{"id":135,"date":"2011-11-27T07:27:00","date_gmt":"2011-11-27T07:27:00","guid":{"rendered":"http:\/\/pheonixsolutions.com\/?p=135"},"modified":"2026-05-10T18:07:48","modified_gmt":"2026-05-10T12:37:48","slug":"mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/","title":{"rendered":"How to compile mod_security in Apache 1.3 or 2.x?"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Introduction:<\/h3>\n\n\n\n<p>ModSecurity is an open-source web application firewall (WAF) module for the Apache HTTP Server. It helps protect web servers against common attacks such as SQL injection, cross-site scripting (XSS), remote file inclusion, and malicious HTTP requests.<\/p>\n\n\n\n<p>Compiling Apache with ModSecurity allows administrators to integrate advanced request filtering and security rules directly into the web server environment. This guide explains how to download, compile, configure, and enable ModSecurity on Apache servers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Prerequisites:<\/h3>\n\n\n\n<p>Before starting the installation, ensure the following requirements are met:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Root or sudo access to the server<\/li>\n\n\n\n<li>Apache installed on the system<\/li>\n\n\n\n<li>Apache development tools (<code>apxs<\/code> and <code>httpd-devel<\/code>)<\/li>\n\n\n\n<li>GCC compiler and build tools installed<\/li>\n\n\n\n<li>Basic knowledge of Linux command line operations<\/li>\n<\/ul>\n\n\n\n<p>Install required development packages if they are not already available:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ yum install httpd-devel gcc make -y<\/code><\/pre>\n\n\n\n<p>For Debian\/Ubuntu systems:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ apt-get install apache2-dev build-essential -y<\/code><\/pre>\n\n\n\n<p>It is also recommended to create a backup of the Apache configuration before making any changes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Implementation:<\/h3>\n\n\n\n<p><strong>Step 1: Download and Extract ModSecurity<\/strong><\/p>\n\n\n\n<p>Download the ModSecurity source package:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ wget http:\/\/www.modsecurity.org\/download\/modsecurity-apache_1.9.4.tar.gz<\/code><\/pre>\n\n\n\n<p>Extract the archive:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ tar -zxf modsecurity-apache_1.9.4.tar.gz<\/code><\/pre>\n\n\n\n<p><strong>Step 2: Navigate to the Apache Version Directory<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">For Apache 1.3.x<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>$ cd modsecurity-apache_1.9.4\/apache1<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">For Apache 2.x<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>$ cd modsecurity-apache_1.9.4\/apache2<\/code><\/pre>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Note: Most modern Linux distributions and control panels such as Plesk use Apache 2.x.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>Step 3: Compile ModSecurity<\/strong><\/p>\n\n\n\n<p>Compile the ModSecurity module using the Apache Extension Tool (<code>apxs<\/code>):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ \/etc\/httpd\/bin\/apxs -cia mod_security.c<\/code><\/pre>\n\n\n\n<p>If the above command fails due to missing development files, install the Apache development package and retry:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ yum install httpd-devel -y\/usr\/sbin\/apxs -cia mod_security.c<\/code><\/pre>\n\n\n\n<p>Successful compilation will install the <code>mod_security.so<\/code> module into the Apache modules directory.<\/p>\n\n\n\n<p><strong>Step 4: Backup Apache Configuration<\/strong><\/p>\n\n\n\n<p>Before modifying the Apache configuration, create a backup:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ cp \/etc\/httpd\/conf\/httpd.conf \/etc\/httpd\/conf\/httpd.conf-mod_sec<\/code><\/pre>\n\n\n\n<p><strong>Step 5: Edit Apache Configuration<\/strong><\/p>\n\n\n\n<p>Open the Apache configuration file:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ vi \/etc\/httpd\/conf\/httpd.conf<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">For Apache 1.3.x<\/h3>\n\n\n\n<p>Locate the following line:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>AddModule mod_security.c<\/code><\/pre>\n\n\n\n<p>If it does not exist, add it with the other module entries.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">For Apache 2.x<\/h3>\n\n\n\n<p>Locate the following line:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code> LoadModule security_module modules\/mod_security.so<\/code><\/pre>\n\n\n\n<p>Below this line, add the ModSecurity ruleset configuration.<\/p>\n\n\n\n<p><strong>Step 6: Configure ModSecurity Rules<\/strong><\/p>\n\n\n\n<p>Add the following basic ModSecurity directives:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Enable ModSecuritySecFilterEngine On# Hide Apache version informationSecServerSignature \"Apache\"# Unicode checkSecFilterCheckUnicodeEncoding Off# Audit loggingSecAuditEngine RelevantOnlySecAuditLog logs\/audit_log# Scan POST payloadsSecFilterScanPOST On# Default actionSecFilterDefaultAction \"deny,log,status:403\"<\/code><\/pre>\n\n\n\n<p>Additional custom filtering rules can then be added based on security requirements.<\/p>\n\n\n\n<p>The provided ruleset includes protections against:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>XSS attacks<\/li>\n\n\n\n<li>Malicious file downloads<\/li>\n\n\n\n<li>Email header injection<\/li>\n\n\n\n<li>Remote command execution attempts<\/li>\n\n\n\n<li>Common exploit patterns<\/li>\n<\/ul>\n\n\n\n<p><strong>Step 7: Restart Apache<\/strong><\/p>\n\n\n\n<p>After saving the configuration, restart Apache to apply the changes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">On CentOS\/RHEL<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>$ service httpd restart<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">On Ubuntu\/Debian<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>$ systemctl restart apache2<\/code><\/pre>\n\n\n\n<p><strong>Step 8: Verify ModSecurity<\/strong><\/p>\n\n\n\n<p>Check whether ModSecurity is loaded successfully:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ httpd -M | grep security<\/code><\/pre>\n\n\n\n<p>Or on Debian\/Ubuntu:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ apache2ctl -M | grep security<\/code><\/pre>\n\n\n\n<p>You should see output similar to:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>security_module (shared)<\/code><\/pre>\n\n\n\n<p>Monitor the ModSecurity audit log for blocked or suspicious requests:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ tail -f \/etc\/httpd\/logs\/audit_log<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Compiling Apache with ModSecurity provides an additional layer of security for web servers by enabling request filtering and intrusion detection capabilities directly within Apache. Once installed and configured, ModSecurity can help prevent many common web application attacks and improve overall server security.<\/p>\n\n\n\n<p>Regular monitoring of the audit logs and periodic updates to the ruleset are recommended to ensure continued protection against emerging threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: ModSecurity is an open-source web application firewall (WAF) module for the Apache HTTP Server. It helps protect web servers against common attacks such as SQL injection, cross-site scripting (XSS), remote file inclusion, and malicious HTTP requests. Compiling Apache with ModSecurity allows administrators to integrate advanced request filtering and security&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\">How to compile mod_security in Apache 1.3 or 2.x?<\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[1],"tags":[],"class_list":{"0":"post-135","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-uncategorized","7":"h-entry","9":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"Introduction: ModSecurity is an open-source web application firewall (WAF) module for the Apache HTTP Server. It helps protect web servers against common attacks such as SQL injection, cross-site scripting (XSS), remote file inclusion, and malicious HTTP requests. Compiling Apache with ModSecurity allows administrators to integrate advanced request filtering and security&hellip; Continue Reading How to compile mod_security in Apache 1.3 or 2.x?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-11-27T07:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-10T12:37:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3837\" \/>\n\t<meta property=\"og:image:height\" content=\"2540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\"},\"headline\":\"How to compile mod_security in Apache 1.3 or 2.x?\",\"datePublished\":\"2011-11-27T07:27:00+00:00\",\"dateModified\":\"2026-05-10T12:37:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/\"},\"wordCount\":441,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"datePublished\":\"2011-11-27T07:27:00+00:00\",\"dateModified\":\"2026-05-10T12:37:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to compile mod_security in Apache 1.3 or 2.x?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/pheonixsolutions.com\\\/blog\"],\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"Introduction: ModSecurity is an open-source web application firewall (WAF) module for the Apache HTTP Server. It helps protect web servers against common attacks such as SQL injection, cross-site scripting (XSS), remote file inclusion, and malicious HTTP requests. Compiling Apache with ModSecurity allows administrators to integrate advanced request filtering and security&hellip; Continue Reading How to compile mod_security in Apache 1.3 or 2.x?","og_url":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2011-11-27T07:27:00+00:00","article_modified_time":"2026-05-10T12:37:48+00:00","og_image":[{"width":3837,"height":2540,"url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/"},"author":{"name":"admin","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503"},"headline":"How to compile mod_security in Apache 1.3 or 2.x?","datePublished":"2011-11-27T07:27:00+00:00","dateModified":"2026-05-10T12:37:48+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/"},"wordCount":441,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/","url":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"datePublished":"2011-11-27T07:27:00+00:00","dateModified":"2026-05-10T12:37:48+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/mod_security-how-to-compile-mod_security-in-apache-1-3-or-2-x\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to compile mod_security in Apache 1.3 or 2.x?"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","caption":"admin"},"sameAs":["http:\/\/pheonixsolutions.com\/blog"],"url":"https:\/\/pheonixsolutions.com\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-2b","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":1,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions"}],"predecessor-version":[{"id":10170,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions\/10170"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}