Jump to content

Sandeep B.

Administrators
  • Last visited

  • Posts

    298
  • Reputation

    10k

Everything posted by Sandeep B.

  1. Yes few minutes after restarting the dns server.
  2. After _acme-challenge.clovstore.com add dot It should be : _acme-challenge.clovstore.com. Then restart the bind/named dns server
  3. Hi can you send the screenshot of the dns in raw file edit format?
  4. In this tutorial I’ll provide you the steps to reset root password for MySQL 8.0 and MariaDB 10.4/10.xx/11.xx easily and efficiently. Since this are latest version of MySQL and fork mariadb you should do some extra caution during root password reset. Below are the easy steps to reset the root password. If you’re getting below error then it seems root password is not working or something bad happens to MySQL root user : ERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: YES) Lets get started with MySQL/mariadb root password reset :- First stop the MySQL/Mariadb service : systemctl stop mysqld mariadb mysql service mysqld stop / service mariadb stop Then you need to run the below command to start mysql with skip-grant-tables option : mysqld --skip-grant-tables --user=root & if upper user with root not work you can use below with mysql mysqld --skip-grant-tables --user=mysql & After running the above command press “Enter” Key or "ctrl+c" > to get the shell again Then you need to run mysql command and then run flush privileges command under MySQL CLI: mysql FLUSH PRIVILEGES; Then at last change the MySQL/Mariadb root password : ALTER USER 'root'@'localhost' IDENTIFIED BY 'root_passowrd'; Replace “root_password” with some password. then exit from MySQL cli by typing “quit“ Then run this command to kill all mysql processes : killall -u mysql or pkill -U mysql Ensure by running this command to unset environments if you accidentally set any : systemctl unset-environment MYSQLD_OPTS Now Stop and restart mysql systemctl stop mysql mysqld mariadb && systemctl start mysql mysqld mariadb service mysqld stop && service mysqld restart some time mysql/mariadb process are still running you need to kill them manually you can find the process via top command : top -u mysql if it is running then you need to kill the pid with kill -9 "pid no." and restart mysql/mariadb Thats it you’re done with root password reset for MySQL Check by logging into mysql root. CWP and for other control panels only : On control panel like cwp and other panel having /root/.my.cnf ensure you’ve updated the file with new root password which you changed it via upper command For CWP only update the new password in this files:
  5. CSF (ConfigServer Security & Firewall) is a popular firewall and security tool for Linux servers. CSF is full featured firewall which contains many features and works on Linux out of the box. Its a Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers. Here are some common commands that you can use with CSF: Start CSF: To start CSF, use the following command: csf -s you can also use systemctl to restart csf and lfd server systemctl start csf lfd Stop CSF: To stop CSF, use the following command: csf -x you can also use systemctl to restart csf and lfd server systemctl stop csf lfd Restart CSF: To restart CSF, use the following command: csf -r you can also use systemctl to restart csf and lfd server systemctl restart csf lfd Check CSF status: To check the status of CSF, use the following command: csf -status Allow an IP address: To allow an IP address through the firewall, use the following command: csf -a you can add the comment after the ip with space example : Unblock an IP address: To unblock an IP address that has been blocked by CSF, use the following command: csf -dr Block an IP address: To block an IP address, use the following command: csf -d you can add the comment after the ip with space example : View blocked IP addresses: To view a list of blocked IP addresses, use the following command: csf -g to find specific ip in blocked list use below command : Unblock all IP addresses: To unblock all IP addresses that have been blocked by CSF, use the following command: csf -df Check for updates to csf but do not upgrade : csf -c To update CSF : csf -u To Force update : csf -uf Get an IP’s information country of origin & hostname/ptr : csf -i IP usage : Hope this helped and you can add your own commands below in the comment to help others.
  6. systemctl is a command-line tool used to manage and control the systemd system and service manager in various Linux distributions. It enables administrators to manage the OS and control the status of services. Further, systemctl is useful for troubleshooting and basic performance tuning. Here are some Commands which need admin/root privilege service_name is the name of the service you want to perform the action for. Start a service: To start a service, use the following command: systemctl start service_name Stop a service: To stop a service, use the following command: systemctl stop service_name Restart a service: To restart a service, use the following command: systemctl restart service_name Enable a service at boot: To enable a service to start automatically at boot, use the following command: systemctl enable service_name Disable a service at boot: To disable a service from starting automatically at boot, use the following command: systemctl disable service_name Check the status of a service: To check the status of a service, use the following command: systemctl status service_name List all running services: To list all running services, use the following command: systemctl list-units --type=service --state=running example : [root@cwp ~]# systemctl list-units --type=service --state=running UNIT LOAD ACTIVE SUB DESCRIPTION amavisd.service loaded active running Amavis mail content checker atd.service loaded active running Job spooling tools cbpolicyd.service loaded active running CWP Policyd for Postfix clamd.service loaded active running clamd scanner () daemon console-getty.service loaded active running Console Getty crond.service loaded active running Command Scheduler cwp-phpfpm.service loaded active running The PHP FastCGI Process Manager cwpsrv-phpfpm.service loaded active running The PHP FastCGI Process Manager cwpsrv.service loaded active running CentOS Web Panel service (daemon) dbus.service loaded active running D-Bus System Message Bus dovecot.service loaded active running Dovecot IMAP/POP3 email server getty@tty2.service loaded active running Getty on tty2 httpd.service loaded active running Web server Apache lfd.service loaded active running ConfigServer Firewall & Security - lfd mariadb.service loaded active running MariaDB 10.11.2 database server named.service loaded active running Berkeley Internet Name Domain (DNS) nginx.service loaded active running nginx - high performance web server opendkim.service loaded active running DomainKeys Identified Mail (DKIM) Milter php-fpm81.service loaded active running The PHP FastCGI Process Manager php-fpm82.service loaded active running The PHP FastCGI Process Manager postfix.service loaded active running Postfix Mail Transport Agent pure-ftpd.service loaded active running Pure-FTPd FTP server rsyslog.service loaded active running System Logging Service saslauthd.service loaded active running SASL authentication daemon. spamassassin.service loaded active running Spamassassin daemon sshd.service loaded active running OpenSSH server daemon systemd-journald.service loaded active running Journal Service systemd-logind.service loaded active running Login Service systemd-udevd.service loaded active running udev Kernel Device Manager varnish.service loaded active running Varnish Cache, a high-performance HTTP accelerator xinetd.service loaded active running Xinetd A Powerful Replacement For Inetd Find a service name use grep : systemctl list-units --type=service --state=running | grep keyword example : [root@server ~]# systemctl list-units --type=service --state=running | grep php php-fpm81.service loaded active running The PHP FastCGI Process Manager php-fpm82.service loaded active running The PHP FastCGI Process Manager List all failed services: To list all running services, use the following command: systemctl list-units --type=service --state=failed example : [root@cwp ~]# systemctl list-units --type=service --state=failed UNIT LOAD ACTIVE SUB DESCRIPTION * systemd-sysctl.service loaded failed failed Apply Kernel Variables * systemd-vconsole-setup.service loaded failed failed Setup Virtual Console * vzquota.service loaded failed failed LSB: Start vzquota at the end of boot To Stop/masking a service strictly so no one or other programs can start it : systemctl mask service_name To unmasking a service and undo : systemctl unmask service_name Reload systemd configuration: To reload the systemd configuration after changes is done or to just reload it, use the following command: systemctl daemon-reload View service logs: To view the logs of a service, use the following command: journalctl -u service_name example : [root@cwp ~]# journalctl -u httpd -- Logs begin at Wed 2023-05-05 18:48:58 EDT, end at Sat 2023-05-06 15:20:01 EDT. -- Aug 04 04:25:14 cwp.onefinehost.com systemd[1]: Stopping Web server Apache... Aug 04 04:25:14 cwp.onefinehost.com systemd[1]: Stopped Web server Apache. Aug 04 04:25:14 cwp.onefinehost.com systemd[1]: Starting Web server Apache... Aug 04 04:25:14 cwp.onefinehost.com systemd[1]: Started Web server Apache. Aug 04 04:25:14 cwp.onefinehost.com systemd[1]: Reloading Web server Apache. Aug 04 04:25:14 cwp.onefinehost.com systemd[1]: Reloaded Web server Apache. Aug 04 04:25:15 cwp.onefinehost.com systemd[1]: Reloading Web server Apache. Aug 04 04:25:15 cwp.onefinehost.com systemd[1]: Reloaded Web server Apache. Aug 04 04:25:17 cwp.onefinehost.com systemd[1]: Stopping Web server Apache...
  7. great and yes cwp php-fpm uses .user.ini for users, always modify the php values from user panel.
  8. i see the correct php.ini is loaded in your screenshot, normally this type of issue doesn't comes with cwp php versions.
  9. you can PM me with server root details for the checks.
  10. hi run this below command : sh /scripts/php_big_file_upload 128 or sh /scripts/php_big_file_upload 64
  11. Sandeep B. replied to Ling's post in a topic in CWP - Control WEB Panel
    yes in future there will be 2fa for both panels.
  12. Sandeep B. replied to Ling's post in a topic in CWP - Control WEB Panel
    I've identified the issue and the devs are working on it this will be resolved soon in next version of cwp. For CWP-admin 2fa will not be releases as of now but our devs have this in there to do list.
  13. In this tutorial we'll learn how you can replace rsyslog with Syslog-ng (System Logging Next Generation) this tutorial will also help if for some reason rsyslog is not working in your server you can relace it with Syslog-ng , it is an open-source, highly configurable, and flexible log management tool. It is used for collecting, processing, and storing log messages from various sources in a centralized location. Syslog-ng is an enhanced replacement for the traditional syslogd service and offers more advanced features and capabilities. Key features of syslog-ng include: Log Collection: Syslog-ng can collect log messages from a wide range of sources, including local log files, remote hosts, network devices, applications, and more. It supports various log message formats, making it versatile for handling different types of logs. Log Routing and Filtering: With syslog-ng, you can define sophisticated log routing and filtering rules based on message content, source, facility, severity, or other criteria. This allows you to route specific logs to different destinations and filter out irrelevant or sensitive information. Log Transformation: Syslog-ng can modify log messages before storing or forwarding them. You can perform tasks like adding or removing fields, enriching log data, or anonymizing sensitive information to comply with data privacy regulations. Reliable Log Transport: Syslog-ng ensures reliable log transport with features like TLS encryption, message acknowledgment, and retransmission mechanisms. This helps prevent log message loss and ensures the integrity and confidentiality of log data during transit. Centralized Log Management: By sending logs to a centralized server, you can easily monitor, search, and analyze log data from multiple sources in one location. This simplifies log analysis and troubleshooting processes. Integration with SIEMs and Big Data Solutions: Syslog-ng can integrate with Security Information and Event Management (SIEM) systems and big data solutions like Elasticsearch, enabling you to leverage advanced analytics and visualization capabilities for log data. High Performance and Scalability: Syslog-ng is designed to handle a large volume of log data efficiently and can scale to meet the needs of enterprise-level environments. Community and Enterprise Editions: Syslog-ng is available in both community and enterprise editions. The community edition is free and open-source, while the enterprise edition provides additional features, support, and commercial licensing options. Step 1 : Remove rsyslog : yum remove rsyslog ** for centos 8 and above you can also use dnf in place of yum Step 2 : Install epel repo and syslog-ng yum install epel-release -y yum install syslog-ng ** for centos 8 and above you can also use dnf in place of yum Step 3 : Enable syslog-ng service and start the service : systemctl enable syslog-ng systemctl start syslog-ng That's it syslog-ng is now enabled and working check the /var/log/messages
  14. In this tutorial we'll learn how you can disable dangerous PHP functions. Disabling dangerous PHP functions can help improve the security of your web application by preventing potential exploits and attacks. However, it's important to be cautious when disabling functions, as it may impact the functionality of your application. Only disable functions that are truly unnecessary and represent a significant security risk. Here are some steps you can take to disable dangerous PHP functions: Use PHP Configuration (php.ini): Many PHP functions can be disabled or restricted through the PHP configuration file (php.ini). Access to this file is usually restricted to server administrators, so you may need to contact your hosting provider or server administrator to make changes. Using php.ini or .user.ini : Look or add the disable_functions directive in the php.ini or in .user.ini file and list/add the functions you want to disable, separated by commas. For example: disable_functions = exec,system,passthru,popen,proc_open,shell_exec **you need to restart Apache or php-fpm service after you added this directive. Using .htaccess when using Apache php DSO - mod_php module : Use .htaccess (Apache): If you're using the Apache web server, you can also disable PHP functions via the .htaccess file in your web application's root directory. However, this method requires the "mod_php" module to be enabled, and you should have the necessary permissions to modify .htaccess. Add the following line to your .htaccess file to disable a function: php_flag disable_functions "exec, system, passthru, popen, proc_open, shell_exec" **restart Apache service after you've added this directive. Please note : Regularly update your PHP version and libraries, apply security patches to your CMS/scripts, and follow secure coding practices to build a robust and secure web application
  15. In this tutorial We'll install Lets Encrypt free SSL in Control web panel, so you can access the admin panel and user panel url in https also for mail server and hostname. Follow the below steps to get ssl installed. Step 1 : Choose a valid Hostname i.e it should be the subdomain of your main domain example : server1.domain.tld or alphagnu.domain.tld ** ensure whatever you choose as a hostname url you should have valid A record DNS pointing to the server ip *** don't choose mail.domain.tld or cpanel.domain.tld or ftp.domain.tld or webmail.domain.tld as this are reserved for cwp admin services. Step 2 : Change the hostname : Go to CWP-admin >> search >> search for change hostname >> open change hostname module Step 3 : Install Lets encrypt ssl for hostname : By entering the hostname click on "change hostname" button that's it the module will install Lets encrypt ssl automatically for hostname, control panel urls and mail server the hostname module will add ssl to everywhere, now check the admin panel url : https://server1.domain.tld:2031/ and user panel url https://server1.domain.tld:2083 it should be opening with proper ssl certs.
  16. In this tutorial We'll install Lets Encrypt free SSL in Hestia Control panel, so you can access the admin panel in https also for mail server and hostname. The developers built an easy script for it, you need to run the bwlo command to get the ssl installed for hostname, email server and hestia admin panel Step 1 : Choose a valid Hostname i.e it should be the subdomain of your main domain example : server1.domain.tld or alphagnu.domain.tld ** ensure whatever you choose as a hostname url you should have valid A record DNS pointing to the server ip Step 2 : Change the hostname : v-change-sys-hostname server1.domain.tld Step 3 : Install Lets encrypt ssl for hostname : v-add-letsencrypt-host this script will add ssl to everywhere now check the admin panel : https://server1.domain.tld:8083 it should be opening with proper ssl certs.
  17. In this tutorial we’ll learn How to install HestiaCP control panel which is similar like vestacp and made by one developer of vesta control panel. Since Vestacp is not updating there features anymore and it seems dead project already I recommend you to move to Hestiacp as soon as possible. They have some extended features in there panel and there forum support is excellent. Make sure that your server is running a supported operating system : Debian 10 Debian 11 Debian 12 Ubuntu 20.04 LTS Ubuntu 22.04 LTS Also ARM server will also work with hestia cp. Our website alphagnu.com also uses ARM server with hestia cp. I recommend to use debian 12 or debian 11 for stable production environment. Homepage : https://hestiacp.com HestiaCP Demo : https://demo.hestiacp.com:8083/ Step 1: Login as root into your server via ssh client like putty or Linux terminal Step 2: Preparing install deps/requirements : apt install sudo wget curl Download Hestiacp install script : wget https://raw.githubusercontent.com/hestiacp/hestiacp/release/install/hst-install.sh Step 3: Run below command according to your software choice : Ensure you change this with your details in below installation flag : **here port 8083 is the admin/user gui port for hestia cp you can chnage the port too by changing the --port 8083 to your fav port number. To install Nginx + Apache + php-fpm with multiphp, email server with clamav and spamassassin and installs mariadb server (requires 2gb ram and above): sudo bash ./hst-install.sh --apache yes --phpfpm yes --multiphp yes --mysql yes --postgresql no --vsftpd yes --proftpd no --exim yes --dovecot yes --clamav yes --spamassassin yes --iptables yes --fail2ban yes --quota yes --api yes --hostname server.domain.tld --email admin@gmail.com --port 8083 --password admin_password --lang en To install Nginx + php-fpm with multiphp, email server with clamav and spamassassin and installs mariadb server (requires 2gb ram and above): sudo bash ./hst-install.sh --apache no --phpfpm yes --multiphp yes --mysql yes --postgresql no --vsftpd yes --proftpd no --exim yes --dovecot yes --clamav yes --spamassassin yes --iptables yes --fail2ban yes --quota yes --api yes --hostname server.domain.tld --email admin@gmail.com --port 8083 --password admin_password --lang en To install Apache + php-fpm with multiphp, email server with clamav and spamassassin and installs mariadb server (requires 2gb ram and above): sudo bash ./hst-install.sh --apache yes --phpfpm yes --multiphp yes --mysql yes --postgresql no --vsftpd yes --proftpd no --exim yes --dovecot yes --clamav yes --spamassassin yes --iptables yes --fail2ban yes --quota yes --api yes --hostname server.domain.tld --email admin@gmail.com --port 8083 --password admin_password --lang en For 1 gb ram and above, if you need only Nginx + Apache + php-fpm with multiphp and light email server without security (clamav and spamassassin) with mariadb : sudo bash ./hst-install.sh --apache yes --phpfpm yes --multiphp yes --mysql yes --postgresql no --vsftpd yes --proftpd no --exim yes --dovecot yes --clamav no --spamassassin no --iptables yes --fail2ban yes --quota yes --api yes --hostname server.domain.tld --email admin@gmail.com --port 8083 --password admin_password --lang en For 1 gb ram and above, if you need only Nginx + php-fpm with multiphp and light email server without security (clamav and spamassassin) with mariadb : sudo bash ./hst-install.sh --apache no --phpfpm yes --multiphp yes --mysql yes --postgresql no --vsftpd yes --proftpd no --exim yes --dovecot yes --clamav no --spamassassin no --iptables yes --fail2ban yes --quota yes --api yes --hostname server.domain.tld --email admin@gmail.com --port 8083 --password admin_password --lang en Suppose you want to install postgresql change the option “–postgresql no” to “–postgresql yes” to disable revert the option yes to no. That's it if you need installation support you can use this forum.
  18. IN this tutorial I’ll show you how you can easily clear ram cache and swap memory to speed up the Linux server. You all are familiar with word CACHE which usually represents performance benefits like cache can improve website’s loading speed and similarly cache will improve Linux server performance too in some places. Normally cache are managed by Linux Kernel efficiently and will be cleaned overtime when not in use. Cache cleaning is necessary to refresh and free up the system memory so a new version of cache can be built by eliminating old cache. In result it will help your Server to run even faster with fresh cache. Let’s get started with the tutorial : Please note it is not recommended running Level 3 cache on regular basis, use it when you need to free up memory and cache. It is recommend to use level 1 cache clearing only. Here there are 3 levels of RAM cache clearing commands : vm.drop_caches=1 : This is will clear pagecache – recommended sync; echo 1 > /proc/sys/vm/drop_caches vm.drop_caches=2 : This is will clear dentries and inodes sync; echo 2 > /proc/sys/vm/drop_caches vm.drop_caches=3 : This is will clear pagecache, dentries and inodes i.e. all cache are cleared sync; echo 3 > /proc/sys/vm/drop_caches Clear Swap Memory : Clearing swap memory can take time depending disk speed and the size of the swap memory usage, to clear it simply run this command : swapoff -a && swapon -a ** also don’t use cache clearing command under cron jobs, this commands should be run manually and automation is not recommended.
  19. In this tutorial we’ll test and check the server network connection speed via speedtest-cli (Speedtest by Ookla), the best thing is you can directly install the speedtest python package to your Linux distro and run the test via terminal command isn’t is awesome. This will also help you to determine that what exactly network speed your server provider is providing. Without waiting lets get started. Difficulty level : super easy For Centos/EL 7/centos 8 stream/centos 9 stream curl -s https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.rpm.sh | sudo bash yum install speedtest to run the speedtest type below command : speedtest **accept the license by typing "yes" For Ubuntu/Debian : sudo apt-get install curl curl -s https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.deb.sh | sudo bash sudo apt-get install speedtest to run the speedtest type below command : speedtest **accept the license by typing "yes" For other OS : mkdir -p /usr/local/ookla cd /usr/local/ookla wget https://install.speedtest.net/app/cli/ookla-speedtest-1.2.0-linux-x86_64.tgz tar zxvf ookla-speedtest-1.2.0-linux-x86_64.tgz to run the speedtest type below command : cd /usr/local/ookla ./speedtest **accept the license by typing "yes" it will show the speed results like below : Speedtest by Ookla Server: Frontier - Ashburn, VA (id: 14229) ISP: Hetzner Online GmbH Idle Latency: 0.32 ms (jitter: 0.00ms, low: 0.31ms, high: 0.32ms) Download: 17904.35 Mbps (data used: 9.7 GB) 1.25 ms (jitter: 0.27ms, low: 0.34ms, high: 1.86ms) Upload: 16385.81 Mbps (data used: 15.5 GB) 2.86 ms (jitter: 0.79ms, low: 0.68ms, high: 7.50ms) Packet Loss: 0.0% Result URL: https://www.speedtest.net/result/c/524965dc-5310-4b38-9ce6-218bf4de7d0b
  20. In this tutorial we’ll learn how to install MSSQL express server in centos/EL 7/8 stream OS easily. Microsoft SQL Server Express is a version of Microsoft’s SQL Server relational database management system that is free to download, distribute and use. It comprises a database specifically targeted for embedded and smaller-scale applications. To install MSSQL express edition follow the below steps : First install some dependencies :- yum install python2 compat-openssl10 openssl-devel Second make python 2 default alternative interpreter : alternatives --config python Third Microsoft MSSQL repo : For Centos 7/EL7 : curl -o /etc/yum.repos.d/mssql-server.repo https://packages.microsoft.com/config/rhel/7/mssql-server-2019.repo or Centos 8/EL8/AlmaLinux/RockyLinux : curl -o /etc/yum.repos.d/mssql-server.repo https://packages.microsoft.com/config/rhel/8/mssql-server-2019.repo Fourth Install MSSQL express server : yum install mssql-server Fifth Run mssql-conf via below command and choose the Express edition and accept the licensing and terms by typing “yes” : /opt/mssql/bin/mssql-conf setup ** choose “Express” by typing the number you see Infront of it, also choose/enter the password fo “SA” user Sixth enable MSSQL to run on boot : systemctl enable mssql-server you can restart, start and stop mssql-server as below : systemctl start mssql-server systemctl stop mssql-server systemctl restart mssql-server Install the SQL Server command-line tools To install sqlcmd follow this : For Centos 7/EL7 : curl -o /etc/yum.repos.d/msprod.repo https://packages.microsoft.com/config/rhel/7/prod.repo For 8/EL8/AlmaLinux/RockyLinux : curl -o /etc/yum.repos.d/msprod.repo https://packages.microsoft.com/config/rhel/8/prod.repo Then install the sqlcmd tool : yum remove unixODBC-utf16 unixODBC-utf16-devel -y && yum install mssql-tools unixODBC-devel -y Now set the environment variable : echo 'export PATH="$PATH:/opt/mssql-tools/bin"' >> ~/.bash_profile echo 'export PATH="$PATH:/opt/mssql-tools/bin"' >> ~/.bashrc Now update the current shell environment : source ~/.bashrc example : you can connect to SA user with below command : sqlcmd -S localhost -U SA -P 'YourPassword'
  21. Maldet is a malware scanner for Linux servers. It detects varieties of infections and malwares within your scripts (php and etc) and in server. To scan for viruses with Maldet, follow these steps: Log in to your Linux server as the root user. Install Maldet by running the following command: wget http://www.rfxn.com/downloads/maldetect-current.tar.gz tar -xzf maldetect-current.tar.gz cd maldetect-*/ sh install.sh Update Maldet with the latest malware definitions by running the following command: maldet -u To scan a specific directory, run the following command: maldet -a /path/to/directory Replace “/path/to/directory” with the path to the directory you want to scan. To scan all files on the server, run the following command: maldet -a / #or maldet -a /home #or maldet -a /home/user/public_html Note that this can take a long time to complete, depending on the size of your server and the number of files. Maldet will output any suspicious files it finds. If it finds a file that it suspects is malware, it will quarantine it automatically if enable. You can view the quarantine list by running the following command: maldet --quarantine list If you want to restore a file from quarantine, run the following command: maldet --quarantine restore ID Replace “ID” with the ID of the file you want to restore, which you can find in the quarantine list. That’s it! You’ve successfully scanned for viruses with Maldet. For more advance malware/virus scanning and cleaning you can contact me (paid service low price)
  22. SSH keys provide a more secure way of logging in compared to using a password alone. While a password can eventually be cracked with a brute-force attack, SSH keys are nearly impossible to decipher by brute force alone. With public key authentication, every computer has (i) a public and (ii) a private “key” (two mathematically-linked algorithms that are effectively impossible to crack). Setup SSH Keys on your Windows computer/laptop using PuttyGEN Step 1 Download PuttyGEN from the Homepage website. Scroll down until you find puttygen.exe and download either 32 or 64bit version. Step 2 Start PuttyGEN by double clicking on its icon Step 3 From top menu, click on “Key” and select “SSH-2 RSA” and in the bottom right box change the number 2048 to 4096 Step 4 Click “Generate” button Step 5 Move your mouse pointer around in the blank area of the Key section, below the progress bar (to generate some randomness) until the progress bar is full Step 6 Click the “Save public key” button & choose whatever filename you’d like (some users create a folder in their computer named my_keys) Step 7 Click the “Save private key” button & choose whatever filename you’d like Step 8 Right-click in the text field labeled Public key for pasting into OpenSSH authorized_keys file and choose Select All, right-click again and choose Copy Step 9 Login to your VPS or Dedicated server Step 10 Run the following commands: mkdir ~/.ssh chmod 0700 ~/.ssh touch ~/.ssh/authorized_keys chmod 0644 ~/.ssh/authorized_keys Step 11 Paste the SSH public key which you copied in step 8 into your ~/.ssh/authorized_keys file Lets setup Putty on your Windows OS Step 1 Start PuTTY by double-clicking its executable file Step 2 PuTTY’s initial window is the Session Category (navigate PuTTY’s various categories, along the left-hand side of the window) Step 3 In the Host Name field, enter the IP address of your VPS or its fully qualified domain name (FQDN) Step 4 Enter the port number in the Port field (for added security, consider changing your server’s SSH port to a non-standard port. Step 5 Along the left-hand side of the window, select the Data sub-category, under Connection Step 6 Specify the username that you plan on using, when logging in to the SSH server, and whose profile you’re saving, in the Auto-login username field Step 7 Expand the SSH sub-category, under Connection Step 8 Highlight the Auth sub-category and click the Browse button, on the right-hand side of the PuTTY window Step 9 Browse your file system and select your previously-created private key Step 10 Return to the Session Category and enter a name for this profile in the Saved Sessions field, e.g. user@123.456.78.9 or user@host.yourdomain.tld Step 11 Click the Save button Now you can go ahead and log in to your server and you will not be prompted for a password. Finally let’s disable username/password login on your vps/dedicated server Step 1 Open /etc/ssh/sshd_config nano /etc/ssh/sshd_config Step 1 Lets change both “PasswordAuthentication” and “UsePAM” options to “no” [...] PasswordAuthentication no [...] UsePAM no [...] Step 2 Restart your SSH server service sshd restart
  23. Windows VPS are not cheap instead buy RDP from https://webpundits.in/ clearance sales : https://webpundits.in/clients/index.php?rp=/store/stock-clearance-sale they are best provider for RDP but the activation time is longer sometime you've to wait 24 hrs.
  24. In this tutorial we'll learn how we can enable and install Latest stable version of nginx in centos Stream , almalinux and rockylinux. By default This OS have old version of nginx installed from nginx stream module. To install latest version of nginx stable or mainline do the steps : Step 1 : Disable nginx module : dnf module disable nginx -y Step 2 : Add Official repository for nginx : Create repository : > /etc/yum.repos.d/nginx.repo nano /etc/yum.repos.d/nginx.repo For stable Nginx and add this line : [nginx-stable] name=nginx stable repo baseurl=http://nginx.org/packages/centos/$releasever/$basearch/ gpgcheck=1 enabled=1 gpgkey=https://nginx.org/keys/nginx_signing.key module_hotfixes=true For mainline Nginx and add this line : [nginx-mainline] name=nginx mainline repo baseurl=http://nginx.org/packages/mainline/centos/$releasever/$basearch/ gpgcheck=1 enabled=1 gpgkey=https://nginx.org/keys/nginx_signing.key module_hotfixes=true Step 3 : Remove any nginx version installed : dnf remove nginx -y Step 4 : Install the latest version of nginx : dnf install nginx -y systemctl enable nginx systemctl restart nginx That's it you can now check the nginx version via this command : nginx -V
  25. In this tutorial we’ll install WDDX php extension in php 7.4. This extension is DEPRECATED and REMOVED as of PHP 7.4. Lets find what is WDDX ? – WDDX (Web Distributed Data eXchange) is a programming language-, platform- and transport-neutral data interchange mechanism designed to pass data between different environments and different computers. No worry we can still install WDDX extension in php 7.4 follow this easy guide to this :Step 1 : Building and installing WDDX php extension : Step 1 : wget https://github.com/php/pecl-text-wddx/archive/master.zip -O wddx.zip unzip wddx.zip cd pecl-text-wddx-master phpize ./configure make make install Step 2 : Enabling WDDX php extension In php.ini add this following line to enable WDDX : extension=wddx.so Restart apache/php-fpm/php-handler service done. Step 3 : Check wddx is installed correctly and loaded via this command : php -m | grep wddx If loaded successfully then result will look like : [root@mysterydata]# php -m | grep wddx wddx Or check via php info page