LSM is a network socket monitor; it is designed to track changes to Network sockets and Unix domain sockets, effectively a port monitor. It does this by a rather simple differential based comparison of current and new server sockets (Server Ports). A simple and configurable alerting system sends alerts whenever new ports activate. LSM will ignore services that are currently holding sockets open, events are only applicable when a ‘new’ socket (port) is created. Install And Configure Linux Socket Monitor (LSM) 1. Download the latest version of LSM from the …
Bella
Ping is a networking utility used to test the reachability and round-trip time (RTT) delay of a remote host over Internet Protocol (IP). The ping utility does so by sending out a series of Internet Control Message Protocol (ICMP) echo request packets to a remote host and waiting for corresponding ICMP response packets from the host. However, we cannot check a specific port with ping command as ICMP belongs to the layer-2 IP layer, not layer-3 transport layer. In order to ping a specific port of a remote host, we …
FirewallD is a new firewall suite being introduced to Linux distribution. At present, the all-new popular CentOs 7 has it as the default firewall suite which in near future will be implemented in servers. FirewallD, as usual, was developed by the Fedora community and was implemented in the 20th version of the same. It is also being used in arch Linux and others till the date. FirewallD is a dynamic firewall, dynamic in the sense that any change in the firewall will be implemented as soon as the amendment is …
We can subscribe Sent, Trash, Drafts, Junk and other IMAP folders in webmail and other email clients, if they are missing. Below are the instructions on how to subscribe IMAP folders in order to make them appear in the webmail or any email clients. 1. Horde Login to webmail and Select Horde. Click on the Folders icon at the top of the screen. Choose the Rebuild Folder Tree option from the drop-down box.
Portsentry is a tool to detect port scans and log it. Once a host is targeted by an attacker, a port scan is almost always performed. PortSentry detects such scans by monitoring the unused ports on the host. Upon a connection attempt to one of the unused ports, PortSentry is alerted and has the ability to issue a number of commands in response to the scan. Installation # cd /usr/src/ # wget http://sourceforge.net/projects/sentrytools/files/latest/download
The Redirect feature allows you to send all of the users that access a domain or a particular page to a different URL. This can be done by using cPanel’s “Redirects” feature or by using .htaccess file if the cPanel redirection does not work properly. In here we shall discuss few helpful .htaccess codes Non-www to www Redirection RewriteEngine on RewriteCond %{HTTP_HOST} ^domain.com [NC] RewriteRule ^(.*)$ http://www.domain.com/$1 [L,R=301]
When we own a website, we may want to analyze on how many people visits our website. cPanel has several in-built statistical analysis programs and one of the most important ones is Awstats. Awstats produces visual statistics about visitors of your site. Awstats gives details about the count of people visiting your website, and other information like: > Monthly history > Countries visiting your website (Top 25) > Visits duration > Operating Systems that accesses your website (Top 10) > Browsers (Top 10) etc.,
In this article we will be discussing a few basic commands we could use in our daily server terminal interaction. Generally Linux commands have the following syntax. command [options] [arguments] Each item is separated by space. >> Options modify a commands behavior. Single letter options usually preceded by “ – ” Full word options usually preceded by “ — ” >> Arguments are file names or other data needed by the command. >> Multiple commands can be separated by “;” Lets have a check with few of the most commonly …
Today many tools are available for performing Server Administration. In this article, let’s have a check with a few of the top Server Administration tools. 1.TightVNC TightVNC is a remote desktop software application and it can be used to connect to another computer and display its live remote desktop. Like other VNC systems, it consists of two parts: the “Server”, which shares the screen of the machine it’s running on, and the “Viewer”, which shows the remote screen received from the server TightVNC Server is designed to run in two …
IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Its a phenomena in which attackers changes or replicate a IP packets. In order to dig deep lets understand some basic concepts. In internet the connection between two computer takes place using TCP/IP protocol. In which data needed to send from one computer to another is broken down into pieces known as packets. These packets are …