Search our database

Archive | Linux RSS feed for this section
Viewing 1 to 10 of 97 items

Linux Malware Scanner – AI-Bolit

There are many great tools to scan for malware within you web directory. The other alternative available other than Maldet is AI-Bolit. It is a neat tool built using PHP.Requirement: PHP5.3 and aboveSSH into your server and go to public_html directoryDownload AI-Bolit scanner by using links. If you don’t have it installed, you can install it by running […]

All About SPF Records and How to Manage it

Sender Policy Framework, also abbreviated as SPF. SPF is a framework designed to prevent email phishing/forgery. With SPF, if a spammer attempts to send emails with a faked “from” address, the message will be rejected by mail servers that use SPF verification. An SPF record is a single TXT entry in the DNS for each domain. […]

Allow Cloudflare IPs in Firewall

This guide will show you how to only allow Cloudflare IPs to access port 80 using IPTables. Please make sure that all domains is already pointed to Cloudflare, or this guide will make your domains inaccessible. Cloudflare IPs 1 – Create a new file to be your new firewall :- #vi /root/firewall 2 – Paste […]

How to install Linux Malware Detect on CentOS

Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection.In addition, threat data […]

How to generate your SSH public key

1st step to generate the public key :- Step 1 : SSH to the server under root privilege :- # cd ~/.ssh # ls known_hosts After done, generate the key using command below : # ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/Users/schacon/.ssh/id_rsa): Enter passphrase (empty for no […]

Restore backup under R1soft

You can restore whole Devices or selected files and folders from any ‘Recovery Point’. You can extract files from a Recovery Point to an off-site server or local hard disk. To restore data in R1soft, follow the instructions below. 1. Click on “Recovery Points” in the Main Menu to open the “Recovery Points” :- 2. In […]

How to set SSH login email alerts in a Linux Server?

To improve the security of the server, especially web server which exposes to the internet and worldwide hackers, it’s a good way to enable the server to send a notification email automatically to a predefined email address every time someone logs in as “root” to the host. To configure the automatic email alert notification to […]

Exim Mail Cheatsheet

Exim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of flexibility in the way […]