Posts

Showing posts from March, 2014

Increased the proxy timeout settings in nginx for a single domain.

Copied the proxy.inc to proxy1.inc and increased the timeout values  and buffer size limits proxy_connect_timeout 500s; proxy_send_timeout  2000; proxy_read_timeout  2000; proxy_buffer_size    128k; proxy_busy_buffers_size 128k; proxy_temp_file_write_size 128k; Included this proxy1.inc in the domains vhost file instead of proxy.inc.

Remove the line which contain some specific words in files

Use sed command, sed --in-place '/sara/d' file1 It removes the specific line which contain word sara.

Interview questions about OS arch

Segmentation fault: ---------------------- If you ever see a Unix message that says "Segmentation fault", "core dumped" or something similar, this is exactly what has happened; an attempt by the running program to access memory (core) outside its segment has raised a fatal interrupt. This indicates a bug in the program code; the core dump it leaves behind is diagnostic information intended to help a programmer track it down. Signal 11, or officially know as "segmentation fault", means that the program accessed a memory location that was not assigned. That's usually a bug in the program. What is 32-bit" or "64-bit" computers: --------------------------------------- Before we can go into this, you need to understand about the word size of your computer. The word size is the computer's preferred size for moving units of information around; technically it's the width of your processor's registers, which are the holding a

Unattended installation of Windows Server 2012

It is used for fast installation of windows servers.  You just need to mount an iso file. Refer: http://www.ragnarharper.com/2013/09/unattended-installation-of-windows-server-2012-r2.html

virtualization types

There are three ways to create virtual servers: full virtualization , para-virtualization and OS-level virtualization . They all share a few common traits. The physical server is called the host . The virtual servers are called guests . The virtual servers behave like physical machines. Each system uses a different approach to allocate physical server resources to virtual server needs. Full virtualization uses a special kind of software called a hypervisor . The hypervisor interacts directly with the physical server's CPU and disk space. It serves as a platform for the virtual servers' operating systems . The hypervisor keeps each virtual server completely independent and unaware of the other virtual servers running on the physical machine. Each guest server runs on its own OS -- you can even have one guest running on Linux and another on Windows. The hypervisor monitors the physical server's resources. As virtual servers run applications, the hypervisor rela

server hardening

http://www.tecmint.com/how-to-monitor-user-activity-with-psacct-or-acct-tools/ # Turn on execshield kernel.exec-shield=1 kernel.randomize_va_space=1 # Enable IP spoofing protection net.ipv4.conf.all.rp_filter=1 # Disable IP source routing net.ipv4.conf.all.accept_source_route=0 # Ignoring broadcasts request net.ipv4.icmp_echo_ignore_broadcasts=1 net.ipv4.icmp_ignore_bogus_error_messages=1 # Make sure spoofed packets get logged net.ipv4.conf.all.log_martians = 1