<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>directadmin &#8211; VeriTeknik</title>
	<atom:link href="https://www.veriteknik.net.tr/en/tag/directadmin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.veriteknik.net.tr/en/</link>
	<description>VeriTeknik Bilişim &#124; VeriTeknik Bilişim</description>
	<lastBuildDate>Mon, 18 Mar 2019 07:45:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Finding spammer php script in DirectAdmin</title>
		<link>https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/</link>
					<comments>https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/#respond</comments>
		
		<dc:creator><![CDATA[Fehmi Can Tokay]]></dc:creator>
		<pubDate>Sat, 28 Jan 2017 13:13:04 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[find]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=1113</guid>

					<description><![CDATA[<p>There is an easy method to find spammer php script in your home path. Directadmin logs these spammer scripts which are using phpmailer or similar things. To find this: Go to your home path cd /home Find your log files find ./ -type f -size +1k -name "php-mail.log" After this find operation, you can see [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/">Finding spammer php script in DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is an easy method to find spammer php script in your home path. Directadmin logs these spammer scripts which are using phpmailer or similar things. To find this:</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Go to your home path</li>
</ol>
</li>
</ol>
<pre class="EnlighterJSRAW" data-enlighter-language="shell">cd /home</pre>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Find your log files</li>
</ol>
</li>
</ol>
<pre class="EnlighterJSRAW" data-enlighter-language="shell">find ./ -type f -size +1k -name "php-mail.log"</pre>
<p>After this find operation, you can see your log files. It means, users that have this log file are could be the potential spammer.</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Tailf your log file.</li>
</ol>
</li>
</ol>
<pre class="EnlighterJSRAW" data-enlighter-language="shell">tailf /home/user/.php/php-mail.log</pre>
<p>&nbsp;</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>You can see spammer scripts.!!</li>
</ol>
</li>
</ol>
<pre class="brush: bash; gutter: true; first-line: 1">mail() on [/home/user/domains/domain.com.tr/public_html/modules/mod_users_latest/files.php(1947) : eval()'d code:775]: To: user@hotmail.com -- Headers: Date: Sat, 28 Jan 2017 15:51:47 +0300 From: Flora &lt;user@domain.com.tr&gt; Message-ID: &lt;3f796c9fb6de893f060882897f360bea@domain.com.tr&gt; X-Priority: 3 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="b1_3f796c9fb6de893f060882897f360bea" Content-Transfer-Encoding: 8bit</pre>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Remove this peace of shit.</li>
</ol>
</li>
</ol>
<pre class="brush: bash; gutter: true; first-line: 1">rm /home/user/domains/domain.com.tr/public_html/modules/mod_users_latest/files.php</pre>
<p>You can easiliy get rid of these spammer scripts using this method. Don&#8217;t forget to clear your mail queue after this operation.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/">Finding spammer php script in DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/finding-spammer-php-script-directadmin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1113</post-id>	</item>
		<item>
		<title>Installing MS SQL Module to PHP on DirectAdmin</title>
		<link>https://www.veriteknik.net.tr/en/installing-ms-sql-module-to-php-on-directadmin/</link>
					<comments>https://www.veriteknik.net.tr/en/installing-ms-sql-module-to-php-on-directadmin/#respond</comments>
		
		<dc:creator><![CDATA[Mustafa Emre Aydın]]></dc:creator>
		<pubDate>Fri, 23 Aug 2013 06:32:00 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[LINUX]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[mssql]]></category>
		<category><![CDATA[php]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=831</guid>

					<description><![CDATA[<p>If you need to connect to an MS Sql Server remotely from your DirectAdmin server via php, you need to rebuild PHP with necessary components. Get the latest stable release of FreeTDS and install it. cd /root wget ftp://ftp.astron.com/pub/freetds/current/freetds-current.tgz tar -xvzf freetds-current.tgz cd freetds-dev.0.92.377 ./configure --prefix=/usr/local/freetds make make install Now we should tell Direct Admin&#8217;s [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/installing-ms-sql-module-to-php-on-directadmin/">Installing MS SQL Module to PHP on DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you need to connect to an MS Sql Server remotely from your DirectAdmin server via php, you need to rebuild PHP with necessary components. Get the latest stable release of FreeTDS and install it.</p>
<pre class="brush: bash; gutter: true; first-line: 1">cd /root
wget ftp://ftp.astron.com/pub/freetds/current/freetds-current.tgz
tar -xvzf freetds-current.tgz
cd freetds-dev.0.92.377
./configure --prefix=/usr/local/freetds
make
make install</pre>
<p>Now we should tell Direct Admin&#8217;s custom build that we want the MS Sql libraries installed using freetds.Edit the file :/usr/local/directadmin/custombuild/configure/ap2/configure.php5 add</p>
<pre class="brush: bash; gutter: true; first-line: 1">--with-mssql=/usr/local/freetds \</pre>
<p>to anywhere in the file. If you&#8217;re adding it the to end of the file, don&#8217;t add the <strong>\</strong> at the end, instead add to the end of the line &#8220;before&#8221; the last line. Now go to custombuild and build the new PHP.</p>
<pre class="brush: bash; gutter: true; first-line: 1">cd /usr/local/directadmin/custombuild
./build clean
./build php d</pre>
<p>Check if MS Sql is intalled.</p>
<pre class="brush: actionscript3; gutter: true; first-line: 1">php -m|grep mssql
mssql</pre>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/installing-ms-sql-module-to-php-on-directadmin/">Installing MS SQL Module to PHP on DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/installing-ms-sql-module-to-php-on-directadmin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">831</post-id>	</item>
		<item>
		<title>PHP-SOAP Installation on DirectAdmin</title>
		<link>https://www.veriteknik.net.tr/en/php-soap-installation-on-directadmin/</link>
					<comments>https://www.veriteknik.net.tr/en/php-soap-installation-on-directadmin/#respond</comments>
		
		<dc:creator><![CDATA[Mustafa Emre Aydın]]></dc:creator>
		<pubDate>Sat, 18 Aug 2012 10:29:17 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[LINUX]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[php]]></category>
		<category><![CDATA[soap]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=629</guid>

					<description><![CDATA[<p>People using Direct Admin usually do the mistake to install anything new by using the yum repositories. In fact, Direct Admin has a custom build method, so when you want to add something new to your system, you might need to recompile what&#8217;s allready installed. The same goes for the PHP-SOAP too. Yet don&#8217;t freak [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/php-soap-installation-on-directadmin/">PHP-SOAP Installation on DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>People using Direct Admin usually do the mistake to install anything new by using the yum repositories. In fact, Direct Admin has a custom build method, so when you want to add something new to your system, you might need to recompile what&#8217;s allready installed.</p>
<p>The same goes for the PHP-SOAP too. Yet don&#8217;t freak out, it&#8217;s very simple.</p>
<p>Go to your Direct Admin custom build directory</p>
<pre class="brush: bash; gutter: true; first-line: 1">cd /usr/local/directadmin/custombuild</pre>
<p>Now let&#8217;s see our custom build configuration files.</p>
<pre class="brush: bash; gutter: true; first-line: 1">./build used_configs</pre>
<p>One of the outputs is the PHP configuration file, edit that file,</p>
<pre class="brush: bash; gutter: true; first-line: 1">/usr/local/directadmin/custombuild/configure/suphp/configure.php5</pre>
<p>Now append <strong>–enable-soap</strong> to the end of the file. Don&#8217;t forget to add a <strong>&#8220;\</strong>&#8221; to the end of the last line.</p>
<p>After this, save the file and exit. Now we&#8217;re ready to recompile php.</p>
<pre class="brush: bash; gutter: true; first-line: 1">./build php all</pre>
<p>That&#8217;s it!</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/php-soap-installation-on-directadmin/">PHP-SOAP Installation on DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/php-soap-installation-on-directadmin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">629</post-id>	</item>
		<item>
		<title>Directadmin : Problem Receiving Emails &#8211; The &#8220;Unknown User&#8221; Issue</title>
		<link>https://www.veriteknik.net.tr/en/directadmin-problem-recieving-emails-the-unknown-user-issue/</link>
					<comments>https://www.veriteknik.net.tr/en/directadmin-problem-recieving-emails-the-unknown-user-issue/#respond</comments>
		
		<dc:creator><![CDATA[Mustafa Emre Aydın]]></dc:creator>
		<pubDate>Sat, 09 Jun 2012 08:55:47 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[exim]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=535</guid>

					<description><![CDATA[<p>If you get a 550 error as a reply when you email a user with directadmin, saying Remote host said: 550 &#8220;Unknown User&#8221; or The error that the other server returned was: 550 550 &#8220;Unknown User&#8221; (state 13). or something equivalent, then the problem might be your virtual domainowner settings. This happens with exim especially [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/directadmin-problem-recieving-emails-the-unknown-user-issue/">Directadmin : Problem Receiving Emails &#8211; The &#8220;Unknown User&#8221; Issue</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you get a <em>550 error</em> as a reply when you email a user with directadmin, saying <strong>Remote host said: 550 &#8220;Unknown User&#8221;</strong> or <strong>The error that the other server returned was: 550 550 &#8220;Unknown User&#8221; (state 13).</strong> or something equivalent, then the problem might be your virtual domainowner settings.</p>
<p>This happens with exim especially when moving from one server to another via Directadmin.</p>
<p>To verify this solution, first check your paniclog:</p>
<pre class="brush: bash; gutter: true; first-line: 1">tail /var/log/exim/paniclog</pre>
<p>If you get something like this:</p>
<blockquote><p>2012-06-08 18:53:01 1SczTF-0002Cj-B8 Failed to find user &#8220;&#8221; from expanded string &#8220;${lookup{$domain}lsearch{/etc/virtual/domainowners}{$value}}&#8221; for the domain_filter router</p></blockquote>
<p>then you probably have an issue with your domainowners file. as you can see, the perl script can&#8217;t parse the <em>username</em>, hence the error &#8220;unknown user&#8221; when receiving email.</p>
<p>The solution is to rebuild the /etc/virtual directory</p>
<p>Get a backup</p>
<pre class="brush: bash; gutter: true; first-line: 1">cd /etc
cp -Rp virtual virtual.backup</pre>
<p>Verify its existance</p>
<pre class="brush: bash; gutter: true; first-line: 1">mkdir -p /etc/virtual
chmod 755 /etc/virtual
chown mail:mail /etc/virtual</pre>
<p>Create this script and save it somewhere, let&#8217;s say /root/fix_virtual.sh</p>
<pre class="brush: bash; gutter: true; first-line: 1">#!/bin/sh

echo -n '' &gt; /etc/virtual/domains
echo -n '' &gt; /etc/virtual/domainowners

mkdir -p /etc/virtual/`hostname`
chown mail:mail /etc/virtual/`hostname`
chmod 711 /etc/virtual/`hostname`
echo `hostname` &gt;&gt; /etc/virtual/domains

for u in `ls /usr/local/directadmin/data/users`; do
{
       for d in `cat /usr/local/directadmin/data/users/$u/domains.list`; do
       {
               echo "$d: $u" &gt;&gt; /etc/virtual/domainowners
               echo "$d" &gt;&gt; /etc/virtual/domains

               DMN=/etc/virtual/$d

               mkdir -p $DMN
               chmod 711 $DMN
               chown mail:mail $DMN

               touch $DMN/aliases
               if [ ! -s $DMN/aliases ]; then
                       echo "$u: $u" &gt; $DMN/aliases
               fi
               touch $DMN/autoresponder.conf
               touch $DMN/filter
               touch $DMN/filter.conf
               touch $DMN/passwd
               touch $DMN/quota
               touch $DMN/vacation.conf
               chown mail:mail $DMN/*

               mkdir -p $DMN/majordomo
               chmod 751 $DMN/majordomo
               chown majordomo:daemon $DMN/majordomo

               mkdir -p $DMN/reply
               chmod 700 $DMN/reply
               chown mail:mail $DMN/reply

               for p in `cat /usr/local/directadmin/data/users/$u/domains/$d.pointers 2&gt;/dev/null`; do
               {
                       echo "$p: $u"  &gt;&gt; /etc/virtual/domainowners
                       echo "$p" &gt;&gt; /etc/virtual/domains
                       ln -s $d /etc/virtual/$p
               };
               done;
       }
       done;
}
done;

chown mail:mail /etc/virtual/domains
chown mail:mail /etc/virtual/domainowners
chmod 644 /etc/virtual/domainowners
chmod 644 /etc/virtual/domains</pre>
<p>Make it exacutable and run.</p>
<pre class="brush: bash; gutter: true; first-line: 1">chmod 755 /root/fix_virtual.sh
/root/fix_virtual.sh</pre>
<p>Restart exim services</p>
<pre class="brush: bash; gutter: true; first-line: 1">service exim restart</pre>
<p>Your problem should be fixed.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/directadmin-problem-recieving-emails-the-unknown-user-issue/">Directadmin : Problem Receiving Emails &#8211; The &#8220;Unknown User&#8221; Issue</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/directadmin-problem-recieving-emails-the-unknown-user-issue/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">535</post-id>	</item>
		<item>
		<title>Web Hosting Security premier</title>
		<link>https://www.veriteknik.net.tr/en/web-hosting-security-premier/</link>
					<comments>https://www.veriteknik.net.tr/en/web-hosting-security-premier/#respond</comments>
		
		<dc:creator><![CDATA[ckaraca]]></dc:creator>
		<pubDate>Mon, 16 Apr 2012 22:20:07 +0000</pubDate>
				<category><![CDATA[Web Hosting Security]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[repoforge]]></category>
		<category><![CDATA[rpmforge]]></category>
		<category><![CDATA[telnet]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[yum]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=323</guid>

					<description><![CDATA[<p>IMPORTANT NOTE: Never assume the directory structures exist in your system as written in the document. Never blindly follow security instructions &#8212; read, review, compare, apply as it fits your system., Update your server as necessary As its nature, Linux is a multi-developer operating system and you might see an update on any package everyday, an updater like [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/web-hosting-security-premier/">Web Hosting Security premier</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="color: #ff0000;"><strong>IMPORTANT NOTE:</strong></span> Never assume the directory structures exist in your system as written in the document. Never blindly follow security instructions &#8212; read, review, compare, apply as it fits your system.,</p>
<h3>Update your server as necessary</h3>
<p>As its nature, Linux is a multi-developer operating system and you might see an update on any package everyday, an updater like YUM if you don&#8217;t change it&#8217;s default behavior hosts the most recent stable versions of each package that you install on your server.</p>
<p>Compared to other operating systems, updating Linux is easy as writing a command to terminal, the rest will be automated by YUM. Yum can be extended by independent software repositories like Repoforge. RPMforge is a collaboration of Dag and other packagers. They provide over 5000 packages for CentOS, including wine, vlc, mplayer, xmms-mp3, and other popular media tools. It is not part of Red Hat or CentOS but is designed to work with those distributions.</p>
<p>To install Rpmforge, run;</p>
<blockquote><p> rpm -Uvh http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.2-2.rf.src.rpm</p></blockquote>
<p>If you get an error with the command, check the web site for a recent version. If you are using a control panel like Directadmin you better exclude the packages below from yum as they are maintained by the control panel updater;</p>
<blockquote><p>exclude=apache* httpd* mod_* mysql* MySQL* da_* *ftp* exim* sendmail* php* bind-chroot*</p></blockquote>
<p>and the last thing you should do is to type</p>
<blockquote><p>yum upgrade</p></blockquote>
<p>We suggest you to run the update at least every once a month.</p>
<h3>Disable Telnet</h3>
<hr style="width: 100%;" width="100%" />
<p>Nowadays, Telnet is mostly given its role to SSH; more secure remote shell client, because Telnet is sending the passwords in readable clear text. Also SSH have many abilities that you can use such as private-keys that you can use to log in to the server without writing down a password. Public key is mostly used when you need root access even you don&#8217;t know the root password (root password might be changed by the system administrator or by your client which you install the system for).</p>
<p>Connect to the server and edit<strong> /etc/xinetd.d/telnet</strong> by typing;</p>
<blockquote><p>vi /etc/xinetd.d/telnet</p></blockquote>
<p>if exists <strong>disable = no</strong> change to <strong>disable = yes</strong></p>
<p>save &amp; exit (SHIFT + ZZ)</p>
<h3>Restrict Access to applications that can directly connect to the Internet</h3>
<hr />
<p>Even an attacker leak into your server, it is better to give him no chance to download his applications to the server, don&#8217;t give run permission to following applications except root user by typing;</p>
<blockquote><p>chmod 700 /usr/bin/wget<br />
chmod 700 /usr/bin/telnet<br />
chmod 700 /usr/local/bin/lynx<br />
chmod 700 /usr/bin/links<br />
chmod 700 /usr/bin/bcc<br />
chmod 700 /usr/bin/byacc<br />
chmod 700 /usr/bin/cc<br />
chmod 700 /usr/bin/gcc<br />
chmod 700 /usr/bin/perlcc<br />
chmod 700 /usr/bin/yacc<br />
chmod 0700 /usr/bin/curl<br />
chmod 700 /usr/bin/lwp-*<br />
chmod 700 /usr/bin/*ncftp*</p></blockquote>
<p>Also please note that, if you are taking backups of your domains/dbs to the same server, be aware that a directory created without explicit permission will be readable by all users, to make the directory readable only by root, type;</p>
<blockquote><p>chmod 600 /backups</p></blockquote>
<h3>Restrict OS level function calling to PHP</h3>
<hr />
<p>In a shared hosting environment, even a customer of yours may try to explore your server. If you don&#8217;t have any reason to call the functions below, restrict them;</p>
<p>edit /etc/php.ini (or whereever it is, for directadmin you can check /usr/local/lib/php.ini) and find the line disable_functions and replace with the below line:</p>
<blockquote><p>disable_functions = apache_get_modules,apache_get_version,apache_getenv,apache_note, apache_setenv,disk_free_space,diskfreespace,dl, highlight_file,ini_alter,ini_restore,openlog,passthru,phpinfo, proc_nice,shell_exec,show_source,symlink,system, exec,popen,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_ put,fpassthru</p></blockquote>
<h3> Block executing commands on the /tmp Partition</h3>
<hr />
<p>Several script languages like PHP, holds temporary files like session,upload and cache on the /tmp partition on Linux systems. İf the attacker has an access to this folder then those scripts can be run from this point so with this way, all system files can be reached or accessed by root. To block running of files which are in the /tmp partition, it must not be given run permission while mounting /tmp partition.</p>
<p>To do this process, you have to choose /tmp partition as seperate partition while installaing the system. Enter this command in the command line to check this setting:</p>
<blockquote><p>df -h # or<br />
mount</p></blockquote>
<p>Enter this command:</p>
<blockquote>[root@xxx ~]# df -h<br />
Filesystem            Size  Used Avail Use% Mounted on<br />
/dev/mapper/VolGroup00-LogVol00 2.9G  820M  1.9G  30% /<br />
<strong>/dev/mapper/VolGroup00-LogVol02 2.9G  288M  2.4G  11% /tmp</strong><br />
/dev/mapper/VolGroup00-LogVol04 7.8G  3.8G  3.7G  51% /var<br />
/dev/mapper/VolGroup00-LogVol05 44G   35G  6.6G  85% /hsphere<br />
/dev/mapper/VolGroup00-LogVol03 4.8G  908M  3.6G  20% /usr<br />
/dev/sda1              99M   36M   58M  39% /boot<br />
tmpfs                 2.0G     0  2.0G   0% /dev/shm</p></blockquote>
<p>If you can not see a seperate  /tmp partition like in the example, create a new 3 GB /tmp partition by applying steps below. If there is a /tmp partition then follow with the step 2:</p>
<p><strong>Step 1:</strong></p>
<blockquote><p>cd /dev/<br />
dd if=/dev/zero of=Tmp bs=1024 count=3000000<br />
mkfs -t ext3 /dev/Tmp<br />
cd /<br />
cp -aR  /tmp  /tmp_backup<br />
mount  -o  loop,noexec,nosuid,rw  /dev/Tmp  /tmp<br />
cp -aR /tmp_backup/* /tmp/<br />
chmod 0777 /tmp<br />
chmod +t  /tmp</p></blockquote>
<p>Add information of the newly created partition into the /etc/fstab in order to make it available after next boot.</p>
<blockquote><p>/dev/Tmp          /tmp          ext3          loop,rw,nosuid,noexec     0 0</p></blockquote>
<p>If you already have  /tmp partition, please apply the below steps.</p>
<p><strong>Step 2:<br />
</strong></p>
<p>change &#8220;defaults&#8221; in the line starting with /tmp in /etc/fstab to restrict running applications such as</p>
<blockquote><p>/dev/VolGroup00/LogVol02 /tmp                    ext3    <strong>defaults </strong>1 2</p></blockquote>
<p>to</p>
<blockquote><p>/dev/VolGroup00/LogVol02 /tmp                    ext3     <strong>rw,nosuid,noexec</strong> 1 2</p></blockquote>
<p>Change defaults region as <strong>rw,nosuid,noexec </strong>then save and exit. Remount /tmp partition in order to make changes available immediately by typing;</p>
<blockquote><p>mount -oremount loop,rw,nosuid,noexec /tmp</p></blockquote>
<p>..</p>
<p>note: Some parts of this document inspired from the documentation of dynamicnet.net</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/web-hosting-security-premier/">Web Hosting Security premier</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/web-hosting-security-premier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">323</post-id>	</item>
		<item>
		<title>How to Reset DirectAdmin &#8220;admin&#8221; Password</title>
		<link>https://www.veriteknik.net.tr/en/how-to-reset-directadmin-admin-password/</link>
					<comments>https://www.veriteknik.net.tr/en/how-to-reset-directadmin-admin-password/#respond</comments>
		
		<dc:creator><![CDATA[ckaraca]]></dc:creator>
		<pubDate>Mon, 16 Apr 2012 00:20:15 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[console]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[reset]]></category>
		<category><![CDATA[ssh]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=306</guid>

					<description><![CDATA[<p>DirectAdmin determines the admin password during installation and saves these passwords into the file called setup.txt. If you havent changed this password, you can find it in this file, to see the file contents: less /usr/local/directadmin/scripts/setup.txt adminpass= you can find admin password here, and if you didn&#8217;t change it after installing you should be able [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/how-to-reset-directadmin-admin-password/">How to Reset DirectAdmin &#8220;admin&#8221; Password</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>DirectAdmin determines the admin password during installation and saves these passwords into the file called setup.txt. If you havent changed this password, you can find it in this file, to see the file contents:</p>
<blockquote><p>less /usr/local/<em>directadmin</em>/scripts/setup.txt</p></blockquote>
<p>adminpass= you can find admin password here, and if you didn&#8217;t change it after installing you should be able to log in to your admin interface</p>
<p>to change admin password by ssh or console, write:</p>
<blockquote><p>passwd admin</p></blockquote>
<p>and enter your new password.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/how-to-reset-directadmin-admin-password/">How to Reset DirectAdmin &#8220;admin&#8221; Password</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/how-to-reset-directadmin-admin-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">306</post-id>	</item>
		<item>
		<title>MySQL root password recovery in DirectAdmin</title>
		<link>https://www.veriteknik.net.tr/en/mysql-root-password-recovery-in-directadmin/</link>
					<comments>https://www.veriteknik.net.tr/en/mysql-root-password-recovery-in-directadmin/#respond</comments>
		
		<dc:creator><![CDATA[ckaraca]]></dc:creator>
		<pubDate>Sun, 15 Apr 2012 23:58:02 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[recover]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[reset]]></category>
		<category><![CDATA[set]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=291</guid>

					<description><![CDATA[<p>Before changing MySQL root password you may try to recover default installation password. DirectAdmin MySQL root password is set within the installation process and written down to setup.txt. If you didn&#8217;t change this password you can find the default one in the setup.txt, use the command below to see the contents of /usr/local/directadmin/scripts/setup.txt: your password [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/mysql-root-password-recovery-in-directadmin/">MySQL root password recovery in DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Before changing MySQL root password you may try to recover default installation password. DirectAdmin MySQL root password is set within the installation process and written down to setup.txt.</p>
<p style="text-align: justify;">If you didn&#8217;t change this password you can find the default one in the setup.txt, use the command below to see the contents of /usr/local/directadmin/scripts/setup.txt:</p>
<p style="text-align: justify;">your password is stored in the line starting with &#8220;mysql=&#8221;</p>
<p style="text-align: justify;">To see the contents of this file from a terminal, type:</p>
<pre class="brush: shell; gutter: true; first-line: 1">less /usr/local/directadmin/scripts/setup.txt</pre>
<p><span style="text-align: justify;">If you want to access mysql from ssh or console directly without typing password, create a file in /root/ dir called .my.cnf:</span></p>
<pre class="brush: shell; gutter: true; first-line: 1">touch /root/.my.cnf</pre>
<p>and edit this file with the vi editor:</p>
<pre class="brush: bash; gutter: false; first-line: 1">vi /root/.my.cnf</pre>
<p>Add the lines below:</p>
<pre class="brush: bash; gutter: true; first-line: 1">[client]
 user=root
 password=XXXXXX</pre>
<p>Fill the password with the pass you got from setup.txt, save the file with SHIFT+ZZ or :wq and exit. After this step just write <strong>mysql </strong>to enter MySQL console directly without password.</p>
<pre class="brush: bash; gutter: false; first-line: 1">[root@test ~]# mysql
 Welcome to the MySQL monitor.  Commands end with ; or \g.
 Your MySQL connection id is 169833
 Server version: 5.0.77-log MySQL Community Edition (GPL)
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql&gt;</pre>
<p>..</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/mysql-root-password-recovery-in-directadmin/">MySQL root password recovery in DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/mysql-root-password-recovery-in-directadmin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">291</post-id>	</item>
		<item>
		<title>Step III: DirectAdmin post installation tasks</title>
		<link>https://www.veriteknik.net.tr/en/step-iii-directadmin-post-installation-tasks/</link>
					<comments>https://www.veriteknik.net.tr/en/step-iii-directadmin-post-installation-tasks/#respond</comments>
		
		<dc:creator><![CDATA[ckaraca]]></dc:creator>
		<pubDate>Sun, 15 Apr 2012 23:42:35 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[directadmin]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=279</guid>

					<description><![CDATA[<p>There are some important processes after successfully installation of DirectAdmin and if you miss these steps, the system may not work efficiently. After logged in with the admin user: (default admin password is located at: /usr/local/directadmin/scripts/setup.txt) Add an additional IP for the second DNS Server, to do so, click to the &#8220;IP Management&#8221; link in [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/step-iii-directadmin-post-installation-tasks/">Step III: DirectAdmin post installation tasks</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are some important processes after successfully installation of DirectAdmin and if you miss these steps, the system may not work efficiently. After logged in with the admin user: (default admin password is located at: /usr/local/directadmin/scripts/setup.txt)</p>
<ol>
<li>Add an additional IP for the second DNS Server, to do so, click to the &#8220;IP Management&#8221; link in the &#8220;Admin Level&#8221;. While adding IP address, pay attention to SUBNET value and be sure to assign the same subnet as the IP address or you network may hang, after adding process is complete, choose 2 IP adresses and click to the &#8220;Assign to admin&#8221; button.</li>
<li>In the second step, Click &#8220;user level&#8221; link located at the right-top side of the page. Click &#8220;Domain Setup&#8221; link and click &#8220;add new domain&#8221;. enter the main site name without www.</li>
<li>Switch to reseller level, below the title &#8220;Extra Features&#8221; click &#8220;nameservers&#8221; link. Use the IP addresses just added to create the name servers of the default domain. Select both IP addresses and click &#8220;Create&#8221; button. With this step finished you set-up basic operation of DirectAdmin. Further, you can create your reseller plans and you can edit your main site&#8217;s settings through &#8220;User Level&#8221; menu.</li>
<li>You can update your system any time using &#8220;yum upgrade -y&#8221; via ssh or terminal and your control panel through a terminal using &#8220;custombuild&#8221;</li>
<li>http://www.directadmin.com/forum/ includes various information about your control panel.</li>
</ol>
<p>Security &amp; performance Guidelines</p>
<ol>
<li>Change SSHD port to something you know or only allow certain IP addresses to access SSH</li>
<li>edit php.ini and set your date.timezone, restrict calling of system functions</li>
<li>Optimize MySQL by setting /etc/my.cnf</li>
</ol>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/step-iii-directadmin-post-installation-tasks/">Step III: DirectAdmin post installation tasks</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/step-iii-directadmin-post-installation-tasks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">279</post-id>	</item>
		<item>
		<title>Step II: DirectAdmin Setup</title>
		<link>https://www.veriteknik.net.tr/en/step-ii-directadmin-setup/</link>
					<comments>https://www.veriteknik.net.tr/en/step-ii-directadmin-setup/#respond</comments>
		
		<dc:creator><![CDATA[ckaraca]]></dc:creator>
		<pubDate>Sun, 15 Apr 2012 22:20:41 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[directadmin]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[setup]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=273</guid>

					<description><![CDATA[<p>If you prepared your server with the directives we mentioned on the previous article, it will be so much easy to install DireactAdmin software. You must download the setup file from DirectAdmin site: Download DirectAdmin setup file &#38; run: mkdir /root/DA cd /root/DA wget http://www.directadmin.com/setup.sh sh setup.sh Steps to follow: DirectAdmin setup will ask you [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/step-ii-directadmin-setup/">Step II: DirectAdmin Setup</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you prepared your server with the directives we mentioned on the previous article, it will be so much easy to install DireactAdmin software.</p>
<p>You must download the setup file from DirectAdmin site:</p>
<h3>Download DirectAdmin setup file &amp; run:</h3>
<blockquote><p>mkdir /root/DA<br />
cd /root/DA<br />
wget http://www.directadmin.com/setup.sh<br />
sh setup.sh</p></blockquote>
<h3>Steps to follow:</h3>
<p>DirectAdmin setup will ask you your account number &amp; your license number, if you mistype accidentally just press CTRL+C to quit and restart setup. You need to wait ten seconds after restarting setup.</p>
<p>After that step the setup will ask you your domain name (hostname) bare in mind that wirte your hostname as subdomain + domain + tld as we offer the subdomain part should better be &#8220;mail&#8221;. Such that your domain name is myserver.com then write your hostname as &#8220;mail.myserver.com&#8221;, this way your mail server inside DirectAdmin should work better.</p>
<p>After that step, follow the directives, (we offer apache 2, php5 installation and &#8220;yes&#8221; to all questions) and finish the installation. Always consider selecting the second option,</p>
<p>You should better restart the server but restarting DirectAdmin is enough with the command:</p>
<blockquote><p>service directadmin restart</p></blockquote>
<p>After the installation you can enter to your admin site by typing http://SERVERIP:2222 to your favorite browser. Don&#8217;t panic if some of the services is not responding after setup, this is because you need to make some DNS configurations and you need to enter your master domain name to the control panel(cp).</p>
<p>DirectAdmin setup creates a log file called setup.txt where all your passwords for your server is present:</p>
<blockquote><p>less /usr/local/directadmin/scripts/setup.txt</p></blockquote>
<p>Go to Step three for making post installation tasks.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/step-ii-directadmin-setup/">Step II: DirectAdmin Setup</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/step-ii-directadmin-setup/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">273</post-id>	</item>
		<item>
		<title>Things you should know before installing DirectAdmin</title>
		<link>https://www.veriteknik.net.tr/en/things-you-should-know-before-installing-directadmin/</link>
					<comments>https://www.veriteknik.net.tr/en/things-you-should-know-before-installing-directadmin/#respond</comments>
		
		<dc:creator><![CDATA[ckaraca]]></dc:creator>
		<pubDate>Sun, 15 Apr 2012 20:34:01 +0000</pubDate>
				<category><![CDATA[DirectAdmin]]></category>
		<category><![CDATA[directadmin]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=263</guid>

					<description><![CDATA[<p>DirectAdmin is one of the mostly used Hosting Control Panels around, for single server installations it is easy to setup and start selling hosting busines, some advantages of DirectAdmin are; Easy to install, can be installed on a VPS or VDS also Less overhead, minimal code Easy to maintain &#38; upgrade Easy to modify wtihout [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/things-you-should-know-before-installing-directadmin/">Things you should know before installing DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>DirectAdmin is one of the mostly used Hosting Control Panels around, for single server installations it is easy to setup and start selling hosting busines, some advantages of DirectAdmin are;</p>
<ul>
<li>Easy to install, can be installed on a VPS or VDS also</li>
<li>Less overhead, minimal code</li>
<li>Easy to maintain &amp; upgrade</li>
<li>Easy to modify wtihout breking the continuity</li>
<li>Huge fans and great forum that you can find your solutions</li>
</ul>
<h3>Operating System Setup (RedHat Enterprise Linux, CentOS or CloudLinux is recomended)</h3>
<p>In order to make your system more secure to attacks, trojans and backdoors you should make a seprate partition for /tmp and restrict execute rights for all users. size between <strong>4 to 6 GB</strong> is enough for the /tmp partition. Follow our directives on howto make tmp partition more secure in Linux Security Documents and disable execute permissions in /etc/fstab.</p>
<p>For more secure installation do not blindly install default packages or any Desktop environment. You should remove all selected groups and belonging packages from the installation, be aware that CentOS could be installed with the first CD, if the setup asks for additional CDs, you most probably forgot to uncheck some packages. <strong>With this method you should only need the first CD of CentOS distro.</strong></p>
<p>We recommend using YUM as an updater/package installer for Linux.</p>
<h3>Close firewall with CHKCONFIG</h3>
<p>You might enable it after installing DirectAdmin or you should better install csf</p>
<blockquote><p>chkconfig  iptables off<br />
chkconfig ip6tables off</p>
<p>service iptables stop<br />
service ip6tables stop</p></blockquote>
<h3>Disable SELINUX</h3>
<p>SELINUX is enabled default in LINUX and if you don&#8217;t disable or modify you cannot access some of the services from the outside such as httpd (apache). Open the config file with the following command:</p>
<blockquote><p>sed -i &#8216;s/SELINUX=.*/SELINUX=disabled/&#8217; /etc/sysconfig/selinux<br />
/usr/sbin/setenforce 0</p></blockquote>
<h3> Install Prerequisities &amp; Updates:</h3>
<p>DirectAdmin requires some additional packages before entering the setup. Use YUM to upgrade your system:</p>
<blockquote><p>yum upgrade -y</p></blockquote>
<p>Install additional packages required by DirectAdmin:</p>
<blockquote><p>CentOS 5.x #yum install gcc gcc-c++ make vixie-cron flex wget quota perl gd<br />
CentOS 6.x #yum install gcc gcc-c++ flex bison make bind bind-libs bind-utils openssl openssl-devel perl quota libaio libcom_err-devel libcurl-dev which bc wget gd</p></blockquote>
<p>If you get a conflict error with perl, perl was already installed before, please remove it from the above code and re-try.</p>
<p>Set hostname to &#8220;mail.yourservername.tld&#8221; before starting setup, using mail. saves you from confusions &amp; mail transmission problems:</p>
<blockquote><p>hostname mail.yourserver.tld</p></blockquote>
<p>Go to step two: DirectAdmin Setup</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/things-you-should-know-before-installing-directadmin/">Things you should know before installing DirectAdmin</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/things-you-should-know-before-installing-directadmin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">263</post-id>	</item>
	</channel>
</rss>
