Solved

installing php on solaris 8 with Sun one WEb server

Posted on 2003-11-24
8
1,375 Views
Last Modified: 2013-12-13
Hi

I want to install php on solaris 8 using Sun one WEb server, can someone tell me step by step how to do it?

I'm newbie and just finish to install mysql (after several days of work) and have the procedure but using apache webserver

0
Comment
Question by:Alejandro_Lopez
  • 2
  • 2
8 Comments
 
LVL 14

Assisted Solution

by:ThG
ThG earned 150 total points
Comment Utility
Honestly I have no idea since I don't have such hardware to try on.. If only I had it...
Anyway there is something related to Solaris here:
http://www.php.net/manual/en/installation.php

I didn't notice anything about "Sun one web server" though..
0
 

Author Comment

by:Alejandro_Lopez
Comment Utility
OK thanks .

The page is not very helpfull but y just find a way to do it, here is a very good page that can help:

http://benoit.noss.free.fr/php/install-php4.html

regards
0
 
LVL 6

Accepted Solution

by:
aolXFT earned 200 total points
Comment Utility
Handiest way would probably be to set it up as a CGI.

To install a CGI Binary, you go into the source,

type ./configure --prefix
make

And you've got yourself a cgi-binary in

{php_src}/sapi/cgi/php

I'm not sure if you can compile PHP as a SunONE Module

I've heard rumours that SunONE and PHP don't go too well together, so you might'nt get very far.
0
 
LVL 6

Expert Comment

by:aolXFT
Comment Utility
I think my comment is a suitable answer to this question, and I think if the question is going to be cleaned, that my answer should be accepted.

I've both suggested a CGI Solution, and also outlined the possibility that it may not work.

If it works, at all in anyway, it will work through CGI, if not, then my suggestion that he mightn't get very far, is a valid answer under EE rules.
0
 

Author Comment

by:Alejandro_Lopez
Comment Utility
OK I agree

Regards
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Things That Drive Us Nuts Have you noticed the use of the reCaptcha feature at EE and other web sites?  It wants you to read and retype something that looks like this.Insanity!  It's not EE's fault - that's just the way reCaptcha works.  But it is …
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
The viewer will learn how to dynamically set the form action using jQuery.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now