Can anyone tell me in order to use the crypt function (amd md5sum) in a c++ program (g++ on CentOS assuming the cryptography libary is installed) what do I have to
--> Populating transaction set with selected packages. Please wait. ---> Package cadaver.i386 0:0.22.5-1.el5.rf set to be updated ---> Package mtr.i386 2:0.72-1.el5.rf set to be updated ---> Package rsync.i386 0:3.0.2-1.el5.rf set to be updated ---> Package nmap.i386 2:4.20-1.el5.rf set to be updated ---> Package lftp.i386 0:3.7.1-1.el5.rf set to be updated ---> Package syslinux.i386 0:3.63-1.el5.rf set to be updated ---> Package dkms.noarch 0:2.0.19-2.el5.rf set to be updated ---> Package subversion.i386 0:1.4.6-0.1.el5.rf set to be updated --> Running transaction check --> Processing Dependency: perl(Crypt:asswdMD5) for package: syslinux --> Finished Dependency Resolution Error: Missing Dependency: perl(Crypt:asswdMD5) is needed by package syslinux
I am in the process of setting up a VPN server for a client who lives in a Middle Eastern country.
He will be using the VPN for all his internet surfing, email access, etc. (So the VPN will be his internet gateway. His local ISP connection will only be used to make the VPN connection.)
The majority of his internet surfing through the VPN will be to US websites.
Where is the best place to locate the VPN server? I have two datacenters available to choose from: USA or UK
When I enter my_domain.com the browser displays index.php located in httpdocs on my server. When I enter my_domain.com/main/ the browser displays another page, but there's no directory "main" in my httpdocs. Somehow it's redirected to another location (but in URL bar in the browser it's still my_comain.com/main/). I need to find that location.
As I searched through the web, such redirection can be made in .htaccess file, but I can't locate this one either. My server is Apache on CentOS6, and httpdocs directory is located in /var/www/vhosts/my_domain.com. I searched for .htaccess in several locations that I googled, I also tried executing "find / -type d -name '.htaccess'" on PuTTy, but it gives no results.
My server running and update CentOS 4.4. In the last hours lot of spam are being send form my server to the world. I'm unable to locate the source. Sendmail is define to relay localhost, and it seems that the source is local!
It seem that all the email are send from apache@mydomain.com to user@mydomain.com Sendmail is configure to accept for local delivery mail for domain mydomain.com Here is trace of spam session:
Quote:
May 3 14:39:51 active sendmail[17696]: NOQUEUE: connect from mydomain.com [127.0.0.1] May 3 14:39:51 active sendmail[17696]: AUTH: available mech=CRAM-MD5 DIGEST-MD5 PLAIN ANONYMOUS LOGIN, allowed mech=EXTERNAL GSSAPI KERBEROS_V4 DIGEST-MD5 CRAM-MD5 May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: Milter: no active filter May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 220 mydomain.com ESMTP Sendmail 8.13.1/8.12.8; Thu, 3 May 2007 14:39:51 +0300 May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: <-- EHLO mydomain.com May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-mydomain.com Hello mydomain.com [127.0.0.1], pleased to meet you May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-ENHANCEDSTATUSCODES May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-PIPELINING May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-8BITMIME May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-SIZE May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-DSN May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-ETRN May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-AUTH DIGEST-MD5 CRAM-MD5 May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250-DELIVERBY May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250 HELP May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: <-- MAIL From:<apache@mydomain.com> SIZE=133 AUTH=apache@mydomain.com May 3 14:39:51 active sendmail[17696]: ruleset=trust_auth, arg1=apache@mydomain.com, relay=mydomain.com [127.0.0.1], reject=550 5.7.1 <apache@mydomain.com>... not authenticated May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250 2.1.0 <apache@mydomain.com>... Sender ok May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: <-- RCPT To:<reports@mydomain.com> May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250 2.1.5 <reports@mydomain.com>... Recipient ok May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: <-- DATA May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 354 Enter mail, end with "." on a line by itself May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: from=<apache@mydomain.com>, size=410, class=0, nrcpts=1, msgid=<200705031139.l43BdpDW017695@mydomain.com>, proto=ESMTP, daemon=MTA, relay=mydomain.com [127.0.0.1] May 3 14:39:51 active sendmail[17696]: l43Bdpg2017696: --- 250 2.0.0 l43Bdpg2017696 Message accepted for delivery May 3 14:39:51 active sendmail[17696]: l43Bdpg3017696: <-- QUIT May 3 14:39:51 active sendmail[17696]: l43Bdpg3017696: --- 221 2.0.0 mydomain.com closing connection
It seems the spam message BCC contain a lot of victims address, that not from mydomain.
Is some one connect form outside and spoof 127.0.0.1 ?
If it local process, ho do I locate it?
I scan /tmp and my web server root for suspicious file and didn't find nothing!
if anyone knew if with Network Solutions advanced hosting package on unix there was a way to store the documents outside of document root? If not is there a good way to secure a folder/files that is in the document root from users?
does mod_cache use real disk space or real memory to locate "cache"? I mean if i use mod_cache, does my vps/server will use more disk space/memory?
Quote:
mod_cache implements an RFC 2616 compliant HTTP content cache that can be used to cache either local or proxied content. mod_cache requires the services of one or more storage management modules. Two storage management modules are included in the base Apache distribution: