If you are getting the below error while updating the Plesk versions or installing the microupdates , have a try with the mentioned solution : —- ERROR: Unable to download the MD5 sum for the new Parallels Installer binary. Not all packages were installed. Please, contact product technical support. —- Solution : —– Remove cache from /var/cache/parallels_installer/ and start auto-installer again. —– If you require help, contact SupportPRO Server Admin
Bella
If you are getting following error while directory listing, follow the solution provided below : ———- ftp> ls 227 Entering Passive Mode (108,61,169,245,167,161). ftp: connect: No route to host ———- Solution : 1. Edit /etc/sysconfig/iptables-config and add this line: IPTABLES_MODULES=”ip_conntrack_ftp” 2. Save it and restart iptables. That’s because passive mode use non standard ports to communicate, so you need to keep track of the ftp connections and iptables will allow them when necessary. Another solution is specify the passive ports that will be used on FTP server configuration, then open …
In our example, the current kernel version is 2.6.32.71. Lets now upgrade the kernel to higher version 3.2 1: Installing Kernel Dependencies Installing or Compiling Kernel requires following various required packages and up-to-date system packages. Latest GCCversion Latest Ncursesdevelopment version System packages up-to-date # yum install gcc ncurses ncurses-devel # yum update
The SSLv3 Poodle vulnerability which was released on October 14th 2014, is an attack on the SSL 3.0 protocol and it is completely protocol based vulnerability. POODLE stands for “Padding Oracle On Downgraded Legacy Encryption”. The padding attack happens when a plain text is converted to ciphertext. The plain text message often has to be expanded to be compatible with the underlying cryptographic structure and the leakage of data mainly occur during the decryption of the cipher text. The SSLv3 poodle vulnerability allows a man-in-the-middle attacker to decrypt ciphertext using …
As we are aware, cPanel has introduced the latest stable version cPanel 11.50. Many new features are implemented in the latest version, which includes but are not limited to :. Support for CentOS 7 on fresh installations Synchronized Calendar & Contacts Greylisting: Protect your server against spam, Greylisting defers email received from new, unknown triplets Passive OS fingerprinting (p0f): Improved the GeoIP identifier and added an operating system and other information to email notifications. This information helps you quickly identify users that trigger events. Changes to new cPanel user system …
CentOS has introduced a free Web Hosting control panel (CWP: Centos Web Panel) which is designed for easy management of servers including both Dedicated & VPS without the help of ssh console. During the installation procedure, CWP installs full LAMP stack (Apache, PHP, phpMyAdmin, webmail, mail server etc.) on your server. List of softwares installed and configured during CWP installation are as below: =========== Apache Web Server PHP 5.4 MySQL + phpMyAdmin Postfix + Dovecot + roundcube webmail CSF Firewall Backups; AutoFixer for server configuration Varnish Cache server suPHP & …
The International Earth Rotation & Reference Systems Service (IERS) has mentioned that an extra second is to be added to Coordinated Universal Time (UTC) at 23:59:59 on 30 June 2015 and this is to make sure the alignment of astronomical and atomic time. Coordinated Universal Time, UTC is one of the basic time conventions used by most of the world’s local time zones. This UTC time convention has been derived from a bunch of atomic clocks that are distributed across several countries globally. The rotation of our earth is not …
VENOM vulnerability also known as QEMU exploit is the most recent vulnerability reported on May 13, 2015 and it is discovered by Jason Geffner while performing a security review of virtual machine hypervisors. VENOM stands for “Virtualized Environment Neglected Operations Manipulation”. This venom exploits QEMU, an open source machine emulator. The venom CVE-2015-3456 vulnerability resides in the virtual floppy drive code (FDC) used by the virtualization platforms. If it gets exploited, it allows an attacker to gain full control of the operating system hosting them and as well as on …
Round Robin is a balancing mechanism used by the DNS servers which are usually used for sharing the network load and managing the load of geographically distributed Web servers. The DNS server that uses the round-robin mechanism will provide alternates for each client request. Concept:- Suppose, you have a domain name and three identical home pages hosted on three servers with three different IP addresses. By using Round Robin DNS, when one user accesses the home page, the request will be sent to the first IP address. The second user who …