11Μαΐ2015

WHM Account Info Email

WHM Account Info Email WHM Πληροφορίες Λογαριασμού Email   In WHM goto: Main >> Server Configuration >> Tweak Settings There you goto section: Security Then mark: Send passwords in plaintext over email when creating a new acccount. Enabling this option is a security risk.

Continue Reading
22Δεκ2014

Disk usage problem: WHM is showing incorrect disk usage details and I cannot also change the disk quota via WHM.

Disk usage problem: WHM is showing incorrect disk usage details and I cannot also change the disk quota via WHM. (Use disk space) The problem happens when the disk quota file get corrupted on server. You can run the following command while logged into the server through SSH as the root user. /scripts/fixquotas –force In […]

Continue Reading
4Δεκ2014

Εγκατάσταση / Απεγκατάσταση nginx

Installation / Uninstall of nginx… (Εγκατάσταση / Απεγκατάσταση του nginx …) Nginx Admin Install instruction: cd /usr/local/src wget http://nginxcp.com/latest/nginxadmin.tar tar xf nginxadmin.tar cd publicnginx ./nginxinstaller install <<<<<>>>>> service httpd restart crontab -e To automated /tmp cleanup add bellow cron (Για αυτοματοποιημένη / tmp καθαρισμού προσθέσετε παρακάτω cron) 0 */1 * * * /usr/sbin/tmpwatch -am 1 /tmp/nginx_client […]

Continue Reading
22Δεκ2013

Getting MYSQL Error: “Error Code: 2006 – MySQL server has gone away”

Getting MYSQL Error: “Error Code: 2006 - MySQL server has gone away”

By default the Timeout directive is set to 300 seconds. If you want to increase or decrease it by finding the Timeout directive in ‘httpd.conf’ file. (/usr/local/apache).   Investigation shows many solutions correctly talking about setting the max_allowed_packet and wait_timeout for mysql in my.cnf; small addendum that the default install of mysql on mac osx […]

Continue Reading
28Νοέ2013

Mod Security whitelist

Ε-mail από το mod_security Pattern match “(?:\b(?:(?:n(?:et(?:\b\W+?\blocalgroup|\.exe)|(?:map|c)\.exe)|t(?:racer(?:oute|t)|elnet\.exe|clsh8?|ftp)|(?:w(?:guest|sh)|rcmd|ftp)\.exe|echo\b\W*?\by+)\b|c(?:md(?:(?:32)?\.exe\b|\b\W*?\/c)|d(?:\b\W*?[\\/]|\W*?\.\.)|hmod.{0,40}? …” at REQUEST_HEADERS:User-Agent. [file “/usr/local/apache/conf/modsec2.user.conf”] [line “150”] [id “1234123404“] [msg “System Command Injection”] [data “; mail”] [severity “CRITICAL”] [tag “WEB_ATTACK/COMMAND_INJECTION”] Βήμα 1ο: Επιλέγουμε το domain που θέλουμε πατάμε Modify user whitelist Βήμα 2ο: Αντιγράφουμε το ID στο (mod_security rule ID list) που έχουμε λάβει στο e-mail μας από το […]

Continue Reading
Καλέστε μας