apache listen 8080 by virtual hosting

Most Relevant Content

  • Port Based Apache Virtual Hosting on RHEL 7

    Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be Name Based, IP Based or Port Based. In Name Based Virtual Hosting, multiple domains can be hosted on single Server and single IP address. On the other hand, in IP Based Virtual Hosting, each domain is hosted on single server but on a dedicated IP address and in Port Based Virtual Hosting, multiple domains are hosted on different ports. In my previous article, I discussed how to configure Named Based and IP Based Apache Virtual Web Hosting on CentOS 7 Linux. In this article, I will discuss how to configure Port Based Apache Virtual Hosting on CentOS 7 Linux. Port Based Apache Virtual Hosting Configuration We are now going to start Port Based Virtual Hosting configuration with apache web server. It is assumed that you have already installed CentOS 7 Server on your physical or virtual machine. If you don’t have CentOS 7 Server installed, take [...]

    READ MORE »

  • You May Also Like

  • »

    6 Best VPN Providers to Consider in 2022 |   October 19, 2021

    There are many VPN providers on the market. It can be difficult to know which one is best for you, but luckily we have compiled a list of six of the best! Get ready for our top picks. What is a VPN? A VPN, or virtual private network, hides and encodes your internet traffic so that you can surf the web more securely. By doing so, it protects your data from hackers and prying eyes. Think of a VPN as [...]

    READ MORE »

  • »

    How to Recover MikroTik User Password |   August 9, 2018

    MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]

    READ MORE »

  • »

    Static Routing Configuration in MikroTik Router |   February 11, 2018

    Static Routing is an important topic to any network administrator who works with multiple MikroTik RouterOS and wants to establish communication among Router’s local networks. For example, say a network administrator maintains two MikroTik RouterOS connected with any communication medium and each RouterOS has its own networks and network resources such as servers, printers etc. and he wants that each network and network resources will be accessible from other networks. In this case, static routing configuration between two RouterOS will [...]

    READ MORE »

  • »

    MikroTik Block Website (Facebook, YouTube and Other Sites) |   October 12, 2017

    MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]

    READ MORE »

  • »

    CentOS 7.5 Installation Step by Step with GUI (GNOME Desktop) |   August 15, 2018

    Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with [...]

    READ MORE »

  • »

    Download YouTube Video with Firefox Add-ons |   August 26, 2015

    YouTube is the most popular video sharing website. Statistics shows that YouTube is the second popular website of the world. So, it is nothing to say that you are a YouTube fan like me. As a YouTube fan, sometimes you may need to download YouTube videos which you like. Although, you often get an extra bandwidth for YouTube video streaming from your ISP now a days so that you can watch your favorite YouTube video without any buffering. But it [...]

    READ MORE »

  • »

    How to Assign Static IP Address in Windows OS |   September 16, 2015

    Communication between one computer to another computer or server is established with IP addresses. Without IP address no communication is possible in computer network. An Internet Protocol (IP) Address is a numerical value or label assigned to each electronic device (e.g., computer, smartphone and printer) which uses Internet Protocol for communication. IP can be assigned both dynamically and statically on a IP devices. Dynamic IP is assigned by a DHCP server. If a DHCP server is present in a network, [...]

    READ MORE »

  • »

    How to Backup and Restore Mozilla Firefox Bookmarks |   August 13, 2015

    Bookmark is one of the most important and useful features in Mozilla Firefox Browser. If Bookmark is lost, Firefox users become very anxiety to recover it. But Mozilla Firefox also provides a tool to backup and restore Bookmarks so easily. So don’t need to be worried. If you know the proper steps about how to take a backup of your bookmark file and how to restore that bookmark backup file again, it will be very beneficial for you. So, this [...]

    READ MORE »

  • »

    Hardening MikroTik RouterOS by Limiting Login Services |   February 6, 2021

    MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]

    READ MORE »