Create a disk partition on a disk greater than 2TB in size

Fdisk command does not supports partitioning of disk that has greater than 2 TB size. The parted tool supports GPT disk labels which can be used on disks larger than 2TB. The example below demonstrates how to create a 6TB partition: 1. Use the parted tool to access the partition table of the device: # … Continue reading “Create a disk partition on a disk greater than 2TB in size”

OSCommerce, images not displaying

If images do not display in IE, but they do in firefox, and if the includes/configure.php files are correct, the images are in the /images directory, and the permissions on the /images directory and the images are correct, then, you should go to includes/application_top.php and where it says $request_type = (getenv(‘HTTPS’) == ‘on’) try changing … Continue reading “OSCommerce, images not displaying”

Updating Cpanel Apache Configurations

When changes are made to the httpd.conf on a cPanel server, people don’t update the distiller file normally. So when apache is recompiled, the changes are lost. To avoid this, please be sure that you save the changes to the distiller file by running the following; /usr/local/cpanel/bin/apache_conf_distiller –update –main This will confirm that the changes … Continue reading “Updating Cpanel Apache Configurations”

cPanel Fantastico Installation

SSH to your server and run the following commands from shell: cd /usr/local/cpanel/whostmgr/docroot/cgi wget -N tar -xzvf fantastico_whm_admin.tgz rm -rf fantastico_whm_admin.tgz Now goto WHM -> Plugins -> Fantastico De Luxe WHM Admin Upon loading, Fantastico De Luxe WHM Admin will auto-update your existing installation (if existing). All admin files (masterfiles, tarballs, settings etc) will … Continue reading “cPanel Fantastico Installation”

Checking Rootkits with rkhunter

Rootkits A rootkit is software that is installed on your server with the purpose of hiding the fact that your server has been compromised and providing access to your server so that the intruder can easily return. It is important to understand that in order for an intruder to install a rootkit they will have … Continue reading “Checking Rootkits with rkhunter”

Delete files securely with shred

Deleting a file or reformatting a disk does not destroy your sensitive data. The data can easily be undeleted. That’s a good thing if you accidentally deletes a file, but what if you are trying to destroy secure data? To make sure the data is unrecoverable by anyone, it needs to be overwritten. The shred … Continue reading “Delete files securely with shred”

Using chmod and chown

You can use the chown command to change the associated with a file. For example: # chown root.root test.txt Will change the permissions to root.root. Anyone other than the root user will have to be under the group “root” to access this file. You can also change the permissions for file access with … Continue reading “Using chmod and chown”