1. get the file with this command:

wget http://download.utorrent.com/linux/utorrent-server-3.0-25053.tar.gz

(link might be different)
2. make sure you got it
ls
3. if you got it, extract it
tar zxvf utorrent-server-3.0-21701.tar.gz
(as i said name might be different)
4. go into the folder created
ls
cd utorrent-server-3.0-21701
5. run the program
./utserver
6. Should read: Open your web browser and enter http://localhost:8080/gui into the address bar
7. Enter admin for the user name and leave paswword empty, and the server should start.

Customer may be a king as the company serves him, but he is certainly not a king in the meaning that he can do what he please, including insulting the service provider.

You need two for the tango, and the same way the provider wants your money, you want his services. It’s a fair exchange of money for services, and both parties are on the same level. Just because you are on the money side on the barter doesn’t give yiu any extra privileges.

Example of the dwalters is a valid one – just because you are paying money for food doesn’t give you the right to insult the waitress, or even the restaurant owner. Do that and you will be asked out, and chances are never served again.

Steps:

1.

1
2
[server1.domain.com:/root]# cat /etc/exim.conf | grep ^system_filter
system_filter = /etc/system_filter.exim

then

2.

1
[server1.domain.com:/root]# nano system_filter = /etc/system_filter.exim

and find the line with following content

1
2
3
if not first_delivery
then finish
endif

3. After the above line add following

1
2
3
4
if $header_from: contains "@domain.com"
then
unseen deliver "monitor@domain.com"
endif

4. Restart exim service

1
[server1.domain.com:/root]# service exim restart

The above filter rule sends a copy of every message from domain.com to monitor@domain.com [unless the message already has that recipient – Exim never does duplicate deliveries].

 

———————————————————

USTTEKI CALISIYORDU ANCAK GELEN TUM MAILLERINDE HARICI BIR MAILE GITMESI GEREKIYORDU

BU DURUMDA USTTEKINI SALLADIK YERINE BUNU KOYDUK

GAYET ACIK KONU

 


nano /etc/system_filter.exim

#Incoming/Outgoing Email Archiving
if ("$h_to:, $h_cc:, $h_bcc" contains "YOURDOMAIN.com")
then
unseen deliver "incoming@YOURDOMAIN.com"
endif

if $sender_address_domain is YOURDOMAIN.com
then
unseen deliver "outgoing@YOURDOMAIN.com"
endif

1- https://launchpad.net/mysql-tuning-primer
2- https://github.com/rackerhacker/MySQLTuner-perl

directadmin httpd hata verdi: the first has precedence, perhaps you need a NameVirtualHost directive

nedeni:

/etc/httpd/conf/ips.conf dosyasi ucmus

.lock dosyasi varsa ayni dizinde sil

dosyayi yeniden olusturmak icin

echo "action=rewrite&value=ips" >> /usr/local/directadmin/data/task.queue

/usr/local/directadmin/dataskq d

nosuid,noexec to tmp
sym link from /var/tmp to /tmp
php_cli with mod_ruid2 (check the forum there is an easy how-to)
suhosin patch for php (always in this forum, search update.script)
nobodycheck (same in update.script)
clamav (as before)
proftpd with clamav mod (same update.script)

And kiss or csf firewall (i use csf but you can choose what you want/prefer).

https://ssltest12.bbtest.net/

Root: GeoTrust Global CA

—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

Intermediate: RapidSSL CA

—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

yum install dnstop

dnstop eth0

1 e bas 2 ye bas 3 e basmak icin

dnstop -l 3 etho

detayli aciklama:::

Monitor Dns Server

You can monitor various dns data and queries using command line options.

How do I view dns traffic with dnstop?

Simply, type the following command at a shell prompt to monitor traffic for eth0 interface:
# dnstop {interface-name}
# dnstop eth0
# dnstop em0

Sample output:

2 new queries, 220 total queries                  Mon Aug  4 05:56:50 2008

Sources              count      %
---------------- --------- ------
180.248.xxx.26          72   32.7
77.89.xx.108             7    3.2
186.xxx.13.108           5    2.3
90.xxx.94.39             4    1.8
178.xx.77.83             4    1.8
187.xxx.149.23           4    1.8
xxx.13.249.70            4    1.8
1.xxx.169.102            4    1.8
189.xx.191.126           4    1.8
xxx.239.194.97           3    1.4

You can force dnstop to keep counts on names up to level domain name levels by using the -l {level} option. For example, with -l 2 (the default), dnstop will keep two tables: one with top-level domain names (such as .com, .org, .biz etc), and another with second level domain names (such as co.in, col.uk).
# dnstop -l 3 eth0
Under Debian / Ubuntu Linux, enter:
# dnstop -t -s eth0
Where,

  • -s Track second level domains
  • -t Track third level domains

Please note that increasing the level provides more details, but also requires more memory and CPU to keep track of DNS traffic.

How do I exit or reset counters?

To exit the dnstop, hit ^X (hold [CTRL] key and press X). Press ^R to reset the counters.

How do find out TLD generating maximum traffic?

While running dnstop, hit 1 key to view first level query names (TLDs):

5 new queries, 1525 total queries                 Mon Aug  4 06:11:09 2008

TLD                                count      %
------------------------------ --------- ------
net                                  520   34.1
biz                                  502   32.9
in-addr.arpa                         454   29.8
in                                    23    1.5
org                                   15    1.0
com                                   11    0.7

Look like this DNS server is serving more .net TLDs. You can also find out more about actual domain name by hinting 2 key while running dnstop:

3 new queries, 1640 total queries                 Mon Aug  4 06:13:20 2008

SLD                                count      %
------------------------------ --------- ------
cyberciti.biz                        557   34.0
nixcraft.net                         556   33.9
74.in-addr.arpa                       34    2.1
208.in-addr.arpa                      29    1.8
195.in-addr.arpa                      28    1.7
192.in-addr.arpa                      27    1.6
64.in-addr.arpa                       27    1.6
theos.in                              23    1.4
203.in-addr.arpa                      20    1.2
202.in-addr.arpa                      18    1.1
212.in-addr.arpa                      15    0.9
nixcraft.com                          13    0.8
217.in-addr.arpa                      13    0.8
213.in-addr.arpa                      12    0.7
128.in-addr.arpa                      12    0.7
193.in-addr.arpa                      12    0.7
simplyguide.org                       12    0.7
cricketnow.in                          3    0.2

To find out 3 level domain, hit 3 key:

www.cyberciti.biz         60   39.0
figs.cyberciti.biz        33   21.4
ns1.nixcraft.net          18   11.7
ns3.nixcraft.net          13    8.4
ns2.nixcraft.net          13    8.4
theos.in                   5    3.2
nixcraft.com               5    3.2
cyberciti.biz              2    1.3
jobs.cyberciti.biz         1    0.6
bash.cyberciti.biz         1    0.6

How do I display the breakdown of query types seen?

You can easily find out most requested, query type (A, AAAA, PTR etc) by hinting t key

Query Type     Count      %
---------- --------- ------
A?               224   56.7
AAAA?            142   35.9
A6?               29    7.3

How do I find out who is connecting to my DNS server?

Hit d to view dns client IP address:

Source         Query Name        Count       %
-------------- ------------- ---------  ------
xx.75.164.90   nixcraft.net          20    9.1
xx.75.164.90   cyberciti.biz         18    9.1
x.68.25.4      nixcraft.net           9    9.1
xxx.131.0.10   cyberciti.biz          5    4.5
xx.104.200.202 cyberciti.biz          4    4.5
202.xxx.0.2    cyberciti.biz          1    4.5

Option help

There many more option to provide detailed view of current, traffic, just type ? to view help for all run time options:

 s - Sources list
 d - Destinations list
 t - Query types
 o - Opcodes
 r - Rcodes
 1 - 1st level Query Names      ! - with Sources
 2 - 2nd level Query Names      @ - with Sources
 3 - 3rd level Query Names      # - with Sources
 4 - 4th level Query Names      $ - with Sources
 5 - 5th level Query Names      % - with Sources
 6 - 6th level Query Names      ^ - with Sources
 7 - 7th level Query Names      & - with Sources
 8 - 8th level Query Names      * - with Sources
 9 - 9th level Query Names      ( - with Sources
^R - Reset counters
^X - Exit

 ? - this

In place of a Q&A this week, I’d like to talk about an upcoming event. June 8, 2011 has been declared World IPv6 Day. The event, being led by Google, will see a handful of the Internet’s large websites enable Internet Protocol version 6. In theory most users won’t notice the difference and we’ll all be able to access Google, Facebook, Yahoo and others on June 8th, just like we would every other day.

But where theory meets practice there are often sparks, so it’s a good idea to see if your system is ready now. To help with that, there’s this test site. The site will test your system to see if you can reach IPv4 websites and IPv6 sites. It will also test to see if, assuming you can’t reach an IPv6 website, your web browser will properly fall-back to trying IPv4 in a reasonable amount of time. This last point is key because the proposed World IPv6 Day is less about moving everyone from the old protocol to the new one than it is about making sure websites will continue to function, regardless of which protocol is in use. In the past we’ve seen some websites, such as Google, provide separate IPv4 and IPv6 URLs in an effort to cater to both groups of users. Ideally websites should be able to offer one URL, regardless of client protocol. And, ideally, users should be able to connect to their favourite websites, regardless of which protocol they’re using.

For people who are currently on IPv4 (and that’s most of us), it is possible to set up a tunnel which allows access to IPv6 websites. Ubuntu’s website has a good article on creating an IPv6 tunnel when your computer is stuck with an IPv4 address. I recommend reading the article, which is fairly distro-neutral, because it’s good to experiment with IPv6 now to avoid a rushed implementation later.

For more information on IPv6 Day, please see this FAQ page.

taken from: http://distrowatch.com/weekly.php?issue=20110124