Process/Parse PHP from HTML files using .htaccess and allowoverride

RemoveHandler .html .htm
AddType application/x-httpd-php .php .htm .html

Just add the above into the .htaccess file for your website.

Also remember that you need to be allowed to override the Apache and this should go into the vhost for your site as shown below:

# you need the AllowOverride otherwise .htaccess directives will be ignored

Options FollowSymLinks
AllowOverride All


Tags:

parse, php, html, htaccess, allowoverrideremovehandler, htmaddtype, httpd, htm, website, override, apache, vhost, allowoverride, directives, ignored, directory, quot, www, vhosts, complaintdb, httpdocs, followsymlinksallowoverride,

Latest Articles

  • Centos 7 how to save iptables rules like Centos 6
  • nfs tuning maximum amount of connections
  • qemu-kvm error "Could not initialize SDL(No available video device) - exiting"
  • Centos 7 tftpd will not work with selinux enabled
  • Debian Ubuntu Mint Howto Create Bridge (br0)
  • How To Control Interface that dhcpd server listens to on Debian based Linux like Mint and Ubuntu
  • LUKS unable to type password to unlock during boot on Debian, Ubuntu and Mint
  • Debian Ubuntu and Linux Mint Broken Kernel After Date - New Extra Module Naming Convention
  • Wordpress overwrites and wipes out custom htaccess rules and changes soluton
  • Apache htaccess and mod_rewrite how to redirect and force all URLs and visitors to the SSL / HTTPS version
  • python 3 pip cannot install mysql module
  • QEMU-KVM won't boot Windows 2016 or 2019 server on an Intel Core i3
  • Virtualbox vbox not starting
  • Bind / named not responding to queries solution
  • Linux Mint How To Set Desktop Background Image From Bash Prompt CLI
  • ImageMagick Convert PDF Not Authorized
  • ImageMagick Converted PDF to JPEG some files have a black background solution
  • Linux Mint Mate Customize the Lock screen messages and hide username and real name
  • Ubuntu/Gnome/Mint/Centos How To Take a partial screenshot
  • ssh how to verify your host key / avoid MIM attacks