what good support company could provide support also via chat to get issues resolved..
Most are ticket based and chat is for very basic issues..
What we need is get support on board, dialogue between issues to resolve the problem asap instead of waiting for email for a problem that could be resolved in a few minutes.
Any ideas who offers this type of service with well qualified engineers behind the chat team?
A database of open relay email servers, provided until late 2006 as a voluntary service to help email administrators block spam, has suddenly re-activated but is returning every address queried as being on its blacklist.
Administrators of email systems should have stopped querying the database (relays.ordb.org) in December 2006 when it shut down, but some failed to do so. That was no problem until today, queries were simply rejected, but now the address of any email server presented is being returned as an open relay. This results in the querying system rejecting all incoming mails from that server.....
today i changed the password for the admin panel for a customer (username eg. mylogin). 10 minutes later he called me and said that he cannot get into his emailaccount anymore. Checked the password and saw that the emailpassword for his emailaddress (eg. mylogin@mydomain.com) is now the same from the admin panel login. So i changed the emailpassword and checked the admin panel login - it now has the emailpassword. What a mess.. I'm running Plesk Panel 11.5.30 MU47.
my Server is : CentOS and my control panel is : Cpanel
my Freand have a mySQL password, but he donot know ROOT Password ( i change root password ) my Freand is a bad Boy ) can he attack Mysql or Mysql user by mysql password?
if he can attack server by Mysql password please help me about change Mysql password by CPANEL
I have successfully changed a shell user password but I cannot login with it via ssh cos its says wrong pass (with previous password can login) as well as any other users pass says wrong pass after a change.
I am transfering my database to a new host and well I need to create the same database (same name and username) along with the same password I used before (because a script im using is connected to it) then import the old .SQL files.
However I dont know how I can find out the current password linked to that database (When you create one it asks you for a password remember?) Anyclue how to find it out? I cant change it I need to know what it is still.
I have the user "tech" added to my system. I want that user (tech) to be able to use sudo, but for only *one* command. ssh. I also want this to utilize the "NOPASSWD" feature.
What's the line I need to add to /etc/sudoers to allow only SSH (and sudo with the no password).
if this is possible, when I create a new client in Plesk I want to automatically generate a complicated password, as opposed to me making up one for a client...
I am using HC7 to manage my hosting plans for my company. The hosting Server have Mail server (MDaemon) and it configured. However, SMTP service in IIS6.0 is not enable. I tried to get password to login HC7. it is tested 2 times : first time : Boths SMTP service in MDaemon and IIS are enable ....result : all things are ok second times : SMTP service is disable in IIS, SMTP service in MDaemon still enable...result : anymail are sent customers to get password.
I suggested : Enable SMTP service in IIS, but my boss (before he also worked with windows hosting ) said that it not need to enable.
May 28 16:23:06 server sshd(pam_unix)[13017]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root
I got so many of this line in my server log.
First of all, where is the server log located anyway? I got this from SIM.
May 28 16:23:09 server sshd(pam_unix)[13037]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:11 server sshd(pam_unix)[13045]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:11 server sshd(pam_unix)[13061]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13066]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13067]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13071]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 17:00:02 server ntpdate[19626]: adjust time server 192.5.41.40 offset 0.343837 sec May 28 18:00:07 server ntpdate[28711]: adjust time server 192.5.41.40 offset 0.344493 sec May 28 19:00:06 server ntpdate[3218]: adjust time server 192.5.41.40 offset 0.342326 sec May 28 20:00:02 server ntpdate[8283]: adjust time server 192.5.41.40 offset 0.341603 sec May 28 21:00:07 server ntpdate[13899]: adjust time server 192.5.41.40 offset 0.343715 sec May 28 21:37:45 server sshd(pam_unix)[17268]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17271]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17270]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17254]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root
In my linux vps (cpanel based) hackers have hacked the password of the user ( website owner ) and he have uploaded some hack files(PHP) through FTP. Sometimes the hacker uploads perl/CGI scripts and sends spam mails .This happens frequently in server. How the hacker gets the users password? How can i prevent my users and server from this security issue?
restore a VPS onto a different server due to a hardware failure. The new VPS is up and running and I can apache is displaying the cPanel WHM login panel ok. So I know the VPS is fine.
However, my WHM username/password are no longer working.
What options do I have resetting the password for the WHM? I have full access to the shell of the VPS (root access).
I'm still trying to figure this one out. I got an email last night about 10:30pm that a weird IP had logged with root. I thought it was a guy that helps with tech things but I ran the IP... it came back from Korea and I knew I was in trouble. I immediately logged into WHM and changed the root password then sent the server down for a reboot. He was only in there for about 3 minutes before I nailed him. I've banned the IP from the server and have been watching it for nearly 12 hours now and they haven't came back yet.
Now comes the task of trying to figure out how he got the password. This is mind boggling to me. He knew the password, like someone gave it to him... there were no incorrect guesses or brute force. The password was a series of random letters, both upper and lower case. Is it possible he got it through getting to /etc/passwd via a PHP script? I have open basedir restrictions in place, can they get around that? I noticed at the time he logged in there were several IPs trying to exploit PHP scripts on my server, you know, setting the parameters to txt files but I assumed with shell functions disabled (except exec) and with open basedir this wouldn't be possible. Is there a hole in cpanel / PHP / kernel recently I may have missed?