From owner-freebsd-stable Fri Sep 15 11:48:43 2000 Delivered-To: freebsd-stable@freebsd.org Received: from cmh-dial.columbus.rr.com (cmh-dial.columbus.rr.com [204.210.252.23]) by hub.freebsd.org (Postfix) with ESMTP id 40CFD37B422 for ; Fri, 15 Sep 2000 11:48:38 -0700 (PDT) Received: from columbus.rr.com (dhcp26130024.columbus.rr.com [24.26.130.24]) by cmh-dial.columbus.rr.com (8.9.3/8.9.3) with ESMTP id OAA13480 for ; Fri, 15 Sep 2000 14:47:49 -0400 (EDT) Message-ID: <39C27048.D03DF9A6@columbus.rr.com> Date: Fri, 15 Sep 2000 14:54:00 -0400 From: Bill Moran X-Mailer: Mozilla 4.72 [en] (X11; I; FreeBSD 4.1-STABLE i386) X-Accept-Language: en MIME-Version: 1.0 Cc: stable@FreeBSD.ORG Subject: Re: apach+ssl+php port References: <39C26016.3066C92F@columbus.rr.com> <39C26125.DAFDAA2F@thehousleys.net> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG James Housley wrote:  > ports/www/apache13-ssl or > ports/www/apache13 then ports/www/mod_ssl or > ports/www/apache13+ipv6 then ports/www/mod_ssl > then > ports/www/mod_php3 or ports/www/mod_php4 > > Yes you can do it through the ports system.  Thanks to all who responded. That seems to do the trick. I'd forgotten all about the mod_* directories. Reminding me of this has probably saved me a lot of extra work. -- FreeBSD ('BSD'): No battles to the death are recalled. It is a small Daemon wearing sneakers. It is normally found on Internet servers and powerful desktops, and moves very quickly. A kill of this poweful creature is enough to tick off any sysadmin. It is highly magical, having the power to serve. It resists DoS and SYN flood attacks. Nothing is known about its attack. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message