Published on : October 21, 2014 by Vipin R.N
Umask is used to remove additional permissions of files which are copied to the server. If the file has 777 permission on the source and uploaded via sftp using -p or -P option, the permission will be preserved. It can be used in SFTP to change permissions of files. For SFTP change permissions after uploading the […]
Published on : September 17, 2014 by Vipin R.N
Disable Mod security for an account was easier in Mod_security v 1.x, you just had to add the following lines in the .htaccess file for that account’s public_html directory : SecFilterEngine Off SecFilterScanPost Off This will no longer work as Mod_security 2.x was been started to use in newer WHM/cPanel versions. In this article, we […]
Published on : September 10, 2014 by Geo Paul
Some times the webserver become loaded heavily due to large no. of inbound connections and makes the server sluggish or non-responsive. This is quite evident during DOS or DDOS attacks.In DDOS attack detection you can use the following script to identify the IP and the no. of connections active on a server using the following […]
Published on : August 4, 2014 by Vipin R.N
Scenario Sometimes you will see a maldet scan gets finished at the very moment it was initiated. Moreover nothing will be detected after the ‘lightning scan’. Well, that’s not normal. root@server [~]# maldet -b -a ~user Linux Malware Detect v1.4.1 (C) 2002-2011, R-fx Networks <proj@r-fx.org> (C) 2011, Ryan MacDonald <ryan@r-fx.org> inotifywait (C) 2007, Rohan McGovern […]
Published on : June 18, 2012 by Scott S
TLS Authentication of LDAP sessions: Till now all the sessions made by the LDAP client to the server is open and not encrypted. Its time to make our LDAP client-server sessions encrypted by some mechanisms. The most common encryption method includes Transport Layer Security (TLS) and/or Secure Sockets Layer (SSL) encryption. Here, we are using […]