Calpop Not Work Safe
Sep 19, 2007I stumbled upon this through google images...click as you wish. They are clothed, just riskay. And in calpop! LOL! I wonder who that guy is? Yes, off topic I know. Maybe a repost.
[url]
I stumbled upon this through google images...click as you wish. They are clothed, just riskay. And in calpop! LOL! I wonder who that guy is? Yes, off topic I know. Maybe a repost.
[url]
I am planning to move my site to calpop.com from my current shared hosting service.. Their price sounds sweet and their extra harddrive addon is one time fee... But i heard many bad reviews about them .. but!.. all the posts are from 2005 and 2006.. So.. any of you who is using a hosting service from calpop.com right now, do you like it or not :p ?
View 6 Replies View RelatedWondering if anyone has used CalPOP's network to host a server or rent a server from there.
If so can you post a review.
I had my server shut down due to ddos attacks and proxy calls. I am a designer so I dunno what this means so I asked for proof and they said it was archived. I then tried getting my servers back online with them for over the last few hours and they replied we cant help you. I offered $3000usd to fix the problem and they said they cant do it. From where I come from, if a virus is added it can be removed under any circumstances. I then kept on phoning to get my server restored hense I am selling a lot of website property lately and he totally by passed that, I was put on hold for over 20 minutes and I am calling from Canada. I phoned the last time and told a white lie saying I have huge partners ready to boycott their company unless they restore my server....
What do you know it got restored and I got all my sites moved over to the new server, but this is the golden part.
Have you ever phoned your hosting company and been sworn at? Been called a ****ing idiot or to **** off and stop phoning, or I have had enough of your ****ing ****? Well this is what I heard from Ben at CalPOP and that is totally unacceptible hense I am the customer who was about to purchase numerous servers from them to increase my bandwith usage I would be using on my upcomming site called thewetwilly.com.
I dont respect a programming punk thinking he is better then me just because he works for a low end database center. I also dont respect being called an idiot while I am purchasing hosting from the company, aswell as being to to **** OFF. 100% totally unacceptable.
Alot of my friends have experienced poorness with this company and I wish I noticed it earlier instead of taking it the hard way/HARSH WAY.
But hey I am sure my word will get around and people will stop using calPOP due to their immaturity Cali Mr know it all talk and realize that they can find a better place to host their site.
I also have been told that calPOP used the excuse of DDOS and Proxy attacks as an excuse to get rid of you because you are using to much bandwith.
Oh they also told me that they would send me the HD for $100usd so I could move to another server, wtf is that???
Like come on!
Has anyone ever experienced first hand about CalPop Datacenter i hear they are good wanna see feedback from the WHT members i gotten a really good deal!
I started a poll the poll will be up for 24 hours!
Has anyone heard anything about Calpop.com for collocation? I am looking to get a Full Cabinet there and 100mbps unmetered bandwidth for $1599 per month. Please let me know what everyone has heard of?
View 14 Replies View RelatedAny reviews?
Coreexpress.net
OrgName: CoreExpress
OrgID: COEX
Address: 600 W. 7th Street
Address: Suite 360
City: Los Angeles
StateProv: CA
PostalCode: 90017
Country: US
NetRange: 64.69.32.0 - 64.69.47.255
CIDR: 64.69.32.0/20
NetName: COREEXPRESS-BLK-1
NetHandle: NET-64-69-32-0-1
Parent: NET-64-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.CALPOP.COM
NameServer: NS2.CALPOP.COM
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2000-04-11
Updated: 2004-08-06
RNOCHandle: ZC46-ARIN
RNOCName: ipadmin
RNOCPhone: +1-213-627-1937
What is the best option in the php setting does keeping the php function safe mode on or off?
View 12 Replies View Relatedi need to enable php safe mode on for my joomla and i came across this
Quote:
When the php safe mode is turned off globally by default at our server end, you can still override the setting to turn it ON for only your domain by just insert the following line inside the ".htaccess" file (at Linux server):
Code:
php_value safe_mode "1"
my joomla .htaccess file:
Quote:
##
# @version $Id: htaccess.txt 10492 2008-07-02 06:38:28Z ircmaxell $
# @package Joomla
# @copyright Copyright (C) 2005 - 2008 Open Source Matters. All rights reserved.
# @license http://www.gnu.org/copyleft/gpl.html GNU/GPL
# Joomla! is Free Software
##
#####################################################
# READ THIS COMPLETELY IF YOU CHOOSE TO USE THIS FILE
#
# The line just below this section: 'Options +FollowSymLinks' may cause problems
# with some server configurations. It is required for use of mod_rewrite, but may already
# be set by your server administrator in a way that dissallows changing it in
# your .htaccess file. If using it causes your server to error out, comment it out (add # to
# beginning of line), reload your site in your browser and test your sef url's. If they work,
# it has been set by your server administrator and you do not need it set here.
#
#####################################################
## Can be commented out if causes errors, see notes above.
Options +FollowSymLinks
#
# mod_rewrite in use
RewriteEngine On
########## Begin - Rewrite rules to block out some common exploits
## If you experience problems on your site block out the operations listed below
## This attempts to block the most common type of exploit `attempts` to Joomla!
#
# Block out any script trying to set a mosConfig value through the URL
RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]
# Block out any script trying to base64_encode crap to send via URL
RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]
# Block out any script that includes a <script> tag in URL
RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3E) [NC,OR]
# Block out any script trying to set a PHP GLOBALS variable via URL
RewriteCond %{QUERY_STRING} GLOBALS(=|[|\%[0-9A-Z]{0,2}) [OR]
# Block out any script trying to modify a _REQUEST variable via URL
RewriteCond %{QUERY_STRING} _REQUEST(=|[|\%[0-9A-Z]{0,2})
# Send all blocked request to homepage with 403 Forbidden error!
RewriteRule ^(.*)$ index.php [F,L]
#
########## End - Rewrite rules to block out some common exploits
My /tmp on my cPanel hosting server is nearly full, and I was wondering if it is safe to remove all the contents in /tmp, if not, what can I delete to clear up the space?
View 6 Replies View RelatedMost of my files are 755 as permission. Is this safe?
How about putting all files under 644 permission? What is the best permission so that all files are safe from intrusion?
I have a script that needs safe mode off to run, the script writers have said safe mode is disabled as default and not required and even disabled in php 6
Now I'm not to fimular with Safe mode, all I know is most scripts are wrote to work with this on
Should i switch safe mode on or off . Right now i am using it as on some one told me if i switch it off then server can easily hack but becoz i switch it on im having too much problem specially users of sites having problem of uploading and wordpress also have issue and some more script what you say what should i do?
View 9 Replies View Relatedhow can i make "safe mode on/off" using .htaccess?( in SharedHosting )
View 1 Replies View RelatedI would like to know as to whether or not you have php safe mode turned on? If you do, please specify why, and would you allow your clients to turn it off?
View 13 Replies View RelatedI'm a customer and don't know much about server management, so like title says, is it okay to put php.ini in public_html?
View 14 Replies View RelatedI searched but couldn't find much - should you run PHP with safe mode on or off on a shared (Linux) server?
View 3 Replies View RelatedI am trying to install gallery 2.3 and it requires exec() to be enabled for some functions. Is it safe to enable it in php.ini?
In php.ini file I see this, disable_functions = symlink,shell_exec,exec,proc_close,proc_open,popen,system,dl,passthru,escapeshellarg,escapeshellcmd
I have CentOS running on my VPS.
As with many sites. my site was hacked recently. my host was so negative about this. they didn't notice the hack attempt although it took the hacker 9 hours to break through.
after that I made some search on my host to find that it is not a real host at all. they are just resellers to another company. I was very disappointed, Then I decided to go to a better host who can protect me from hackers.
I read some threads about 'hacker safe host' but they all in general don't give a real name of trusted 'anti-hackers' companies.
can you guide me to some of the famous hosts?
if you can't my friends got a VPS hosted with WestHost. he offered me to move my site to his VPS. is west host trusted about hackers?
i have a cpanel server.. can any one tell me how to allow safe mode to a specific domain?
View 1 Replies View RelatedI am going to run a free host, yes I know I should post this in FWHT but well, they dont answer very fast if at all.
It is very dangerous to have Safe Mode OFF on a free host, but someone was telling me about open_basedir, which makes it so they cant touch any files set outside of open_basedir. Would this be suffiecient to keep them from touching others files? I know I need to disable other functions like exec() and stuff but would open_basedir keep hackers away from others files and hacking them...
I am running my VPS on direct admin panel, my disk space is going low, so i am deleting few junk / log files
Kindly let me know
1) is it safe to delete data of this directory -
/var/log/httpd/domains
The File names in above directory are such as - " domain.com.bytes "
As it is occupying 600 MB space
2) where can i delete much junk / temp files, to free up space.
To Install www.awbs.com scripts to my server
How Can I Do This Following to one site on My server
safe_mode Off
allow_url_fopen On
session.auto_start Off
tell Me that i can do that from httpd config
I have found on one webhost that they have very cool feature:
Here is what they say:
Quote:
Browsing through any webhost related forum will reveal that giving safe mode off poses extreme security risk to the server. Because it offers hackers a great advantage to access any other members account or read their sensitive files which usually contain passwords.
But then some genuine scripts won't work with safe mode ON. Meaning you could turn it on per member requests but that takes lots of labor.
So we completely reprogrammed the safe mode PHP source code and recompiled it. As a result ours safe mode OFF is light-years safer & hacker-proof then standard PHP v5 safe mode ON.
So all our members are getting safe mode OFF, with harder security then those hosts who offer Safe Mode ON.
So now I am wondering, how they did that? I have searched forums and Google for lots of different keyword but haven't found anything.
I believe a lot of you running Apache as nobody and having php save mode OFF. It there any way you protect yourself? phpsuexec is not a solution now as it increasing load.
I am trying to assist a customer install a Dolphin CMS but it returns some "open_basedir restriction in effect" on /usr/local/bin/php (it needs the path to the PHP binary).
If I put /usr/local/bin/php in httpd.conf -> php_admin_value open_basedir "..." it seems to work and it finds the required binary but...is this safe?
I have WHM 11.1.0 cPanel 11.2.1-C11635
FEDORA 4 i686 - WHM X v3.1.0
My /var partition is over 64% full. 2 directories in there show a lot of space being used.
One of these is /var/lib/mysql
du -h --max-depth=1 #
shows user accounts on the server with their database names. Are these just logs, or are they the actual databases? (Probably dumb newbie question)
The other big one is /var/log/munin Is there anything there I can delete?
I need to ask, what's best company of Secuity and Safe servers.
So I hope any one can answer my seeking.
I had VPS from SolarVPS a year ago and I found that it requires full attention since it wasn't stable like dedicated server. So, I had to keep an eye on the server and websites where some technical problems happened. These problems like websites stopped working suddenly, email problems, Mysql permissions etc.
I totally agree that SolarVPS has a fantastic support and very quick. They supported me all over the past period. But, a week ago one of my client’s website was used for phishing Paypal customers and it seems like a hacker used the mailing script for this website. Therefore, SolrVPS stopped my VPS immediately and I am still keep on contacting Abuse Department to clarify the situation and resolve the problem. However, all my clients are down now because they are affected by stopping my VPS.
My question here, since I wasn't be able to administrate security or look after the websites at my VPS, what shall I do to have a rest of mind from these problems and concentrate on sales and light support?
Shall I go for dedicated? VPS again? Reseller? However, I always need root access to my server for my technical purposes.
i have vps and i enable the safe_mode , but now i need to turn it off becouse i need to install image uploader script and this script need safe mode off to work
so,
what can i do to secure my server while i turn off my safe mode?
what can happend if i turn off safe mode?
what is the job of safe mode?
Ok first thing I have a P4 3.0ghz server and i assumed it has HTT feature in it but correct me if Im wrong with this dmesg
Code:
Copyright (c) 1992-2007 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD 6.2-RELEASE-p5 #0: Sun May 27 03:15:00 UTC 2007
root@:/usr/obj/usr/src/sys/SharkTECH6
Timecounter "i8254" frequency 1193182 Hz quality 0
CPU: Intel(R) Pentium(R) 4 CPU 3.00GHz (2999.68-MHz 686-class CPU)
Origin = "GenuineIntel" Id = 0xf41 Stepping = 1
Features=0xbfebfbff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,C
MOV,PAT,PSE36,CLFLUSH,DTS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE>
Features2=0x441d<SSE3,RSVD2,MON,DS_CPL,CNTX-ID,<b14>>
Logical CPUs per core: 2
Anyways the kernel it is using now has SMP disabled. Now i heard and from google searches that enabling SMP when you have an HTT processor is bad since I heard that there some kind of exploit and vulnerability. But this was back in 2005 and im not sure if it's fixed yet. Is anyone using a P4 with HTT with SMP enabled in their kernel as a dedi server? Some people also said that it lowers performance. This server mainly runs on WHM, apache, mysql, mail, and php.
After installing Kernels seems /boot is boing to be full soon. Which files can be safely deleted ? Mean lets say to keep the latest Kernel and previous version:
root@[/boot]# ls -la
total 70317
drwxr-xr-x 4 root root 3072 Dec 4 11:28 ./
drwxr-xr-x 22 root root 4096 Sep 29 10:41 ../
-rwxr--r-- 1 root root 6144 Nov 9 2006 aquota.user*
-rw-r--r-- 1 root root 48736 Sep 28 2005 config-2.4.21-37.EL
-rw-r--r-- 1 root root 48851 Sep 28 2005 config-2.4.21-37.ELsmp
-rw-r--r-- 1 root root 48951 Oct 19 2006 config-2.4.21-47.0.1.EL
-rw-r--r-- 1 root root 49066 Oct 19 2006 config-2.4.21-47.0.1.ELsmp
-rw-r--r-- 1 root root 49066 Aug 1 2006 config-2.4.21-47.ELsmp
-rw-r--r-- 1 root root 48951 Jun 11 18:29 config-2.4.21-50.EL
-rw-r--r-- 1 root root 49066 Jun 11 18:21 config-2.4.21-50.ELsmp
-rw-r--r-- 1 root root 48951 Aug 16 17:11 config-2.4.21-51.EL
-rw-r--r-- 1 root root 49066 Aug 16 17:03 config-2.4.21-51.ELsmp
-rw-r--r-- 1 root root 48951 Sep 27 18:38 config-2.4.21-52.EL
-rw-r--r-- 1 root root 49066 Sep 27 18:30 config-2.4.21-52.ELsmp
-rw-r--r-- 1 root root 48951 Dec 3 13:51 config-2.4.21-53.EL
-rw-r--r-- 1 root root 49066 Dec 3 13:42 config-2.4.21-53.ELsmp
drwxr-xr-x 2 root root 1024 Dec 4 11:28 grub/
-rw-r--r-- 1 root root 276201 May 5 2006 initrd-2.4.21-37.EL.img
-rw-r--r-- 1 root root 283119 May 5 2006 initrd-2.4.21-37.ELsmp.img
-rw-r--r-- 1 root root 282640 Apr 10 2007 initrd-2.4.21-47.0.1.EL.img
-rw-r--r-- 1 root root 289544 Oct 21 2006 initrd-2.4.21-47.0.1.ELsmp.img
-rw-r--r-- 1 root root 289539 Sep 23 2006 initrd-2.4.21-47.ELsmp.img
-rw-r--r-- 1 root root 282779 Jun 26 22:04 initrd-2.4.21-50.EL.img
-rw-r--r-- 1 root root 289656 Jun 26 22:03 initrd-2.4.21-50.ELsmp.img
-rw-r--r-- 1 root root 282783 Aug 21 05:32 initrd-2.4.21-51.EL.img
-rw-r--r-- 1 root root 289652 Aug 21 05:32 initrd-2.4.21-51.ELsmp.img
-rw-r--r-- 1 root root 282781 Sep 28 08:22 initrd-2.4.21-52.EL.img
-rw-r--r-- 1 root root 289649 Sep 28 08:23 initrd-2.4.21-52.ELsmp.img
-rw-r--r-- 1 root root 282778 Dec 4 11:27 initrd-2.4.21-53.EL.img
-rw-r--r-- 1 root root 289653 Dec 4 11:28 initrd-2.4.21-53.ELsmp.img
-rw-r--r-- 1 root root 547 May 5 2006 kernel.h
drwx------ 2 root root 12288 May 5 2006 lost+found/
-rw-r--r-- 1 root root 10213 Jan 4 2005 message
-rw-r--r-- 1 root root 10213 Jan 4 2005 message.ja
-rwxr--r-- 1 root root 32 Nov 9 2006 quota.user*
lrwxrwxrwx 1 root root 26 Sep 29 09:37 System.map -> System.map-2.4.21-52.ELsmp
-rw-r--r-- 1 root root 578588 Sep 28 2005 System.map-2.4.21-37.EL
-rw-r--r-- 1 root root 606073 Sep 28 2005 System.map-2.4.21-37.ELsmp
-rw-r--r-- 1 root root 580154 Oct 19 2006 System.map-2.4.21-47.0.1.EL
-rw-r--r-- 1 root root 607622 Oct 19 2006 System.map-2.4.21-47.0.1.ELsmp
-rw-r--r-- 1 root root 607622 Aug 1 2006 System.map-2.4.21-47.ELsmp
-rw-r--r-- 1 root root 580321 Jun 11 18:29 System.map-2.4.21-50.EL
-rw-r--r-- 1 root root 607789 Jun 11 18:21 System.map-2.4.21-50.ELsmp
-rw-r--r-- 1 root root 580321 Aug 16 17:11 System.map-2.4.21-51.EL
-rw-r--r-- 1 root root 607789 Aug 16 17:03 System.map-2.4.21-51.ELsmp
-rw-r--r-- 1 root root 580321 Sep 27 18:38 System.map-2.4.21-52.EL
-rw-r--r-- 1 root root 607789 Sep 27 18:30 System.map-2.4.21-52.ELsmp
-rw-r--r-- 1 root root 580321 Dec 3 13:51 System.map-2.4.21-53.EL
-rw-r--r-- 1 root root 607789 Dec 3 13:42 System.map-2.4.21-53.ELsmp
-rwxr-xr-x 1 root root 2908624 Sep 28 2005 vmlinux-2.4.21-37.EL*
-rwxr-xr-x 1 root root 3543696 Sep 28 2005 vmlinux-2.4.21-37.ELsmp*
-rwxr-xr-x 1 root root 2912724 Oct 19 2006 vmlinux-2.4.21-47.0.1.EL*
-rwxr-xr-x 1 root root 3551892 Oct 19 2006 vmlinux-2.4.21-47.0.1.ELsmp*
-rwxr-xr-x 1 root root 3551888 Aug 1 2006 vmlinux-2.4.21-47.ELsmp*
-rwxr-xr-x 1 root root 2912720 Jun 11 18:29 vmlinux-2.4.21-50.EL*
-rwxr-xr-x 1 root root 3551888 Jun 11 18:21 vmlinux-2.4.21-50.ELsmp*
-rwxr-xr-x 1 root root 2912720 Aug 16 17:11 vmlinux-2.4.21-51.EL*
-rwxr-xr-x 1 root root 3551888 Aug 16 17:03 vmlinux-2.4.21-51.ELsmp*
-rwxr-xr-x 1 root root 2912720 Sep 27 18:38 vmlinux-2.4.21-52.EL*
-rwxr-xr-x 1 root root 3551888 Sep 27 18:30 vmlinux-2.4.21-52.ELsmp*
-rwxr-xr-x 1 root root 2912720 Dec 3 13:51 vmlinux-2.4.21-53.EL*
-rwxr-xr-x 1 root root 3551888 Dec 3 13:42 vmlinux-2.4.21-53.ELsmp*
-rw-r--r-- 1 root root 1252609 Sep 28 2005 vmlinuz-2.4.21-37.EL
-rw-r--r-- 1 root root 1363969 Sep 28 2005 vmlinuz-2.4.21-37.ELsmp
-rw-r--r-- 1 root root 1260075 Oct 19 2006 vmlinuz-2.4.21-47.0.1.EL
-rw-r--r-- 1 root root 1368141 Oct 19 2006 vmlinuz-2.4.21-47.0.1.ELsmp
-rw-r--r-- 1 root root 1367751 Aug 1 2006 vmlinuz-2.4.21-47.ELsmp
-rw-r--r-- 1 root root 1260875 Jun 11 18:29 vmlinuz-2.4.21-50.EL
-rw-r--r-- 1 root root 1370368 Jun 11 18:21 vmlinuz-2.4.21-50.ELsmp
-rw-r--r-- 1 root root 1260877 Aug 16 17:11 vmlinuz-2.4.21-51.EL
-rw-r--r-- 1 root root 1370369 Aug 16 17:03 vmlinuz-2.4.21-51.ELsmp
-rw-r--r-- 1 root root 1260879 Sep 27 18:38 vmlinuz-2.4.21-52.EL
-rw-r--r-- 1 root root 1370369 Sep 27 18:30 vmlinuz-2.4.21-52.ELsmp
-rw-r--r-- 1 root root 1260893 Dec 3 13:51 vmlinuz-2.4.21-53.EL
-rw-r--r-- 1 root root 1370450 Dec 3 13:42 vmlinuz-2.4.21-53.ELsmp
root@[/boot]#
This is the /etc/grub.conf
# grub.conf generated by anaconda
#
# Note that you do not have to rerun grub after making changes to this file
# NOTICE: You have a /boot partition. This means that
# all kernel and initrd paths are relative to /boot/, eg.
# root (hd0,0)
# kernel /vmlinuz-version ro root=/dev/sda2
# initrd /initrd-version.img
#boot=/dev/sda
default=0
timeout=10
splashimage=(hd0,0)/grub/splash.xpm.gz
title CentOS (2.4.21-53.ELsmp)
root (hd0,0)
kernel /vmlinuz-2.4.21-53.ELsmp ro root=LABEL=/
initrd /initrd-2.4.21-53.ELsmp.img
title CentOS (2.4.21-53.EL)
root (hd0,0)
kernel /vmlinuz-2.4.21-53.EL ro root=LABEL=/
initrd /initrd-2.4.21-53.EL.img
title CentOS (2.4.21-52.ELsmp)
root (hd0,0)
kernel /vmlinuz-2.4.21-52.ELsmp ro root=LABEL=/
initrd /initrd-2.4.21-52.ELsmp.img
title CentOS (2.4.21-52.EL)
root (hd0,0)
kernel /vmlinuz-2.4.21-52.EL ro root=LABEL=/
initrd /initrd-2.4.21-52.EL.img
title CentOS (2.4.21-51.ELsmp)
root (hd0,0)
kernel /vmlinuz-2.4.21-51.ELsmp ro root=LABEL=/
initrd /initrd-2.4.21-51.ELsmp.img
title CentOS (2.4.21-51.EL)
root (hd0,0)
kernel /vmlinuz-2.4.21-51.EL ro root=LABEL=/
initrd /initrd-2.4.21-51.EL.img
title CentOS (2.4.21-50.EL)
root (hd0,0)
kernel /vmlinuz-2.4.21-50.EL ro root=LABEL=/
initrd /initrd-2.4.21-50.EL.img
title CentOS (2.4.21-50.ELsmp)
root (hd0,0)
kernel /vmlinuz-2.4.21-50.ELsmp ro root=LABEL=/
initrd /initrd-2.4.21-50.ELsmp.img
title CentOS (2.4.21-47.0.1.EL)
root (hd0,0)
kernel /vmlinuz-2.4.21-47.0.1.EL ro root=LABEL=/
initrd /initrd-2.4.21-47.0.1.EL.img
title CentOS (2.4.21-47.0.1.ELsmp)
root (hd0,0)
kernel /vmlinuz-2.4.21-47.0.1.ELsmp ro root=LABEL=/
initrd /initrd-2.4.21-47.0.1.ELsmp.img
title CentOS (2.4.21-47.ELsmp)
root (hd0,0)
kernel /vmlinuz-2.4.21-47.ELsmp ro root=LABEL=/
initrd /initrd-2.4.21-47.ELsmp.img
title CentOS-3 (2.4.21-37.ELsmp)
root (hd0,0)
kernel /vmlinuz-2.4.21-37.ELsmp ro root=LABEL=/
initrd /initrd-2.4.21-37.ELsmp.img
title CentOS-3-up (2.4.21-37.EL)
root (hd0,0)
kernel /vmlinuz-2.4.21-37.EL ro root=LABEL=/
initrd /initrd-2.4.21-37.EL.img