This article discusses how to use Apache web server as a proxy (reverse proxy) to a Tomcat server. Apache is often used as a proxy to Tomcat. This allows the server to host a website that needs a traditional site (html, php, etc) as well as some java served by
Read moreContact our friendly team to get started.
Mac Botnet you say?
The new well sort of new (The light bulb has only just come on for some users) Mac.BackDoor.iWorm backdoor appears to be causing some concern just lately, I have added a brief description of how it works below but if you want to know more I have linked some good
Read moreSee your YUM history
Yum has the ability to show you the yum activity of the past. For example, if you want to know when you (or someone) ran a YUM command on a given system, you can. To get an overview, issue the following command yum history You’ll get something like this: [[email protected]:
Read moreGit with OpenShift for SysAdmins
This article is a short overview of how to use Git for Linux system administrators particularly when using OpenShift. When you create your OpenShift application, OpenShift will present you with the Git location you must use for uploading and downloading the web-application code. Updates to the web application code in
Read moreRed Hat Enterprise Linux 7 – an overview of changes
Red Hat has provided a short PDF document describing the changes and new features in RHEL 7. There isn’t much that has changed in the way you’d administer a RHEL system except for a handful of components such as the new firewall (firewalld), network control and service control. I’d say
Read moreInstall security updates only with YUM
This article is a quick description of how to install security updates on a CentOS or Redhat system without installing other normal updates. First install the YUM Plugin: yum install yum-security You can optionally list the available security updates: yum list-security Now you can run the following to install security
Read moreUnderstanding the cloud in 3 minutes – a guide for Executives
The cloud is a nice name for the services offered via the Internet. For example, if i said i have built you an online shop and i am hosing it for you, you could say you have an online shop in the cloud. So services that make up the cloud
Read moreHow data in the cloud is secured and who has access to it
This article explains how data can be secured while stored in the cloud. I’m not comparing cloud providers but simply pointing out how data is encrypted and who ultimately has access to it. Big players such as Google Docs, DropBox and SkyDrive (OneDrive) all ensure the data is sent between
Read moreHow to structure DNS and NAT for Office Networks and Roaming Devices
This article discusses the design of a network that allows a device to roam between the office network and the outside (such as the home or coffee shop). We assume the roaming user will be accessing services on services that reside within the office network. There are other solutions such
Read more