OpenStack is a set of software tools for building and managing cloud computing platforms for public and private clouds. Mostly deployed as an infrastructure-as-a-service (IaaS). Deploy virtual machines and other instances that handle different tasks for managing a cloud environment on the fly. It makes horizontal scaling easy, which means that tasks that benefit from running concurrently can easily serve more or fewer users on the fly by just spinning up more instances. So we can say OpenStack is the future of cloud computing. OpenStack began in 2010 as a …
Bella
A serious vulnerability named Dirty COW has been discovered recently which has put the Linux kernel under risk. It is said that this vulnerability was noticed nine years ago (since version 2.6.22 in 2007) and remained unnoticed throughout this time. A researcher named Phil Oester was the man behind the detection of this serious threat. According to him, the vulnerability is described as a race condition where the Linux kernel’s memory subsystem handles the copy-on-write (COW) breakage of private read-only memory mappings. In this way, the attackers gain write access to …
A “Smart Host” (also known as a relay host) is a type of mail relay server which allows an SMTP server to route e-mail to an intermediate mail server rather than directly to the recipient’s server. This improves the performance of your server and the reliability of your e-mail delivery. Exim Server (Forwarding Server) This server will be forwarding all emails to the SmartHost for relay for final delivery. If you are not using cPanel / WHM, then you will simply edit ‘/etc/exim.conf’ instead of using cPanel / WHM’s interface. …
Pluggable Authentication Module (PAM) handle the authentication tasks of applications/services on the Linux system. In other words, it allows us to configure how applications use authentication to verify the identity of a user. In this article, we are mainly dealing with the configuration file format. The PAM configuration files are located under the directory /etc/pam.d/ which describes the authentication procedure for an application. Each file in this directory has the same name as the application for which the module provides authentication. /etc/pam.conf was the configuration file used in earlier versions …
CloudLinux is one of the widely used Operating System nowadays due to the high-level stability and advanced server security it provides, which makes it the first preference for hosting providers, especially in a shared hosting environment. LVE (Lightweight Virtual Environment) is a kernel-level technology developed by the CloudLinux team. It is lightweight and transparent. The goal of LVE is to make sure that no single website can bring down your web server. The kernel makes sure that all LVEs get a fair share of the server’s resources, and that no …
The Network File System (NFS) was originally developed by SUN Micro-systems that allows communications between Linux/Unix systems. It allows you to mount your local file systems over a network and remote hosts or clients to interact with them as they are mounted locally on the same system. Benefits >> Central Data Management. >> Allows local access to remote files transparently. >> Very good for local or reliable connections Important NFS configuration file /etc/exports : All files and directories which need to be exported are defined in this which is located …
Security researchers identified a new OpenSSL vulnerability, called DROWN( Decrypting RSA with Obsolete and Weakened Encryption ) on March 2016. This attack was focused on servers that use the more secure TLS protocol, which also supports the obsolete SSLv2.This vulnerability allows an attacker to decrypt the highly secured TLS encrypted communication if the server houses SSLv2 cipher support. DROWN was assigned the CVE-2016-0800 id by the us-nert on the march (https://www.us-cert.gov/ncas/bulletins/SB16-067 ). More than 11 million websites that use TLS were vulnerable to DROWN attack. If your website is protected …
Kibana is an open-source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data. You can set up Kibana and start exploring your Elasticsearch indices in minutes. All you need is: * Elasticsearch 2.3 or later * A modern web browser – Supported Browsers.
DDoS has emerged as a choice of weapon for hackers. DDoS attackers not only use it to target individual websites and servers of the network, but also subdue the network itself. The growing dependency and usage of the Internet, makes the impact of successful DDoS attacks more challenging for service providers and other enterprises, costing them thousands of money lost in revenue and productivity. DDoS attackers employ much sophisticated spoofing techniques and protocols day by day and it has become essential to develop a solution that has been designed to …
The Zend OpCache provides faster PHP execution through opcode caching and optimization. It improves PHP performance by storing precompiled script bytecode in the shared memory. Installing Zend OPCache on PHP 5.3 or 5.4 1. Login to SSH on your server 2. Type the following commands: #cd /usr/local/src #wget http://pecl.php.net/get/ZendOpcache # to get the latest (master) build do the following instead: