cd /usr/local/directadmin/custombuild
./build set litespeed_serialno litespeedlicense#
cd /usr/local/directadmin/custombuild
./build update
./build set webserver litespeed
./build set php1_mode lsphp
./build set php2_mode lsphp
./build set php3_mode lsphp
./build set php4_mode lsphp
./build litespeed
./build php n
IF ERROR AFTER LOGIN:
Can not find handler with type: 17, name: lsphp70.
Can not find External Application: lsphp70, type: lsapi
Litespeed admin panel -> Configuration -> Server -> External App
Command Line Should Be:
php 56 : /usr/local/php56/bin/lsphp
php 70 : /usr/local/php70/bin/lsphp
php 71 : /usr/local/php71/bin/lsphp
php 72 : /usr/local/php72/bin/lsphp
php 73 : /usr/local/php73/bin/lsphp
save & Graceful Restart
UNINSTALL:
/usr/local/lsws/admin/misc/cp_switch_ws.sh apache
Proxmox – Shrink local ZFS disk
Proxmox – Shrink local ZFS disk
1- boot gparted and shrink partitions leaving free space as you like
2- in pve shell
$zfs set volsize=<new size>G rpool/data/vm-<vm id>-disk-<disk number>
Ex: zfs set volsize=50G rpool/data/vm-141-disk-0
3- edit vm config in /etc/pve/qemu-server/vm-id.conf
virtio0: local-zfs:vm-<vm id>-disk-<disk number>,size=<new size>G
IF can not boot and corrupted partition table for shrinked disk:
boot gparted
gdisk /dev/sda
press
v
x
e
w
y
Done!
asrock rack X470D4U, X470D4U2-2T IPMICFG settings
Oncelikle su dosyayi indir:
http://shukko.com/IPMICFG_1.32.0_build.200910.zip
sonrasinda icinden uygun dosyayi cikart
chmod +x IPMICFG-Linux.x86_64 ornegin
sonrasinda
./IPMICFG-Linux.x86 -help mesela x86 dosyasi icin
hatta mevcut ipmi admin pass degistirmek icin
./IPMICFG-Linux.x86 -user list
Maximum number of Users : 10
Count of currently enabled Users : 2
User ID | User Name | Privilege Level | Enable |
---|---|---|---|
2 | admin | Administrator | Yes |
3 | ekkullanici | Administrator | Yes |
./IPMICFG-Linux.x86 -user setpwd 2 supergizliparola1
Done.
asrock rack X470D4U, X470D4U2-2T memory overclock settings
there is no xmmp auto configuration in BIOS in these motherboards,
So to set the correct memory speed do the following:
In BIOS there are 2 separate ways to get to the memory settings.
Although these 2 ways should lead to the very same “folders” and settings, changes done via the first way don’t show up if you access the settings via the second way.
I don’t know if this is really necessary but I use both ways, one after the other and change the “same” settings to the very same values each time.
First way:
BIOS -> Advanced -> AMD CBS -> UMC Common Options -> DDR4 Common Options -> DRAM Timing Configuration -> (Accept the risks to access menu) -> Memory Clock Speed: From “Auto” to 1333MHz for DDR4-2666, for example.
Second way:
BIOS -> Advanced -> AMD Overclocking -> (Accept the risks to access menu) -> DDR and Infinity Fabric Frequency/Timings -> DDR Frequency and Timings -> DRAM Timing Configuration
When you are in BIOS also set the amd precision boost to enable for extra benefirt.
How to Install Pure-FTPd with Let’s Encrypt
taken from: https://hostio.solutions/kb/how-to-install/pure-ftpd/
How to Install Pure-FTPd with Let’s Encrypt
If you manage multiple servers, it is super important to make backups yourself. Hosting providers often do offer backup services, however, it’s also important to have a back-up server elsewhere so that you always have access to your own data. This is especially useful when, for example, your hosting provider is completely offline.
In this “how to install” we’ll explain step by step how you can setup an FTP server with Pure-FTPd and how you can secure it with a certificate.
For this setup, we recommend that you use a dedicated server with Debian 10.
Step 1: Update server
Make sure that your Debian 10 server is up-to-date.
Step 2: Pure-FTPd installation
When your server is up-to-date, we can install the FTP server with Pure FTPd. For this, we use the following command:
apt-get install pure-ftpd
Step 3: Configuration and setup of Pure-FTPd
To ensure that everything runs properly, the following commands must be executed:
echo "yes" > /etc/pure-ftpd/conf/Daemonize
echo "yes" > /etc/pure-ftpd/conf/NoAnonymous
echo "yes" > /etc/pure-ftpd/conf/ChrootEveryone
echo "2" > /etc/pure-ftpd/conf/TLS
We recommend setting your FTP to IPv4 only, as the performance of IPv6 is not the same for every provider. You can do this by using the following command:
echo "yes" > /etc/pure-ftpd/conf/IPV4Only
Now we are going to set the config. Out of experience we know that the following works best:
We start with deleting the existing config. To do this, you can use the following command:
rm -rf /etc/pure-ftpd/pure-ftpd.conf
Now that we’ve deleted the existing config, we can complete the config file with our settings. Open the pure-ftpd.conf.
nano /etc/pure-ftpd/pure-ftpd.conf
Now that we have the text editor open, you can copy & paste the following:
ChrootEveryone yes
BrokenClientsCompatibility no
MaxClientsNumber 50
Daemonize yes
MaxClientsPerIP 8
VerboseLog no
DisplayDotFiles yes
AnonymousOnly no
NoAnonymous no
SyslogFacility ftp
DontResolve yes
MaxIdleTime 15
LimitRecursion 10000
AnonymousCanCreateDirs no
MaxLoad 4
AntiWarez yes
Umask 133:022
MinUID 100
AllowUserFXP no
AllowAnonymousFXP no
ProhibitDotFilesWrite no
ProhibitDotFilesRead no
AutoRename no
AnonymousCantUpload no
MaxDiskUsage 99
CustomerProof yes
CertFile /etc/ssl/private/pure-ftpd.pem
Everything is now set up and configured.
Step 4: Secure the FTP server with Let’s Encrypt.
It’s important to make sure that you’re using a secure connection for your FTP traffic.
If you want to use an SSL/TLS, we first need to create the folder for it. The certificate will be placed in this folder. To do this, you can use the following command:
mkdir -p /etc/ssl/pure-ftpd
Secure your FTP server with the SSL of Let’s Encrypt
In order to use Let’s Encrypt we first have to install Certbot.
apt-get install certbot
Now that we have done the installation, it is time to request an SSL. Make sure you have a hostname and A record for your server and go through all the steps of certbot.
certbot certonly --standalone
Now we are going to merge the created Let’s Encrypt certificate files. We do this with the following command:
cat /etc/letsencrypt/live/*/privkey.pem /etc/letsencrypt/live/*/fullchain.pem > /etc/ssl/private/pure-ftpd.pem
After we’ve merged the certificates, we have to make sure that the renewed SSL is automatically merged via cronob:
nano /etc/cron.d/certbot
If all goes well, the last line should say:
0 */12 * * * root test -x /usr/bin/certbot -a \! -d /run/systemd/system && perl -e 'sleep int(rand(43200))' && certbot -q renew
Now we have to add the following to the last line:
&& cat /etc/letsencrypt/live/*/privkey.pem /etc/letsencrypt/live/*/fullchain.pem > /etc/ssl/private/pure-ftpd.pem
It should then look as follows:
0 */12 * * * root test -x /usr/bin/certbot -a \! -d /run/systemd/system && perl -e 'sleep int(rand(43200))' && certbot -q renew && cat /etc/letsencrypt/live/*/privkey.pem /etc/letsencrypt/live/*/fullchain.pem > /etc/ssl/private/pure-ftpd.pem
If all went well, we can restart Pure-FTPd with the following command:
service pure-ftpd restart
Step 5: create user(s)
There are two ways: create a user with SSH access or create a user without SSH access and set a storage limit.
For every account that is created, a home profile is created at /home.
Easy way to create user(s)
Use the following command to easily create an user:
adduser USERNAME
After entering this command, you can set your password. After having set the password, everything will be ready for this user and a profile will be created on /home/username.
Create user with extra options
If you want to create a user with extra options, we first have to create a user group for FTP users without SSH access.
groupadd ftpgroup
Now we can create the user:
useradd -g ftpgroup -d /dev/null -s /etc USERNAME pure-pw useradd USERNAME -u USERNAME -g ftpgroup -d /home/USERNAME
If you want to give the user a storage limit you can add: -N 1000.
This gives the user a storage limit of 1000MB.
Example of the command with a storage limit of 1000 MB:
pure-pw useradd USERNAME -u ftpuser -g ftpgroup -d /home/USERNAME -N 1000
Now we have to create the directory for the FTP user with the following command:
mkdir /home/USERNAME chown -R USERNAME:ftpgroup /home/USERNAME
The next step is to update the Pure-FTPd database. You can do this with the following command:
pure-pw mkdb ln -s /etc/pure-ftpd/pureftpd.passwd /etc/pureftpd.passwd ln -s /etc/pure-ftpd/pureftpd.pdb /etc/pureftpd.pdb ln -s /etc/pure-ftpd/conf/PureDB /etc/pure-ftpd/auth/PureDB
Finally, we have to restart the Pure-FTPd:
service pure-ftpd restart
Every time you make changes to a user, the database must be updated:
pure-pw mkdb
Do you want to change the password for an FTP user? Then you can use the following command:
pure-pw passwd USERNAME
I
Centos 6 EOL oldu. Repolar Calismiyor. Ne yapacagiz?
nano /etc/yum.repos.d/CentOS-Base.repo
[base]
name=CentOS-$releasever – Base
baseurl=http://vault.centos.org/6.10/os/$basearch/
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6
released updates
[updates]
name=CentOS-$releasever – Updates
baseurl=http://vault.centos.org/6.10/updates/$basearch/
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6
additional packages that may be useful
[extras]
name=CentOS-$releasever – Extras
baseurl=http://vault.centos.org/6.10/extras/$basearch/
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6
additional packages that extend functionality of existing packages
[centosplus]
name=CentOS-$releasever – Plus
baseurl=http://vault.centos.org/6.10/centosplus/$basearch/
gpgcheck=1
enabled=0
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6
contrib – packages by Centos Users
[contrib]
name=CentOS-$releasever – Contrib
baseurl=http://vault.centos.org/6.10/contrib/$basearch/
gpgcheck=1
enabled=0
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6
Yada basitce sunu yapiniz
wget -O /etc/yum.repos.d/CentOS-Base.repo http://shukko.com/Centos-Base.repo
wget -O /etc/yum.repos.d/CentOS-SCLo-scl.repo http://shukko.com/CentOS-SCLo-scl.repo
wget -O /etc/yum.repos.d/CentOS-SCLo-scl-rh.repo http://shukko.com/CentOS-SCLo-scl-rh.repo
yum clean all
yum -y update
directadminde /var/www/html php 7.3 calissin ama ana php surumu php 5.6 olsun , nasil mi ?
directadminde /var/www/html php 7.3 calissin ama ana php surumu php 5.6 olsun , nasil mi ?
/etc/httpd/conf/extra/httpd-hostname.conf
dosyasini editle
eger zaten php-fpm calistiriyorsan
proxy:unix:/usr/local/php73/sockets/webapps.sock
olarak guncelle
yok php-fpm degil mod_php calisiyor ise
artik oyle calistirma ya
aslinda php 5.x falan hic calistirma
8 cikti cikicak…
cikcikcik..
bir video dosyamiz var ve biz bunu stream etmek istiyoruz ancak elimizdeki stream icin uygun degil , haydi mp4e cevirelim ve stream edelim. her durum ve sartta stream etmek guzel birseydir.
ffmpeg -i Ralph.mkv -vcodec libx264 -crf 22 -preset:v veryfast -ac 2 -acodec aac -ab 128K -strict -2 output.mp4
directadmin block access to xmlrpc.php serverwide
mkdir /usr/local/directadmin/data/templates/custom/
chown diradmin.diradmin /usr/local/directadmin/data/templates/custom/
cd /usr/local/directadmin/data/templates/custom/
wget http://shukko.com/xmlrpcblock.tar.gz
tar zxvf xmlrpcblock.tar.gz
rm -rf xmlrpcblock.tar.gz
chmod 644 virtual_host2*
cd /usr/local/directadmin/custombuild/
./build rewrite_confs
Configuring ProFTPd with virtual users in a file
proftpd kurulumu su sekildedir:
apt-get install proftpd
nano /etc/proftpd/proftpd.conf
ServerName “Debian”
DefaultRoot ~
Port 21
RootLogin off
AllowStoreRestart on
Bununla test et
proftpd -t
service proftpd restart
calistir gitsin
Sanal kullanicilar ile kolay kurulum duzenegi:
nano /etc/proftpd/proftpd.conf
DefaultRoot ~
RequireValidShell off
AuthUserFile /etc/proftpd/ftpd.passwd
AuthGroupFile /etc/proftpd/ftpd.group
AuthOrder mod_auth_file.c
Kullanici Olustur:
ftpasswd –passwd –file=/etc/proftpd/ftpd.passwd –name=test –uid=60 –gid=60 –home=/srv/ftp/test/ –shell=/bin/false
Grup Olustur:
ftpasswd –group –name=nogroup –file=/etc/proftpd/ftpd.group –gid=60 –member test
Bununla test et
proftpd -t
Sifre degistirmek icin:
ftpasswd –passwd –file=/etc/proftpd/ftpd.passwd –name=test –change-password
kullanici silmek icin:
ftpasswd –passwd –file=/etc/proftpd/ftpd.passwd –name=test –delete-user
Open the ProFTPd configuration in any text editor:
1 | sudo nano /etc/proftpd/proftpd.conf |
Specify the parameters:
12345 | DefaultRoot ~ RequireValidShell off AuthUserFile /etc/proftpd/ftpd.passwd AuthGroupFile /etc/proftpd/ftpd.group AuthOrder mod_auth_file.c |
As you can see, only module mod_auth_file.c is used for authorization of users, so logins and passwords are taken only from /etc/proftpd/ftpd.passwd file.
Now create an example user, test:
1 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --uid=60 --gid=60 --home=/srv/ftp/test/ --shell=/bin/false |
After this command, the /etc/proftpd/ftpd.passwd file of the similar structure with /etc/passwd will be created.
UID and GID can be specified any, preferably except 0 (this is root) and those specified in /etc/passwd.
You can also specify the UID and GID similar to the user in /etc/passwd, for example, 33 as a www-data user, to provide similar rights to web files and specify the home directory of /var/www.
You can create users with the same UID and GID, different home directories and taking into account that they are not allowed to go above their directory level (DefaultRoot ~ parameter in the server configuration).
Create an ftpd.group file:
1 | sudo ftpasswd --group --name=nogroup --file=/etc/proftpd/ftpd.group --gid=60 --member test |
Let’s check the configuration:
1 | sudo proftpd -t |
Restart ProFTPd to apply the changes:
1 | sudo /etc/init.d/proftpd restart |
Since the passwords in the file are stored in encrypted form, you can change the password to the user as follows:
1 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --change-password |
You can lock/unlock the user (add/remove the ! character in the ftpd.passwd file before the password hash, thereby making it impossible for the user to connect):
12 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test2 --lock sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --unlock |
You can delete the user as follows:
1 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --delete-user |
Open the ProFTPd configuration in any text editor:
1 | sudo nano /etc/proftpd/proftpd.conf |
Specify the parameters:
12345 | DefaultRoot ~ RequireValidShell off AuthUserFile /etc/proftpd/ftpd.passwd AuthGroupFile /etc/proftpd/ftpd.group AuthOrder mod_auth_file.c |
As you can see, only module mod_auth_file.c is used for authorization of users, so logins and passwords are taken only from /etc/proftpd/ftpd.passwd file.
Now create an example user, test:
1 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --uid=60 --gid=60 --home=/srv/ftp/test/ --shell=/bin/false |
After this command, the /etc/proftpd/ftpd.passwd file of the similar structure with /etc/passwd will be created.
UID and GID can be specified any, preferably except 0 (this is root) and those specified in /etc/passwd.
You can also specify the UID and GID similar to the user in /etc/passwd, for example, 33 as a www-data user, to provide similar rights to web files and specify the home directory of /var/www.
You can create users with the same UID and GID, different home directories and taking into account that they are not allowed to go above their directory level (DefaultRoot ~ parameter in the server configuration).
Create an ftpd.group file:
1 | sudo ftpasswd --group --name=nogroup --file=/etc/proftpd/ftpd.group --gid=60 --member test |
Let’s check the configuration:
1 | sudo proftpd -t |
Restart ProFTPd to apply the changes:
1 | sudo /etc/init.d/proftpd restart |
Since the passwords in the file are stored in encrypted form, you can change the password to the user as follows:
1 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --change-password |
You can lock/unlock the user (add/remove the ! character in the ftpd.passwd file before the password hash, thereby making it impossible for the user to connect):
12 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test2 --lock sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --unlock |
You can delete the user as follows:
1 | sudo ftpasswd --passwd --file=/etc/proftpd/ftpd.passwd --name=test --delete-user |
ftpasswd is a script written in Perl, usually located in /usr/sbin/ftpasswd.