your application. You can use mod_rewrite to avoid this attack. it is very easy to detect the words drop and table, and then redirect the client away from the original URL. A determined attacker could simply …