<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Linux Archives - 益沃斯</title>
	<atom:link href="https://evoxt.com/zh/category/linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://evoxt.com/zh/category/linux/</link>
	<description></description>
	<lastBuildDate>Wed, 05 Jan 2022 10:34:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://evoxt.com/zh/wp-content/uploads/sites/2/2023/04/cropped-android-chrome-512x512-1-32x32.png</url>
	<title>Linux Archives - 益沃斯</title>
	<link>https://evoxt.com/zh/category/linux/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enable automatic updates in Linux</title>
		<link>https://evoxt.com/zh/2022/01/05/enable-automatic-updates-in-linux/</link>
		
		<dc:creator><![CDATA[Evoxt]]></dc:creator>
		<pubDate>Wed, 05 Jan 2022 10:34:25 +0000</pubDate>
				<category><![CDATA[Guides]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://evoxt.com/?p=4386</guid>

					<description><![CDATA[<p>It is almost impossible to log in to your server to check and update it every day. However, failing to keep servers up to date can be a potential threat. There is a better solution to this, automatic updates. Here is how to enable automatic updates in Linux: Ubuntu/ Debian based servers Install unattended-upgrades apt ... <a title="Enable automatic updates in Linux" class="read-more" href="https://evoxt.com/zh/2022/01/05/enable-automatic-updates-in-linux/" aria-label="More on Enable automatic updates in Linux">Read more</a></p>
<p>The post <a href="https://evoxt.com/zh/2022/01/05/enable-automatic-updates-in-linux/">Enable automatic updates in Linux</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></description>
										<content:encoded><![CDATA[It is almost impossible to log in to your server to check and update it every day. However, failing to keep servers up to date can be a potential threat.<br /><br /> There is a better solution to this, automatic updates. Here is how to enable automatic updates in Linux:<br /><br />

<h3>Ubuntu/ Debian based servers</h3>

Install unattended-upgrades<br />
<div class="code">apt install unattended-upgrades</div><br />

Edit the unattended upgrade configuration<br />
<div class="code">vi /etc/apt/apt.conf.d/50unattended-upgrades</div><br />

<div class="cli">
// Automatically upgrade packages from these (origin:archive) pairs<br />
//<br />
// Note that in Ubuntu security updates may pull in new dependencies<br />
// from non-security sources (e.g. chromium). By allowing the release<br />
// pocket these get automatically pulled in.<br />
Unattended-Upgrade::Allowed-Origins {<br />
        &quot;${distro_id}:${distro_codename}&quot;;<br />
        //&quot;${distro_id}:${distro_codename}-security&quot;;<br />
        // Extended Security Maintenance; doesn&#039;t necessarily exist for<br />
        // every release and this system may not have it installed, but if<br />
        // available, the policy for updates is such that unattended-upgrades<br />
        // should also install from here by default.<br />
        &quot;${distro_id}ESMApps:${distro_codename}-apps-security&quot;;<br />
        &quot;${distro_id}ESM:${distro_codename}-infra-security&quot;;<br />
//      &quot;${distro_id}:${distro_codename}-updates&quot;;<br />
//      &quot;${distro_id}:${distro_codename}-proposed&quot;;<br />
//      &quot;${distro_id}:${distro_codename}-backports&quot;;<br />
};<br />
</div><br />

In this case we will enable the security updates only to avoid potentially messing up the running programs.<br />
To enable security updates, remove the comment on this line "${distro_id}:${distro_codename}-security";<br /><br />

<div class="cli">
// Automatically upgrade packages from these (origin:archive) pairs<br />
//<br />
// Note that in Ubuntu security updates may pull in new dependencies<br />
// from non-security sources (e.g. chromium). By allowing the release<br />
// pocket these get automatically pulled in.<br />
Unattended-Upgrade::Allowed-Origins {<br />
        <p style="color:orange;margin-bottom:0">//&quot;${distro_id}:${distro_codename}&quot;;</p>
        <p style="color:orange;margin-bottom:0">&quot;${distro_id}:${distro_codename}-security&quot;;</p>
        // Extended Security Maintenance; doesn&#039;t necessarily exist for<br />
        // every release and this system may not have it installed, but if<br />
        // available, the policy for updates is such that unattended-upgrades<br />
        // should also install from here by default.<br />
        &quot;${distro_id}ESMApps:${distro_codename}-apps-security&quot;;<br />
        &quot;${distro_id}ESM:${distro_codename}-infra-security&quot;;<br />
//      &quot;${distro_id}:${distro_codename}-updates&quot;;<br />
//      &quot;${distro_id}:${distro_codename}-proposed&quot;;<br />
//      &quot;${distro_id}:${distro_codename}-backports&quot;;<br />
};<br />
</div><br />

After this, we will have to enable automatic upgrade. Use this command to enable automatic upgrade.<br />

<div class="code">
echo &#039;APT::Periodic::Update-Package-Lists &quot;1&quot;;<br />
APT::Periodic::Download-Upgradeable-Packages &quot;1&quot;;<br />
APT::Periodic::AutocleanInterval &quot;3&quot;;<br />
APT::Periodic::Unattended-Upgrade &quot;1&quot;;&#039; &gt; /etc/apt/apt.conf.d/20auto-upgrades<br />
</div><br /><br />

<h3>CentOS/ Fedora based servers</h3>

Install dnf-automatic<br />
<div class="code">dnf install dnf-automatic</div><br />

We will have to make changes to the configuration files before enabling automatic update. Go to the configuration file by using this command<br />
<div class="code">vi /etc/dnf/automatic.conf</div><br />

<div class="cli">
[commands]<br />
#  What kind of upgrade to perform:<br />
# default                            = all available upgrades<br />
# security                           = only the security upgrades<br />
upgrade_type = default<br />
random_sleep = 0<br />
<br />
# Maximum time in seconds to wait until the system is on-line and able to<br />
# connect to remote repositories.<br />
network_online_timeout = 60<br />
<br />
# To just receive updates use dnf-automatic-notifyonly.timer<br />
<br />
# Whether updates should be downloaded when they are available, by<br />
# dnf-automatic.timer. notifyonly.timer, download.timer and<br />
# install.timer override this setting.<br />
download_updates = yes<br />
<br />
# Whether updates should be applied when they are available, by<br />
# dnf-automatic.timer. notifyonly.timer, download.timer and<br />
# install.timer override this setting.<br />
apply_updates = no<br />
</div><br /><br />

In this case we will enable the security updates only to avoid potentially messing up the running programs.<br />
	<li>Enabled security updates</li>
<li>Set apply updates to yes to automatic applying the update once downloaded</li><br /><br />

<div class="cli">
[commands]<br />
#  What kind of upgrade to perform:<br />
# default                            = all available upgrades<br />
<p style="color:orange;margin-bottom:0">security                           = only the security upgrades</p><br />
upgrade_type = default<br />
random_sleep = 0<br />
<br />
# Maximum time in seconds to wait until the system is on-line and able to<br />
# connect to remote repositories.<br />
network_online_timeout = 60<br />
<br />
# To just receive updates use dnf-automatic-notifyonly.timer<br />
<br />
# Whether updates should be downloaded when they are available, by<br />
# dnf-automatic.timer. notifyonly.timer, download.timer and<br />
# install.timer override this setting.<br />
download_updates = yes<br />
<br />
# Whether updates should be applied when they are available, by<br />
# dnf-automatic.timer. notifyonly.timer, download.timer and<br />
# install.timer override this setting.<br />
<p style="color:orange;margin-bottom:0">apply_updates = yes</p><br />
</div><br /><br />
Once this is done, start dnf-automatic.timer service<br />

<div class="code">systemctl start dnf-automatic.timer</div><br />

Enable dnf-automatic.timer service to automatic start on reboot<br />

<div class="code">systemctl enable dnf-automatic.timer</div><br />
<div class="cli">
[root@evoxt ~]# systemctl enable dnf-automatic.timer<br />
Created symlink /etc/systemd/system/timers.target.wants/dnf-automatic.timer → /usr/lib/systemd/system/dnf-automatic.timer.<br />
[root@evoxt ~]# <span class='green-box'> </span> <br />
</div><br /><br />

By following this guide, automatic security update is now enabled on your Linux system.<br /><br />

Your server will now automatically install the latest security updates, protecting your server.<br /><br />

<a href="https://evoxt.com/deploy/" rel="noopener" target="_blank">Deploy a server with Evoxt now!</a><br />
<a id='deploy-button-one-click' href='/deploy'>Deploy</a><p>The post <a href="https://evoxt.com/zh/2022/01/05/enable-automatic-updates-in-linux/">Enable automatic updates in Linux</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing a Linux server</title>
		<link>https://evoxt.com/zh/2022/01/03/securing-a-linux-server/</link>
		
		<dc:creator><![CDATA[Evoxt]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 13:48:36 +0000</pubDate>
				<category><![CDATA[Guides]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://evoxt.com/?p=4365</guid>

					<description><![CDATA[<p>Is your Linux server safe from hackers? Can they get hacked? Freak out about getting your server compromised and getting your data leaked? Take a look at some of the tips you can take to secure and protect your Linux server. 1. SSH security SSH is like a path to connect you to your Linux ... <a title="Securing a Linux server" class="read-more" href="https://evoxt.com/zh/2022/01/03/securing-a-linux-server/" aria-label="More on Securing a Linux server">Read more</a></p>
<p>The post <a href="https://evoxt.com/zh/2022/01/03/securing-a-linux-server/">Securing a Linux server</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></description>
										<content:encoded><![CDATA[Is your Linux server safe from hackers? Can they get hacked? Freak out about getting your server compromised and getting your data leaked? Take a look at some of the tips you can take to secure and protect your Linux server.<br /><br />

<h2>1. SSH security</h2>
SSH is like a path to connect you to your Linux server. Of course, you will have to secure the passage. Hackers can access your server the same way you access your server.<br /><br />

	<h4>SSH Port</h4>
Everyone knows that SSH uses the default port 22 to connect to your server. To avoid letting people know that your SSH is open to connection, change the port so hackers that scan port 22 will not know that your server's SSH is active. The best practice is to change your SSH ports to a different port between <strong>10000 and 32767</strong>.<br /><br />

To change your SSH ports, edit SSH config<br />
<div class="code">vi /etc/ssh/sshd_config</div>
Find this line<br />
<div class="code">#Port 22</div>
change port value
<div class="code">Port &lt;Random Ports&gt;</div>
Don't forget to restart your ssh server to apply the settings.<br />

<div class="code">systemctl restart sshd</div><br />

	<h4>2. SSH Keys</h4>
Password can easily get bruteforced, trying keying in your Password in <a href="https://www.security.org/how-secure-is-my-password/" rel="noopener" target="_blank">https://www.security.org/how-secure-is-my-password/</a> and find out how long does it take for a hacker to crack your password. Scary isn't it?<br /><br />
Now, how about cracking a 4096 bits SSH key? Good luck with that, Mr. Hackers.<br /><br />

To set up an SSH key, use the code to generate a rsa 4096 bit key pair<br />
<div class="code">ssh-keygen -t rsa -b 4096</div><br />

<img decoding="async" src="https://console.evoxt.com/img/windows.svg" alt="" style="width:50px;height:50px" /><br />
On Windows machine (cmd), this will be<br />
<div class="cli">
C:\Users\evoxt&gt;ssh-keygen -t rsa -b 4096
Generating public/private rsa key pair.<br />
Enter file in which to save the key (C:\Users\evoxt/.ssh/id_rsa):<br />
Created directory 'C:\Users\evoxt/.ssh'.<br />
Enter passphrase (empty for no passphrase):<br />
Enter same passphrase again:<br />
Your identification has been saved in C:\Users\evoxt/.ssh/id_rsa.<br />
Your public key has been saved in C:\Users\evoxt/.ssh/id_rsa.pub.<br />
The key fingerprint is:<br />
SHA256:RSM1LY13KzUzgSziCz1gLKfTSLs3YtgKBtHdQGdX2SQ evoxt@DESKTOP-DU15VE5<br />
The key's randomart image is:<br />
+&#8212;[RSA 4096]&#8212;-+<br />
| . oo+o ooEO&#8230;. |<br />
|. . +o*..o=+B *  |<br />
| . . O + ..+ o = |<br />
|.   = o +.  . .  |<br />
|.  o o .So   .   |<br />
|&#8230; = o .        |<br />
|.. o o .         |<br />
|  .              |<br />
|                 |<br />
+&#8212;-[SHA256]&#8212;&#8211;+<br />
C:\Users\evoxt&gt;<br />
</div><br />

Then, you will have to manually copy the ssh public key to your server ( ~/.ssh/authorized_keys )<br /><br />

The formatting will be <br />
<div class="code">ssh-rsa &lt;generated_public_key&gt;</div>
Example:<br />
<div class="cli">
[root@evoxt .ssh]# cat authorized_keys <br />
ssh-rsa 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<br />

[root@evoxt ~]# <span class='green-box'> </span><br />
</div><br />

<img decoding="async" src="https://evoxt.com/img/linux.svg" alt="" style="height:50px" /><br />
On a Linux machine, this will be <br />

<div class="cli">
[root@evoxt ~]# ssh-keygen -t rsa -b 4096<br />
Generating public/private rsa key pair.<br />
Enter file in which to save the key (/root/.ssh/id_rsa):<br /> 
Created directory '/root/.ssh'.<br />
Enter passphrase (empty for no passphrase): <br />
Enter same passphrase again: <br />
Your identification has been saved in /root/.ssh/id_rsa.<br />
Your public key has been saved in /root/.ssh/id_rsa.pub.<br />
The key fingerprint is:<br />
SHA256:eIS1I1I0YXgvjR9igqAipDp0j3D+CYpyqjuJQ02ugZ8 root@evoxt<br />
The key's randomart image is:<br />
+&#8212;[RSA 4096]&#8212;-+<br />
|     o*..        |<br />
|..  .o.+ .       |<br />
|+. &#8230;o++        |<br />
|=o.+..=++.       |<br />
|* O oo.+S.       |<br />
|+o * . ..        |<br />
|+++.o .          |<br />
|BoE  o           |<br />
|**               |<br />
+&#8212;-[SHA256]&#8212;&#8211;+<br />
[root@evoxt ~]# <span class='green-box'> </span> <br />
</div><br />

Then, you can use ssh-copy-id command to install the ssh public key.<br />
<div class="code">ssh-copy-id user@your_server_ip</div>

<div class="cli">
[root@evoxt ~]# ssh-copy-id root@xx.xx.xx.xx<br />
/usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub"<br />
The authenticity of host 'xx.xx.xx.xx (xx.xx.xx.xx)' can't be established.<br />
ECDSA key fingerprint is SHA256:umf+E/a0OQe8eRmPdYyCM5kE+ZG/FCC2MEEn2G81dGA.<br />
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes<br />
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed<br />
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed &#8212; if you are prompted now it is to install the new keys<br />
root@xx.xx.xx.xx's password: <br /><br />

Number of key(s) added: 1<br /><br />

Now try logging into the machine, with "ssh 'root@xx.xx.xx.xx'"<br />
and check to make sure that only the key(s) you wanted were added.<br /><br />

[root@evoxt ~]# <span class='green-box'> </span>
</div><br /><br />

	<h4>SSH from Specific IP</h4>
To allow specific IP to access your server through SSH, configure the firewall only to allow a single IP address to go through the firewall to your SSH port.<br /><br />

Make sure you have a static IP before doing this. Else you can get locked out of your server.<br /><br />

	<h4>Disable Password Authentication</h4>
Once SSH key authentication has been set up, disable password authentication.<br />

<div class="code">sed -i 's/PasswordAuthentication yes/PasswordAuthentication no/g' /etc/ssh/sshd_config</div>

Then restart SSH service<br />

<div class="code">systemctl restart sshd</div><br />

<h2>3. Automatic updates</h2>
Zero-day exploits are attacks that you can't react to. The best thing next is to protect yourself from N-day attacks once the zero-day exploit has been discovered. To protect yourself from N-day attacks, enable automatic updates. Keep in mind that automatic updates can potentially mess things up. To reduce the chances, enable automatic security only.<br /><br />

To enable automatic security updates, <a href="https://evoxt.com/guides/enable-automatic-updates-in-linux/" rel="noopener" target="_blank">use this guide</a>.<br /><br />

<h2>4. Default password</h2>
Change your server's default password. Most default passwords are stored in databases and your email inbox. Change them!<br /><br />

To change your server's password,<br />

<div class="code">passwd &lt;user&gt;</div>

<div class="cli">
[root@TEST ~]# passwd root<br />
Changing password for user root.<br />
New password: <br />
Retype new password: <br />
passwd: all authentication tokens updated successfully.<br />
[root@TEST ~]# <span class='green-box'> </span> 
</div><br />

<h2>5. Private Networks and VPNs</h2>
Set up a server and connect to your servers through a private network. Private network uses private IP to communicate with each other isolating your servers from the public without any exposure to the public.<br /><br />

To set up a private network or a VPN. Take a look at <a href="https://evoxt.com/one-click-installation/pritunl-one-click-installation/" rel="noopener" target="_blank">Pritunl</a>. They offer many advanced features such as organization management to separate between Private networks, and it also comes with GUI to easily configure the server.<br /><br />

<h2>6. Firewall</h2>
Set up a firewall to block unnecessary open ports.<br /><br />

Most Linux distributions includes Iptables by default.<br /><br />

To control your Iptables: <br />

	<li>CentOS/ Fedora uses FirewallD</li>
	<li>Ubuntu/ Debian uses UFW.</li><br />


To take a look for running programs that are currently using specific ports, use netstat<br />

<div class="code">netstat -tulpn</div>

Also, block ICMP Ping if not required.<br />
<br />
With ICMP blocked, hackers have a harder time knowing your server is currently up and running.<br /><br />

<h2>7. Users</h2>

Root access is scary! With root access, the hacker can do almost anything to your servers.<br /><br />

Because root access is so powerful, hackers tend to try to crack and brute force root accounts. Hackers will usually stay away from other user accounts if you disable root user access due to the lack of permissions.<br /><br />

The most common practice is to block root access through SSH.<br /><br />

To disable root access through SSH<br />
<div class="code">vi /etc/ssh/sshd_config</div>

Change PermitRootLogin from yes to no and remove the <strong>#</strong> comment if there is any<br /><br />
<div class="code">#PermitRootLogin yes</div>
to
<div class="code">PermitRootLogin no</div>

Or use this simple command to disable root login.

<div class="code">sed -i 's/#PermitRootLogin yes/PermitRootLogin no/g' /etc/ssh/sshd_config</div>

Don't forget to restart your ssh service to apply the settings.<br />

<div class="code">systemctl restart sshd</div><br />

Note: Please make sure you have other users account created with sufficient permission to avoid getting locked out of your server.<br /><br />

<h2>8. Backup</h2>
This is not quite related to server security. However, I believe this is super important to be included.<br /><br />

It is crucial to have a server backup just in case something goes wrong.<br /><br />

When a server is hacked, backup files will be your savior.<br /><br />

Store your backup offsite, so the hacker cannot modify or alter your backup files.<br /><br />

Luckily for you, all servers under Evoxt will be backup weekly on an offsite server. If you are not using Evoxt yet, consider <a href="https://evoxt.com/deploy" rel="noopener" target="_blank">upgrading</a>!
<p>The post <a href="https://evoxt.com/zh/2022/01/03/securing-a-linux-server/">Securing a Linux server</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Setup SSL/ HTTPS on NGINX on CentOS 8/ AlmaLinux 8/ RockyLinux 8</title>
		<link>https://evoxt.com/zh/2022/01/02/setup-ssl-https-on-nginx-on-centos-8-almalinux-8-rockylinux-8/</link>
		
		<dc:creator><![CDATA[Evoxt]]></dc:creator>
		<pubDate>Sun, 02 Jan 2022 20:36:07 +0000</pubDate>
				<category><![CDATA[Guides]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://evoxt.com/?p=4341</guid>

					<description><![CDATA[<p>Installing SSL can usually be a very tedious process. Luckily for us, Certbot has an automated script to easily help us to get SSL/ HTTPS set up with a few command lines. To start, install Certbot sudo dnf install https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm sudo dnf install certbot python3-certbot-nginx Once Certbot is installed, automatically generate an SSL certificate by ... <a title="Setup SSL/ HTTPS on NGINX on CentOS 8/ AlmaLinux 8/ RockyLinux 8" class="read-more" href="https://evoxt.com/zh/2022/01/02/setup-ssl-https-on-nginx-on-centos-8-almalinux-8-rockylinux-8/" aria-label="More on Setup SSL/ HTTPS on NGINX on CentOS 8/ AlmaLinux 8/ RockyLinux 8">Read more</a></p>
<p>The post <a href="https://evoxt.com/zh/2022/01/02/setup-ssl-https-on-nginx-on-centos-8-almalinux-8-rockylinux-8/">Setup SSL/ HTTPS on NGINX on CentOS 8/ AlmaLinux 8/ RockyLinux 8</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></description>
										<content:encoded><![CDATA[Installing SSL can usually be a very tedious process. Luckily for us, Certbot has an automated script to easily help us to get SSL/ HTTPS set up with a few command lines.

To start, install Certbot
<div class="code">
sudo dnf install https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm <br />
sudo dnf install certbot python3-certbot-nginx
</div>

Once Certbot is installed, automatically generate an SSL certificate by running this command. You will be prompted with several inputs to fill in.
<div class="code">
certbot &#8211;nginx
</div>

<div class="cli">[root@nginx ~]# certbot &#8211;nginx<br />
[root@nginx ~]# certbot &#8211;nginx<br />
Saving debug log to /var/log/letsencrypt/letsencrypt.log<br />
Enter email address (used for urgent renewal and security notices)<br />
 (Enter 'c' to cancel): <strong style="color:orange">test@test.com</strong><br />
<br />
&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br />
Please read the Terms of Service at<br />
https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf. You must<br />
agree in order to register with the ACME server. Do you agree?<br />
&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br />
(Y)es/(N)o: <strong style="color:orange">Y</strong><br />
<br />
&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br />
Would you be willing, once your first certificate is successfully issued, to<br />
share your email address with the Electronic Frontier Foundation, a founding<br />
partner of the Let's Encrypt project and the non-profit organization that<br />
develops Certbot? We'd like to send you email about our work encrypting the web,<br />
EFF news, campaigns, and ways to support digital freedom.<br />
&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br />
(Y)es/(N)o: <strong style="color:orange">Y</strong><br />
Account registered.<br />
Please enter the domain name(s) you would like on your certificate (comma and/or<br />
space separated) (Enter 'c' to cancel): <strong style="color:orange">yourdomain.com</strong><br />
Requesting a certificate for yourdomain.com<br />
<br />
Successfully received certificate.<br />
Certificate is saved at: /etc/letsencrypt/live/yourdomain.com/fullchain.pem<br />
Key is saved at:         /etc/letsencrypt/live/yourdomain.com/privkey.pem<br />
This certificate expires on 2022-04-02.<br />
These files will be updated when the certificate renews.<br />
Certbot has set up a scheduled task to automatically renew this certificate in the background.<br />
<br />
Deploying certificate<br />
Successfully deployed certificate for yourdomain.com to /etc/nginx/conf.d/nginx.conf<br />
Congratulations! You have successfully enabled HTTPS on yourdomain.evoxt.com<br />
We were unable to subscribe you the EFF mailing list because your e-mail address appears to be invalid. You can try again later by visiting https://act.eff.org.<br />
<br />
&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br />
If you like Certbot, please consider supporting our work by:<br />
 * Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate<br />
 * Donating to EFF:                    https://eff.org/donate-le<br />
&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br />
[root@nginx ~]# <span class='green-box'> </span></div><br /><br />

With these set up, your domain's SSL setup should be complete.<br /><br />

<img fetchpriority="high" decoding="async" src="https://evoxt.com/wp-content/uploads/2022/01/ssl-certificate.png" alt="" width="554" height="677" class="alignnone size-full wp-image-4349" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2022/01/ssl-certificate.png 554w, https://evoxt.com/zh/wp-content/uploads/sites/2/2022/01/ssl-certificate-245x300.png 245w" sizes="(max-width: 554px) 100vw, 554px" /><br />
<br />


Note: Your browser might still cache the old self-signed certificate, or the certificate will not update, hence still showing insecure SSL. To fix this, try clearing your browser's cache or try accessing your website with a different browser.<br /><br />

To check SSL status, try using this <a href="https://www.geocerts.com/ssl-checker" rel="noopener" target="_blank">SSL Checker</a> from Geocerts.<br />

<img decoding="async" src="https://evoxt.com/wp-content/uploads/2022/01/ssl-checker-geocerts.png" alt="" width="833" height="851" class="alignnone size-full wp-image-4353" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2022/01/ssl-checker-geocerts.png 833w, https://evoxt.com/zh/wp-content/uploads/sites/2/2022/01/ssl-checker-geocerts-294x300.png 294w, https://evoxt.com/zh/wp-content/uploads/sites/2/2022/01/ssl-checker-geocerts-768x785.png 768w" sizes="(max-width: 833px) 100vw, 833px" />
<p>The post <a href="https://evoxt.com/zh/2022/01/02/setup-ssl-https-on-nginx-on-centos-8-almalinux-8-rockylinux-8/">Setup SSL/ HTTPS on NGINX on CentOS 8/ AlmaLinux 8/ RockyLinux 8</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to install phpMyAdmin on CentOS 8 / AlmaLinux 8 / RockyLinux 8</title>
		<link>https://evoxt.com/zh/2021/09/14/how-to-install-phpmyadmin-on-centos-8-almalinux-8-rockylinux-8/</link>
		
		<dc:creator><![CDATA[Evoxt]]></dc:creator>
		<pubDate>Tue, 14 Sep 2021 20:49:49 +0000</pubDate>
				<category><![CDATA[Guides]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://evoxt.com/?p=4016</guid>

					<description><![CDATA[<p>phpMyAdmin is a web-based free and open-source tool that is written in PHP to help users to manage their database easily. With phpMyAdmin, users can easily create and manage databases, import and export data and even executing SQL queries, such as creating, deleting, editing, inserting and more, providing easy to use web-based interface to easily ... <a title="How to install phpMyAdmin on CentOS 8 / AlmaLinux 8 / RockyLinux 8" class="read-more" href="https://evoxt.com/zh/2021/09/14/how-to-install-phpmyadmin-on-centos-8-almalinux-8-rockylinux-8/" aria-label="More on How to install phpMyAdmin on CentOS 8 / AlmaLinux 8 / RockyLinux 8">Read more</a></p>
<p>The post <a href="https://evoxt.com/zh/2021/09/14/how-to-install-phpmyadmin-on-centos-8-almalinux-8-rockylinux-8/">How to install phpMyAdmin on CentOS 8 / AlmaLinux 8 / RockyLinux 8</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></description>
										<content:encoded><![CDATA[phpMyAdmin is a web-based free and open-source tool that is written in PHP to help users to manage their database easily.  
With phpMyAdmin, users can easily create and manage databases, import and export data and even executing SQL queries, such as creating, deleting, editing, inserting and more, providing easy to use web-based interface to easily perform SQL queries without any command line.<br /><br />

As of today, phpMyAdmin has become one of the most widely used MySQL administration tools.<br /><br />

<h3>Requirements:</h3>
<ul>
	<li>A server with network connection running CentOS 8 , AlmaLinux 8 or RockyLinux 8.</li>
	<li>MySQL / MariaDB Installed</li>
	<li>PHP Installed</li>
	<li>Web Server Installed ( In this tutorial, we are working with Apache )</li>
</ul><br /><br />

If you don't have any MySQL / MariaDB, PHP, Web Server Installed, you can use the command line below to install your LAMP stack.<br />
<div class="code">dnf install wget httpd php php-pdo php-xml php-pecl-zip php-json php-common php-fpm php-mbstring php-cli php-mysqlnd php-json php-mbstring mariadb-server -y</div><br />

Once you are done with the installation, start and enable the services.<br />
<div class="code">
systemctl enable httpd<br />
systemctl start httpd<br />
systemctl enable mariadb<br />
systemctl start mariadb<br />
</div><br />

Once the dependencies are installed and started,<br />
Start by configuring your MySQL / MariaDB by running this command, which is a secure MySQL / MariaDB script<br />
<div class="code">mysql_secure_installation</div>
<div class="cli">
[root@EvoxtGuide ~]# mysql_secure_installation<br /><br />

NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MariaDB<br />
      SERVERS IN PRODUCTION USE!  PLEASE READ EACH STEP CAREFULLY!<br /><br />

In order to log into MariaDB to secure it, we'll need the current<br />
password for the root user.  If you've just installed MariaDB, and<br />
you haven't set the root password yet, the password will be blank,<br />
so you should just press enter here.<br /><br />

Enter current password for root (enter for none):<br />
OK, successfully used password, moving on&#8230;<br /><br />

Setting the root password ensures that nobody can log into the MariaDB<br />
root user without the proper authorisation.<br /><br />

Set root password? [Y/n] Y<br />
New password:<br />
Re-enter new password:<br />
Password updated successfully!<br />
Reloading privilege tables..<br />
 &#8230; Success!<br /><br /><br /><br />


By default, a MariaDB installation has an anonymous user, allowing anyone<br />
to log into MariaDB without having to have a user account created for<br />
them.  This is intended only for testing, and to make the installation<br />
go a bit smoother.  You should remove them before moving into a<br />
production environment.<br />
<br />
Remove anonymous users? [Y/n] Y<br />
 &#8230; Success!<br /><br />

Normally, root should only be allowed to connect from 'localhost'.  This<br />
ensures that someone cannot guess at the root password from the network.<br />
<br />
Disallow root login remotely? [Y/n] Y<br />
 &#8230; Success!<br /><br />

By default, MariaDB comes with a database named 'test' that anyone can<br />
access.  This is also intended only for testing, and should be removed<br />
before moving into a production environment.<br /><br />

Remove test database and access to it? [Y/n] Y<br />
 &#8211; Dropping test database&#8230;<br />
 &#8230; Success!<br />
 &#8211; Removing privileges on test database&#8230;<br />
 &#8230; Success!<br /><br />

Reloading the privilege tables will ensure that all changes made so far<br />
will take effect immediately.<br /><br />

Reload privilege tables now? [Y/n] Y<br />
 &#8230; Success!<br /><br />

Cleaning up&#8230;<br /><br />

All done!  If you've completed all of the above steps, your MariaDB<br />
installation should now be secure.<br /><br />

Thanks for using MariaDB!<br />
[root@EvoxtGuide ~]#<span class="green-box"> </span></div><br />
</div><br />

Now let's get started with phpMyAdmin installation!<br /><br />

Unfortunately, phpMyAdmin is not included in CentOS 8 / AlmaLinux 8 / RockyLinux 8's repo.<br />
You will have to download the files, extract and move the files to successfully install phpMyAdmin.<br /><br />

To download, go to <a href="https://www.phpmyadmin.net/files/" rel="noopener" target="_blank">here</a>, choose the latest phpMyAdmin and copy the URL to download the latest phpMyAdmin.<br /><br />

For this tutorial, the latest phpMyAdmin version is phpMyAdmin 5.1.1. So in this tutorial, we will be using phpMyAdmin 5.1.1 as an example.<br /><br />

Download phpMyAdmin on your server by running this command, <br />if you are installing a different version of phpMyAdmin, <br />remember to change the version number on the URL or use the URL you copied from the above step.<br />
<div class="code">wget https://files.phpmyadmin.net/phpMyAdmin/5.1.1/phpMyAdmin-5.1.1-all-languages.zip</div><br />

<div class="cli">[root@EvoxtGuide ~]# wget https://files.phpmyadmin.net/phpMyAdmin/5.1.1/phpMyAdmin-5.1.1-all-languages.zip<br />
&#8211;2021-09-14 17:30:31&#8211;  https://files.phpmyadmin.net/phpMyAdmin/5.1.1/phpMyAdmin-5.1.1-all-languages.zip<br />
Resolving files.phpmyadmin.net (files.phpmyadmin.net)&#8230; 89.187.187.20, 2a02:6ea0:c800::8<br />
Connecting to files.phpmyadmin.net (files.phpmyadmin.net)|89.187.187.20|:443&#8230; connected.<br />
HTTP request sent, awaiting response&#8230; 200 OK<br />
Length: 14801905 (14M) [application/zip]<br />
Saving to: ‘phpMyAdmin-5.1.1-all-languages.zip’<br /><br />

phpMyAdmin-5.1.1-al 100%[===================&gt;]  14.12M  82.6MB/s    in 0.2s<br /><br />

2021-09-14 17:30:32 (82.6 MB/s) &#8211; ‘phpMyAdmin-5.1.1-all-languages.zip’ saved [14801905/14801905]<br /><br />

[root@EvoxtGuide ~]#<span class="green-box"> </span>
</div><br />

Once this is downloaded, unzip the file using this command:<br />
<div class="code">unzip phpMyAdmin-*.zip</div><br />

Remove the zip file<br />
<div class="code">rm -f phpMyAdmin-*.zip</div><br />

Once this is done, move the extracted folder to /usr/share directory as that is the default directory for phpMyAdmin<br />
<div class="code">mv phpMyAdmin-* /usr/share/phpmyadmin</div><br />

Next, change directory to /usr/share/phpmyadmin and rename config.sample.inc.php to config.inc.php<br />
<div class="code">cd /usr/share/phpmyadmin<br />
mv config.sample.inc.php config.inc.php</div><br />

Then, edit config.inc.php and find this line $cfg['blowfish_secret'] = "; and add a secret key for cookie auth. Remember to make sure the secret key is at least 32 characters.<br />
<div class="code">vi config.inc.php<br />
$cfg['blowfish_secret'] = '<strong>your-secret-key-here-32-characters</strong>';</div><br />

After that, import create_tables.sql with the following command.<br />
<div class="code">mysql &lt; /usr/share/phpmyadmin/sql/create_tables.sql -u root -p</div><br />
Key in your MySQL / MariaDB root password when prompted. ( This is from the <strong>mysql_secure_installation</strong> part )<br /><br />

<div class="cli">[root@EvoxtGuide phpmyadmin]# mysql &lt; /usr/share/phpmyadmin/sql/create_tables.sql -u root -p<br />
Enter password:<br />
[root@EvoxtGuide phpmyadmin]#<span class="green-box"> </span></div><br />

Next, create a temporary directory for phpmyadmin and change permission. If you are using other web server, remember to change apache:apache to the webserver that you use.<br />
<div class="code">
mkdir /usr/share/phpmyadmin/tmp<br />
chown -R apache:apache /usr/share/phpmyadmin<br />
chmod 777 /usr/share/phpmyadmin/tmp<br />
</div><br />

phpMyAdmin installation is now complete.<br />
To make phpmyadmin accessible through public, you will need to configure your webserver to include phpmyadmin's directory.<br />
If you are using Apache, just copy and paste this on your command line<br />
<div class="code">
echo 'Alias /phpmyadmin /usr/share/phpmyadmin <br /><br />
&lt;Directory /usr/share/phpmyadmin/&gt; <br />
AddDefaultCharset UTF-8 <br /><br />

&lt;IfModule mod_authz_core.c&gt; <br />
# Apache 2.4 <br />
&lt;RequireAny&gt; <br />
Require all granted <br />
&lt;/RequireAny&gt; <br />
&lt;/IfModule&gt; <br />
&lt;IfModule !mod_authz_core.c&gt; <br />
# Apache 2.2 <br />
Order Deny,Allow <br />
Deny from All <br />
Allow from 127.0.0.1 <br />
Allow from ::1 <br />
&lt;/IfModule&gt; <br />
&lt;/Directory&gt; <br /><br />

&lt;Directory /usr/share/phpmyadmin/setup/&gt; <br />
&lt;IfModule mod_authz_core.c&gt; <br />
# Apache 2.4 <br />
&lt;RequireAny&gt; <br />
Require all granted <br />
&lt;/RequireAny&gt; <br />
&lt;/IfModule&gt; <br />
&lt;IfModule !mod_authz_core.c&gt; <br />
# Apache 2.2 <br />
Order Deny,Allow <br />
Deny from All <br />
Allow from 127.0.0.1 <br />
Allow from ::1 <br />
&lt;/IfModule&gt; <br />
&lt;/Directory&gt;' &gt; /etc/httpd/conf.d/phpmyadmin.conf
</div><br />

Restart webserver
<div class="code">
systemctl restart httpd
</div><br />

If there are no errors, you are done.<br /><br />

If there is any error, this should be some configuration error with your configuration files. You can troubleshoot using this command line to check the status.<br />
<div class="code">
systemctl status httpd
</div><br />

Congratulations! you have successfully installed phpMyAdmin on CentOS 8/ AlmaLinux 8/ RockyLinux 8 server.



<p>The post <a href="https://evoxt.com/zh/2021/09/14/how-to-install-phpmyadmin-on-centos-8-almalinux-8-rockylinux-8/">How to install phpMyAdmin on CentOS 8 / AlmaLinux 8 / RockyLinux 8</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to point a Domain to your VM</title>
		<link>https://evoxt.com/zh/2021/06/23/how-to-point-a-domain-to-your-vm/</link>
		
		<dc:creator><![CDATA[Evoxt]]></dc:creator>
		<pubDate>Wed, 23 Jun 2021 17:33:39 +0000</pubDate>
				<category><![CDATA[Guides]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://evoxt.com/?p=2343</guid>

					<description><![CDATA[<p>This is a guide on how to point a domain to your VM to serve content with your VM as the host. You require a DNS server to be set up for you. Usually, most domain provider has that already set up, and you can start pointing. But for this guide, we will be using ... <a title="How to point a Domain to your VM" class="read-more" href="https://evoxt.com/zh/2021/06/23/how-to-point-a-domain-to-your-vm/" aria-label="More on How to point a Domain to your VM">Read more</a></p>
<p>The post <a href="https://evoxt.com/zh/2021/06/23/how-to-point-a-domain-to-your-vm/">How to point a Domain to your VM</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></description>
										<content:encoded><![CDATA[This is a guide on how to point a domain to your VM to serve content with your VM as the host. <br /><br />

You require a DNS server to be set up for you. Usually, most domain provider has that already set up, and you can start pointing. But for this guide, we will be using Cloudflare. Cloudflare offers free DNS service and Wildcard SSL.<br /><br />

<h2>Signup / Login to your Cloudflare account</h2><br />
Head to Cloudflare to login to your account or signup here: <a href="https://dash.cloudflare.com/sign-up">https://dash.cloudflare.com/sign-up</a> if you haven't already.<br />
<img decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/cloudflaresignup.png" alt="" width="886" height="576" class="alignnone size-full wp-image-2346" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflaresignup.png 886w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflaresignup-300x195.png 300w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflaresignup-768x499.png 768w" sizes="(max-width: 886px) 100vw, 886px" /><br /><br />

Click add site on the top right of your Cloudflare account<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/addsite-1024x762.png" alt="" width="900" height="670" class="alignnone size-large wp-image-2347" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/addsite-1024x762.png 1024w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/addsite-300x223.png 300w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/addsite-768x572.png 768w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/addsite.png 1032w" sizes="auto, (max-width: 900px) 100vw, 900px" /><br />
Add your domain and click add site<br /><br />

Choose the free plan<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/free-plan-cloudflare.png" alt="" width="768" height="857" class="alignnone size-full wp-image-2348" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/free-plan-cloudflare.png 768w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/free-plan-cloudflare-269x300.png 269w" sizes="auto, (max-width: 768px) 100vw, 768px" /><br /><br />

<h2>Set your DNS records</h2><br />
Cloudflare will check your existing DNS record and will request you to check and update your DNS record<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/cloudflarednsreview.png" alt="" width="811" height="633" class="alignnone size-large wp-image-2350" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflarednsreview.png 811w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflarednsreview-300x234.png 300w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflarednsreview-768x599.png 768w" sizes="auto, (max-width: 811px) 100vw, 811px" /><br /><br />

You have to add A record to tell Cloudflare to point the domain name to your VM IP<br />

<div class='code'> 
Type : <strong>A</strong><br />
Name : <strong>Your domain name</strong> or <strong>@</strong><br />
IPv4 address : <strong>Your_VM_IP</strong>
</div>
Remember to enable the proxy setting, which helps you hide your VM IP to prevent exposing your VM IP, leading to potential DDoS.<br />
Also don't forget to clear any existing duplicate A record and CNAME you have to prevent any potential issues.<br /><br />

Example config:<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/cloudflarednssetting.png" alt="" width="818" height="719" class="alignnone size-full wp-image-2351" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflarednssetting.png 818w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflarednssetting-300x264.png 300w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflarednssetting-768x675.png 768w" sizes="auto, (max-width: 818px) 100vw, 818px" /><br /><br />

Remember to also add a Cname record to make sure www.yourdomainname.com will resolve<br />
<div class='code'> 
Type : <strong>Cname</strong><br />
Name : <strong>www</strong><br />
Target : <strong>Your domain name</strong> or <strong>@</strong>
</div>
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/cloudflare-cname.png" alt="" width="691" height="109" class="alignnone size-full wp-image-2352" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflare-cname.png 691w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflare-cname-300x47.png 300w" sizes="auto, (max-width: 691px) 100vw, 691px" /><br />
Click save and Continue<br /><br />

<h2>Set your Nameserver records</h2><br />
Now you have to change your domain's nameserver record to Cloudflare's nameserver.<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/nameserver-cloudflare.png" alt="" width="790" height="821" class="alignnone size-full wp-image-2353" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/nameserver-cloudflare.png 790w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/nameserver-cloudflare-289x300.png 289w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/nameserver-cloudflare-768x798.png 768w" sizes="auto, (max-width: 790px) 100vw, 790px" /><br /><br />

<div class='notice'>
Note: Nameserver record differs depending on the provider, contact your domain provider if you have any questions, here are some guides on some popular domain providers.
</div>
<a href="https://my.godaddy.com/help/change-nameservers-for-my-domains-664" rel="noopener" target="_blank">GoDaddy</a><br />
<a href="https://www.namecheap.com/support/knowledgebase/article.aspx/767/10/how-to-change-dns-for-a-domain/" rel="noopener" target="_blank">NameCheap</a><br />
<a href="https://support.google.com/domains/answer/3290309?hl=en" rel="noopener" target="_blank">Google Domains</a><br />
<a href="https://www.domain.com/help/article/domain-management-how-to-update-nameservers" rel="noopener" target="_blank">Domain.com</a><br />
<a href="https://cp.enom.com/kb/kb/kb_0086_how-to-change-dns.htm" rel="noopener" target="_blank">eNom</a><br /><br />

When you are done, click Done, check the nameservers, and you are done pointing your domain to your VM.<br /><br />

Now try visiting your domain on your browser, and the domain will resolve!<br /><br />

<div class='notice'>
Note: It might take a while for the DNS and nameserver to propagate, usually it is instant, but it might take up to 24 hours to propagate, contact your domain provider if it hasn't propagated after 24 hours.
</div><br /><br />

<h2>Bonus:</h2>
<h3>SSL</h3>
Configuring SSL usually takes a lot of work and quite complicated.<br />
With cloudflare, simply go to SSL/TLS tab and click on Flexible<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/cloudflare-ssl.png" alt="" width="871" height="568" class="alignnone size-large wp-image-2366" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflare-ssl.png 871w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflare-ssl-300x196.png 300w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/cloudflare-ssl-768x501.png 768w" sizes="auto, (max-width: 871px) 100vw, 871px" /><br />
With this your website will have a padlock beside the URL and it will be secured, to check, head to <strong>https://</strong>yourdomainname<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/secured.png" alt="" width="400" height="529" class="alignnone size-large wp-image-2368" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/secured.png 400w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/secured-227x300.png 227w" sizes="auto, (max-width: 400px) 100vw, 400px" /><br /><br />

Don't forget to enable Automatic HTTPS Rewrites after that so all HTTP traffic will be forwarded to HTTPS traffic.<br />
You can do that by going to Cloudflare &gt; SSL/TLS &gt; Edge Certificates &gt; Automatic HTTPS Rewrites &gt; On<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/auto-https-rewrite.png" alt="" width="881" height="168" class="alignnone size-full wp-image-2481" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/auto-https-rewrite.png 881w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/auto-https-rewrite-300x57.png 300w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/auto-https-rewrite-768x146.png 768w" sizes="auto, (max-width: 881px) 100vw, 881px" /><br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/auto-https-rewrite-on.png" alt="" width="904" height="227" class="alignnone size-full wp-image-2482" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/auto-https-rewrite-on.png 904w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/auto-https-rewrite-on-300x75.png 300w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/auto-https-rewrite-on-768x193.png 768w" sizes="auto, (max-width: 904px) 100vw, 904px" /><br /><br />

Haven't deployed a VM with Evoxt yet? Deploy a VM now! <br />
<a id='deploy-button-one-click' href='/deploy'>Deploy</a><p>The post <a href="https://evoxt.com/zh/2021/06/23/how-to-point-a-domain-to-your-vm/">How to point a Domain to your VM</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to connect to a Linux VPS / Linux VM</title>
		<link>https://evoxt.com/zh/2021/06/13/how-to-connect-to-a-linux-vps-linux-vm/</link>
		
		<dc:creator><![CDATA[Evoxt]]></dc:creator>
		<pubDate>Sun, 13 Jun 2021 11:09:45 +0000</pubDate>
				<category><![CDATA[Guides]]></category>
		<category><![CDATA[Linux]]></category>
		<guid isPermaLink="false">https://evoxt.com/?p=2132</guid>

					<description><![CDATA[<p>Introduction Secure Shell (SSH) is a UNIX-based command interface and protocol to securely connect and access a remote computer. Typical applications include remote command-line, login, and remote command execution. SSH commands are secure as both ends of the client/ server connection are connected using a cryptographic network that operates securely over an unsecured network. Retriving ... <a title="How to connect to a Linux VPS / Linux VM" class="read-more" href="https://evoxt.com/zh/2021/06/13/how-to-connect-to-a-linux-vps-linux-vm/" aria-label="More on How to connect to a Linux VPS / Linux VM">Read more</a></p>
<p>The post <a href="https://evoxt.com/zh/2021/06/13/how-to-connect-to-a-linux-vps-linux-vm/">How to connect to a Linux VPS / Linux VM</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Introduction</h2>
Secure Shell (SSH) is a UNIX-based command interface and protocol to securely connect and access a remote computer. Typical applications include remote command-line, login, and remote command execution. SSH commands are secure as both ends of the client/ server connection are connected using a cryptographic network that operates securely over an unsecured network.<br /><br />

<h2>Retriving your Evoxt VM details:</h2>
Get your VM's IP, Username and Password from Email. Check your email for your VM details. Your VM details are sent to your email inbox.<br />
Check your junk/ spam mail just in case.<br />
Did not receive it? <a href="https://console.evoxt.com/submitticket.php">Contact us</a>.<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/details.png" alt="" width="492" height="581" class="alignnone size-full wp-image-2103" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/details.png 492w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/details-254x300.png 254w" sizes="auto, (max-width: 492px) 100vw, 492px" /><br /><br />

<h2>How to connect via to your Linux VPS/ VM via SSH</h2>
<h3>Windows</h3>
If you are using Windows, Open CMD and type:<br />
<div class='code'>ssh USERNAME@Your-VM-IP</div><br />
Accept authenticity by typing 'yes'<br />
and key in your VM password.<br />
<div class="cli">
ssh root@192.168.0.1
The authenticity of host '192.168.0.1 (192.168.0.1)' can't be established.<br />
RSA key fingerprint is SHA256:GY4yCL+HfYQXaKXePGlJvGcgKdvQR8OGTbmwbpiQbDE.<br />
Are you sure you want to continue connecting (yes/no/[fingerprint])?<br />
</div><br />

Alternatively, you can connect to your Linux VPS / VM using programs such as PuTTy:<br />
You can download putty here: <a href="https://www.putty.org/">https://www.putty.org/</a><br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/putty-ssh.png" alt="" width="458" height="444" class="alignnone size-full wp-image-2148" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/putty-ssh.png 458w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/putty-ssh-300x291.png 300w" sizes="auto, (max-width: 458px) 100vw, 458px" /><br />
To connect through PuTTy, simply key in your VM IP, Default Port (22) and click Open<br />
Accept authenticity by typing 'yes' and key in the VM username and VM password to login.<br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/putty-login.png" alt="" width="663" height="123" class="alignnone size-full wp-image-2149" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/putty-login.png 663w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/putty-login-300x56.png 300w" sizes="auto, (max-width: 663px) 100vw, 663px" /><br /><br />

<h3>Linux</h3>
If you are using Linux based machine, Open Terminal and type:<br />
<div class='code'>ssh USERNAME@Your-VM-IP</div><br />
<img loading="lazy" decoding="async" src="https://evoxt.com/wp-content/uploads/2021/06/ubuntu-ssh.png" alt="" width="346" height="66" class="alignnone size-full wp-image-2150" srcset="https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/ubuntu-ssh.png 346w, https://evoxt.com/zh/wp-content/uploads/sites/2/2021/06/ubuntu-ssh-300x57.png 300w" sizes="auto, (max-width: 346px) 100vw, 346px" /><br /><br />

Want to set up a website but don't know how?<br />
<a href="https://evoxt.com/applications/">Deploy a WordPress website with just a single click!</a>
<p>The post <a href="https://evoxt.com/zh/2021/06/13/how-to-connect-to-a-linux-vps-linux-vm/">How to connect to a Linux VPS / Linux VM</a> appeared first on <a href="https://evoxt.com/zh">益沃斯</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
