Port based virtual hosts on apache
Most Relevant Content
Port Based Apache Virtual Hosting on RHEL 7
Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be Name Based, IP Based or Port Based. In Name Based Virtual Hosting, multiple domains can be hosted on single Server and single IP address. On the other hand, in IP Based Virtual Hosting, each domain is hosted on single server but on a dedicated IP address and in Port Based Virtual Hosting, multiple domains are hosted on different ports. In my previous article, I discussed how to configure Named Based and IP Based Apache Virtual Web Hosting on CentOS 7 Linux. In this article, I will discuss how to configure Port Based Apache Virtual Hosting on CentOS 7 Linux. Port Based Apache Virtual Hosting Configuration We are now going to start Port Based Virtual Hosting configuration with apache web server. It is assumed that you have already installed CentOS 7 Server on your physical or virtual machine. If you don’t have CentOS 7 Server installed, take [...]
- »
Download YouTube Video with Firefox Add-ons | August 26, 2015
YouTube is the most popular video sharing website. Statistics shows that YouTube is the second popular website of the world. So, it is nothing to say that you are a YouTube fan like me. As a YouTube fan, sometimes you may need to download YouTube videos which you like. Although, you often get an extra bandwidth for YouTube video streaming from your ISP now a days so that you can watch your favorite YouTube video without any buffering. But it [...]
- »
MikroTik Hotspot Login by HTTP CHAP, HTTP PAP and HTTPS | July 25, 2020
MikroTik Hotspot uses various types of login methods. Among these login methods HTTP CHAP, HTTP PAP and HTTPS are basic and important login methods. So, a MikroTik system administrator should have proper understanding on Hotspot HTTP CHAP, HTTP PAP and HTTPS login methods. In my previous article I discussed how to configure MikroTik Hotspot using Winbox. In this article I will discuss how to use HTTP CHAP, HTTP PAP and HTTPS login methods properly in MikroTik Hotspot Server. MikroTik Hotspot [...]
- »
System Restore in Windows 10 | August 30, 2015
Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]
- »
MikroTik Router First Time Startup and Setup using WebFig | April 17, 2018
I guess, you have purchased a new MikroTik Router or installed a new MikroTik RouterOS on PC and you are searching How to Start MikroTik Router First Time and How to Complete Basic RouterOS Configuration using WebFig (Web Interface) for running a basic network. If these are your concern, don’t worry, in this article I will show how to startup your MikroTik Router first time and complete RouterOS basic configuration using WebFig web interface so easily. There are three methods [...]
- »
Ubuntu Server 20.04 Installation with LVM | May 28, 2021
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Ubuntu is one of the best stable Linux distributions. Ubuntu has both Desktop and Server distribution. Ubuntu Server is a high performance and stable enterprise Linux distribution and it can be easily used in production. Ubuntu Server has both community-support and well documentation. So, IT guys can use Ubuntu [...]
- »
MikroTik Site to Site VPN Configuration with IPsec | March 8, 2018
VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. Site to Site VPN technique establishes a secure tunnel between two routers across public network and local networks of these routers can send and receive data through this VPN tunnel. MikroTik RouterOS [...]
- »
How to Mount USB Device in CentOS 7 (NTFS and Linux FS) | February 18, 2019
USB Hard Disk Drive or USB Flash Drive (Pen drive) is a popular external device that can be used to backup data or transfer data from one device to other device. In GUI (Graphical User Interface) Operating System such as Window or GNOME Desktop in Linux can automatically mount USB device and can show data in it if the File System of that device is supported. But all users do not like or always do not have GUI mode of [...]
- »
MikroTik WiFi Frequency Band and Channel Width Explanation | January 10, 2020
MikroTik WiFi frequency, band and channel width tuning is an important task in any wireless network. If we fail to setup WiFi frequency and channel width parameter properly, we will notice a poor performance of wireless network. WiFi is aimed at use within unlicensed spectrum and the unlicensed spectrum that is usually used for WiFi is 2.4 GHz and 5 GHz band. 2.4 GHz and 5 GHz bands have multiple channels and these channels must be setup properly to get [...]
- »
How to Block WiFi Access although Password is Known | April 23, 2024
We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]
You May Also Like