SlideShare une entreprise Scribd logo
1  sur  24
Web Server(Apache), Proxy Server(Squid) & Server Logs   By Sanjay Kumar Malik Lecturer University School of IT GGS Indraprastha University Kashmere Gate, Delhi -110403
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Webserver & it’s types  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Apache Web Server ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Requirement for Hosting WebServer(WebSite). ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Webserver works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.yahoo.com ISP Domain Proxy server www.yahoo.com Note:-For Home users, request will go directly to ISP since home users don’t use proxy servers .
Web Server Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Proxy Server,Advantages & Types(Squid & Others) ,[object Object],[object Object],[object Object],[object Object],[object Object],Clients Proxy Server WAN Link LAN Cables
Networking Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Switches 1. A Network device. Provides connectivity to all machines. Basically a centralize device with intelligence to forward data. Generally , superior than hubs. It maintains a table by which it takes decision to forward data. It has speed of upto 1000 mbps. It comes with 8port,16port,24port,48port,72port and so on) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linux Introduction & features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A few Linux commands   Commands Description touch create new file mkdir create new dir. vi  to edit file. cd  change dir. cp  copy file/dir. mv  move file/dir rm  remove file. rmdir  remove dir. date  view date. cal  view calendar. bc  view calculator. Init -0 shutdown the machine.
Server Logs ,[object Object],[object Object],[object Object],[object Object],[object Object],  Squid logs 1209105932.207  3  172.16.78.42  TCP_IMS_HIT/304 303 GET  http://www.ncbi.nlm.nih.gov/blast/js/utils.js  - NONE/- application/x-javascript 1209105931.658  7  172.16.1.148  TCP_MEM_HIT/200 1212 GET  http://www.relbio.com/images/careers_hover.jpg  - NONE/- image/jpeg1208855587.146  5561  172.16.16.12  TCP_MISS/302 553 GET  http://mail.yahoo.com / - DIRECT/202.86.7.110 text/html1208855687.590  712 172.16.1.1 TCP_MISS/302 572 GET http://orkut.com/ -  DIRECT/72.14.209.85 text/html Apache Logs(mail.ipu.edu) 202.159.218.122  - - [22/Apr/2008:09:47:21 +0530] "GET /webmail/src/style.php?themeid=default_theme&templateid=default HTTP/1.1" 200 5627 " http://mail.ipu.edu/webmail/src/login.php " "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14" 59.90.72.161  - - [22/Apr/2008:09:12:14 +0530] "GET /webmail/src/style.php?themeid=default_theme&templateid=default HTTP/1.1" 200 5627 " http://mail.ipu.edu/webmail/src/login.php " "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;  Embedded Web Browser from: http://bsalsa.com/)" 202.159.218.122  - - [22/Apr/2008:09:47:21 +0530] "GET /webmail/src/login.php HTTP/1.1" 200 2363  "http://mail.ipu.edu /" "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14"
Network Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Securing Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anti-X ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A few NetworkingTools ,[object Object],[object Object],[object Object],[object Object],OPManager - OPManager is a network monitoring software that can automatically discover our network, group your  devices into intuitive maps, monitor devices in real-time and alert instantaneously on failure.     http://manageengine.adventnet.com/products/opmanager/   IPAudit   IPAudit can be used to monitor network activity for a variety of purposes. It has proved useful for    monitoring intrusion detection, bandwith consumption and denial of service attacks.  .   For more informations   visit:http://ipaudit.sourceforge.net/ Ethereal (Packet sniffer ) http://www.ethereal.com WireShark (packet sniffer)  http://www.wireshark.org NMAP (port scanner)  http://nmap.org MRTG  ( Multi-route traffic generator)  http://www.mrtg.com Spamassassin (Mail Filter)  http://www.spamassassin.apache.org VNC (Remote desktop)  http://www.realvnc.com
Malicious Software Is a software that is intentionally included or inserted in a system for a harmful purpose. Virus :-Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  Effects of Virus :- 1.A virus might corrupt or delete data on your computer. 2.Due to virus drives are not opened. 3.Slows down the speed of the system. 4.Taskmanager is Disabled.
Threats other than virus ,[object Object],[object Object],[object Object]
Antivirus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to use antivirus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Symantec Antivirus Corporate Edition ,[object Object],[object Object],[object Object],[object Object],[object Object]
Management of Symantec Antivirus in Indraprastha University   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GGSIPU Website Updating through VPN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Mcse notes
Mcse notesMcse notes
Mcse notes
vrammn
 
Mikrotik
MikrotikMikrotik
Mikrotik
hzcom
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Shu Shin
 

Tendances (18)

Configuring asa site to-site vp ns
Configuring asa site to-site vp nsConfiguring asa site to-site vp ns
Configuring asa site to-site vp ns
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
802.1x
802.1x802.1x
802.1x
 
Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
Implementing transparent proxy server with acl
Implementing transparent proxy server with aclImplementing transparent proxy server with acl
Implementing transparent proxy server with acl
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentation
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Net prog
Net progNet prog
Net prog
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
 
Mikrotik basic configuration
Mikrotik basic configurationMikrotik basic configuration
Mikrotik basic configuration
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 

En vedette (8)

websecure.ppt
websecure.pptwebsecure.ppt
websecure.ppt
 
CAHs Using Health Information Technology
CAHs Using Health Information TechnologyCAHs Using Health Information Technology
CAHs Using Health Information Technology
 
Application Note APLX-LMW-0403: Interfacing the Apache Web ...
Application Note APLX-LMW-0403: Interfacing the Apache Web ...Application Note APLX-LMW-0403: Interfacing the Apache Web ...
Application Note APLX-LMW-0403: Interfacing the Apache Web ...
 
Detecting Typo-squatting Domains Mishari Almishari
Detecting Typo-squatting Domains Mishari AlmishariDetecting Typo-squatting Domains Mishari Almishari
Detecting Typo-squatting Domains Mishari Almishari
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Super Committee To The Rescue
Super Committee To The RescueSuper Committee To The Rescue
Super Committee To The Rescue
 
Web Packages...Internet Marketing....Hosting
Web Packages...Internet Marketing....Hosting Web Packages...Internet Marketing....Hosting
Web Packages...Internet Marketing....Hosting
 
cPanel User Manual
cPanel User ManualcPanel User Manual
cPanel User Manual
 

Similaire à Web Server(Apache),

Web Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris UriarteWeb Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris Uriarte
webhostingguy
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
aisadhsa
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Web Servers, Browsers, Server - Browser Interaction, Web Surfing
Web Servers, Browsers, Server - Browser Interaction, Web SurfingWeb Servers, Browsers, Server - Browser Interaction, Web Surfing
Web Servers, Browsers, Server - Browser Interaction, Web Surfing
webhostingguy
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
Vikram g b
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
webhostingguy
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
Austina Francis
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 

Similaire à Web Server(Apache), (20)

Web Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris UriarteWeb Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris Uriarte
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Web application development ( basics )
Web application development ( basics )Web application development ( basics )
Web application development ( basics )
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
 
Web Servers, Browsers, Server - Browser Interaction, Web Surfing
Web Servers, Browsers, Server - Browser Interaction, Web SurfingWeb Servers, Browsers, Server - Browser Interaction, Web Surfing
Web Servers, Browsers, Server - Browser Interaction, Web Surfing
 
Web server
Web serverWeb server
Web server
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
Apache Web Server Setup 1
Apache Web Server Setup 1Apache Web Server Setup 1
Apache Web Server Setup 1
 
Chapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).pptChapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).ppt
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
Java Networking
Java NetworkingJava Networking
Java Networking
 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 

Plus de webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
webhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
webhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
webhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
webhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
webhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
webhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
webhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
webhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
webhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
webhostingguy
 

Plus de webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

Web Server(Apache),

  • 1. Web Server(Apache), Proxy Server(Squid) & Server Logs By Sanjay Kumar Malik Lecturer University School of IT GGS Indraprastha University Kashmere Gate, Delhi -110403
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. A few Linux commands Commands Description touch create new file mkdir create new dir. vi to edit file. cd change dir. cp copy file/dir. mv move file/dir rm remove file. rmdir remove dir. date view date. cal view calendar. bc view calculator. Init -0 shutdown the machine.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Malicious Software Is a software that is intentionally included or inserted in a system for a harmful purpose. Virus :-Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Effects of Virus :- 1.A virus might corrupt or delete data on your computer. 2.Due to virus drives are not opened. 3.Slows down the speed of the system. 4.Taskmanager is Disabled.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.