Monthly Archives: August 2013

Memory dumps

memory dump records all the contents of system memory or debugging information when your computer stops unexpectedly( known as a “blue screen,” system crash, or bug check)

There are 3 dumps can generate

Kernel memory dump (Between150MB and 2GB)
Small memory dump (64 KB)
Complete memory dump(Physcical RAM+1MB)

Kernel memory dump
A kernel memory dump records only the kernel memory.For 32-bit systems, kernel memory is usually between150MB and 2GB. Additionally, on Windows 2003 and Windows XP, the page file must be on the boot volume. Otherwise, a memory dump cannot be created.

Small memory dump
A small memory dump records the smallest set of useful information that may help identify why your computer stopped unexpectedly.

This dump file type includes the following information:
•The Stop message and its parameters and other data
•A list of loaded drivers
•The processor context (PRCB) for the processor that stopped
•The process information and kernel context (EPROCESS) for the process that stopped
•The process information and kernel context (ETHREAD) for the thread that stopped
•The Kernel-mode call stack for the thread that stopped
Complete memory dump
A complete memory dump may contain data from processes that were running when the memory dump was collected.

If you select the Complete memory dump option, you must have a paging file on the boot volume that is sufficient to hold all the physical RAM plus 1 megabyte (MB).

Configure the dump type
1.Click Start, and then click Control Panel.
2.Click Performance and Maintenance, and then click System.
3.On the Advanced tab, click Settings under Startup and Recovery.
NOTE: You must restart Windows in order for your changes to take affect.

Registry location
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\CrashControl

The default path is C:\Windows\MEMORY.DMP or %SystemRoot%\MEMORY.DMP.

Change Dump File Location in Startup and Recovery
Right click on the Computer button on the dark right side and click on Properties Advanced system settings
Under the Advanced tab, click on the Settings button under Startup and Recovery.
In the Write debugging information list

Note:The default path is C:\Windows\Minidump or %SystemRoot%\Minidump.

Using Command
Open a elevated command prompt
wmic RECOVEROS get DebugFilePath ; To see What the Current Default Dump File Location is Set To
wmic RECOVEROS set DebugFilePath = “file path” ;To Change the Default Dump File Location

Tools to read the small memory dump file
Dumpchk is a command-line utility you can use to verify that a memory dump file has been created correctly. Dumpchk does not require access to symbols.

You can download debugging tools for Windows products from the following Microsoft Web site:
http://www.microsoft.com/whdc/DevTools/Debugging/default.mspx

Dumpchk has the following command-line switches:
   DUMPCHK [options] <CrashDumpFile>

     -? Display the command syntax.

     -p Prints the header only (with no validation).

     -v Specifies verbose mode.

     -q Performs a quick test. Not available in the Windows 2000.
    Additional switches that are only available in Windows 2000 Dumpchk.exe version:
    -c Do dump validation.

    -x Extra file validation. Takes several minutes.

    -e Do dump exam.

    -y <Path> Set the symbol search path for dump exam.
       If the symbol search path is empty, the CD-ROM
       is used for symbols.

    -b <Path> Set the image search path for dump exam.
       If the symbol search path is empty, <SystemRoot>\system32
       is used for symbols.

    -k <File> Set the name of the kernel to File.

    -h <File> Set the name of the hal to File.
    
Open the dump file
1.Click Start, click Run, type cmd, and then click OK.
2.Change to the Debugging Tools for Windows folder. To do this, type the following at the command prompt, and then press ENTER:
cd c:\program files\debugging tools for windows
3.To load the dump file into a debugger, type one of the following commands, and then press ENTER:
windbg -y SymbolPath -i ImagePath -z DumpFilePath
kd -y SymbolPath -i ImagePath -z DumpFilePath

The following table explains the use of the placeholders that are used in these commands.
Placeholder  Explanation
SymbolPath  Either the local path where the symbol files have been downloaded or the symbol server path, including a cache folder. Because a small memory dump file contains limited information, the actual binary files must be loaded together with the symbols for the dump file to be correctly read.

ImagePath  The path of these files. The files are contained in the I386 folder on the Windows XP CD-ROM. For example, the path may be C:\Windows\I386.  

DumpFilePath  The path and file name for the dump file that you are examining.

Refferences
http://support.microsoft.com/kb/254649
http://www.sevenforums.com/tutorials/204214-dump-file-change-default-location.html
http://msdn.microsoft.com/en-us/windows/hardware/gg463009.aspx
http://support.microsoft.com/kb/156280
http://support.microsoft.com/kb/315263#method6

Install and configure Varnish Cache or Web Accelerator

Varnish is an open source web application accelerator also call as HTTP accelerator or caching HTTP reverse proxy.Varnish is focused exclusively on HTTP,unlike other proxy servers that often support FTP, SMTP and other network protocols.If you need https, then use something like NGINX for 443 and Varnish for 80.2.If you want to essentially redirect all port 80 traffic to port 443, then a simple way would be to write a redirect in your site’s .htaccess file.

Installations

Yum install varnish
sudo apt-get install varnish

Configurations

# List of upstream proxies we trust to set X-Forwarded-For correctly.acl upstream_proxy {  “127.0.0.1”;}

backend default {  .host = “127.0.0.1”;  .port = “8080”;}

sub vcl_recv {
  # Set the X-Forwarded-For header so the backend can see the original
  # IP address. If one is already set by an upstream proxy, we’ll just re-use that.
  if (client.ip ~ upstream_proxy && req.http.X-Forwarded-For) {
    set req.http.X-Forwarded-For = req.http.X-Forwarded-For;
  } else {
    set req.http.X-Forwarded-For = regsub(client.ip, “:.*”, “”);
  }
}

sub vcl_hash {
  # URL and hostname/IP are the default components of the vcl_hash
  # implementation. We add more below.
  hash_data(req.url);
  if (req.http.host) {
      hash_data(req.http.host);
  } else {
      hash_data(server.ip);
  }

  # Include the X-Forward-Proto header, since we want to treat HTTPS
  # requests differently, and make sure this header is always passed
  # properly to the backend server.
  if (req.http.X-Forwarded-Proto) {
    hash_data(req.http.X-Forwarded-Proto);
  }

  return (hash);
}
 
Starting Varnish
# chkconfig –level 345 varnish on
# /etc/init.d/varnish start

or
# varnishd -f /usr/local/etc/varnish/default.vcl -s malloc,1G -T 127.0.0.1:2000 -a 0.0.0.0:8080

Here traffic on 8080 port forward to a web server listening on port 2000

check for running
# ps auxww | grep varnish
How to Install and Configure Varnish with Apache on Ubuntu 12.04

https://www.digitalocean.com/community/articles/how-to-install-and-configure-varnish-with-apache-on-ubuntu-12-04–3

How to Install WordPress, Nginx, PHP, and Varnish on Ubuntu 12.04

https://www.digitalocean.com/community/articles/how-to-install-wordpress-nginx-php-and-varnish-on-ubuntu-12-04

Ubuntu 12.04 – Install Varnish 3 in front of Apache 2

http://pietervogelaar.nl/ubuntu-12-04-install-varnish-3-in-front-of-apache-2/

Setting Up Varnish & Memcache with Aegir

http://community.aegirproject.org/node/388

Refferences
http://www.tecmint.com/install-varnish-cache-web-accelerator/
http://mikkel.hoegh.org/blog/2012/07/24/varnish-as-reverse-proxy-with-nginx-as-web-server-and-ssl-terminator/
https://github.com/revealit/varnishconf/blob/master/revealit.vcl
https://gist.github.com/jeremyjbowers/1542949
https://www.varnish-cache.org/trac/wiki/DebuggingVarnish
https://www.varnish-cache.org/trac/wiki/Introduction

Trouble shooting Volume Shadow copy Service errors

 

1 VSS service status
Type services.msc from run and check Volume Shadow Copy services is running.

2 Type below commad for any writer errors
C:\Windows\system32>vssadmin list writers

3 Windows logs
Type eventvwr in run and open Application for error messages  relating to ‘VSS’, ‘Shadow Copy’ or ‘VolSnap’.

4 Re-register the VSS components
Sometimes re-registering VSS core components can fix errors. Copy the following commands to Notepad and save the file with a ‘.bat’ extension. Run the .bat file by opening a command prompt and entering the .bat file name.

cd /d %windir%\system32
net stop vss
net stop swprv
regsvr32 /s ole32.dll
regsvr32 /s oleaut32.dll
regsvr32 /s vss_ps.dll
vssvc /register
regsvr32 /s /i swprv.dll
regsvr32 /s /i eventcls.dll
regsvr32 /s es.dll
regsvr32 /s stdprov.dll
regsvr32 /s vssui.dll
regsvr32 /s msxml.dll
regsvr32 /s msxml3.dll
regsvr32 /s msxml4.dll
vssvc /register
net start swprv
net start vss

Volume shadow copy service

Shadow Copy (Volume Snapshot Service, Volume Shadow Copy Service or VSS), is a technology that allows taking manual or automatic backup copies or snapshots of data, even if it has a lock, on a specific volume at a specific point in time over regular intervals.

Snapshots have two primary purposes: they allow the creation of consistent backups of a volume, ensuring that the contents cannot change while the backup is being made; and they avoid problems with file locking. By creating a read-only copy of the volume, backup programs are able to access every file without interfering with other programs writing to those same files.

Enabling Volume Shadow Copy
All of the VSS configuration options are accessible through Windows’ Disk Management Console. You can access the Disk Management Console by entering the DISKMGMT.MSC command at the Run prompt.

Shadow Copy Clients
To configure your workstations so that they can access the shadow copy files.To do so, you must create a network share on your server that allows clients to access the server’s %SYSTEMROOT%\TWCLIENT\X86 folder.

Once the location has been shared, go to a client machine and run the TWCLI32.MSI program found in this folder.

Command                                                                            Description
Vssadmin add shadowstorage                                      Adds a volume shadow copy storage     association.
Vssadmin create shadow                                                 Creates a new volume shadow copy.
Vssadmin delete shadows                                              Deletes volume shadow copies.
Vssadmin delete shadowstorage                                 Deletes volume shadow copy storage     associations.
Vssadmin list providers                                                   Lists registered volume shadow copy     providers.
Vssadmin list shadows                                                    Lists existing volume shadow copies.
Vssadmin list shadowstorage                                      Lists all shadow copy storage associations on  the system.
Vssadmin list volumes                                                    Lists volumes that are eligible for shadow copies.
Vssadmin list writers                                                       Lists all subscribed volume shadow copy  writers on the system.
Vssadmin resize shadowstorage                                 Resizes the maximum size for a shadow copy storage association.

Windows memory dump

memory dump records all the contents of system memory or debugging

information when your computer stops unexpectedly( known as a “blue screen,”

system crash, or bug check)

There are 3 dumps can generate

Kernel memory dump (Between150MB and 2GB)
Small memory dump (64 KB)
Complete memory dump(Physcical RAM+1MB)

Kernel memory dump
A kernel memory dump records only the kernel memory.For 32-bit systems,

kernel memory is usually between150MB and 2GB. Additionally, on Windows 2003

and Windows XP, the page file must be on the boot volume. Otherwise, a memory

dump cannot be created.

Small memory dump
A small memory dump records the smallest set of useful information that may

help identify why your computer stopped unexpectedly.

This dump file type includes the following information:
•The Stop message and its parameters and other data
•A list of loaded drivers
•The processor context (PRCB) for the processor that stopped
•The process information and kernel context (EPROCESS) for the process that

stopped
•The process information and kernel context (ETHREAD) for the thread that

stopped
•The Kernel-mode call stack for the thread that stopped
Complete memory dump
A complete memory dump may contain data from processes that were running when

the memory dump was collected.

If you select the Complete memory dump option, you must have a paging file on

the boot volume that is sufficient to hold all the physical RAM plus 1

megabyte (MB).

Configure the dump type
1.Click Start, and then click Control Panel.
2.Click Performance and Maintenance, and then click System.
3.On the Advanced tab, click Settings under Startup and Recovery.
NOTE: You must restart Windows in order for your changes to take affect.

Registry location
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\CrashControl

The default path is C:\Windows\MEMORY.DMP or %SystemRoot%\MEMORY.DMP.

Change Dump File Location in Startup and Recovery
Right click on the Computer button on the dark right side and click on

Properties Advanced system settings
Under the Advanced tab, click on the Settings button under Startup and

Recovery.
In the Write debugging information list

Note:The default path is C:\Windows\Minidump or %SystemRoot%\Minidump.

Using Command
Open a elevated command prompt
wmic RECOVEROS get DebugFilePath ; To see What the Current Default Dump File

Location is Set To
wmic RECOVEROS set DebugFilePath = “file path” ;To Change the Default Dump

File Location

Tools to read the small memory dump file
Dumpchk is a command-line utility you can use to verify that a memory dump

file has been created correctly. Dumpchk does not require access to symbols.

You can download debugging tools for Windows products from the following

Microsoft Web site:
http://www.microsoft.com/whdc/DevTools/Debugging/default.mspx

Dumpchk has the following command-line switches:
   DUMPCHK [options] <CrashDumpFile>

     -? Display the command syntax.

     -p Prints the header only (with no validation).

     -v Specifies verbose mode.

     -q Performs a quick test. Not available in the Windows 2000.
    Additional switches that are only available

in Windows 2000 Dumpchk.exe version:
    -c Do dump validation.

    -x Extra file validation. Takes several minutes.

    -e Do dump exam.

    -y <Path> Set the symbol search path for dump exam.
       If the symbol search path is empty, the CD-ROM
       is used for symbols.

    -b <Path> Set the image search path for dump exam.
       If the symbol search path is empty, <SystemRoot>\system32
       is used for symbols.

    -k <File> Set the name of the kernel to File.

    -h <File> Set the name of the hal to File.
    
Open the dump file
1.Click Start, click Run, type cmd, and then click OK.
2.Change to the Debugging Tools for Windows folder. To do this, type the

following at the command prompt, and then press ENTER:
cd c:\program files\debugging tools for windows
3.To load the dump file into a debugger, type one of the following commands,

and then press ENTER:
windbg -y SymbolPath -i ImagePath -z DumpFilePath
kd -y SymbolPath -i ImagePath -z DumpFilePath

The following table explains the use of the placeholders that are used in

these commands.
Placeholder  Explanation
SymbolPath  Either the local path where the symbol files have been

downloaded or the symbol server path, including a cache folder. Because a

small memory dump file contains limited information, the actual binary files

must be loaded together with the symbols for the dump file to be correctly

read.

ImagePath  The path of these files. The files are contained in the I386

folder on the Windows XP CD-ROM. For example, the path may be C:\Windows

\I386.  

DumpFilePath  The path and file name for the dump file that you are

examining.

Refferences
http://support.microsoft.com/kb/254649
http://www.sevenforums.com/tutorials/204214-dump-file-change-default

location.html
http://msdn.microsoft.com/en-us/windows/hardware/gg463009.aspx
http://support.microsoft.com/kb/156280
http://support.microsoft.com/kb/315263#method6

Import and export windows local security policy

Instructions

Export

1.       Click Start -> Run, type “secpol.msc”, to open the Security Policy tool.
2.       Configure the Password Policy as required.
3.       Right click “Security Settings”, and click “Export Policy…” to export the settings to a .inf file.

Import

1 Click the “Start” button. This is the circular button with the Windows logo.
2 Type “gpedit.msc” without the quotation marks in the “Search programs and

files” box. Press “Enter” to launch the group policy editor.
3 Expand “Computer Configuration” under the “Local Computer Policy.”
4 Expand “Windows Settings” under “Computer Configuration” and click “Security

Settings.”
5 Click the “Action” menu and select “Import Policy.”
6 Browse to the location of the security template file and select the security

template to be imported.
7 Click “Open” to import.

Read more from
http://blogs.technet.com/b/askds/archive/2008/05/28/default-security

templates-in-windows-2008.aspx
http://technet.microsoft.com/en-us/library/hh875542(v=ws.10).aspx
http://social.technet.microsoft.com/Forums/windowsserver/en-US/cedf320b-cbf5

4f32-b37c-5d44706181dc/how-to-manage-local-security-policy

Install and configure Varnish Cache or Web Accelerator

Varnish is an open source web application accelerator also call as HTTP

accelerator or caching HTTP reverse proxy.Varnish is focused exclusively on

HTTP,unlike other proxy servers that often support FTP, SMTP and other network

protocols.If you need https, then use something like NGINX for 443 and Varnish

for 80.2.If you want to essentially redirect all port 80 traffic to port 443,

then a simple way would be to write a redirect in your site’s .htaccess file.

Installations

Yum install varnish
sudo apt-get install varnish

Configurations

# List of upstream proxies we trust to set X-Forwarded-For correctly.acl

upstream_proxy {  “127.0.0.1”;}

backend default {  .host = “127.0.0.1”;  .port = “8080”;}

sub vcl_recv {
  # Set the X-Forwarded-For header so the backend can see the original
  # IP address. If one is already set by an upstream proxy, we’ll just re-use

that.
  if (client.ip ~ upstream_proxy && req.http.X-Forwarded-For) {
    set req.http.X-Forwarded-For = req.http.X-Forwarded-For;
  } else {
    set req.http.X-Forwarded-For = regsub(client.ip, “:.*”, “”);
  }
}

sub vcl_hash {
  # URL and hostname/IP are the default components of the vcl_hash
  # implementation. We add more below.
  hash_data(req.url);
  if (req.http.host) {
      hash_data(req.http.host);
  } else {
      hash_data(server.ip);
  }

  # Include the X-Forward-Proto header, since we want to treat HTTPS
  # requests differently, and make sure this header is always passed
  # properly to the backend server.
  if (req.http.X-Forwarded-Proto) {
    hash_data(req.http.X-Forwarded-Proto);
  }

  return (hash);
}
 
Starting Varnish
# chkconfig –level 345 varnish on
# /etc/init.d/varnish start

or
# varnishd -f /usr/local/etc/varnish/default.vcl -s malloc,1G -T

127.0.0.1:2000 -a 0.0.0.0:8080

Here traffic on 8080 port forward to a web server listening on port 2000

check for running
# ps auxww | grep varnish
How to Install and Configure Varnish with Apache on Ubuntu 12.04

https://www.digitalocean.com/community/articles/how-to-install-and-configure

varnish-with-apache-on-ubuntu-12-04–3

How to Install WordPress, Nginx, PHP, and Varnish on Ubuntu 12.04

https://www.digitalocean.com/community/articles/how-to-install-wordpress

nginx-php-and-varnish-on-ubuntu-12-04

Ubuntu 12.04 – Install Varnish 3 in front of Apache 2

http://pietervogelaar.nl/ubuntu-12-04-install-varnish-3-in-front-of-apache-2/

Setting Up Varnish & Memcache with Aegir

http://community.aegirproject.org/node/388

Refferences
http://www.tecmint.com/install-varnish-cache-web-accelerator/
http://mikkel.hoegh.org/blog/2012/07/24/varnish-as-reverse-proxy-with-nginx

as-web-server-and-ssl-terminator/
https://github.com/revealit/varnishconf/blob/master/revealit.vcl
https://gist.github.com/jeremyjbowers/1542949
https://www.varnish-cache.org/trac/wiki/DebuggingVarnish
https://www.varnish-cache.org/trac/wiki/Introduction

Http-Ping a utility to ping your site

Ping is a common utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

http-ping is a small, free, easy-to-use Windows command line utility that probes a given URL and displays relevant statistics. It is similar to the popular ping utility, but works over HTTP/S instead of ICMP, and with a URL instead of a computer name/IP address. http-ping supports IPv6 addresses.

For each request, http-ping displays: The HTTP return code (and its brief textual description) The number of bytes returned by the server (excluding headers) The time taken to complete the request (i.e. round-trip time) A summary of all the requests is presented upon completion.

Command-Line Options http-ping offers a rich set of command line options which can be seen by running “http-ping.exe /?” from a DOS prompt:

http-ping [-t] [-n count] [-i interval] [-f file-name] [-s] [-v]
          [-q] [-c] [-r] [-w timeout] [-p] [-d] [-o data | -of file-name]
          [-ua user-agent] URL

Where:
    URL            The URL you wish to check. For example, http://www.kiva.org,
                   http://209.191.122.70, or http://www.yourhost:8080.
                   Be sure to surround an IPv6 address with square brackets. For
                   example, http://[2a00:1450:4007:800::1014].

Options:
    -t             Ping the specified URL until stopped.
                   To see statistics and continue - type Control-Break;
                   To stop - type Control-C.
    -n count       Send 'count' requests. Supercedes -t.
    -i interval    Wait 'interval' seconds between each request. There is a
                   1-second wait if this option is not specified.
    -f file-name   Save responses to file 'file-name'. Please specify the full
                   path, and use quotes around file names with spaces.
    -s             Silent. Print no output.
    -v             Verbose. Print detailed output. Supercedes -s.
    -q             Quick. Perform HTTP HEAD requests instead of GETs. This will
                   retrieve headers only, and bytes reported will be 0.
    -c             Perform a full connection on each request; ignore keep-alive.
    -r             Follow HTTP redirects.
    -w timeout     Wait 'timeout' seconds for a response before timing out.
                   Specify 0 to avoid timing out.
                   If not specified, the default timeout is 30 seconds.
    -p             Use the proxy defined in the Windows Internet settings.
    -d             Print the date and time of each ping attempt.
    -o data        Perform HTTP POSTs sending the given data. Please enclose
                   the data in quotes if it contains spaces.\n"
    -of file-name  Perform HTTP POSTs sending the contents of file 'file-name'.
                   Please specify the full path, and use quotes if the file name
                   contains spaces.
    -ua user-agent Set the User-Agent value to 'user-agent'. Please use quotes
                   if the value contains spaces.

Reffernce

http://www.coretechnologies.com/products/http-ping/

SSL on different port

Secured Sockets Layer (SSL) provides websites with encryption services which means, protects user data from a hacker to read data packets that transfer between the server and client.Generaly it runs on well known port number 443 and doesn’t mean it has to use the same port.
An administrator can change manually on a different port number.

In IIS , this need to be bind with different port no and then can access the site by using

https://yoursite:8445/
In Apache configuration, this need to be enabled by virtual host setting
————————————————————————
Listen 80
Listen 444

NameVirtualHost IP:80
NameVirtualHost ip:444

<VirtualHost *:80>
  ServerName www.yourdomain.com
  DocumentRoot /www/htdocs/
</VirtualHost>
<VirtualHost IP:444>
    ServerName  www.yourdomain.com
    DocumentRoot /www/htdocs/subcom/

     SSLEnable
    SSLCertificateFile  /path/to/ceritficate.crt
    SSLCertificateKeyFile  /path/to/ceritficate.key
    SSLCACertificateFile  /path/to/ca.crt
</VirtualHost>
On Jboss
——–
Connector in the $CATALINA_BASE/conf/server.xml file

To define a Java (JSSE) connector
 <– Define a blocking Java SSL Coyote HTTP/1.1 Connector on port 8443 –>
<Connector protocol=”org.apache.coyote.http11.Http11Protocol”
      port=”8443″ …/>

<– Define a SSL Coyote HTTP/1.1 Connector on port 8443 –>
<!–
<Connector
           port=”8443″ maxThreads=”200″
           scheme=”https” secure=”true” SSLEnabled=”true”
           keystoreFile=”${user.home}/.keystore” keystorePass=”changeit”
           clientAuth=”false” sslProtocol=”TLS”/>
–>
Alternatively, APR connector 
  
 <– Define a APR SSL Coyote HTTP/1.1 Connector on port 8443 –>
<Connector protocol=”org.apache.coyote.http11.Http11AprProtocol”
           port=”8443″ …/>
 <Listener className=”org.apache.catalina.core.AprLifecycleListener”
          SSLEngine=”someengine” SSLRandomSeed=”somedevice” />
 
 <– Define a SSL Coyote HTTP/1.1 Connector on port 8443 –>
<!–
<Connector
           port=”8443″ maxThreads=”200″
           scheme=”https” secure=”true” SSLEnabled=”true”
           SSLCertificateFile=”/usr/local/ssl/server.crt”
           SSLCertificateKeyFile=”/usr/local/ssl/server.pem”
           clientAuth=”optional” SSLProtocol=”TLSv1″/>
–>
https://localhost:8443

Refferences

IIS
http://msdn.microsoft.com/en-us/library/ms733791.aspx
http://www.sslshopper.com/article-how-to-configure-ssl-host-headers-in-iis-6.html
http://www.petri.co.il/configure_ssl_on_your_website_with_iis.htm#

apache
http://httpd.apache.org/docs/2.2/ssl/ssl_faq.html
http://www.apache-ssl.org/
tomcat
http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html
http://mircwiki.rsna.org/index.php?title=Configuring_Tomcat_to_Support_SSL

%d bloggers like this: