WordPress is a free and open source blogging tool and a content management system (CMS) based on PHP and MySQL. WordPress is the most popular blogging system in use on the Web, at more than 60 million websites. WordPress Themes : WordPress users may install and switch between themes. Themes allow users to change the look and functionality of a WordPress website or installation without altering the information content or structure of the site. Themes may be installed using the WordPress “Appearance” administration tool or theme folders may be uploaded …
General Topics
A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X. Known as the “Bash Bug” or “ShellShock,” the GNU Bash Remote Code Execution Vulnerability could allow an attacker to gain control over a targeted computer if exploited successfully. And because Bash is everywhere on Linux and Unix-like machines and interacts with all parts of the operating system, everyone anticipates that it will have lot of repercussions. How does Shellshock work? Shellshock exploits a flaw in how …
Email signatures are generally used to display the sender’s name and contact information at the end of an email. We can use website links or even images in the signature for providing the identity of an email owner. It is much easier if this content is automatically added to the end of every email instead of manually adding it for each email. We can create an email signature in both webmail and email clients. Below are the instructions on how to add your own custom email signature in different email …
WordPress is the most popular blogging and CMS system on the Internet which makes it a favorite target for hackers. Having a WordPress site means that you have to take some extra efforts in order to protect your and your visitors data. Here is a summary of the best practices for securing a WordPress, that will help you do that. Keep your WordPress site and plugins up-to-date Protect your WordPress Admin Area Don’t use the “admin” username Securing wp-admin Add a Unique Database Prefix and Authentication Keys Hide your username …
Installation of PECL_HTTP Extension From Source Code in Custom PHP in Cloudlinux
Suppose that your Linux server has PHP version selector installed and configured. As you know alternative php5.x (while using PHP version selector) versions should load /opt/alt/php5x/etc/php.ini file and scan /opt/alt/php5x/etc/php.d directory for modules:: ==== Configuration File (php.ini) Path /opt/alt/php5x/etc Loaded Configuration File /opt/alt/php5x/etc/php.ini Scan this dir for additional .ini files /opt/alt/php5x/etc/php.d additional .ini files parsed /opt/alt/php5x/etc/php.d/alt_php.ini ==== Those are default locations for alt-php. Steps in installing pecl http package in cloudlinux platform: 1. Download the pecl_http package from pecl website http://pecl.php.net/package/pecl_http and compile it. #wget http://pecl.php.net/get/pecl_http-2.0.4.tgz 2. Extract the package …
SSH is a network protocol that provides secure access to a computer. When we need to connect to a remote computer via SSH, that computer should have an SSH server running on it. There are different ways a client can authenticate itself to the server. A typical authentication mode will be to enter a password when logging into a remote system. Using the below-mentioned steps we can directly login to Linux server without password authentication step. First, we will need to download PuTTY and PuTTYgen. PuTTY: the Telnet and SSH …
Google has launched its new free tool called ‘Web Designer’ for building interactive HTML5 web sites and advertisements.This tool can be downloaded for Mac and Windows. It is a great means by which the advertisers can create HTML5 pages and animations very easily for mobile as well as PC. The best part about this latest release is that one can directly edit the source code in the editor which is built into it. The designers can later view the preview of their sites in the browser. One can further improve …
Throttling can be used to actively limit a user’s upload and download rates on programs such as video streaming, Website throttling is the intentional slowing of website. It is a reactive measure employed in communication networks in an apparent attempt to regulate network traffic and minimize website congestion. Website throttling can occur at different locations on the network. On a broader level, the internet service provider may use bandwidth throttling to help reduce a user’s usage of bandwidth that is supplied to the local network. Bandwidth throttling is also often …
Network Monitoring witn Ntop
There are various types of network problems that occur in an organization,which results in inaccessible devices,performance degradation, etc.These can be classified as: Network Hardware failure : Includes faulty devices like switches,Ethernet cards,improper cabling etc. Network configuration problems : Includes issues related to improper configuration of protocols Malicious code : Includes issues as a result of the presence of worms/viruses on the network In order to troubleshoot network problems from scratch you need to start checking by hardware – ie,physically check network cabling,network cables crossovers over electric cables,quality of switches routers …
Hardware failures can lock up your system; no matter how stable the Linux kernel is. This topic finds a solution to the issues such as the cursor doesn’t even move in X, Ctrl + Alt + Backspace or Ctrl + Alt + F1 and the likes don’t seem to work anymore, maybe even Num Lock doesn’t turn on and off when you press the button. Rebooting is the only option if you ever encounter this issue. This piece of work describes a way to reboot your system that will do …