Apache Cookbook and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Start reading Apache Cookbook on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Apache Cookbook [Paperback]

Ken Coar , Rich Bowen
4.4 out of 5 stars  See all reviews (7 customer reviews)

Available from these sellers.


‹  Return to Product Overview

Table of Contents

Preface; What's in This Book; Platform Notes; Other Books; Other Sources; How This Book Is Organized; Conventions Used in This Book; We'd Like to Hear from You; Acknowledgments; Chapter 1: Installation; 1.1 Installing from Red Hat Linux's Packages; 1.2 Installing Apache on Windows; 1.3 Downloading the Apache Sources; 1.4 Building Apache from the Sources; 1.5 Installing with ApacheToolbox; 1.6 Starting, Stopping, and Restarting Apache; 1.7 Uninstalling Apache; Chapter 2: Adding Common Modules; 2.1 Installing a Generic Third-Party Module; 2.2 Installing mod_dav on a Unixish System; 2.3 Installing mod_dav on Windows; 2.4 Installing mod_perl on a Unixish System; 2.5 Installing mod_php on a Unixish System; 2.6 Installing mod_php on Windows; 2.7 Installing the mod_snake Python Module; 2.8 Installing mod_ssl; Chapter 3: Logging; 3.1 Getting More Details in Your Log Entries; 3.2 Getting More Detailed Errors; 3.3 Logging POST Contents; 3.4 Logging a Proxied Client's IP Address; 3.5 Logging Client MAC Addresses; 3.6 Logging Cookies; 3.7 Not Logging Image Requests from Local Pages; 3.8 Logging Requests by Day or Hour; 3.9 Rotating Logs on the First of the Month; 3.10 Logging Hostnames Instead of IP Addresses; 3.11 Maintaining Separate Logs for Each Virtual Host; 3.12 Logging Proxy Requests; 3.13 Logging Errors for Virtual Hosts to Multiple Files; 3.14 Logging Server IP Addresses; 3.15 Logging the Referring Page; 3.16 Logging the Name of the Browser Software; 3.17 Logging Arbitrary Request Header Fields; 3.18 Logging Arbitrary Response Header Fields; 3.19 Logging Activity to a MySQL Database; 3.20 Logging to syslog; 3.21 Logging User Directories; Chapter 4: Virtual Hosts; 4.1 Setting Up Name-Based Virtual Hosts; 4.2 Designating One Name-Based Virtual Host as the Default; 4.3 Setting Up Address-Based Virtual Hosts; 4.4 Creating a Default Address-Based Virtual Host; 4.5 Mixing Address-Based and Name-Based Virtual Hosts; 4.6 Mass Virtual Hosting with mod_vhost_alias; 4.7 Mass Virtual Hosting Using Rewrite Rules; 4.8 SSL and Name-Based Virtual Hosts; 4.9 Logging for Each Virtual Host; 4.10 Splitting Up a LogFile; 4.11 Port-Based Virtual Hosts; 4.12 Displaying the Same Content on Several Addresses; Chapter 5: Aliases, Redirecting, and Rewriting; 5.1 Showing Highlighted PHP Source Without Symlinking; 5.2 Mapping a URL to a Directory; 5.3 Creating a New URL for Existing Content; 5.4 Giving Users Their Own URL; 5.5 Aliasing Several URLs with a Single Directive; 5.6 Mapping Several URLs to the Same CGI Directory; 5.7 Creating a CGI Directory for Each User; 5.8 Redirecting to Another Location; 5.9 Redirecting Several URLs to the Same Destination; 5.10 Permitting Case-Insensitive URLs; 5.11 Replacing Text in Requested URLs; 5.12 Rewriting Path Information to CGI Arguments; 5.13 Denying Access to Unreferred Requests; 5.14 Rewriting Based on the Query String; 5.15 Redirecting All—or Part—of Your Server to SSL; 5.16 Turning Directories into Hostnames; 5.17 Redirecting All Requests to a Single Host; 5.18 Turning Document Names into Arguments; Chapter 6: Security; 6.1 Using System Account Information for Web Authentication; 6.2 Setting Up Single-Use Passwords; 6.3 Expiring Passwords; 6.4 Limiting Upload Size; 6.5 Restricting Images from Being Used Off-Site; 6.6 Requiring Both Weak and Strong Authentication; 6.7 Managing .htpasswd Files; 6.8 Making Password Files for Digest Authentication; 6.9 Relaxing Security in a Subdirectory; 6.10 Lifting Restrictions Selectively; 6.11 Authorizing Using File Ownership; 6.12 Storing User Credentials in a MySQL Database; 6.13 Accessing the Authenticated Username; 6.14 Obtaining the Password Used to Authenticate; 6.15 Preventing Brute-Force Password Attacks; 6.16 Using Digest Versus Basic Authentication; 6.17 Accessing Credentials Embedded in URLs; 6.18 Securing WebDAV; 6.19 Enabling WebDAV Without Making Files Writable by the Web User; 6.20 Restricting Proxy Access to Certain URLs; 6.21 Protecting Files with a Wrapper; 6.22 Protecting All Files Except a Subset; 6.23 Protecting Server Files from Malicious Scripts; 6.24 Setting Correct File Permissions; 6.25 Running a Minimal Module Set; 6.26 Restricting Access to Files Outside Your Web Root; 6.27 Limiting Methods by User; 6.28 Restricting Range Requests; Chapter 7: SSL; 7.1 Installing SSL; 7.2 Generating SSL Certificates; 7.3 Generating a Trusted CA; 7.4 Serving a Portion of Your Site via SSL; 7.5 Authenticating with Client Certificates; Chapter 8: Dynamic Content; 8.1 Enabling a CGI Directory; 8.2 Enabling CGI Scripts in Non-ScriptAliased Directories; 8.3 Using Windows File Extensionsto Launch CGI Programs; 8.4 Using Extensions to Identify CGI Scripts; 8.5 Testing That CGI Is Set Up Correctly; 8.6 Reading Form Parameters; 8.7 Invoking a CGI Program for Certain Content Types; 8.8 Getting SSIs to Work; 8.9 Displaying Last Modified Date; 8.10 Including a Standard Header; 8.11 Including the Output of a CGI Program; 8.12 Running CGI Scripts as a Different User with suexec; 8.13 Installing a mod_perl Handler from CPAN; 8.14 Writing a mod_perl Handler; 8.15 Enabling PHP Script Handling; 8.16 Verifying PHP Installation; Chapter 9: Error Handling; 9.1 Handling a Missing Host Field; 9.2 Changing the Response Status for CGI Scripts; 9.3 Customized Error Messages; 9.4 Providing Error Documents in Multiple Languages; 9.5 Redirecting Invalid URLs to Some Other Page; 9.6 Making Internet Explorer Display Your Error Page; 9.7 Notification on Error Conditions; Chapter 10: Proxies; 10.1 Securing Your Proxy Server; 10.2 Preventing Your Proxy Server from Being Used as an Open Mail Relay; 10.3 Forwarding Requests to Another Server; 10.4 Blocking Proxied Requests to Certain Places; 10.5 Proxying mod_perl Content to Another Server; 10.6 Configuring a Caching Proxy Server; 10.7 Filtering Proxied Content; 10.8 Requiring Authentication for a Proxied Server; Chapter 11: Performance; 11.1 Determining How Much Memory You Need; 11.2 Benchmarking Apache with ab; 11.3 Tuning Keepalive Settings; 11.4 Getting a Snapshot of Your Site's Activity; 11.5 Avoiding DNS Lookups; 11.6 Optimizing Symbolic Links; 11.7 Minimizing the Performance Impact of .htaccess Files; 11.8 Disabling Content Negotiation; 11.9 Optimizing Process Creation; 11.10 Tuning Thread Creation; 11.11 Caching Frequently Viewed Files; 11.12 Sharing Load Between Servers Using mod_proxy; 11.13 Distributing Load Evenly Between Several Servers; 11.14 Caching Directory Listings; 11.15 Speeding Up Perl CGI Programs with mod_perl; Chapter 12: Miscellaneous Topics; 12.1 Placing Directives Properly; 12.2 Renaming .htaccess Files; 12.3 Generating Directory/Folder Listings; 12.4 Solving the "Trailing Slash" Problem; 12.5 Setting the Content-Type According to Browser Capability; 12.6 Handling Missing Host: Header Fields; 12.7 Alternate Default Document; 12.8 Setting Up a Default "Favicon"; Appendix A: Using Regular Expressions in Apache; A.1 What Directives Use Regular Expressions?; Appendix B: Troubleshooting; B.1 Troubleshooting Methodology; B.2 Debugging the Configuration; B.3 Debugging Premature End of Script Headers; B.4 Common Problems on Windows; B.5 Fixing Build-Time Error Messages; B.6 Getting Server-Side Includes to Work; B.7 Debugging Rewrites That Result in "Not Found" Errors; B.8 .htaccess Files Having No Effect; B.9 Address Already in Use; Colophon;

‹  Return to Product Overview