Solved

Linux Server Requirements verification

Posted on 2012-04-09
6
250 Views
Last Modified: 2012-04-09
I have VPS and a better than basic knowledge of linux OS, I can use putty and not intimidated by command line. I am trying to have 3rd party software company install thier script and requirements, however I need to verify some info before hiring them. I have root access to the box.

Can someone lead me into how to verify the following information. My current host isnt being extremely helpful. And  I need to learn this stuff someday.
TIA

Linux Server (Fedora Core, CentOS, Ubuntu, Slackware or SuSE).
Apache Web Server
Support for AcceptPathInfo
Support for MultiViews (or mod_rewrite which is slower)
MySQL 5.x
PHP 5.x (mod_php/CGI)
Support for GD2 Library
Support for MySQL
Support for Curl
Support for uploadprogress PHP extension (only if you want to display a progress bar on uploads)
0
Comment
Question by:seaweed27
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 37824660
If you upload and run phpinfo(), it will give you Most of that info.

<?php
phpinfo();
?>

Open in new window

0
 

Author Comment

by:seaweed27
ID: 37824945
http://docs.simplemachines.org/index.php?topic=479.0

I found this and think I can pull it off. however a bit thrown by the "open in a browser"- haven't tried to use a the browser of the vps server.
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 37825155
That's exactly what I showed you above.  You upload it to the web site and open it in your regular browser ( http://www.yoursite.com/phpinfo.php ) and it tells you everything that PHP knows about your server.
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 

Author Comment

by:seaweed27
ID: 37825541
It was your post that led me to google "How to"- I am eager to follow up with your second post as i would have been just guessing  or grasping at straws :) Im not the sharpest knife in the drawer, but with perseverance I will cut through anything.... ;)
Thanks
0
 

Author Closing Comment

by:seaweed27
ID: 37825943
worked flawlessly
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 37825945
Glad to hear it, glad to help.
0

Featured Post

Give Your Engineering Team a Productivity Boost

Learn why container technology is so powerful and how it can provide your team with productivity gains and other benefits.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question