I am running Centos 5 with Parallels Plesk Panel 10.3.1. My MTA is Postfix. I was looking for some solution to forward all the mails for user root to some external email address. Follow these steps at your own risk to achieve this.
Plesk stores the mail aliases database in /var/spool/postfix/plesk/aliases.db file. If this is the first time you are browsing the folder /var/spool/postfix/plesk then you will not find the file named aliases but instead you will find aliases.db file. These db files are binary files so you need to have some tool to decode this file to text format ; make the changes in the text file and convert it back to the database file. Continue reading How to forward mails for root to external email address using Postfix in Plesk environment→
If you have never set a root password for MySQL, the server does not require a password at all for connecting as root. To set up a root password for the first time, use the mysqladmin command at the shell prompt as follows:
$ mysqladmin -u root password ‘newpassword’
If you want to change a root password, then you need to use the following command:
Download the appropriate Update ISOs from Red Hat Network (RHN).
Login to RHN.
Click on the ‘Channels’ tab and from the left pane click ‘Download Software’.
Select the appropriate Red Hat Enterprise Linux channel and download ISOs (Install Disc).
This article will explain how to setup DenyHosts on a RedHat-based (RHEL 6, Centos 5.5, or Fedora 14) Linux server to automatically add remote IP addresses that repeatedly fail login attempts to your server’s /etc/hosts.deny file in an attempt to block SSH brute force/dictionary attacks.
Fail2ban is used to prevent various types of DoS attacks. In combination with iptables it will ban the IP addresses which is found to be suspicious by the fail2ban filters. Banning will be done if there are very significant number of authentication failures or 400 errors or 500 errors. This article will guide you on how to make your Apache web server much more secure. Fail2ban also prevents attacks other than Apache related. For eg: ssh, vsftpd, proftpd etc.
I just configured a virtual machine with Redhat Entrprise Linux 5.5 as a guest operating system. The / partition of this machine was assigned a virtual disk of size 60GB. I installed all the required software and later came to know that 60GB was not sufficient so needed to extend this partition to 100GB. Continue reading Extend the size of ext3 partition online in a virtual machine→
I have setup the syslog-ng server to accept log messages from remote host through syslogd in Linux and Snare in Windows platform. After successfully implementing this, I started to configure hosts to send the log messages to the central syslog-ng server. During this, it was found that the remote servers were able to send messages successfully but the messages logged had IP address in place of hostname.
You can try the following tools to detect Linux rootkits:
Zeppoo Software
Zeppoo – Zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls and so many other things. Continue reading Detecting rootkits under Linux→