How do I check and change PHP environment?

Folks, I just installed Snow Leopard server and am having trouble getting things (that used php and GD library such as JetPhoto server) up and running. I could install MAMP I suppose, but don't want to override the features of Snow Leopard Server.
Is PHP installed with SL Server?
How do I check the PHP environment?
How do I enable GD library and enable registerlongarrays?

I've never viewed a php config except by using come cgi script or maybe it was . I have never used terminal to view or config php, but am not opposed to it either.
To confirm php is configured and launched (see below), launch Terminal.app, and cut-and-paste this into the terminal:
sudo echo "<?php phpinfo(); ?>" > /library/webserver/documents/somerandomname.php
sudo chmod o+r /library/webserver/documents/somerandomname.php
you'll have to enter your root password there. Those two bash shell commands stuff some text into a file named somerandomname.php in the web server root directory, and marks the file as world-readable.
The text is a simple php script that returns information on php.
Now (from a web browser running directly on the server) enter the URL:
http://localhost/somerandomname.php
If it is all working, you'll get the typical dump of php settings. This is what the dashboards show you.
When you are done (and to avoid exposing information) you'll probably want to delete the file:
sudo rm /library/webserver/documents/somerandomname.php
I am used to editing a php.ini file in textwrangler or bbedit, or even my web service provider's control panel.
You've signed up to run a server, which means you're going to get to learn more about Apache and IP networking and other tasks.
Nothing using php seems to load. When I installed jetphoto server which I'e used for years with out problem on OS X client, it runs flawlessly. It seems I have to do more with SL server.
Make sure that Server Admin has the php module enabled. Server Admin > select the server > Web Server > Settings > Modules > make sure php5_module is enabled. If not, enable it and restart the web server.
One other detail that can crop up here: Snow Leopard and Snow Leopard Server contain php 5.3, and some widgets aren't yet compatible with that version of php.

Similar Messages

  • Control-k key binding broken. How can I check and change my key bindings?

    I use the Terminal app a lot. Unfortunately I am not able to use the control-k shortcut to cut lines in the terminal anymore. How can I check (and change) the Terminal key bindings?
    Thank you!

    Basing on your input, you should get the following values:
    1) session keys
    SK_ENC: 6DCE2A99BACB5207A7A96A92F114D66C
    SK_MAC: 0D446132B168F75CD6F0A780693A4DD3
    SK_DEK: 19F7B0F94837F32874B29B5EFB7809F6
    2) host cryptogram
    1B781553209748EA
    3) Retail MAC
    01761103B810F00E
    Summing up, the External Authenticate command should have the following value:  84 82 01 00 10 1B781553209748EA 01761103B810F00E.
    Try to compare it with your results.
    Regards

  • How can I check and change the size of photo or doc in iPhone or any other app

    How can I check and change the size of photo or doc in iPhone or any other app

    You would need software form a third party to have this option.  The free software that comes with the 8600 doesn't have an option for that. Vuescan is the only software I could find that says it works with your pritner and has a descreen option.  You have to purchase it, but it will give you more advanced options than the software that came with the printer.
    -------------How do I give Kudos? | How do I mark a post as Solved? --------------------------------------------------------

  • How can I check and change the system set events trace level?

    Dear all:
    How can I check the system set events trace level? I don't want the alert_log so big.
    Regards
    Terry

    Hi Terry;
    Please check :
    How to determine which system events are currently being set? [ID 845043.1]
    How To List All The Named Events Set For A Database [ID 436036.1]
    How to set EVENTS in the SPFILE [ID 160178.1]
    Also check:
    http://www.dba-oracle.com/t_grid_rac_events_in_Oracle.htm
    http://www.akadia.com/services/ora_events.html
    Hope it helps
    Regard
    Helios

  • How to check and change the dafault session timeout of the Portal?

    Hello,
    When leaving a portal page open without using it for a certain amount of time and then accessing it again the Session times-out.
    Where can I check and change this default time-out time in case I would like to extand it for the end users?
    Roy

    Hi Roy,
    Session timeout includes multiple settings (J2EE setting and SSO setting at User Management).
    Defining the Timeout in J2EE Session
           1.      Open file web.xml (path depends on the version of EP6.0. If it is based on NW04, then
    ..\cluster\server0\apps\sap.com\irj\servlet_jsp\irj\root\WEB-INF
           2.      Enter a value in minutes under <session-timeout>. The value should roughly correspond to the length of a synchronization cycle. The default is 30 minutes.
    After a successful login, it receives a SSO ticket which is valid for longer duration (generally 8 hrs, default which you can changed using  "System Admin" as mentioned by Yoel.
    Thanks,
    Swapan

  • How do I check and clear malware from my Mac book Pro 10.6?

    How do I check and clear malware from my Mac book Pro OS x 10.6?

    Helpful Links Regarding Flashback Trojan and Virus Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    A link to a great User Tip about the trojan: Flashback Trojan User Tip.
    To check for the trojan: Anti Flashback Trojan 2.0.4.
    A Google search can reveal a variety of alternatives on how the remove the trojan should your computer get infected. This can get you started. Or the preferred method is to use Apple's protection tool: Flashback Malware Removal Tool 1.0.
    Or, open Software Update. If you do not have the Apple protection software installed it will download and install it via Software Update. If no update appears that means you either already have it installed or it isn't needed for your system. The software is only available for Leopard, Snow Leopard, and Lion versions of OS X.
    Also see Apple's article About Flashback malware.
    For general anti-virus protection I only recommend using ClamXav.
    For the DNS Changer malware see the following:
    Will your internet service cut off on July 9?
    DCWG | DNS Changer Working Group
    How to remove the DNS Changer malware

  • How does Avilability check and TOR  takes place in SD

    How does Avilability check and TOR  takes place in SD? if you have any Tax configuration notes please send it to my mail ID?
    [email protected]
    Gopal

    ATP
    Types of Availability Check in Sales and Distribution
    Processing
    There are three types of availability check:
    _ Check on the basis of the ATP quantities
    _ Check against product allocation
    _ Check against planning
    The following SD-specific control features need to be maintained in Customizing:
    _ Checking group
    The checking group controls whether the system is to create individual or collective
    requirements in sales and shipping processing. In addition, a material block for the
    availability check with transfer of requirements can be set here. The checking group can
    also be used to deactivate the availability check. This option was created especially for
    the assembly order so that when the bill of material is exploded in the assembly order,
    the individual components, if necessary, can be classified as non-critical parts as far as
    procurement is concerned.
    The checking group specifies in combination with the checking rule the scope of the
    availability check. It is proposed in the material master record on the basis of the material
    type and the plant, and copied into the sales and distribution documents.
    _ Checking Rule
    You use the checking rule to control the scope of the availability check for each
    transaction in sales and distribution. You also specify whether the check should be
    carried out including or excluding replenishment lead time. The individual checking rules
    define by transaction, which stock and inward and outward movement of goods should
    be taken into account for the availability check.
    _ Schedule line category
    You can control with the schedule line category whether an availability check and
    transfer of requirements should be carried out in the sales documents. The possible
    settings for this at schedule line level are dependent on the settings in the requirements
    class which is determined from the requirements type of the material.
    _ Delivery item category
    The delivery item category can be used to control whether an availability check takes
    place in deliveries.
    Requirements type
    The various requirements are identified by their requirements type. The requirements
    type refers to the requirements class and its control features.
    _ Requirements Class
    The requirements class contains all control features for planning such as relevance for
    planning, requirements planning strategy and requirements consumption strategy. In
    addition, it is specified at a global level whether an availability check is to take place for
    the material in the sales and distribution documents on the basis of the ATP quantity
    (ATP = available to promise) and whether requirements are to be passed on. A finer
    degree of control can be obtained for sales documents using the schedule line category.
    Replenishment lead time is only included in the check performed on the basis of the
    ATP quantity.
    Prerequisites
    An availability check can only be carried out if the following prerequisites have been fulfilled:
    _ The control elements described above for the availability check must be maintained in
    Customizing for Sales and the relevant assignments made to the sales transactions
    _ The availability check must be switched on at requirements class level and - for the
    availability check in the sales documents - at schedule line category level
    A requirements type must exist by which the requirements class can be found
    _ A plant must be defined. It can either be proposed from the customer or material master
    record or can be entered manually in the document.
    _ A checking group must be defined in the material master record on the Sales/plant data
    screen in the Availability check field
    Configuring entries of the Availability Check
    IMG&#61664;SD&#61664;Basic fncs&#61664;Availability check and TOR&#61664;Availability check&#61664;Availability check with ATP logic or against planning&#61664;Define checking groups
    You can use SAP std checking groups of 01 for summarized reqts or 02 for daily reqts or u can create ur own.
    The columns total sales and total deliveries are selection options whereby u can configure a checking rule to sum up reqts to post to MRP either individually or by day or week.
    Column 5, Block qty; set this block if u want several users to be able to process the material simultaneously in different transactions without blocking each other. The No Check indicator is used when u want a material to not be relevant for an ATP check.
    Defining a material block for other users. The Block checkbox is an indicator that enables u to block the particular material from being checked for availability if it is already being checked at the same time by another user.
    Defining the default value for checking groups. However should no entry exist for the checking group in the material master record, one can set a default value per material type and plant.
    Controlling the availability check. In this section, u tell the system what stock on hand and what inward and outward movements of stock it must take into account when performing the availability check. These settings are based on the checking group that is assigned to the material master record and the checking rule that is predefined and assigned to the sd transaction. The carry out control for the availability check must be maintained for both the sales order and delivery.
    TOR
    IMG &#61664; SD &#61664; Basic fncs &#61664; Availability check and TOR &#61664; TOR
    A line item in the sales order creates a schedule line. The schedule lines in the sales order transfer the requirements through to MRP. You can select the docs on which you want the TOR to happen. For ex, not for quotations.
    The TOR aims to ensure the ordered materials are available for the requested delivery date. The TOR can be set for individual or for collective requirements (materials master&#61664;sales/plant view).
    The TOR is dependent on the following data:
    The reqts type, reqts class, checking group and schedule line category.
    The reqts type and class are determined in the strategy group (material master&#61664;MRP3)
    For TOR to be carried out, a few criteria need to be met:
    Plant assigned to line item level, schedule line category should be switched on at TOR, TOR must be switched on at the reqts class level, checking group must be defined and allocated to the material master record (sales/plant view in the availability check field)
    The reqts class is the controlling factor for the availability check and the TOR for all sd types.
    Configuring the TOR:
    1) Use std 041 reqts class or copy and rename it. Use the indicators to select if this reqts class must carry out an availability check and/or a TOR.
    2) Define the reqts types. A reqts type is allocated to a single reqts class and not vice versa. It is based on the item category and the MRP type of the material.
    3) Assign the rqts type to the relevant item category in the sales order and the MRP type found on the material master record.
    You can select an alternative search strategy where u assign the reqts type to item category and MRP type. Can select source as 0, 1 or 2. (1 = Item type and MRP type strategy).
    4) The TOR and Availability check can be selected/de-selected at the schedule line category level.
    5) Block qty confirmation in delivery blocks. This is used to block the reservation of the TOR from MRP.
    6) Maintain requirements for TOR. Requirements can be used to determine that the TOR to MRP is not carried out unless a number of conditions are met.
    Availability Overview = CO09 &#61664; order qty, sd doc no, item no, requirements class.
    Stock requirements list = MD04 &#61664; sd no or dly no, line item, schedule line placing the demand
    Stock overview = MMBE &#61664; total stock per company, then plant followed by storage location, and finally a breakdown per batch
    this is the customising as weel as the knowledge part.
    PLease award pints if helpful
    thanks

  • How can I check and see that my photos are being backed up by time machine?

    How can I check and see that my photos are being backed up by time machine?

    http://pondini.org/TM/8.html

  • How can we create and change RSS XML?

    1. What tools can we use to create RSS XML pages?
    2. The pages should use data of the other XML pages generated by the XML-forms (e.g. News XML pages)?
    3. How can we setup and change RSS XML templates (e.g. add new tags, change properties and values)?

    Hi
    Is  there any way to create Rss for personal blogs and add it into our portal. That means we can add it newly by clicking button.
    Thank You
    Regards
    Krishnamurthy

  • How do I check and clean of virus's

    How would I check and clean my Mac of virus's?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. This feature is transparent to the user, but internally Apple calls it "XProtect." The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could conceivably get control of a code-signing certificate under false pretenses (though there's no evidence this has happened yet.) The certificate would eventually be revoked, but probably not before some damage was done.
    For more information about Gatekeeper, see this Apple Support article. 4. Considering all the above, the best defense against malware is your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    5. Java on the network (not to be confused with JavaScript, to which it's not related) is a weak point in the security of any operating system. If a Java web plugin is not installed, don't install one unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability and poor performance.
    By modifying the system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so can corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. If you don't need to do that, avoid it. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    8. The greatest danger posed by anti-virus software, in my opinion, is its effect on human behavior. When people install such software, which does little or nothing to protect them from emerging threats, they get a false sense of security from it, and then they may do things that make them more vulnerable. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use.

  • HT4914 How do i replace and change my back up music in itunes match?

    How do i replace and change my back up music in itunes match?

    What mail program are you using?
    If it’s Apple mail then goto Mail preferences and click on the signature tab.

  • How do I check and uncheck music

    How do I check and uncheck my music in iTunes. I opened my computer and all the music was unchecked. Is there a way I can check them all at once?

    Hold down the CMD key and click a check box. That will re-enable all your songs.

  • How can I check who changed a room number for an Asset?

    Hi people!
          I'm working as BASIS and in december we make a restore from production to another environment to make some test.. a user tell me that in transaction AS03 for an specific Asset number and company code the number of the room are diferent. For example he tell me that if he go to production and check the same asset for the same company code that he check in the test environment the room are diferents.. I think that maybe someone change it because 'is a restore'... I think that is imposible that this is caused by the restore.
    Someone knows how can I check in some transaction or table who change this room number?
    Thanks a lot for your help!!

    As stated by Eli, only where there is approval process involving workflow for any changes to the master, then it will be stored temporarily, till the approval process completes.
    If there is no approval process in the system (no workflow), them it immediate updates the database.
    Regards,
    Ravi

  • How to crop canvas and change aspect ratio?

    I'm working on a project shot with an old camera from the 70s. I used that camera but recorded the signal on my mini dv camera. Now I have a black border on the right side of the image.
    This project is going on the Web, not TV. How can I crop the canvas (and change the aspect ratio) without a black border? I know there's a crop feature in the motion tab, but that results in same aspect ratio with black border. Is this possible?
    (I don't care if the aspect ratio is non-standard, and I don't want to letterbox.)

    If you are going to the web (what means you'll downscale at the end) and you shoot using an old camera, the loss of quality of the upscaling probably means nothing in your final web encoding.
    You can make a test upscaling just some seconds of your movie an encoding it for the web to check the final quality.
    Hope that helps !
      Alberto

  • How to modify Find and Change indicator?

    I use Find and Change in Applewors 6. At present, this operation finds what is specified but the indicator is colored green and is open, and hard to locate on a page when looking for a single letter. I changed it from its original pale orange to what it is now but now I would like to change it back to something easier to find. But I forgot how I did it and did not make a note. Would appreciate info on how to change this indicator. Thanks

    Neil--
    Thanks for info. I found it under System preferences>Personal>Appearance. You get a lot of choices in color and intensity. I was hoping to change the Find and Change indicator to solid but maybe this is not possible.

Maybe you are looking for