Call for Paper - March 2020 Edition
IJCA solicits original research papers for the March 2020 Edition. Last date of manuscript submission is February 20, 2020. Read More

Web Solution using More Secure Apache HTTP Server with the Concept of Full Virtualization

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 98 - Number 22
Year of Publication: 2014
Pratibha Gangwar
Sarvesh Kumar
Noopur Rastogi

Pratibha Gangwar, Sarvesh Kumar and Noopur Rastogi. Article: Web Solution using More Secure Apache HTTP Server with the Concept of Full Virtualization. International Journal of Computer Applications 98(22):7-12, July 2014. Full text available. BibTeX

	author = {Pratibha Gangwar and Sarvesh Kumar and Noopur Rastogi},
	title = {Article: Web Solution using More Secure Apache HTTP Server with the Concept of Full Virtualization},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {98},
	number = {22},
	pages = {7-12},
	month = {July},
	note = {Full text available}


Virtualization is the concepts by which we can easily run the multiple virtual machines on a single physical machine by sharing the resources . By using the concept of virtualization the "unsigned" memory which is waste also utilize [1]. If we are not having the different machines so we can easily adopt the concept of virtualization by which we create the virtual machine. In the Linux kernel managing a RAM optimally is a long –solved problem [2]. In this paper we are implementing the concept of virtualization and the lamp server for which it is easy to run the n number of guest on virtual machine ,with the help of the Apache web server we can secure our web site by intrusion attacks and also apply the authentication on that . Once we have DNS correctly setup and our server has access to the internet we'll need to configure the apache to accept surfers wanting to access our website . These configuration maintains any existing resolution to an Internet Service Provider (ISP). And in this paper the main approach is for the college student who are in a dorm room with the limited Ethernet jacks and router they can easily solve their problem with this approach .


  • Virtio based transcendent memory ISBN:978-1-4244-5537-9,Computer Science and Information Technology (ICCSIT),2010 3rd IEEE International Conference on (Volume:1) by kulreja, G. ;Dept. ofComput. Eng. , MAEER"s Maharashtra Acad. Of Eng. , Pune ,Indian ;Singh ,S.
  • Transcendent Memory and Linux by Dan Mageheimer,ChrishMason ,DaceMcCracken,KurtHackel, Oracle Corp.
  • Secure Networking for virtual machine in the cloud, Publised in Cluster computing workshops (CLUSTER WORKSHOP) ,2012 IEEE International conference . by Komu, m. ; Dept. of ComptSci&Eng , Aalto, Finland; Sethi,M. Mallavarapu R. ; Oriole ,
  • Red Hat Enterprising Linux 6 Deployment Guide Edition 5
  • OPTAR: OPTIONAL PIR BASED TRUSTED ADDRESS RESOLUTION FOR DNS by RadhakrishnaBhat,N R Sunitha,Dept. of computer science &Engineering SIT,Tumkur-572103,Karnataka,India ,Proceeding of 5th SARC –IRF International Conference ,Banglore,India, 04th may 2014,ISBN:978-93-84209-13-1.
  • Efficient load balancing for bursty demean in web based application service via Domain name services by Mei Lu Chin; Fac. Of Comput. Sci. & Inf. Technol. Univ. Malaysia Sarawak. KotaSamarahan, Malaysia ;Chong Eng Tan ;Banda , M. I , Published in Information and telecommunication technologies (APSITT),2010 8th Asia –Pacific Symposium on 15-18 June 2010 ISBN 978-1-4244-6413-5 INSPEC Accession Number 11447751.
  • A scheme for high-performance LAN interconnection across public MAN's by A. N. Tantawy, M. zitterbart, IBM Thomas J. Watson Res. Center Yorktown Heights,NY. Published in IEEE Journal .
  • The bridging virtualization approach to next generation Broadband access networks by Jon Matias,EduardoJacob,MarinaAguado, JasoneAstorga .