I am running Centos 5 with Parallels Plesk Panel 10.3.1. My MTA is Postfix. I was looking for some solution to forward all the mails for user root to some external email address. Follow these steps at your own risk to achieve this.
Plesk stores the mail aliases database in /var/spool/postfix/plesk/aliases.db file. If this is the first time you are browsing the folder /var/spool/postfix/plesk then you will not find the file named aliases but instead you will find aliases.db file. These db files are binary files so you need to have some tool to decode this file to text format ; make the changes in the text file and convert it back to the database file. Continue reading How to forward mails for root to external email address using Postfix in Plesk environment
You can recover a MySQL database server password with the following five easy steps:
Step # 1 : Stop the MySQL service:
# /etc/init.d/mysqld stop
Step # 2: Start the MySQL server w/o password:
Continue reading Recover MySQL root password
If you have never set a root password for MySQL, the server does not require a password at all for connecting as root. To set up a root password for the first time, use the mysqladmin command at the shell prompt as follows:
$ mysqladmin -u root password ‘newpassword’
If you want to change a root password, then you need to use the following command:
Continue reading How to change mysql password?
Download the appropriate Update ISOs from Red Hat Network (RHN).
Login to RHN.
Click on the ‘Channels’ tab and from the left pane click ‘Download Software’.
Select the appropriate Red Hat Enterprise Linux channel and download ISOs (Install Disc).
Continue reading How can I update my system to a particular update level using ISO images?
This article will explain how to setup DenyHosts on a RedHat-based (RHEL 6, Centos 5.5, or Fedora 14) Linux server to automatically add remote IP addresses that repeatedly fail login attempts to your server’s /etc/hosts.deny file in an attempt to block SSH brute force/dictionary attacks.
Continue reading How to Install DenyHosts to Block SSH Attacks
Fail2ban is used to prevent various types of DoS attacks. In combination with iptables it will ban the IP addresses which is found to be suspicious by the fail2ban filters. Banning will be done if there are very significant number of authentication failures or 400 errors or 500 errors. This article will guide you on how to make your Apache web server much more secure. Fail2ban also prevents attacks other than Apache related. For eg: ssh, vsftpd, proftpd etc.
Continue reading How to install and configure Fail2ban to secure your Apache Webserver
I just configured a virtual machine with Redhat Entrprise Linux 5.5 as a guest operating system. The / partition of this machine was assigned a virtual disk of size 60GB. I installed all the required software and later came to know that 60GB was not sufficient so needed to extend this partition to 100GB. Continue reading Extend the size of ext3 partition online in a virtual machine
I have setup the syslog-ng server to accept log messages from remote host through syslogd in Linux and Snare in Windows platform. After successfully implementing this, I started to configure hosts to send the log messages to the central syslog-ng server. During this, it was found that the remote servers were able to send messages successfully but the messages logged had IP address in place of hostname.
Continue reading Syslog-ng logging IP Address instead of Hostname
To install/enable Json support for PHP on a Linux server, follow the below steps:
1. Install php-pear and gcc
# yum install php-pear gcc
2. Install json module
# pecl install json
Continue reading How to install PHP-Json module on a Linux server?
You can try the following tools to detect Linux rootkits:
Zeppoo – Zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls and so many other things. Continue reading Detecting rootkits under Linux