Achieving security for a LAMP, or Linux Apache MySQL and Perl/PHP, web server is now possible with the use of Cent OS, which is currently on its fifth installment or version. For users with a background working on ISP, this guide will be able to help you as it is mainly structured using the same configurations that a lot of web hosting service providers use. It will be able to support virtual hosts or those with multiple websites, secure FTP access, locked down SSH access and a logical directory system.
By following the guidelines below, you will be able to get a secure web server operating after a few hours, longer if you decide to experiment on the steps first. If you are not too familiar with Linux and does not have the right background, this guideline will be a great way to learn a little something about the subject matter.At present, there are a myriad of notable developments that has arisen over the course of time concerning individuals hosting websites in their residential ISP broadband connection. First, do you know that many of the major search engines will not work on your website if it is hosted on a home-based IP address. Home-based IP address offered by ADSL or broadband service provider, such as Virgin Media, BT and PlusNet. Though running your own web servers at home is indeed fun, it is still ideal to avoid it unless you intend on doing it for testing. So where can you find the best place to host your new Cent OS web server? It is ideal to obtain a VPS or virtual private server. There are multiple web hosting companies that provide services for VPS, and it seems that the rates and prices of these particular service niche is getting cheaper thus it becomes a more ideal option.
Now to get started-intro
- First, enter the installation CD and boot the server.
- Press enter for the graphical installation wizard at the installation menu. When prompted for an installation type, choose custom installation.
- Use automatic partitioning for the disks.
- Remove all the partitions from the system. Before you do this, make sure that you’ve already backed up all the important files and data as the process will pretty much wipe out all the existing data.
- When you are directed to the Boot Loader section, leave the settings in default. For the network configuration, set it with an internal IP address and DNS name.
- For your firewall settings, choose the No Firewall option as this will be installed and set up afterwards.
- Authenticate the installation by providing and setting a secure root password by means of random characters and numbers provided. For package selection, select minimal configuration.