Ok, so this should be an interesting one.I'm trying to run php-5.2.12 on a RHEL 5.4 server with php-5.1.6 installed on it. I have to continue running php-5.1.6 on everything except... [by guapo42]
on 02/16/2010 – Made popular on 02/16/2010
I have installed git on Red Hat Enterprise 6 with AD group control and SSL Cert .
Everything works fine if I do setenforce 0 ( set SELinux in detection only mode ) or
if I do semanage permissive -a httpd_t (Set httpd_t in detection only mode)
I do not want to use this on my git production server.
I am learning SELinux from LinuxCBT and I'm stuck at one place. Now video is on RHEL 4 (so tell me if things has changed since, cause I can't find anything related) shows how to disable SELinux security on httpd. It's following way
I have a Linux server that I should consider many security points because Security is the most important point for my server. After searching a lot, I found that SELinux, AppArmor and GreSecurity patches. In addition, many articles recommend SElinux for final decision.
I recently encountered an issue where I had installed 32 bit RHEL 6 server on a 64 bit hardware. I did some research and found that RHEL 6.0 has PAE enabled in 32 bit machines that allows the user to use upto 64 GB RAM in a 32 bit OS.
However, RHEL 6 server 32 bit with PAE still has the limitation that a single process at any time could use the maximum address space only upto only 4 GB.
I recently encountered an issue where I had installed a 32-bit RHEL 6 server on a system with a 64-bit processor. I did some research and found that RHEL 6.0 has PAE enabled on 32-bit machines, which allows the user to use up to 64 GB of RAM in a 32-bit OS.
However, RHEL 6 server 32-bit with PAE still has the limitation that a single process can only have a maximum address space of up to 4 GB.