<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OracleLinux 8.8_en | Linux Server Construction</title>
	<atom:link href="https://korodes.com/en/category/oracle8-8_en/feed/" rel="self" type="application/rss+xml" />
	<link>https://korodes.com</link>
	<description></description>
	<lastBuildDate>Wed, 25 Mar 2026 04:51:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://korodes.com/wp-content/uploads/2020/01/cropped-profile-32x32.jpg</url>
	<title>OracleLinux 8.8_en | Linux Server Construction</title>
	<link>https://korodes.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>OracleLinux8.8 : WEB Server (Apache)</title>
		<link>https://korodes.com/en/oraclel8-8_en_06/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 01:38:29 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18655</guid>

					<description><![CDATA[1.Apache2 Install , Virtual Host Configuration

1.1 Apache2 install
2. Use of CGI Scripts

①CGI availability check
3. PHP installation and configuration
4. Digest authentication with Apache2

Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.
On the other hand, Digest Authentication encrypts and transmits authentication information, so there is almost no risk of information leakage.]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : OS Install</title>
		<link>https://korodes.com/en/oraclel8-8_en_01/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Thu, 17 Aug 2023 23:54:00 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18611</guid>

					<description><![CDATA[OracleLinux9.2

Oracle Linux provides a 100% application binary compatible alternative to Red Hat Enterprise Linux and CentOS Linux for both hybrid and multi-cloud environments.
Since 2006, Oracle Linux has been completely free to download and use. Source code, binaries and updates are provided free of charge. It is freely redistributable. Free for use in production environments.

今回は、最新のOracle Linux9.2(2023年5月リリース)で進めていきます。This time, we will proceed with the latest Oracle Linux 9.1.(May 2023 Release)

１．Oracle Linux9.2 Download

Oracle Linux 9.2 installation image (OracleLinux-R9-U2-x86_64-dvd.iso ) can be downloaded from the following site
https://www.oracle.com/linux/]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : Initial settings after OS installation</title>
		<link>https://korodes.com/en/oraclel8-8_en_02/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 00:04:56 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18620</guid>

					<description><![CDATA[1.Install bash completion extension package
# dnf -y install bash-completion
# reboot
2.Disabling SELinux

First, disable selinux.　selinux is a feature that improves auditing and security in Linux, but when enabled, it can limit the behavior of services and the contents of the configuration considerably.
Therefore, it is basically a case of invalidation in many cases.

SELinux operating modes
Enforcing : SELinux functionality is enabled and access control is enabled
Permissive : SElinux will warn, but no access restrictions will be placed
disabled : Both SElinux function and access control are disabled]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : SSH Remote connection , Firewalld , NTP Server</title>
		<link>https://korodes.com/en/oraclel8-8_en_03/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 00:25:03 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18633</guid>

					<description><![CDATA[1.Setting up a remote connection via SSH

SSH is a service for connecting remotely to a server and is basically running immediately after the OS is installed, but the default settings are somewhat insecure.
Here we will configure the default settings to increase the security of SSH connections.
2.Firewall (Firewalld) settings

In Oracle, the firewall is firewalld configured by default and enabled during OS installation.

To briefly explain "firewalld," when setting communication control policies, communication permission/blocking rules are applied to predefined zones, and these zones are then assigned to each NIC (network adapter).]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : SSH connection with SSH key pair</title>
		<link>https://korodes.com/en/oraclel8-8_en_04/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 00:33:27 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18643</guid>

					<description><![CDATA[SSH connection with authentication using public key 
Creation of public and private key pairs

Create a public/private key pair for a user connecting to the Linux server using OpenSSH.
Use ssh-keygen to create key pairs.
Creation of public/private key pairs is performed with remote login user privileges.
If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : FTP Server , Samba FileServer</title>
		<link>https://korodes.com/en/oraclel8-8_en_05/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 01:24:36 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18651</guid>

					<description><![CDATA[1.FTP Server
1.1vsftpd Install
# dnf -y install vsftpd
1.2vsftpd configuration
Save the unedited vsftpd.conf with .bak
# cp /etc/vsftpd/vsftpd.conf /home/huong/vsftpd.conf.bak
2. vsftpd SSL/TLS

Configure Vsftpd to use SSL/TLS

2.1 Create self-signed certificates

This work is not required if you are using a trusted, legitimate certificate such as Let's Encryp
3. File server installation with Samba
Build a file server with access rights that requires user authentication with Samba.
Installation Procedure
①Create shared folders with access rights that require user authentication
②Accessible group creation
③Creation of users belonging to accessible groups
④Configuration File Edit]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : Clamav(anti-virus)　, Mail Server</title>
		<link>https://korodes.com/en/oraclel8-8_en_07/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 02:02:35 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18667</guid>

					<description><![CDATA[Clamav(anti-virus)

1.Clam AntiVirus install

# dnf -y install clamav clamd clamav-update
Mail Server Installation
1. Postfix

1.1 Install
Install Postfix and build an SMTP server
Mail server : Postfix + Clamav + Amavisd+SpamAssassin
1.Real-time scanning of e-mails
①Install Amavisd and Clamav Server]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : SSL Certificate Acquisition( Let&#039;s Encrypt ) , WEB/Mail server SSL</title>
		<link>https://korodes.com/en/oraclel8-8_en_08/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 23:51:13 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18677</guid>

					<description><![CDATA[1.Obtain SSL Certificate ( Let's Encrypt )

Install the latest open ssl

# dnf install openssl-devel
1.1 Certificate Installation
# dnf -y install certbot
# certbot certonly --webroot -w /var/www/html/[FQDN] -d [FQDN]
# Registration of e-mail address and agreement to terms of use are required for the first time only.
# Specify an email address to receive
2. Converting Apache to https

Install the following

# dnf -y install mod_ssl
2.1 Edit ssl.conf file
3. SSL/TLS (Let's Encrypt) settings on the mail server
3.1 Obtaining a certificate for the mail server

Obtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : MySQL8 , WordPress Install</title>
		<link>https://korodes.com/en/oraclel8-8_en_09/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Sat, 19 Aug 2023 01:07:57 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18685</guid>

					<description><![CDATA[Mysql8 Install
＃ dnf -y install mysql-server

Create a new charset.cnf with the following contents
WordPress Install
1. Create database for Word Press

As an example, assume database [wp_db] database user [wp_user] password [?W123456]]]></description>
		
		
		
			</item>
		<item>
		<title>OracleLinux8.8 : SNORT3 , Tripwire , Chkrootkit</title>
		<link>https://korodes.com/en/oraclel8-8_en_10/</link>
		
		<dc:creator><![CDATA[nuy]]></dc:creator>
		<pubDate>Sat, 19 Aug 2023 02:34:36 +0000</pubDate>
				<category><![CDATA[OracleLinux 8.8_en]]></category>
		<guid isPermaLink="false">https://korodes.com/?p=18692</guid>

					<description><![CDATA[SNORT3 Install

Snort is an open source network intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks.

It can perform "protocol analysis," "content search," and "matching," and can be used to detect a variety of attacks, including "buffer overflows," "stealth port scans," "CGI attacks," "SMB probes," "OS fingerprinting attempts," "semantic URL attacks," and "server message block probes.]]></description>
		
		
		
			</item>
	</channel>
</rss>
