MariaDB is a high performance drop-in replacement for MySQL, developed by some of the original authors of the MySQL project. For years, MySQL has been the dominant open-source database management system (DBMS). Recently, MariaDB, the MySQL fork created by MySQL’s founder, has been making in-roads and websites like Wikipedia the world’s sixth most popular Web site, is shifting over from MySQL to MariaDB. Lets check how to replace MYSQL with MARIADB in a cpanel server Step 1: Backup existing MySQL data Before installing mariadb make sure to take backup of …
General Topics
If you inspect your server’s error logs, you may see that many visitors (for the most part robots) constantly request access to things they should not be allowed to see. If you see that such access are suspicious and they are trying to spam your forum or hijack your mail program, you may need to deny access from those IP’s. Collecting such offending IP addresses by manually inspecting your logs across your site can become a full-time job. In such cases, you may block access to the site on Country …
Subversion (SVN) is an open source version control system. It helps you keep track of a collection of files and folders. Any time you change, add or delete a file or folder that you manage with Subversion, you commit these changes to your Subversion repository, which creates a new revision in your repository reflecting these changes. You can always go back, look at and get the contents of previous revisions. This article will help you for step by step setup SVN server on a cPanel/WHM server. Prerequisite 1. …
Spam emails are commonly referred to as unsolicited or junk emails sent in bulk without user consent. In a cPanel server running Exim, spamming usually occurs due to compromised accounts, vulnerable scripts, or improperly configured applications. Common Causes of Server Spamming Spamming generally happens in the following ways: General Fix for Spamming Issues Case 1: Spam Sent via PHP Script Step 1: Check Mail Queue Count A high number indicates possible spam activity. Step 2: View Recent Emails in Queue Step 3: Inspect Email Header Check the auth_id field to …
Samba is a free software re-implementation of the SMB/CIFS networking protocol. We need to set up and configure samba server where the drive to share or mount is located. Samba Server uses the following port no. : 137/tcp 137/udp 138/tcp 138/udp 139/udp 139/udp 445/tcp 445/udp Daemon name: smb and nmb Samba services are implemented as two daemons: smbd, which provides the file and printer sharing services, and nmbd, which provides the NetBIOS-to-IP-address name service. NetBIOS over TCP/IP requires some method for mapping NetBIOS computer names to the IP addresses of …
WordPress is a free and open source blogging tool and a content management system (CMS) based on PHP and MySQL. WordPress is the most popular blogging system in use on the Web, at more than 60 million websites. WordPress Themes : WordPress users may install and switch between themes. Themes allow users to change the look and functionality of a WordPress website or installation without altering the information content or structure of the site. Themes may be installed using the WordPress “Appearance” administration tool or theme folders may be uploaded …
A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X. Known as the “Bash Bug” or “ShellShock,” the GNU Bash Remote Code Execution Vulnerability could allow an attacker to gain control over a targeted computer if exploited successfully. And because Bash is everywhere on Linux and Unix-like machines and interacts with all parts of the operating system, everyone anticipates that it will have lot of repercussions. How does Shellshock work? Shellshock exploits a flaw in how …
Email signatures are generally used to display the sender’s name and contact information at the end of an email. We can use website links or even images in the signature for providing the identity of an email owner. It is much easier if this content is automatically added to the end of every email instead of manually adding it for each email. We can create an email signature in both webmail and email clients. Below are the instructions on how to add your own custom email signature in different email …
WordPress is the most popular blogging and CMS system on the Internet which makes it a favorite target for hackers. Having a WordPress site means that you have to take some extra efforts in order to protect your and your visitors data. Here is a summary of the best practices for securing a WordPress, that will help you do that. Keep your WordPress site and plugins up-to-date Protect your WordPress Admin Area Don’t use the “admin” username Securing wp-admin Add a Unique Database Prefix and Authentication Keys Hide your username …
Installation of PECL_HTTP Extension From Source Code in Custom PHP in Cloudlinux
Suppose that your Linux server has PHP version selector installed and configured. As you know alternative php5.x (while using PHP version selector) versions should load /opt/alt/php5x/etc/php.ini file and scan /opt/alt/php5x/etc/php.d directory for modules:: ==== Configuration File (php.ini) Path /opt/alt/php5x/etc Loaded Configuration File /opt/alt/php5x/etc/php.ini Scan this dir for additional .ini files /opt/alt/php5x/etc/php.d additional .ini files parsed /opt/alt/php5x/etc/php.d/alt_php.ini ==== Those are default locations for alt-php. Steps in installing pecl http package in cloudlinux platform: 1. Download the pecl_http package from pecl website http://pecl.php.net/package/pecl_http and compile it. #wget http://pecl.php.net/get/pecl_http-2.0.4.tgz 2. Extract the package …