Search our database

Archive | Linux RSS feed for this section
Viewing 1 to 10 of 96 items

All About SPF Records and How to Manage it

Sender Policy Framework, also abbreviated as SPF. SPF is a framework designed to prevent email phishing/forgery. With SPF, if a spammer attempts to send emails with a faked “from” address, the message will be rejected by mail servers that use SPF verification. An SPF record is a single TXT entry in the DNS for each domain. […]

Allow Cloudflare IPs in Firewall

This guide will show you how to only allow Cloudflare IPs to access port 80 using IPTables. Please make sure that all domains is already pointed to Cloudflare, or this guide will make your domains inaccessible. Cloudflare IPs 1 – Create a new file to be your new firewall :- #vi /root/firewall 2 – Paste […]

How to install Linux Malware Detect on CentOS

Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection.In addition, threat data […]

How to generate your SSH public key

1st step to generate the public key :- Step 1 : SSH to the server under root privilege :- # cd ~/.ssh # ls known_hosts After done, generate the key using command below : # ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/Users/schacon/.ssh/id_rsa): Enter passphrase (empty for no […]

Restore backup under R1soft

You can restore whole Devices or selected files and folders from any ‘Recovery Point’. You can extract files from a Recovery Point to an off-site server or local hard disk. To restore data in R1soft, follow the instructions below. 1. Click on “Recovery Points” in the Main Menu to open the “Recovery Points” :- 2. In […]

How to set SSH login email alerts in a Linux Server?

To improve the security of the server, especially web server which exposes to the internet and worldwide hackers, it’s a good way to enable the server to send a notification email automatically to a predefined email address every time someone logs in as “root” to the host. To configure the automatic email alert notification to […]

Exim Mail Cheatsheet

Exim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of flexibility in the way […]

How To Allow MySQL Remote Host

Remote access to MySQL database server is disabled by default for security purpose. However, there are times you need to allow remote access to the database server from home or anywhere outside your office or data center. This post will guide you how to do just that.   1) Login into your server’s cPanel and […]