Setup SSL with Apache

SSL is a technique based on public/private key cryptography. It runs on port 443 accessed via https://servername

# Certificates

1. Generate a Private Key & CSR (Certificate Signing Request)

Recovering MySQL root Password

You can recover MySQL database server password with following steps:

Basic things to do when performing MySQL Server Installation

Things to configure to setup basic MySQL Server

How to enable quota on Postfix Virtual & Local Mailboxes

1. To enable mailbox quotas throughout postfix configuration, we need to configure main.cf file of postfix.

Applying Quota on Users & Groups

1. Create a partition on the hard disk

Steps to create a partition:

Postfix Masquerading or changing outgoing address

Address rewriting allows changing outgoing email ID or domain name itself. This is good for hiding internal user names. For example:

VsFTP Server Configuration

  • Install the RPM vsftpd
  • The config file is:

Dual Master Replication With MySQL 5

This document describes how to set up master-master replication with MySQL 5 on Fedora 8. Since version 5, MySQL comes with built-in support for master-master replication, solving the problem that can happen with self-generated keys. In former MySQL versions, the problem with master-master replication was that conflicts arose immediately if node A and node B both inserted an auto-incrementing key on the same table. The advantages of master-master replication over the traditional master-slave replication are that you don’t have to modify your applications to make write accesses only to the master, and that it is easier to provide high-availability because if the master fails, you still have the other master.
This HowTo is a practical guide without any warranty – it doesn’t cover the theoretical backgrounds. There are many ways to set up such a system – this is the way I chose.

Creating bootable USB disk for RHEL

The following steps configure a USB pen drive as a boot medium to start the installation of Red Hat Enterprise Linux.

SSH Login without password

This scenario explains the login from client machine to server