Make a backup of the existing SSL key and certificate file Create the new SSL certificate for two years: Restart Dovecot and Postfix Check the start and end dates for the certificate: Related posts: How to Redirect HTTP to HTTPS in Nginx Use NGINX as a Reverse Proxy IP based
DevOps is a set of practices that automates the processes between software development and IT teams, in order that they can build, test, and release software faster and more reliably. The concept of DevOps is founded on building a culture of collaboration between teams that historically functioned in relative siloes.
1. Definition from Wikipedia: DevOps (a clipped compound of “development” and “operations”) is a set of software development practices[failed verification] that combines software development (Dev) with information technology operations (Ops) to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives.
When you run MySQL commands MySQL, mysqlcheck, mysqdump and psql, psqldump, etc; they will pick username & password from this file if you do not provide them as argument (-u and -p). It can save you time. Of course, if you specify username and password explicitly as part of the
This article explains the most commonly used Email protocols on the internet – POP3, IMAP, and SMTP SMTP 25, 2525 SMTP-SSL/TLS 587,465 IMAP 143 IMAP-SSL/TLS 993 POP3 110 POP3-SSL/TLS 995 587 vs. 465These port assignments are specified by the Internet Assigned Numbers Authority (IANA): Port 587: [SMTP] Message submission (SMTP-MSA),
git-install-latest-from-src.sh Related posts: How to set up Reverse Proxy in Apache/httpd linux swap memory limits – reference guide How to install, configure, create user and database with permissions – PostgreSQL How to install, configure, create user and database with permissions – MySQL
Uncomment the required php version. Related posts: How to Redirect HTTP to HTTPS in Nginx How to Redirect www URL to non-www and non-www URL to www with Nginx IP based restriction using Nginx Restricting Access with HTTP Basic Authentication in Apache and Nginx
When you run MySQL commands MySQL, mysqlcheck, mysqdump and psql, psqldump etc; they will pick username & password from this file if you do not provide them as argument (-u and -p). It can save you time. Of course, if you specify username and password explicitly as part of the
fail2Ban is a very handy tool to prevent a lot of unwanted traffic from consuming bandwidth on your servers. It’s a very small and relatively simple IDS Type Tool that comes with some predefined Filters to automatically lockout potentially dangerous or bandwidth-consuming type attacks. Creating a Custom Filter /etc/fail2ban/filter.d/custom.conf Testing
Logrotate is a system utility that manages the automatic rotation and compression of log files. If log files were not rotated, compressed, and periodically pruned, they could eventually consume all available disk space on a system. Logrotate’s configuration information can generally be found in two places: /etc/logrotate.conf: this file contains