In this post, we will learn how to setup self signed SSL certificate for ghost blog on Nginx . In our previous posts, we have written post on “setting ghost on nginx to serve at HTTP / Port 80” . Recommended reading before starting to setup self signed SSL certificate for ghost blog on Nginx […]
Linux
Setup Nginx as proxy to serve ghost blog on port 80
In this tutorial, we will setup Nginx as proxy to serve ghost blog on port 80 / http . Nginx is widely used as web server plus it can also be used in various ways like loadbalancer, cacheing server, reverse proxy server etc. The use of nginx web server will boost your ghost server serving […]
Create upstart event system for ghost blog on Ubuntu
In this post we will learn , how to create upstart event system for ghost blog on Ubuntu . In our previous post, we have written how to install and run the ghost blog on Ubuntu . By using upstart event system, we can start,stop and restart the ghost with service command. Whereas on system […]
ghost blog reset password and activate user from sqlite
Ghost blog by default uses the sqlite database. After installing the Ghost blog on Ubuntu , I forgot the password of user. Because of unsuccessful trial more than a limit, my user also get deactivated. We have setup the self hosted ghost blog , hence it is quite easy to reset the password and activate […]
How to install and run ghost on Ubuntu
Ghost is free and Open source blogging platform, it is written on javascript . It is very popular among many bloggers now a days. The Ghost is maintained by Ghost Foundation. Do you want to know more about Ghost blogging platform and its history ? You can read about ghost blogging platform on Wikipedia. Know […]
Centralize authorized_keys file on Linux / Unix system
Authorized_keys are important files which has the information of public keys for public key authentication. By default location is ~/.ssh/authorized_keys. Here, ~ is users default home directory in system. While working on SSH, we got requirement to centralize the authorized_keys of all users existing in system. In most of the system for SSH we use […]
Recent Comments