nginx + apache and cPanel

Feb 1st, 2011 | Posted by

How to accelerate cPanel web hosting server with nginx?

You can find  a lot of answers  through the Internet, like this:

cPanel forums
24x7servermanagement

All methods  are good, but there is one big problem with script  (postwwwacct) which was suggested by somebody. It is useless if you are using Addon and Sub domains. This script set wrong homedir for sub- and addon- domains in config.

I wouldn’t rewrite all solution, you can find it easily. But I wrote my own script which generate vhosts.cfg

I think it  will put on in right place.

You can get it simply:

wget http://lanselot.me/scripts/postwwwacct

In variable VHOSTFILE set destination of your vhost config file.
Read more…

Tags: ,

Memory modules in server

Jan 19th, 2011 | Posted by

Today I must collect information about memory modules, which installed on several servers.
Of course every system administrator know about command:

dmidecode

which grab all required information.
But it command not very human-readable and when numbers of servers to examine increased – it become very boring to get useful information.
Okay, I’ve write very simple bash – parser to get only what I need.
Maybe, it will help someone else.
Read more…

Tags: ,

Different types of computer Viruses- A broad outline

Oct 21st, 2010 | Posted by

As with human viruses, computer viruses also have specialism depending on the infectedarea, and amount of damage. There are many types of virus. The basic category of theviruses is:

Boot viruses: The viruses, which infect, boot records on hard disks or other booting
devices are called boot viruses. These viruses replace the boot record program and copy it
elsewhere.

Example: Disk Killer, Stone Virus

Program viruses: These viruses infect the executable program files, for example, those
with extensions like .EXE, .COM, .SYS etc. Virus is loaded in the memory with the programs
on execution and thus it makes copies of itself and infects the file.

Example: Sunday

Multipartite viruses: This virus is a fusion of Boot and Program viruses. They infect
program files as the first step. On execution of these infected files, these viruses infect the
boot record.

Example: Invader, Tequila

Stealth viruses: These viruses are hard to detect. They use different techniques to avoid
detection.

Example: Whale, Joshi

Macro Viruses: It is a new kind of virus infecting the macros within a document.

Example: Nuclear, DMV

The above mentioned types of virus are but a broad category of the viruses. They are many
specialized versions available.

Tags:

Internet Hacking; is Your Information Safe?

Sep 29th, 2010 | Posted by

There is no doubt that the internet is the best thing that ever happened to us but it too has come along with its evils. The bad news is that no company or organization can guarantee total safety of its systems either from cyber terrorists or from people who the cyber space with an intention of causing malicious damage to information, stealing information or causing disarray to your data.
Every day, there are security meetings being held to discuss and chart the way forward in countering internet hacking. Unfortunately, as much progress as is made on the improvement of security and data safety, so also are the illegal hackers improving their tactics. Ironically, the tips and ideas that you can implement, to avoid hacking if you are a network administrator are found online. So also are at he tips for hacking in to networks.
The good news however is that you can be safe from the hackers if only you do little improvements to your security systems here and there. Most hacking problems overwhelm companies just because some one was too lazy to play his role well enough and to up his game to match the hackers. Remember that the same techniques that have been used to bring so much success in information exchange and technology are also the same techniques that hackers use to access information illegally. No email is safe from the hackers and with the many hacking tools that we have in the market today, then any information network is vulnerable.
There are many hacking tips online, but many hackers do not even need them. A good (or is it bad) hacker first researches on the target network that he wants to hack. The relevance of this is to see the kind of operating systems, the firewall and the security of the system and the software installed. Other factors will be the user names, sibling domains and the network connection. And do not take solace that your network is well protected because there are still other openings that can be used as back doors for hackers and these are like the modems, ISPs and many others.

Tags:

ie doesn’t see cookie, but firefox and opera does

Sep 23rd, 2010 | Posted by

Problem.

Very strange problem. We’ve got site di.by. This site set cookie PHPSESSID. Header looks like:

Set-Cookie: PHPSESSID=1f7d0b338f2b5a4e53c66cf213fe5f90; path=/; domain=di.by

Opera and Firefox set this cookie without any problems, but internet explorer doesn’t see it at all. It doesn’t block it. We’ve checked it many times.

We make alias for domain di.by – http://confa.of.by/ and cookie

Set-Cookie: PHPSESSID=498b3195efe311c30b61d59eec3f4b23; path=/; domain=confa.of.by

works without any problems in IE.

We check from ie6 till ie9. And problems was in all versions. Read more…

Tags: ,

rmagick: cannot allocate memory

Sep 8th, 2010 | Posted by

Promlem.

When one of our clients try to rails app, which use rmagick he got error in log:

libgomp: Thread creation failed: Cannot allocate memory

Read more…

Tags: ,

exim using wrong priority mx

Sep 6th, 2010 | Posted by

Symptoms.

Out client wrote, that his script don’t send email to his email.

Discovering problem.

As he told problem only with one email ishops@elserv.example.com. Domain elserv.example.com has 2 MX:

root@server# dig +short MX elserv.example.com
10 ms.elserv.example.com.
30 mx.uniflex.by.

Next step is to check server logs:

root@server# cat /var/log/exim_mainlog | grep elserv.example.com

2010-09-06 13:34:00 1OsZ1E-0000fg-K9 => ishops@elserv.minsk.by R=lookuphost T=remote_smtp H=mx.uniflex.by [84.201.225.218] X=TLSv1:DHE-RSA-AES256-SHA:256
2010-09-06 13:34:00 1OsZ1E-0000fi-LI => ivasilev@elserv.minsk.by R=lookuphost T=remote_smtp H=mx.uniflex.by [84.201.225.218] X=TLSv1:DHE-RSA-AES256-SHA:256

Ok, we’ve got interesting situation. Emails sent to MX with higher priority and it is very strange. Read more…

Tags: ,

Internet Explorer and Firefox: Internet security – access denied on any site

Aug 31st, 2010 | Posted by

Symptoms.

One of our employers ask for help me today. On his computer internet explorer and firefox block all sites and bring kaspersky like menu with text (that was on russian, but i think something can be in another languages):

Internet Security Access Denied
The requested URL-address can not be granted
Your computer is blocked for spamming
You can unlock your computer for this, go to the site VKontakte (http://vkontakte.ru) and activate your profile. Then you can use the entire network. The report created: Internet Security

Read more…

joomla error: css,js files got 404

Aug 19th, 2010 | Posted by

Symptoms.

Often I’ve got this problem  after transferring site from one server to another. The main page works fine, but if you click any link – other pages load only text and all css\js files got 404 error. The result – page looks very ugly. Read more…

Tags:

mysql error: Manager of pid-file quit without updating

Aug 18th, 2010 | Posted by

Symptoms:

You try to start mysqld and get  such error:

Starting MySQL… Manager of pid-file quit without updating

Solution.

Solution was not very hard, but pretty interesting.
Read more…

Tags: