Is there a way to located out dated and already exploited scripts on my VPS? I have already cleaned out the /tmp directory but how can I scan my clients accounts to determine if they have been exploited? Or if they should update scripts that they are running.
There seems to be an explited script on server,someone uploaded c99shell onto the server and then executed sql commands and deleted the data from my vBulletin database.
I have restored backup and deleted c99shell but unsure how to find out which script was exploited,
Also is there a rule for mod_security to stop similar scripts from beeing uploaded and executed?
I have a spammer that's abusing a Joomla php mail script on a customer's account. How do I disable it without deleting the script? Do I simply reset the permissions to something else? (And if so, to what?)
I created backup file the other day and tried to move it to root, however its not there is there anyway I can search the entire search for it? I cant remember the backup's file name either so it is possible to search for a file using locate or find, and list all files with a tar.gz exstension as this would help nail it down.
if there is any good method for finding files that have not been accessed by the server for a long period of time. I was thinking this might be a good way of clearing space.
I am running Clamav in Windows, it seems that the FreshClam is giving some errors when updating
ClamAV update process started at Sat Jul 18 13:20:41 2009 WARNING: Your ClamAV installation is OUTDATED! WARNING: Local version: 0.95.1 Recommended version: 0.95.2 DON'T PANIC! Read http://www.clamav.net/support/faq main.cvd is up to date (version: 51, sigs: 545035, f-level: Downloading daily.cvd [ 99%] ERROR: Can't rename c:clamavdata/clamav-8b0fa144b304158b0 e0c.clamtmp to daily.cvd: Permission denied
I just began work at an office to manage one of their web assets. They have it hosted on a VPS from Network Solutions. In looking at the VPS itself as well as the information on the Network Solutions site, it appears they only offer Fedora Core 6 to their linux VPS customers.
FC6 was released October 24, 2006 and Fedora support is 13 months. That means that as of November 24, 2007, FC6 has received no security updates to any of it's software nor the kernel.
The Fedora project even states that it might not be a good choice for corporate users because of the need to update the whole OS every 13 months.
I can't update the OS on the VPS, I called support and they told me that they only offered FC6 and they had no solution to the security patches problem.
Is this even posssible?! Could a hosting service really consider offering a 3 year old OS with no security support as their only option? Am I missing something incredibly obvious?
we've been having issues with reaching or exceeding our disk quotas. I've checked carefully, and while I've cleared our mail queue's, I don't think that's the issue.
So what I'm really looking for is a way to figure out why we have so many files (our quota is 220000, and I'm pretty confident that we aren't intentionally doing anything to create so many files). There's lots of information on finding the folders with the largest file sizes, but locating the folders with the greatest number of files isn't quite so simple--or at least, it doesn't seem very clear to me.
Does anyone know a way via the command line to figure out this information, short of going through every single folder and figuring out how many files are in the specific folder?
i had 3 emails last night from my box regarding a [checkperlmodules] automatic upgrade.
The modules cannot install as the modules on my system are outdated. I tried installing the module under WHM, IO::Compress::Base, but it says it is the most recent (2.005) and wont upgrade!
Under WHM -> 'Update System Software' i get the same error as modules wont build as they are require 2.006 and i have 2.005.
Is there anywayy how can i force an upgrade regardles?
Warning: prerequisite IO::Compress::Base 2.006 not found. We have 2.005.
[checkperlmodules] The perl module IO::Uncompress::Gunzip could not be installed. This module is required by cPanel, and the system may not function correctly until it is installed, and functional. Below is the results of the auto-install attempt:
Test Run ============== IO::Compress::Base::Common version 2.006 required--this is only version 2.005 at /usr/lib/perl5/site_perl/5.8.8/IO/Uncompress/RawInflate.pm line 9. BEGIN failed--compilation aborted at /usr/lib/perl5/site_perl/5.8.8/IO/Uncompress/RawInflate.pm line 9. Compilation failed in require at /usr/lib/perl5/site_perl/5.8.8/IO/Uncompress/Gunzip.pm line 12. BEGIN failed--compilation aborted at /usr/lib/perl5/site_perl/5.8.8/IO/Uncompress/Gunzip.pm line 12. Compilation failed in require at - line 1. BEGIN failed--compilation aborted at - line 1.
Installer Run
.... snip .... CPAN.pm: Going to build P/PM/PMQS/IO-Compress-Zlib-2.006.tar.gz
Up/Downgrade not needed. Checking if your kit is complete... Looks good Warning: prerequisite IO::Compress::Base 2.006 not found. We have 2.005. Warning: prerequisite IO::Uncompress::Base 2.006 not found. We have 2.005. Writing Makefile for IO::Compress::Zlib CPAN: YAML loaded ok (v0.65) ... snip ...