Der beste Weg eine MySQL Datenbank auf einen neuen Server umzuziehen

Meiner Meinung nach der beste und schnellste Weg eine MySQL Datenbank von Server Alt auf Server Neu zu bekommen ist es, auf Server Alt folgendes Befehl zu starten:

mysqldump –add-drop-table –extended-insert –force –log-error=error.log -uUSER -pPASS OLD_DB_NAME | ssh -C user@newhost „mysql -uUSER -pPASS NEW_DB_NAME“

Das führt dazu, dass die Ausgabe von mysqldump direkt komprimiert und verschlüsselt per SSH auf den neuen Server geschickt wird und dort sofort von mysql verarbeitet wird. Ausgabe gibt es während der Ausführung leider keine…

Configuring Apache for maximum Performance

„Apache is an open-source HTTP server implementation. It is the most popular web server on the Internet. The December 2005 Web Server Survey conducted by Netcraft [1] shows that about 70% of the web sites on Internet are using Apache.
1. Apache server performance
Apache server performance can be improved by adding additional hardware resources such as RAM, faster CPU etc. But, most of the time, the same result can be achieved by custom configuration of the server. This article looks into getting maximum performance out of Apache with the existing hardware resources, specifically on the Linux systems. Of course, it is assumed that there is enough hardware resources, especially enough RAM that the server isn’t swapping frequently. First two sections look into various Compile-Time and Run-Time configuration options. Run-Time section assumes that Apache is compiled with prefork MPM. HTTP compression and caching is discussed next. Finally, using separate servers for serving static and dynamic contents are being discussed. Basic knowledge of compiling and configuring Apache, and Linux are assumed. „

Configuring Apache for maximum Performance

Configuring Apache for maximum Performance

Data Security Challenges in the Internet Age

„Data Security Challenges in the Internet Age
This chapter presents an overview of data security requirements in the Internet Age, and examines the full spectrum of data security risks that must be countered. It then provides a matrix relating security risks to the kinds of technology now available to protect your data.
– Top Security Myths
– The Many Dimensions of System Security
– Fundamental Data Security Requirements
– Security Requirements in the Internet Environment
– A World of Data Security Risks
– A Matrix of Security Risks and Solutions “ – Auszug aus der Oracle-Dokumentation der sich mit der Sicherheit beschäftigt und allgemeingültig ist.

Data Security Challenges in the Internet Age

Data Security Challenges in the Internet Age

Network File Copy using SSH

Ein paar Möglichkeiten Dateien über ssh auf einen anderen Rechner zu übetragen:
„tar cvf – . | gzip -c -1 | ssh user@host cat „>“ remotefile.gz

ssh target_address cat “ remotefile

ssh target_address cat “ remotefile

cat localfile | ssh target_address cat „>“ remotefile

cat localfile | ssh target_address cat – „>“ remotefile

dd if=localfile | ssh target_address dd of=remotefile

ssh target_address cat remotefile.tgz )“

( cd SOURCEDIR && tar cvf – . | gzip -1 -) | ssh target_address „(cd DESTDIR && cat – > remotefile.tgz )“

ssh target_address „( nc -l -p 9210 > remotefile & )“ && cat source-file | gzip -1 – | nc target_address 9210

cat localfile | gzip -1 – | ssh target_address cat „>“ remotefile.gz“

Network File Copy using SSH

Network File Copy using SSH