How to bind a range of IP’s in Linux This method is used by Redhat Linux based servers (Centos/RedhatEnterprise/FedoraCore). Create a file called /etc/sysconfig/network-scripts/ifcfg-eth0-range0 And in the file place these 3 lines but change the IP’s to match YOUR assigned range. ## Start IPADDR_START=67.18.xxx.xxx IPADDR_END=67.18.xxx.xxx CLONENUM_START=0 # Example | IPADDR_START=67.18.333.440 # Example | IPADDR_END=67.18.333.444 #… Continue reading How to bind a range of IP’s in Redhat based linux
Scenario: Customer is concerned that only 100MB of their 2GB of memory is as unused or free when running the free command. However, no processes appear to be consuming large amounts of memory, and the server is not running slow. Cause: This is not a problem, but rather a result of the way linux manages… Continue reading Linux Memory Management
If the Plesk admin account becomes locked due to multiple failed logins, you have two options. The first is to wait till the lockout automatically resets (15 to 30 minutes) or use the following comands. Redhat, once connected via SSH as root: #mysql -uadmin -p`cat /etc/psa/.psa.shadow` psa -e ‘DELETE FROM lockout’ or #mysql -u admin… Continue reading Admin account locked out of Plesk
Adding GD graphic libraries support to php on your linux server with Plesk is relatively simple. First, log into your server using ssh to get to a command line prompt. Second, type the following command to install a version of php with GD support: up2date php-gd Third, restart your web service with this command: service… Continue reading How to add GD support to PHP on a Linux server with Plesk
You can always get the Plesk password if you have Administrative access to the server. If you have also lost administrative access to the server, refer to [How do I reset the password on my server] For Windows, 1. From the Start menu, select Run. 2. Enter the following command: “C:\Program Files\SWsoft\Plesk\admin\bin\plesksrvclient.exe” -get For Linux,… Continue reading How do I retrieve the Plesk control panel password?
RootKit — Spyware and Junkware detection and removal tool Go to Rootkit Hunter homepage, and download the latest release. http://www.rootkit.nl/projects/rootkit_hunter.html ## Get the latest source and untar # cd /usr/src/utils # wget http://downloads.rootkit.nl/rkhunter-<version>.tar.gz # tar xfz rkhunter-*.gz # cd rkhunter # ./installer.sh ## run rkhunter # rkhunter -c Setup automatic protection on System Reboot ##… Continue reading Rootkit help
I have installed a new slave hard drive. How do I format it and mount it? Solution: 1. Login as root: and type the following command: [root@34 root]# fdisk /dev/hdc 2. This screen will appear: The number of cylinders for this disk is set to 10011. There is nothing wrong with that, but this is… Continue reading Formatting and Mounting a new drive in Linux
Problem: ——— Issue: ——— While starting named, or when running /etc/rc.d/init.d/named status, you get the following error: rndc: connection to remote host closed This may indicate that the remote server is using an older version of the command protocol, this host is not authorized to connect, or the key is invalid. Solution: ——- Fix: ——-… Continue reading rndc: the key is invalid