Solved

Apache - srm.conf

Posted on 1998-11-30
4
598 Views
Last Modified: 2012-06-27
Where is the srm.conf file for Apache?
0
Comment
Question by:Theophilus
  • 2
  • 2
4 Comments
 
LVL 1

Accepted Solution

by:
squimph earned 10 total points
Comment Utility
If you installed a recent version of apache for Unix (1.3.0 or later) and kept the default file locations, srm.conf is in the directory /usr/local/apache/conf/

Older versions of apache have a default location of /usr/local/etc/httpd/conf/

The windows apache prefers to stick .conf files in c:\program fles\apache group\apache\conf\
0
 
LVL 1

Author Comment

by:Theophilus
Comment Utility
I'm afraid it's in none of those locations. I have S.u.S.E Linux 5.2.0-5 and the version of Apache that came with it. The directory /usr/local/apache/ doesn't exist. The directory /usr/local/etc/httpd/ does but the only subdirectories are cgi-bin, htdocs and icons.



   Older versions of apache have a default location of conf/
0
 
LVL 1

Expert Comment

by:squimph
Comment Utility
Ah, I see... then SUSE has modified their installation of Apache from the defaults. In that case you can try 'man apache' ... often Linux distributions will customize man pages and list their chosen file locations, or if all else fails there is always the find command:

find / -name srm.conf -print

.but the above will slow your system while it runs.

It's also possible that SUSE has further customized their version of Apache to not have an srm.conf (it's possible to combine httpd.conf, access.conf and srm.conf into one big httpd.conf). So if you find only an httpd.conf on your system, look inside it for commands like AddIcon or DefaultType which are traditionally found in the srm.conf
0
 
LVL 1

Author Comment

by:Theophilus
Comment Utility
Thank you. I found it using the find command. it was in /etc/httpd/
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

You ever wonder how to backup Linux system files just like Windows System Restore?  Well you can use Timeshift in Linux to perform those similar action.  This tutorial will show you how to backup your system files and keep regular intervals. Note…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now