Click here for "Safe Air Conditioner Repair and Proper Freon Recovery".(Japanese Version)

nuy

Rocky Linux9.3_en

Rocky Linux9.3 ; WEB Server(Apache2) & Virtual Hosts

1.Apache2 Install , Virtual Host Configuration 1.1 Apache2 install ①httpd install # dnf -y install httpd 1.3 Virtual Host Settings Assign and configure the domain name [rocky.korodes.com] to the document root [/var/www/html/rocky.korodes.com] directory for virtual host operation 2. Use of CGI Scripts ①CGI availability check 3. PHP installation and configuration 1.PHP8 Install 4. Digest authentication with Apache2 Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted. On the other hand, Digest Authentication encrypts and transmits authentication informa
Rocky Linux9.3_en

Rocky Linux9.3 ; FTP Server , Samba File Server

1.FTP Server 1. 1 Vsftpd Install # dnf -y install vsftpd 1.2 Configure Vsftpd Save the unedited vsftpd.conf with .bak 3. File server installation with Samba Build a file server with access rights that requires user authentication with Samba. Installation Procedure ①Create shared folders with access rights that require user authentication ②Accessible group creation ③Creation of users belonging to accessible groups ④Configuration File Editing
Almalinux9.2_en

AlmaLinux9.2 ; Various settings after installation

1.Disabling SELinux First, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it places considerable restrictions on the behavior of services and on what can be configured. Therefore, it is basically disabled in many cases. SELinux Operation Mode Enforcing : SELinux functionality is enabled and access control is enabled Permissive : SElinux will warn, but no access restrictions will be placed disabled : Both SElinux function and access control are disabled
Rocky Linux9.3_en

Rocky Linux9.3 ; SSH、firewalld 、NTP Server

1.Remote connection via SSH SSH is a service for connecting remotely to a server and is basically running immediately after the OS is installed, but the default settings are somewhat insecure. Here we will configure the default settings to increase the security of ssh connections. 1.1 Edit SSH service configuration file Modify the configuration file to change the SSH service settings. The SSH service configuration file is "/etc/ssh/sshd_config". 2.Firewall (firewalld) settings The firewall is set to firewalld as default and is enabled during OS installation. 4.NTP Server Build an NTP server to synchronize the server time with Japan Standard Time
Rocky Linux9.3_en

Rocky Linux9.3 ; MySQL8 , WordPress Install

MySQL8 Install # dnf -y install mysql-server charset.cnf   Create a new one with the f WordPress Install 1. Create database for Word Press As an example, assume database [wp_db] database user [wp_user] password [?Ww123456]
Rocky Linux9.3_en

Rocky Linux9.3 ; Suricata , Tripwire , Chkrootkit

Suricata SURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic. The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection. 1.advance preparation ①Activate the EPEL Repository Tripwire 1.Installation # dnf install -y tripwire Chkrootkit ①Download and install chkrootkit
Rocky Linux9.3_en

Rocky Linux9.3 ; System Backup and Restore

1.Website data backup 1-1.Backup under /var/www/html ①Create backup script file # cd /var/www/system # vi backup_html.sh 2.MySQL database backup ①Create backup script file # cd /var/www/system # vi db_my_backup.sh 3.Restore backup files under html ①Store HTML backup files in "/ (root)" directory 4.Restore Mysql backup file ①Save the database backup file to any directory and (In the example, the directory is "/var/www/backup/db_bak".)Extracting data
Rocky Linux9.2_en

Rocky Linux9.2 ; MySQL8 , WordPress Install

MySQL8 Install charset.cnf Create a new one with the followi...
Rocky Linux9.2_en

Rocky Linux9.2 ; Anti-virus(Clamav) , Mail Server

clamav (anti-virus software] Install 1.Clam AntiVirus install # dnf -y install clamav clamd clamav-update 2.Clam AntiVirus  Configuration File Edit Mail Server Install 1. Postfix 1.1 Install Install Postfix and build an SMTP server
Rocky Linux9.2_en

Rocky Linux9.2 ; WEB Server(Apache2) & Virtual Hosts

1.Apache2 Install , Virtual Host Configuration 1.1 Apache2 install ①httpd install # dnf -y install httpd 1.3 Virtual Host Settings Assign and configure the domain name [rocky.korodes.com] to the document root [/var/www/html/rocky.korodes.com] directory for virtual host operation 2. Use of CGI Scripts ①CGI availability check 3. PHP installation and configuration 1.PHP8 Install 4. Digest authentication with Apache2 Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted. On the other hand, Digest Authentication encrypts and transmits authentication informa
Rocky Linux9.2_en

Rocky Linux9.2 ; SSH connection with public key

SSH connection with authentication using public key cryptography  Creation of public and private key pairs Create a public/private key pair for a user connecting to the Linux server using OpenSSH. Use ssh-keygen to create key pairs. Creation of public/private key pairs is performed with remote login user privileges。 If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
Rocky Linux9.2_en

Rocky Linux9.2 ; Various settings after installation

1.Disabling SELinux First, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it places considerable restrictions on the behavior of services and on what can be configured. Therefore, it is basically disabled in many cases. SELinux operating modes Enforcing : SELinux functionality is enabled and access control is enabled Permissive : SElinux will warn, but no access restrictions will be placed disabled : Both SElinux function and access control are disabled 2.System Modernization Package updates are performed as soon as possible immediately after OS installation. However, when a dnf update is performed, a kernel update is also performed at the same time. A kernel update may require rebooting the system or stopping services, or worse, a kernel panic may occur and the system may not boot. It is wiser to exclude the kernel from the update. The kernel can be excluded from updates by running dnf -y update with "--exclude=kernel*" after it.
Rocky Linux9.2_en

Rocky Linux9.2 ; SSH、firewalld 、NTP Server

1.Remote connection via SSH SSH is a service for connecting remotely to a server and is basically running immediately after the OS is installed, but the default settings are somewhat insecure. Here we will configure the default settings to increase the security of ssh connections. 1.1 Edit SSH service configuration file Modify the configuration file to change the SSH service settings. The SSH service configuration file is "/etc/ssh/sshd_config". 2.Firewall (firewalld) settings The firewall is set to firewalld as default and is enabled during OS installation. 4.NTP Server Build an NTP server to synchronize the server time with Japan Standard Time
FreeBSD13.3_en

FreeBSD13.3 ; OS INSTALL

FreeBSD FreeBSD is UNIX-like open source OS software. In particular, its performance as a network operating system exceeds that of Linux-based systems, and it maintains stable performance even under high loads. FreeBSD is designed to be robust and sturdy with an emphasis on practicality, making it suitable for operating FTP, WWW, and e-mail servers for major companies and services. In this project, we will install FreeBSD 13.3, released on March 5, 2024, and build the server. Features High-speed, high-performance multi-platform capable of withstanding high workloads Adopted by many major companies Network security measures can be applied by restricting access Capable of operating small to large servers More than 33,000 dedicated software applications from commercial to personal use
FreeBSD13.3_en

FreeBSD13.3 ; Initial setting (Update binaries, Packages and Ports Collection)

After installing FreeBSD, we will start building the server, but it is difficult to work on the console screen, so we will change the SSH connection settings for now in order to operate the server from Windows using TeraTerm or other software. Enter the following command on the FreeBSD console screen # vi /etc/ssh/sshd_config Line 61. #PasswordAuthentication no → PasswordAuthentication yes Make the changes and reflect the settings with the following command # service sshd restart Now you can connect via SSH from TeraTerm on Windows (see the default settings for other operating systems for settings in TeraTerm).