Many Web Hosting Company providing UnManaged Server counts adding additional Ip in Linux distro as managed service and can charge you dollars for it. To rest that aside we have come up with a tutorial so that anyone can easily add N number of ip in linux Dedicated Server or VPS Server
Well we all know to open a online video website we need to have many software installed for the proper functioning of script. Today we will be showing you an easiest way of installing compatible software’s using ffmpeginstaller.
Rootkit Scanner is tool to ensure Linux web server is not infected with nasty virus like Rootkit, Backdoor and local exploit and etc. Below are the scanning test performed:
CentOS is the best Linux os available in market. Due to its easy to use functionality, in most of the Web server it is deployed. Yum is one of the Linux command which makes the user job easier to update things or to install different compatible software’s. In this short tutorial I will show you how to update kernel in just two easy steps.
As our clients were facing problems in handling cpanel features and other web hosting stuffs we came to a conclusion of creating video tutorials for them. From now all our video tutorials will be accessible using the link below:
Cron job is a method of scheduling job for a particular timeline in a UNIX system. Anything scheduled in Cron will trigger at a defined time. Usually people use it as a automated system to update their script billing cycle or to auto update server maintenance.
Search Engine Optimization (SEO) has gained paramount importance in today’s time. It has become so crucial that no individual or business having their web property can ignore it. Since the early days of its inception, there are some basic parameters that have been the driving force behind the exponential growth and popularity of search engine optimization. Among all these parameters one that has been the most crucial and will always be are “backlinks”.
What Is AWStats:
AWStats is a free powerful and feature tool that generates advanced web, streaming, ftp or mail server statistics, graphically. This log analyzer works as a CGI or from command line and shows you all possible information your log contains, in few graphical web pages. It uses a partial information file to process large log files, often and quickly. It can analyze log files from all major server tools like Apache log files (NCSA combined/XLF/ELF log format or common/CLF log format), WebStar, IIS (W3C log format) and a lot of other web, proxy, wap, streaming servers, mail servers and some ftp servers.
How To Install:
tgz -xvzf awstats-7.1.tar.gz
Now follow the setup prompt and Installation will be completed in couple of minutes.
After successful response of 2500 Rs or 50$ Google Adowrds coupon we are in pool to provide 100$ or 5000 Rs coupon code to our Indian clients.
To know more contact us at firstname.lastname@example.org
* Offer Valid For Indian Clients Only.
A Symlink Aka symbolic link is a virtual link pointing to a file in a directory. In shared Linux environment hard disk space in divided in several parts for different account. When proper security measures are not taken it may happen a shared hosting account can take over to another shared hosting account on same server by launching symlink attack. Certain measures have been taken by companies to block these types of attack and they have build their own private patches to harden server security. But what are you doing to stop symlink? Search online you will get solutions like blocking follow symlink or changing some settings in httpd.conf. Enough post or solutions are still not available online to provide full proof security. There are many ways and means to bypass those settings and initiate symlink attacks to break server security but I am not going to explain how to do it. Lets see how this attack can be initiated.
How It’s Done?
Well just by passing a proper symlink query will do the job.
ln -s target_file_path new_file_name
Suppose you have a site xyz.com a WordPress site on a cpanel server and its user is xyz and another user abc.com just have to run ln -s /home/xyz/public_html/wp-config.php wo.txt to get that file. This will get full source code of that file and known as full file disclosure vulnerability. Run the symlink attack on your server to make sure you are safe.
In case you need help feel free to contact us.