- Install cPanel on a Virtual Server Running CentOS 6 with 7 Simple Steps
- Clear Your System Cache in Ubuntu with These Quick Steps
- Install MariaDB on CentOS 7 with these Simple Steps
- What is an A Record?
- Smartermail vs. Mailenable – What does it hold for you?
- Common Issues with Website Migration
- Tips to Evade Spamming
- Dirty Cow Vulnerability – Check How Dirty It Is?
- It’s Time to Update Your Server
- How to Change the Listening Port for Remote Desktop?
Author Archives: Pallavi Godse
An easy application, cPanel enables monitoring of servers through a GUI interface instead of the command line. It’s a fact that the cPanel installation is moderately straightforward but the script takes only a few hours to run.
Extra Details About cPanel –
After the installation of cPanel, it’s not possible to expel from the server if it isn’t completely restored. There’s no uninstaller offered by cPanel.
Setup Steps –
Prior to cPanel installation, it’s essential to take two additional steps –
When your browse something your web browser, a cache of the websites you visit is saved by the browser in order to load the subsequent visits quickly. Similarly, Linux too keeps a system cache – apt-cache, application cache, etc. – so subsequent loading of the application will be very fast.
Cache is a good concept when viewed from a user’s point but do you know it keeps utilizing your system’s memory. Also, at some point, you need to ensure that all the unnecessary data or junk files are deleted which are usually in the form of the cache so that your system remains fresh and less loaded.
An open-source database management system, MariaDB is commonly installed as part of the popular LEMP (Linux, Nginx, MySQL/MariaDB, PHP/Python/Perl) stack. The data is managed by MariaDB by using a relational database and SQL (Structured Query Language). It acts as a fork of MySQL that is managed by the original MySQL developers. Since it’s designed as a replacement for MySQL, it uses commands that reference mysql and is the default package on CentOS 7.
This tutorial explains the installation of the latest version of MariaDB on a CentOS 7 server.
Existing since nine years, the Dirty Cow vulnerability is found in Linux kernel and is privilege escalation vulnerability. A security expert Phil Oester found this vulnerability that can be present in about every available Linux distribution.
A race condition was found in the way the memory subsystem of Linux kernel handled the copy-on-write (COW) breakage of private read-only-memory mappings. This flaw can be misused by an unprivileged local user to gain write access to other read-only memory mappings and further increase their privileges on the system.
You might be getting for software updates several times. Though knowing it’s important, you might be ignoring it always.
Surely there are reasons behind ignorance – “Sending an email to the client is important right now”; “It’s my presentation day today so I need to finish the presentation”; “What if something breaks?”
But, when something goes wrong with your software, you hear the nagging voice at the back of our head saying we made a bad decision.
You need to hear it clearly that software updates can’t wait – significantly when it comes to your servers or business systems. Software updates contain critical bug fixes which if left unpatched; your system is a fish in the barrel for the hackers.
Remote Desktop features in Microsoft Windows XP Professional can be used to connect to your computer from another remote computer.
Here’s an article on steps to change the port that Remote Desktop listens on.
Note: The Remote Desktop Connection Client for the Mac is supportive to only port 3389 which is the default port.
Warning: If the listening port is changed, the Remote Assistance feature in Microsoft Windows XP may not work correctly.
To change the port that Remote Desktop listens on, follow the below steps –
Most internet applications run on the basis of DNS then it may be emails, website browsing, messengers, etc. But very few detect the presence of this extensively used service. And this is the reason why the vulnerabilities in DNS service are ignored by server administrators resulting in easy exploitation by hackers.
Usually, securing a server involves server software plus application software security, file system security, physical and network security.
Below are steps to secure your DNS server –
You might sometimes need to block a specific IP address from accessing your server for several reasons. Follow the simple instructions below which include creating an IPSec Security Policy specifying to block access to specific IP address –
Step 1 – Hover your mouse to Start Menu and click on Run.
Step 2 – Type “secpol.msc” in the run window and click OK.
Step 3 – The Local Security Settings window will open. Click on “IP Security Policies on Local Computer”.
Step 4 – Go to the right window pane, right-click and select “Create IP Security Policy”.
It may be the health records or your credit card details; everything is stored in the form of database today. Database is similar to a goldmine for hackers. The main purpose behind any cyber-attack is simply getting an access to a database server.
This indicates that the security of the database servers needs to be strengthened and that completely depends on network security, operating system hardening and physical security. It continues to be a big list but it’s important to learn how to secure your database server first –
Operating Systems –
EasyApache 4 supports the below operating systems –
- CentOS 6 or 7
- CloudLinux 6 or 7
- Red Hat Enterprise Linux 6 or 7
Apache and PHP –
- EasyApache 4 only supports Apache version 2.4.
- EasyApache 4 supports PHP versions 5.4, 5.5, 5.6, and 7.0.
If you install EasyApache 4, activate the rpm_up setting on your system as below –
- Open the /etc/cpupdate.conf file and set the RPMUP key’s value to daily.
- Go to Update Preferences interface in WHM (Home >> Server Configuration >> Update Preferences) and set the Operating System Package Updates setting to Automatic.
Steps to Install EasyApache 4 –
Run the following command –