How to build nginx from source with php upload progress module in ubuntu
BY vimal
7 years ago
comments comment

Are you looking to configure Drupal with nginx Server? Here is how you build nginx from source with php upload progress module in ubuntu.

Create a directory nginx-src and change to that directory

mkdir nginx-src
cd nginx-src

Then download the source package via apt

apt-get source nginx-full

If everything went successful, you get the nginx directory. inside the nginx directory, you have to modify the rules file in the directory debian in the debian/rules file add the configuration option


to the session config.status.full

(Note: The source package with ubuntu already includes the nginx-upload-progress module in the debian/modules directory, so you do not have to download the module separately)

Before compiling the package, we need to make sure every dependency libraries are available for compiling nginx with the command

sudo apt-get build-dep nginx-full

(In ubuntu I found that the dependency on libgd2-noxpm-dev conflicts with php5-gd package. So if you want to keep php5-gd with nginx you have to edit the debian/control file and change the dependency on libgd2-noxpm-dev to libgd2-xpm-dev)

After setting up all the dependencies, execute the command

dpkg-buildpackage -rfakeroot -uc -b

to build the debs required.

The deb files will be created in the nginx-src directory. You can then install the package with the command

sudo dpkg -i nginx-full_1.0.5-1_i386.deb

You can verify whether the upload-progress library is enabled with the command

sudo nginx -V



on 14th August 2007 / by webmaster
One of the most common support requests we receive from our customers is for clearing their computers of viruses. Most of the infections that we see are by viruses that spread by capitalizing on the ignorance of the users. A few smart steps, if taken by the users, could easily prevent infection from some of the more common viruses that float around in the cyber-universe. USB drives(also called Thumb Drives and Flash Drives) have long replaced floppies and cds as the preferred medium to transfer files from one computer to another. Lot of virus infections happen when using USB drives infected with viruses. One common way in which they spread is by exploiting the 'autorun' feature in Microsoft Windows XP. When a USB drive is connected to an infected computer the virus copies itself on to the USB drive and creates an autorun.inf file in the drive pointing to the copy of the virus on the USB drive. When the drive is then plugged on to a clean system with Windows XP the autorun gets triggered and the virus gets executed and the system gets infected. You can very easily prevent this from happening by setting the "Take no Action" as the default action on inserting a USB drive. If you have the guts you could also disable autorun for all removable media by setting the key 'NoDriveTypeAutorun' at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\policies\Explorer with the value 255. You can read more about disabling autorun at Even after disabling autorun you could trigger the virus execution if you double click on the "Removable Media" drive from "My Computer" as autorun would be the default action when autorun.inf is present in the media. The safest way to browse the contents in a USB drive is to right click on the drive icon and then using the "Explore" option. Another common set of viruses use an innocuous setting in the Explorer to trick the user into executing the virus and infecting the system with the virus. The default settings in Windows XP sets the options "Hide extensions for known file types" and "Do not show Hidden Files and Folders". When a USB drive is connected to a PC infected with the virus, the virus hides all the folders in the USB drive, copies itself as many times to the drive as there were folders in the drive and renames the copies to the names of the original folders. A feature of the virus is that the file icon for the virus is exactly identical to the default folder icon in windows. So if you view the contents of the USB drive with the above options set, you will see icons of as many 'folders' as you would have expected. However each of these folder icons represents a file and not a folder and this file would be the virus file. The first of the above options ensures that you will not see the ".exe" part in the name and the second of the options ensures that you will not see the original folders that are now hidden. Additionally some of the strains of these viruses does the same processes in the subfolders in the drive too. When an unsuspecting user connects this infected Thumb Drive to his system and opens the drive he would see the folder icon he was looking for and once double clicked he would inadvertently infect his system with the virus. You can unset the above options by going to My Computer >> Tools >> Folder options >> View >> Advanced settings and then selecting the appropriate radio buttons. Once that is done you will be able to identify infected Thumb Drives and prevent infection very easily. Also if you are using the explore option while opening the Thumb Drive you will very easily see that, though the folder icons are listed as icons in the explorer, they will not come up as folders in the folder bar. So Important things to remember are Never autorun from a Thumb Drive Always use the explore option when opening Thumb Drives Unset the option "Hide extensions for known file types" Set the option "Show Hidden files and folders" Keep your antivirus software updated and running all the time Finally, as a closing word, we urge you to take a look at the virus free world of Linux. Instead of trying to plug all loopholes in Windows and living under a constant threat of ever-evolving viruses, you could take a break and relax under the safe canopy of a secure Linux installation. If you would like to try out linux take a look at this irresistible offer from us - Free Linux Installation assistance System Administration Virus Leave a reply Your email address will not be published. Required fields are marker * Vishvesh Nayak (not verified) access_time 23 May 2019 - 13:43 I'm immensely thankful to the article posted on your site. I would like to promote your site to my friends. I would like to use this link to tell about the implications involved in using a pendrive to all my friends. At the same time, address the issues involving usage of Windows Operating System. Devashish (not verified) access_time 23 May 2019 - 13:43 nice Micheal (not verified) access_time 23 May 2019 - 13:43 Widespread problems and a failure to genuinely protect the public represent tacit encouragment of the spread of spyware and malware by government and industry. The public's ignorance is their misbegotten gain, and any genuine response is muted and rare. This page, for example, touches on only part of the issue, leaving out critical weaknesses. How, for example, do you protect thumbdrives from the most likely source of infection when plugging into a public internet cafe computer (most of which lack good firewalls)? Holding down the shift key is a method already obsolete perhaps, since activating the shift key when loading a thumbdrive simply locks the host computer. Best response to this problem is to buy a WRITE PROTECT thumbdrive so only you can write on it and no one else. Everything else, including most of what's written, is simply a marketing ploy to assuage consumers and keep them sinking millions of dollars into firewalls and spyware protection (most of which is spyware anyway and therefore ethically most industry today. This ubiquitious problem reflects just how unhealthy our culture has become in many ways. I say, leave the public alone and let them have their privacy if they need it. You don't have to pull people's teeth just to see what's underneath them. Add new comment

on 15th August 2007 / by webmaster
Ubuntu installation on a system which already has other operating systems is simple. Ubuntu will automatically detect other operating systems already installed on the computer and enable booting into them from the grub boot menu. However if you install Windows on a system which already has Ubuntu installed on a partition other than the partition on to which you install windows then you will inevitably lose the option to boot into the Ubuntu installation. There is a simple way to rectify this issue. Boot into Ubuntu using the Ubuntu Live CD Open Gedit and copy the following code into it sudo bash mkdir /mnt/hdd mount /dev/<hda6> /mnt/hdd grub-install --root-directory=/mnt/hdd /dev/<hda> Change <hda6> to whichever partition your /boot resides Change <hda> to whichever harddisk you want to install grub to Open a terminal, copy the code from GEdit and paste into the terminal Presto! You are done If you have any questions please feel free to Contact Us. You can also call us at +91-471-4063818 to get further assistance. If you can bring your PC to our office we will fix this for free else call us we will come over to your place and fix this issue for a nominal service charge. Linux System Administration Ubuntu Windows Leave a reply Your email address will not be published. Required fields are marker * abey (not verified) access_time 23 May 2019 - 13:43 What is the benifit of ubuntu Is this is good as fedora? How to install other software in ubuntu? Is it eazy to install linux software in ubuntu? How to get ubuntu in kerala Are there any solution providers in kerala webmaster access_time 23 May 2019 - 13:43 In reply to ubuntu by abey (not verified) Ubuntu - Linux for the common man Get Ubuntu CDs Delivered to your doorstep Ubuntu Pre-installed Systems Prasad.S.R (not verified) access_time 23 May 2019 - 13:43 Obtain a bootable Windows XP CD, and use it to boot. Wait through all the Bill-messages until you get the first prompt. Choose R to repair an existing installation. It will search and prompt the Windows installation, showing : 1) C:\WINDOWS choose 1, and it will ask for the Admin password. If you have one enter it or just press Enter. C:\WINDOWS> Now, type C:\WINDOWS> CD .. C:\> FIXBOOT C: C:\> FIXMBR C:\> BOOTCFG /rebuild After the BOOTCFG, it will ask if you want to add the Installation it found, and to be safe answer "Y". Prasad.S.R (not verified) access_time 23 May 2019 - 13:43 What to do: Put the Linux liveCD or boot disk you created while the installation; on the floppy drive, boot the system and run grub command Remember that for grub (hd0,1) means hda (primary controller master), second partition. Now we need to tell grub where are the grub files: If you know where they are, type something like: root (hd0,1) else if you have no idea, type: find /boot/grub/stage1 and then the root command with the correct parameters: setup (hd0) to install it on hd0, that is MBR of the first HD. type quit and reboot. The menu will appear again. If you want to make some changes to the boot menu, you must edit the file: /boot/grub/menu.lst $ gksu gedit media/disk/boot/grub/menu.lst sagar raythatha (not verified) access_time 23 May 2019 - 13:43 Hey all you can find best solution of this problem over here: Add new comment

on 03rd October 2007 / by webmaster
Ubuntu 6.10 had complete multimedia support including mp3, video cds, dvds. This was taken out in 7.10 because of license restrictions on the decoders and their incompatibility with the GNU GPL under which Ubuntu is being released. Enabling multimedia support for formats requiring non-GPL codecs in Ubuntu 7.04 was a pain. This is now child's play in Ubuntu 7.10 Once you install or uprade to Ubuntu 7.10 all you have to do is double click on an mp3 file from the file manager. The mp3 will be opened in the default player (being totem) and it will prompt you to download the necessary codecs. The download and installation happens automatically and you can sit back and relax. Once the codecs are installed your system is ready to play any mp3 file. Happy mp3-ing in Ubuntu Linux System Administration Ubuntu Leave a reply Your email address will not be published. Required fields are marker * music (not verified) access_time 23 May 2019 - 13:43 Thank you for good information Add new comment
Leave a reply
Your email address will not be published. Required fields are marker *

Filtered HTML

  • Web page addresses and email addresses turn into links automatically.
  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type='1 A I'> <li> <dl> <dt> <dd> <h2 id='jump-*'> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
The content of this field is kept private and will not be shown publicly.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

Lucas Saliés Brum (not verified)
access_time 23 May 2019 - 14:35

Thank you!!!
Awesome tutorial!

augusto (not verified)
access_time 23 May 2019 - 14:35

on my brand new vps, had a
root@li205-109:/opt/nginx-src# sudo dpkg -i nginx-full_1.2.1-2.2_i386.deb
(Reading database ... 31565 files and directories currently installed.)
Preparing to replace nginx-full 1.2.1-2.2 (using nginx-full_1.2.1-2.2_i386.deb) ...
Unpacking replacement nginx-full ...
dpkg: dependency problems prevent configuration of nginx-full:
nginx-full depends on nginx-common (= 1.2.1-2.2); however:
Package nginx-common is not installed.

dpkg: error processing nginx-full (--install):
dependency problems - leaving unconfigured
Errors were encountered while processing:

while installing the packaging with
sudo dpkg -i nginx-full_1.0.5-1_i386.deb

Solved with a sudo apt-get install nginx-common