Archive

Archive for April, 2012

How to install Softaculous in linux server

April 30th, 2012 No comments

How to install Softaculous in linux server

Note: Before starting the installation make sure ionCube Loaders are enabled. For that go to WHM and click on Tweak Settings. Please make sure that the Ioncube loader is selected for the backend copy of PHP.

Now SSH to your server :

Go to the below path

cd /usr/local/src/

Download the file using the below link:

wget -N http://files.softaculous.com/install.sh

Provide execute permission to that file

chmod 755 install.sh

Run the file

./install.sh

Now go to : WHM and search for Sotaculous option.

 

How to check if InnoDB engine is enabled in MySQL

April 30th, 2012 No comments

How to check if InnoDB engine is enabled in MySQL

If you want to check , if InnoDB is enabled on the server , you can check this via two methods :

[email protected][#] mysqladmin variables | grep have_innodb

If the above command show the output as below :

| have_innodb | YES

then it means InnoDB is enabled.

 

Another Method:

[email protected][#] mysql
mysql> show engines;

If the above command shows the below output :

+————+———+—————————————————————-+
| Engine | Support | Comment |
+————+———+—————————————————————-+
| MyISAM | DEFAULT | Default engine as of MySQL 3.23 with great performance |
| MEMORY | YES | Hash based, stored in memory, useful for temporary tables |
| InnoDB | YES | Supports transactions, row-level locking, and foreign keys |
| BerkeleyDB | NO | Supports transactions and page-level locking |
| BLACKHOLE | YES | /dev/null storage engine (anything you write to it disappears) |
| EXAMPLE | YES | Example storage engine |
| ARCHIVE | YES | Archive storage engine |
| CSV | YES | CSV storage engine |
| ndbcluster | NO | Clustered, fault-tolerant, memory-based tables |
| FEDERATED | YES | Federated MySQL storage engine |
| MRG_MYISAM | YES | Collection of identical MyISAM tables |
| ISAM | NO | Obsolete storage engine |
+————+———+—————————————————————-+
then it means InnoDB is enabled.

 

 

Categories: MySql, Uncategorized Tags:

How to uninstall csf firewall

April 30th, 2012 No comments

How to uninstall csf firewall

Run the below command to uninstall the csf firewall from Linux server using command prompt.

cd /etc/csf
sh uninstall.sh

 

How to disable root login in linux

April 30th, 2012 No comments

How to disable root login in linux

 Login to shell.

Copy and paste below command to server using your favourite editor.
pico -w /etc/ssh/sshd_config

Find the line
Protocol 2, 1

Uncomment it and change it to look like
Protocol 2

Next, find the line
#PermitRootLogin yes

Un-comment it. It looks like
PermitRootLogin no

Save the file Ctrl+X then Y then enter

Now restart the SSH service on server
/etc/rc.d/init.d/sshd restart

 

 

Categories: Security, Uncategorized Tags:

How to check the RAID Drive Status

April 30th, 2012 No comments

RAID – Redundant Array of Inexpensive Disks

 

How to check 3ware RAID drive status

Login to the server via SSH.

Paste the below command.

3ware /c0 show

It will show the status of all RAID drives. If you are getting any error then try using the below RAID command.

3ware maint rescan

How to check Adaptech RAID drive status

Login to server via SSH.

Paste the below command.

arcconf getconfig 1

The above command will show the RAID drive status.

 

Categories: Security, Uncategorized Tags:

How to disable Telnet and Other Unused Service

April 29th, 2012 No comments

How to disable Telnet and Other Unused Service

Steps:

1. Login to server as root

2. vi /etc/xinetd.d/telnet
// OR

3. vi /etc/xinetd.d/krb5-telnet
look for lines disable=no and change to disable=yes

4. chkconfig telnet off

5. service xinetd restart

Categories: Security Tags:

SoftLink Scan

April 29th, 2012 No comments

SoftLink Scan on the servers :

 

Hacker creates softlinks under one account and makes link with other users. This way he can hack other accounts. So how to find such compromised account under which hacker has created softlinks.

 

Following is the command which scan on the server and generates result in file:

/root/found_links.txt

 

1. Login to server as root user.

2. Fire following cmd and hit enter.

  1. screen -A -a -d -m -L -t ‘Beach-Head Finder’ -S ‘bhfinder’ /bin/bash -c “find /home* -type d \( -path ‘/home*/virtfs’ -or -path ‘/home*/.cpan’ -or -path ‘/home*/.cpanm’ -or -path ‘/home*/cpeasyapache’ -or -path ‘/home*/cpapachebuild’ -or -path ‘/home*/cpphpbuild’ -or -path ‘/home*/cpzendinstall’ \) -prune -false -or -type l -not -lname ‘public_html’ -not -lname ‘/usr/local/apache/domlogs/*’ -not -path ‘/home*/*/mail/.*’ -not -lname ‘/home*/*/.rvsitebuilder/projects/*’ -not -lname ‘/var/cpanel/rvglobalsoft/rvsitebuilder/*’ -not -lname ‘/var/netenberg/click_be/*’ -not -lname ‘*/.click_be/database/’ -not -lname ‘*/.click_be/advertisements/’ -not -lname ‘*/.click_be/click_be/’ -not -lname ‘*/.click_be/backup/’ -not -lname ‘/usr/local/urchin/*’ -not \( -path ‘/home*/*/wp-content/advanced-cache.php’ -and -lname ‘/home*/wp-content/plugins/*’ \) -not \( -path ‘/home*/rvadmin/public_html/rvadmin/themeimages/tran’ -and -lname ‘/usr/local/cpanel/base/frontend/*/themeimages/tran’ \) -printf ‘%p => %l\n\c’ -fprintf ‘/dev/stderr’ ‘%p => %l\n\c’ 2>> /root/found_links.txt”

3. This cmd will automatically open a screen session and may take approximately 2/3 hours for complete the scan.

4. Once scan is complete then open the file /root/found_links.txt
(The scan logs are created in this file.)

5. As per the result please delete those directories under which you will see softlinks created by hacker.

6. After deleting those directories, reset that users Cpanel password and send it to that client.

Categories: Security Tags: