![]() +Let's install PHP 7.0 with Apache2, and execute a shell script which does as required. Find out any relevant log lines and analyse them in detail. +**c)** Create a purposeful error in any code line which is executed by Apache web server (PHP or Python, for example). Apache logs each event when a client (web browser, for example) try to access a file or location in server. The logic is exactly same than required in this assignment. +In my answer I have analysed Apache web server log lines. ![]() +**NOTE!** My detailed answer to this assignment is in the previous exercise 2, section a) (successful & failed event + analysing them). Find out any hints of successful (200 ok) website load events and failed load events (for example, 404 not found). +**b)** Browse and explore the websites on your local host. +# Test the created site with the default graphical web browser as the current user (retrieved with whoami command + bash internal command substitution method) +# "Basically, the Apache server does not only require read permissions of all files it serves, but the execution permission of all directories in the path of your virtual host." ![]() +# Is the following procedure secure? However, something found in the internet: +# -e stands for "enable interpretation of backslash escapes" (meaning that you can use \t \n \r \s.symbols in echo command) +# > stands for writing the contents of the echo command into the file/output mentioned after this symbol. ![]() +# \ stands for a newline for multiline input in shell environment ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |