if there is anyway that IIS 6.0 can do reporting of the websites that are running on it. For example I would like to get the local IP address and host header values for them. I can do it manual by going to each website but that will take forever. It seems like there should be a easier way.
We developed an Exim server on debian that sending mails outside to our customers. It's an IP based auth server. For bounce reporting and management, what would you recommend us?
Is there anything like; send all bouncing mails that sent from this server to myaccount@gmail.com? We need this to be done in MTA level..
I have several servers and I need a tool to measure CPU/disk/memory performance.
I no nothing about hardware (and I also don't want/need to know).
The tools is to compare only - I don't care about the measure unit, I just need a way to compare the performance between my servers like which one as a faster CPU and so on...
Anyone knows such a FREEWARE (and not bloatware) tool?
If the tool has some kind of hardware report... well.. even better.
One friend I host sites for is reporting 492MB in WHM, but running DU reports 5.4GB for just one site!!! I've had the DC run Quotafix, but it's still not correct. The site is drupal and DC said they can't even list the tmp folder for that account. Any suggestions so I don't loose $45/month in extra charges? I have no clue how many months this is been going on, but it's costing me allot it seems.
I just leased a server through EV1. It's Linux (I think), Apache, and Plesk 8.0. I'm trying to get error reporting to work for my php scripts. I opened up the php.ini file (I'm about 90% sure that it's the right php.ini file) found in the /etc folder. I changed error reporting to "on" and restarted my server with Plesk.
Wondering if anyone knows of an email DNSBL that are have a real time reporting tool which directly feeds the DNSBL?
I have been using Spamcop for reporting in hopes I might be able to get some IP's listed. However so far I have not seen any IP's listed until many hours or days after they are reported (possibly going through a validation process?).
Wondering if anyone knows a more pro-active DNSBL that is fed directly by reporting and administrators?
I know this can be the most foolishly question on WHT but I'm looking for mod_evasive's download link, I tried googling and searching all forums but all links was dead
anybody can give me a link to get mod_evasive ? Ofcourse If you have a better idea than using of mod_evasive I'll be glad to hear
We installed mod_evasive and ever since we are getting files like: dos-xxx.xxx.xxx.xxx, where xxx.xxx.xxx.xxx is an IP in our /tmp directory. The contents of the file is usually a 4 or 5 digit number and is owned by apache. Can anyone help me understand what this file is? Is it a product of mod_evasive? Can the files be deleted?
How would I go about reporting a website for illegal hacking and other activities?
Their host is fully supporting them. They have even given them the ip address of the proxy I used, in which case the client of theirs have added the proxy to their htaccess deny list.
I rebooted my server and now munin is not showing any eth0 traffic. All other graphs are fine. I can see there is a ton of apache accesses so there is definitely eth0 traffic. Munin logs report no errors. I restarted munin and munin-node. I even did 'yum remove munin munin-node' and reinstalled again but it still doesn't work for eth0.
We've got a client who is using both AWstats and Webalizer and they are claiming the numbers are different between the two and that the numbers reported are not accurate. They need a specific list on how many impressions they are getting on a daily, weekly and monthly time period for advertisers.
Did microsoft require your host email them and say "[you] have exclusive sending rights for this IP"?
Here is the part of the email from microsoft:
xx, unfortunately, we have not received an e-mail confirmation from your ISP, [host], for your IP x.x.x.x. Please ask them to re-send the e-mail confirmation to [email] with the [id] subject. Please also ask them to include you on the "To" or "Cc" field in case that we fail to receive their e-mail confirmation.
Is this a requirement for everybody?
I signed up for AOL's junk reporting program a few months ago and I didn't have to bother anybody about it.
If I recall correctly, all AOL cared about was whether or not my reverse DNS was set properly.
Telia is reporting a fiber cut in the US - any other carriers impacted?
from Telia:
We regret to advise that we are currently experiencing a cable cut in the United States. This outage is causing degradation in our IP backbone, which may affect your service.
The fault has been brought to the attention of senior management, and we are actively working to resolve the fault. Unfortunately we do not know when the fault will be resolved.
We will update you as soon as we have further information, and apologise for the inconvenience caused to you and your customers.
I have a file named dos-1.2.13.4 (i changed the IP address in purpose) inside the log and inside the file there is a 4 digit number that is constantly changing. more
We are having problem with installing mod_evasive on our server. We tried installing it on our Virtual Machine that runs Fedora 7 (on our server, we have Fedora core 5), and on Virtual Machine it is fine, we can compile it and put it in our Apache2 conf file.
However, when we try
[root@ mod_evasive]# /usr/local/psa/admin/bin/apxs -i -a -c mod_evasive20.c on the server, we get a
1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.
I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.
If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server. Probably is not blocing the ip of the external server because of latency.
Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?
Here I'm pasting the code of the test.pl script:
Code: #!/usr/bin/perl
# test.pl: small script to test mod_dosevasive's effectiveness
use IO::Socket; use strict;
for(0..100) { my($response); my($SOCKET) = new IO::Socket::INET( Proto => "tcp", PeerAddr=> "test.domain.tld:80"); if (! defined $SOCKET) { die $!; } print $SOCKET "GET /?$_ HTTP/1.0
2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.
Does anyone know any good mod_evasive rules that pick up DoS, but not many false positives? Just looking to see what works for everyone out there, been having trouble.
Or if there is better apache module to combat DoS.
1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.
I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.
If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server.
Probably is not blocing the ip of the external server because of latency.
Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?
Here I'm pasting the code of the test.pl script:
Quote:
#!/usr/bin/perl
# test.pl: small script to test mod_dosevasive's effectiveness
use IO:ocket; use strict;
for(0..100) { my($response); my($SOCKET) = new IO:ocket::INET( Proto => "tcp", PeerAddr=> "test.domain.tld:80"); if (! defined $SOCKET) { die $!; } print $SOCKET "GET /?$_ HTTP/1.0
2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.
1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.
I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.
If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server. Probably is not blocing the ip of the external server because of latency.
Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?
Here I'm pasting the code of the test.pl script:
Quote:
#!/usr/bin/perl
# test.pl: small script to test mod_dosevasive's effectiveness
use IO:Socket; use strict;
for(0..100) { my($response); my($SOCKET) = new IO:Socket::INET( Proto => "tcp", PeerAddr=> "test.domain.tld:80"); if (! defined $SOCKET) { die $!; } print $SOCKET "GET /?$_ HTTP/1.0
2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.
Installing mod_evasive after serveral attacks on our server.
but when restarting httpd I get this error,
httpd: Syntax error on line 36 of /usr/local/apache/conf/httpd.conf: API module structure 'evasive20_module' in file /usr/lib/httpd/modules/mod_evasive20.so is garbled - expected signature 41503232 but saw 41503230 - perhaps this is not an Apache module DSO, or was compiled for a different Apache version?
I would like to install the Mod_evasive for Apache 2.0 on RHEL 4 Server(Cpanel Installed). I downloaded the Mod_evasive source and extracted and used the following command.
# cd mod_evasive # /usr/sbin/apxs -cia mod_evasive20.c