My Connection to files.directadmin.com is slow Last Modified: Apr 21, 2010, 3:02 pm
If your installs of DA are downloading files slowly from the files.directadmin.com server, you can use one of our mirrors instead.

The current list of mirrored files server is as follows:

files.directadmin.com – USA main server
files2.directadmin.com – USA
files3.directadmin.com – USA
files5.directadmin.com – Turkey
files6.directadmin.com – Netherland
To use one of these backups, take the IP of that server, and add it into your /etc/hosts file.

For example, to use files6, you’d run

[root@server ~]# dig files6.directadmin.com

; <<>> DiG 9.2.4 <<>> files6.directadmin.com +nocomments
;; global options: printcmd
;files6.directadmin.com. IN A
files6.directadmin.com. 14062 IN A 81.26.221.44
directadmin.com. 14294 IN NS ns1.jbmc-software.com.
directadmin.com. 14294 IN NS ns2.jbmc-software.com.
taking note that it resolves to 81.26.221.44.

Then add the following into your /etc/hosts file:

files.directadmin.com 81.26.221.44
which will override the dns lookup, and make files.directadmin.com resolve to the files6 mirror.

logwatch lutfen exim loglarini parse etmesin cani cikiyor makinanin 🙂

nano /usr/share/logwatch/default.conf/logwatch.conf

ctrl+w , exim

alta yaz :

Service = “-eximstats” # Prevents execution of eximstats service, which
# is a wrapper for the eximstats program.
Service = “-exim” #exim loglari allahaskina inceleme pls. 25.08.2010

# If you only cared about FTP messages, you could use these 2 lines

servisler nerede?

/usr/share/logwatch/scripts/services

altinda

yukariya ekledigim kod ile umarim logwatch exim loglarini umursamayacak 🙂

orjinali: http://blog.csirt.ulakbim.gov.tr/?p=77

Açık kaynak kodlu çok ama çok yararlı bir uygulama olan DNSTOP http://dns.measurement-factory.com/tools/dnstop/ tarafından geliştirilmiştir. Bu uygulama sayesinde gelen giden tüm DNS trafiği rahatlıkla gözlenebilmektedir. En çok yapılan saldırılar gözlenmektedir. Aynı şekilde yanlış ayarlanmış kullanıcılarda rahatlıkla bulunabilir.

IPv4 ve IPv6 uyumlu olan bu uygulama ile nerede ise tüm DNS trafiği görülebilmektedir. Çok yoğun isteklerin büyük bir kısmı istenmeyen ticari bağlantılar, band kapasitesi yiyen solucanlar olabilir. Kullanımına gelince;

dnstop [-46apsQR] [-b filtre] [-i adres] [-f filtre-şekli] [-r aralık] [arayüz] [saklama_dosyası]

-4 Sadece IPv4 trafiği
-6 Sadece IPv6 trafiği
-a IP trafiğini anonimleştir
-b
BPF Filtresi
(Varsayılan: udp port 53)

-i adres
Belirtilen adresi görmezden gel.

-p Promiscous kipinde çalıştırma.
-r Ekran tazeleme hızı (saniye)
-l seviye
seviye’sine kadar olan alan adlarının istatistiğini tut. Her seviye için daha çok CPU harcar.

-f unkown-tlds/A-for-A/rfc1918-ptr
“unknown-tlds”: Bogus istekleri gösterir. localhost, wpad, workgroup gibi.
“A-for-A”: İçerisinde A kaydı isteği bulunan istekler. Microsoft Windows DNS sunucularında olan bir hatadan dolayı.
“rfc1918-ptr”: RFC1918 kısmı için gelen PTR istekleridir. Sadece iç ağlarda olması gerekir.

-Q Sadece DNS isteklerini say.
-R Sadece DNS cevaplarını say.

saklama_dosyası: Önceden yakalanmış olan pcap formatındaki dosya
arayüz: ethernet cihazı (fxp0, eth0 gibi.)

Aynı zamanda top gibi uygulamaların kullanım şekliylede kullanılabilmektedir. Bu şekli ile de pekçok bilgi vermektedir. Bence bunları tek tek deneyin ve sonucuna göre kullanımını geliştirin. Benim en çok kullanıdığım * ve t tuşlarıdır. İlki 8. seviyeye kadar alan adlarını kaynak adresleri ile birlikte gösterir. İkincisi ise isteklerin tiplerini sayıları ile beraber göstermektedir. Diğerleri için “man dnstop” demeniz yeterlidir. Eğer henüz kurmadı iseniz http://dns.measurement-factory.com/tools/dnstop/dnstop.8.html adresinden bilgi edinebilirsiniz.

http://dns.measurement-factory.com/tools/dnstop/dnstop.8.html


du -k | sort -nr | awk '
BEGIN {
split("KB,MB,GB,TB", Units, ",");
}
{
u = 1;
while ($1 >= 1024) {
$1 = $1 / 1024;
u += 1
}
$1 = sprintf("%.1f %s", $1, Units[u]);
print $0;
}
' > sort_file.txt

dosyalari_buyuklugune_gore_sirala.sh

eski sistem ise yaramiyor
depreciated 😀

yeni sistem su


for semid in `ipcs -s | grep apache | cut -f2 -d" "`; do ipcrm -s $semid; done

aciklamasi su sekilde

On a cPanel dedicated server, apache server failed to start. So, while checking the apache logs found this:

==> /usr/local/apache/logs/error_log <== [Sat Dec 20 01:12:27 2008] [notice] suEXEC mechanism enabled (wrapper: /usr/local/apache/bin/suexec) [Sat Dec 20 01:12:27 2008] [warn] pid file /usr/local/apache/logs/httpd.pid overwritten -- Unclean shutdown of previous Apache run? [Sat Dec 20 01:12:27 2008] [emerg] (28)No space left on device: Couldn't create accept lock Solution: First of all make sure your server is not out of space. This can be checked with the command: root# df –h Now, to check how many semaphores are currently in use the command is: root# ipcs -s When the apache (httpd) is stopped, to kill the semaphores ID the command is: root# ipcrm –s

To kill all the semaphores ID , you can achieve this by doing it in a for loop, the command is:

root# for semid in `ipcs -s | grep nobody | cut -f2 -d” “`; do ipcrm -s $semid; done

Note: “nobody” is apache user.

Now start apache with the command:

root# service httpd restart

This has fixed the issue for us.

howtoforge adresinde gordum
cok kolay yapiliyor klonlama isi
unutmamak icin burayada yazayim.

Ghosting The Machine

This is a short but potentially extremely handy guide to ghosting one Linux box to another (or simply making a full backup of a desktop/server). Credit goes to ‘topdog’ for this.

You might have a small office where you customise one desktop just how you like it and need to roll this out to N other PC’s or simply want a backup of a server or desktop to another machine or even to an image file.

The main tool here is netcat which is extremely powerful and has a multitude of other great uses that won’t be covered here.

Target Machine:

** Boot to linux rescue mode with networking (CentOS works fine)

Initiate netcat to listen on port 30 – # nc -l -p | dd of=/dev/sda (assuming the hard drive is sda and not hda):

# nc -l -p 30 | dd of=/dev/sda

Source Machine:

Dump the contents of the disk to the target PC – #dd if=/dev/sda | nc

# dd if=/dev/sda | nc 192.168.0.20 30

Then to check that traffic is flowing, on the source go to another terminal (ALT/F2) and dump the tcp data on the NIC (assuming it’s eth0):

tcpdump -tnli eth0 port 30

If you just want a backup image you could change the above output on the taget to:

# nc -l -p 30 | dd of=mybackup.img

That’s it. Naturally the target PC/disk cannot be smaller than the source:) I hope this saves someone a lot of time.

 

REQUIRED module missing: Archive::Tar
REQUIRED module missing: IO::Zlib
optional module missing: Digest::SHA
optional module missing: Mail::SPF
optional module missing: IP::Country
optional module missing: Razor2
optional module missing: Net::Ident
optional module missing: IO::Socket::INET6
optional module missing: Mail::DKIM
optional module missing: Encode::Detect

perl -MCPAN -e ‘install Archive::Tar’
perl -MCPAN -e ‘install IO::Zlib’
perl -MCPAN -e ‘install Digest::SHA’
perl -MCPAN -e ‘install Mail::SPF’
perl -MCPAN -e ‘install IP::Country’
perl -MCPAN -e ‘install Razor2’
perl -MCPAN -e ‘install Net::Ident’
perl -MCPAN -e ‘install IO::Socket::INET6’
perl -MCPAN -e ‘install Mail::DKIM’
perl -MCPAN -e ‘install Encode::Detect’

 

 

NOT: daha gunceli iyisi tek tek ugrasmaktansa

 

 

1- cd /usr/local/directadmin/scripts
./spam.sh

kurmicak hata vericek
cikanlara no demeyi unutma

2- PERL_MM_USE_DEFAULT=1 cpan -i Archive::Tar Digest::SHA Mail::SPF IP::Country Net::Ident IO::Socket::INET6 Compress::Zlib Mail::DKIM LWP::UserAgent HTTP::Date Encode::Detect ExtUtils::MakeMaker

and then run the spam.sh again.

3- Are you ready for manual configuration? [yes] no

4- /usr/bin/spamd -d -c -m 15
calistir bitti

centos lamp
——————

yum install mysql mysql-server

chkconfig –levels 235 mysqld on
/etc/init.d/mysqld start

——————
mysqladmin -u root password supergizliparola
mysqladmin -h server1.example.com -u root password supergizliparola
——————

yum install httpd

chkconfig –levels 235 httpd on

/etc/init.d/httpd start

——————
yum install php

/etc/init.d/httpd restart

——————
nano /var/www/html/info.php

<?php
phpinfo();
?>
——————
yum install php-mysql php-gd php-imap php-ldap php-odbc php-pear php-xml php-xmlrpc php-mbstring
——————

/etc/init.d/httpd restart
——————
wget http://packages.sw.be/rpmforge-release/rpmforge-release-0.5.1-1.el5.rf.i386.rpm
rpm -Uvh rpmforge-release-0.5.1-1.el5.rf.i386.rpm

yum update

yum install phpmyadmin

nano /etc/httpd/conf.d/phpmyadmin.conf

#
#  Web application to manage MySQL
#
#<Directory “/usr/share/phpmyadmin”>
#  Order Deny,Allow
#  Deny from all
#  Allow from 127.0.0.1
#</Directory>
Alias /phpmyadmin /usr/share/phpmyadmin
Alias /phpMyAdmin /usr/share/phpmyadmin
Alias /mysqladmin /usr/share/phpmyadmin

commentle gitsin
——————
nano /usr/share/phpmyadmin/config.inc.php

[…]
/* Authentication type */
$cfg[‘Servers’][$i][‘auth_type’] = ‘http’;
[…]

cookiyi http yapiyoruz.
——————

/etc/init.d/httpd restart

——————

——————

http://server.ip.adresi/info.php
http://server.ip.adresi/phpmyadmin

The DNS was created in 1984 and in 1985 top level domains were defined. The first top level domains were COM, ORG, EDU, GOV, MIL and ccTLD.

In April 1985 cmu.edu, purdue.edu, rice.edu and ucla.edu were the first registered domain names.

The first .gov was css.gov and was registered in June 1985.

The first .org was mitre.org and was registered in July 1985.

Now for the first .com which was registered on March 15 1985 and it was symbolics.com which still happens to be up and running, although not much to look at.

Now for the first 100 registered domains:

SYMBOLICS.COM
BBN.COM
THINK.COM
MCC.COM
DEC.COM
NORTHROP.COM
XEROX.COM
SRI.COM
HP.COM
BELLCORE.COM
IBM.COM
SUN.COM
INTEL.COM
TI.COM
ATT.COM
GMR.COM
TEK.COM
FMC.COM
UB.COM
BELL-ATL.COM
GE.COM
GREBYN.COM
ISC.COM
NSC.COM
STARGATE.COM
BOEING.COM
ITCORP.COM
SIEMENS.COM
PYRAMID.COM
ALPHACDC.COM
BDM.COM
FLUKE.COM
INMET.COM
KESMAI.COM
MENTOR.COM
NEC.COM
RAY.COM
ROSEMOUNT.COM
VORTEX.COM
ALCOA.COM
GTE.COM
ADOBE.COM
AMD.COM
DAS.COM
DATA-IO.COM
OCTOPUS.COM
PORTAL.COM
TELTONE.COM
3COM.COM
AMDAHL.COM
CCUR.COM
CI.COM
CONVERGENT.COM
DG.COM
PEREGRINE.COM
QUAD.COM
SQ.COM
TANDY.COM
TTI.COM
UNISYS.COM
CGI.COM
CTS.COM
SPDCC.COM
APPLE.COM
NMA.COM
PRIME.COM
PHILIPS.COM
DATACUBE.COM
KAI.COM
TIC.COM
VINE.COM
NCR.COM
CISCO.COM
RDL.COM
SLB.COM
PARCPLACE.COM
UTC.COM
IDE.COM
TRW.COM
UNIPRESS.COM
DUPONT.COM
LOCKHEED.COM
ROSETTA.COM
TOAD.COM
QUICK.COM
ALLIED.COM
DSC.COM
SCO.COM
GENE.COM
KCCS.COM
SPECTRA.COM
WLK.COM
MENTAT.COM
WYSE.COM
CFG.COM
MARBLE.COM
CAYMAN.COM
ENTITY.COM
KSR.COM
NYNEXST.COM
March 15 1985
April 24 1985
May 24 1985
July 11 1985
September 30 1985
November 7 1985
January 9 1986
January 17 1986
March 3 1986
March 5 1986
March 19 1986
March 19 1986
March 25 1986
March 25 1986
April 25 1986
May 8 1986
May 8 1986
July 10 1986
July 10 1986
August 5 1986
August 5 1986
August 5 1986
August 5 1986
August 5 1986
August 5 1986
September 2 1986
September 18 1986
September 29 1986
October 18 1986
October 27 1986
October 27 1986
October 27 1986
October 27 1986
October 27 1986
October 27 1986
October 27 1986
October 27 1986
October 27 1986
October 27 1986
November 5 1986
November 5 1986
November 17 1986
November 17 1986
November 17 1986
November 17 1986
November 17 1986
November 17 1986
November 17 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
December 11 1986
January 19 1987
January 19 1987
January 19 1987
February 19 1987
March 4 1987
March 4 1987
April 4 1987
April 23 1987
April 23 1987
April 23 1987
April 23 1987
April 30 1987
May 14 1987
May 14 1987
May 20 1987
May 27 1987
May 27 1987
June 26 1987
July 9 1987
July 13 1987
July 27 1987
July 27 1987
July 28 1987
August 18 1987
August 31 1987
September 3 1987
September 3 1987
September 3 1987
September 22 1987
September 22 1987
September 22 1987
September 22 1987
September 30 1987
October 14 1987
November 2 1987
November 9 1987
November 16 1987
November 16 1987
November 24 1987
November 30 1987