A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X. Known as the “Bash Bug” or “ShellShock,” the GNU Bash Remote Code Execution Vulnerability could allow an attacker to gain control over a targeted computer if exploited successfully. And because Bash is everywhere on Linux and Unix-like machines and interacts with all parts of the operating system, everyone anticipates that it will have lot of repercussions. How does Shellshock work? Shellshock exploits a flaw in how …
Bella
Email signatures are generally used to display the sender’s name and contact information at the end of an email. We can use website links or even images in the signature for providing the identity of an email owner. It is much easier if this content is automatically added to the end of every email instead of manually adding it for each email. We can create an email signature in both webmail and email clients. Below are the instructions on how to add your own custom email signature in different email …
In this article, lets see what is Multi-domain SSL and the steps on how to generate a CSR and installing the multi-domain SSL for various domains in a cpanel server. What is Multi-domain SSL: A multi-domain certificate (also known as a SAN certificate or Unified Communications Certificate (UCC)) is a special type of SSL certificate. With a multi-domain certificate you are able to secure one domain name with different domain extensions (e.g. domain.co.uk and domain.es) or multiple domain names (e.g. domain.co.uk and example.com) hosted in a same server using one …
WordPress is the most popular blogging and CMS system on the Internet which makes it a favorite target for hackers. Having a WordPress site means that you have to take some extra efforts in order to protect your and your visitors data. Here is a summary of the best practices for securing a WordPress, that will help you do that. Keep your WordPress site and plugins up-to-date Protect your WordPress Admin Area Don’t use the “admin” username Securing wp-admin Add a Unique Database Prefix and Authentication Keys Hide your username …
Installation of PECL_HTTP Extension From Source Code in Custom PHP in Cloudlinux
Suppose that your Linux server has PHP version selector installed and configured. As you know alternative php5.x (while using PHP version selector) versions should load /opt/alt/php5x/etc/php.ini file and scan /opt/alt/php5x/etc/php.d directory for modules:: ==== Configuration File (php.ini) Path /opt/alt/php5x/etc Loaded Configuration File /opt/alt/php5x/etc/php.ini Scan this dir for additional .ini files /opt/alt/php5x/etc/php.d additional .ini files parsed /opt/alt/php5x/etc/php.d/alt_php.ini ==== Those are default locations for alt-php. Steps in installing pecl http package in cloudlinux platform: 1. Download the pecl_http package from pecl website http://pecl.php.net/package/pecl_http and compile it. #wget http://pecl.php.net/get/pecl_http-2.0.4.tgz 2. Extract the package …
SSH is a network protocol that provides secure access to a computer. When we need to connect to a remote computer via SSH, that computer should have an SSH server running on it. There are different ways a client can authenticate itself to the server. A typical authentication mode will be to enter a password when logging into a remote system. Using the below-mentioned steps we can directly login to Linux server without password authentication step. First, we will need to download PuTTY and PuTTYgen. PuTTY: the Telnet and SSH …
Issue : While accessing Webmail via Squirrelmail, Horde or Roundcube if you are receiving a blank screen or if all the three mail clients tells that the login failed because of wrong user or password, please have a check with the below steps: Solution : 1. Run the following command in root SSH: #/scripts/whoowns domain.com Where domain.com is the domain name in question. 2. If it doesn’t show any ownership, then move the following files: #cd /etc #mv userdomains userdomains.bak #mv domainusers domainusers.bak #mv trueuserdomains trueuserdomains.bak At that point, run …
This feature can be used to fetch multiple email account using Gmail. If we have multiple email accounts, we can check them all in Gmail. Gmail’s Mail Fetcher feature first imports all your old messages to Gmail and then continues to bring in new messages sent to your other account. We can add up to 5 accounts in Gmail, including Gmail and other email providers.This all works using POP3. General settings for using this features with Gmail. ————————————————————– 1. Log into your Gmail account. 2. Click the gear icon in …
This error may occur if the website uses Incapsula for maintaining traffic. Incapsula provides every website, regardless of its size, with an enterprise-grade PCI-certified Web Application Security, ensuring your website is safe and available. Upon completion of the DNS changes, as outlined by Incapsula, you are effectively directing all of your traffic via Incapsula’s network of proxy servers (Incapsula proxies). Incapsula proxies access your servers directly and then serve content to the site visitors. Requests to your servers are therefore all coming from a limited range of Incapsula IP addresses. …
Ever since after the up gradation of WHM to higher versions, there can be many issues of lost or unlisted addon/parked domains in Cpanel. The domains will be present in /etc/userdomains, but still fails to be seen in the email account creation tab in Cpanel. This is mainly beacuse of the XDNS entries in /var/cpanel/users/<cpanel_username> If your required domains are marked as XDNS, then rename XDNS to DNS of all the required domain entries. After this you have to run the following script to update the userdomains #scripts/updateuserdomains After running …