Apache 2.2 2.4 difference
The settings in httpd.conf are similar and different after the Windows environment is changed from Apache2.2 to Apache2.4.
1. Change of permission setting method
2.2 Use Order Deny / Allow method, 2.4 switch to Require
apache2.2:
Order deny,allow
Deny from all
apache2.4:
Require all denied
The more commonly used ones here are as follows:
Require all denied Require all granted Require host xxx.com Require ip 192.168.1 192.168.2 Require local
Note: If there are any settings in the htaccess file, they must also be modified
2. Change the logging mode setting
RewriteLogLevel command is changed to logLevel
The first value set by LOGLEVEL is the default level for the entire Apache, followed by The logging level of this module can be modified for the specified module
For example:
LogLevel warn rewrite: warn
3, Namevirtualhost is removed
4, More modules need to be loaded
To enable Gzip, mod_deflate needs to be loaded in apache2.2, and mod_filter and mod_deflate need to be loaded in apache2.4
To enable SSL, in apache2.2 Mod_ssl needs to be loaded in, mod_socache_shmcb and mod_ssl need to be loaded in apache2.4
5. Recommended settings in the windows environment
EnableSendfile Off EnableMMAP Off
When the Log log appears It is recommended to set
AcceptFilter http none AcceptFilter https none
when there are errors such as AcceptEx failed. Note: Win32DisableAcceptEx is replaced by AcceptFilter None in apache2.4.
6, Listen setting Adjustment
Taking 443 as an example, you cannot only set Listen 443
The following error will occur:
(OS 10048) Only one communication address (protocol/network address) can be used at a time /connection): AH00072: make_sock: could not bind to address [::]:443
(OS 10048) Only one communication end address (protocol/network address/connection) can be used at a time: AH00072: make_sock: could not bind to address 0.0.0.0:443
AH00451: no listening sockets available, shutting down
AH00015: Unable to open logs
Therefore, you need to specify the listening IP, and you can set multiple
For more Apache related technical articles, please visit the Apache usage tutorial column to learn!
The above is the detailed content of Apache 2.2 2.4 difference. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Running the H5 project requires the following steps: installing necessary tools such as web server, Node.js, development tools, etc. Build a development environment, create project folders, initialize projects, and write code. Start the development server and run the command using the command line. Preview the project in your browser and enter the development server URL. Publish projects, optimize code, deploy projects, and set up web server configuration.

There are two ways to export XML to PDF: using XSLT and using XML data binding libraries. XSLT: Create an XSLT stylesheet, specify the PDF format to convert XML data using the XSLT processor. XML Data binding library: Import XML Data binding library Create PDF Document object loading XML data export PDF files. Which method is better for PDF files depends on the requirements. XSLT provides flexibility, while the data binding library is simple to implement; for simple conversions, the data binding library is better, and for complex conversions, XSLT is more suitable.

Apache errors can be diagnosed and resolved by viewing log files. 1) View the error.log file, 2) Use the grep command to filter errors in specific domain names, 3) Clean the log files regularly and optimize the configuration, 4) Use monitoring tools to monitor and alert in real time. Through these steps, Apache errors can be effectively diagnosed and resolved.

There are the following ways to generate a pom.xml file: Use Maven Archetype to provide predefined project templates to automatically generate pom.xml files for specific types of projects. Use the Maven Helper plugin to provide commands to generate pom.xml files. Create manually to customize the pom.xml file for the project.

To set character encoding on the server side to solve the garbled Bootstrap Table, you need to follow the following steps: check the server character encoding; edit the server configuration file; set the character encoding to UTF-8; save and restart the server; verify the encoding.

The preview methods of Bootstrap pages are: open the HTML file directly in the browser; automatically refresh the browser using the Live Server plug-in; and build a local server to simulate an online environment.

There are many reasons why XAMPP fails to start MySQL, including port conflicts, configuration file errors, insufficient system permissions, service dependency issues, and installation issues. The troubleshooting steps are as follows: 1) Check port conflicts; 2) Check configuration files; 3) Check system permissions; 4) Check service dependencies; 5) Reinstall MySQL. Follow these steps and you can find and resolve issues that cause MySQL startup to fail.

The key to PHPMyAdmin security defense strategy is: 1. Use the latest version of PHPMyAdmin and regularly update PHP and MySQL; 2. Strictly control access rights, use .htaccess or web server access control; 3. Enable strong password and two-factor authentication; 4. Back up the database regularly; 5. Carefully check the configuration files to avoid exposing sensitive information; 6. Use Web Application Firewall (WAF); 7. Carry out security audits. These measures can effectively reduce the security risks caused by PHPMyAdmin due to improper configuration, over-old version or environmental security risks, and ensure the security of the database.
