Information on CVE-2015-0235 (GHOST) Vulnerability for Red Hat and CentOS
A vulnerability found in the glibc library, specifically a flaw affecting the gethostbyname() and gethostbyname2() function calls, that allows a remote attacker to potentially execute arbitrary code. CentOS 5, CentOS 6, and CentOS 7 are potentially affected, thus we want...
How to Check the glibc (GNU libc) Version on CentOS 6 and CentOS 7
Pre-Flight Check These instructions are intended specifically for checking the installed version of glibc. Iâll be working from a Liquid Web Core Managed CentOS 6 and CentOS 7 server, and Iâll be logged in as root. Using ldd ldd --version...
How To Update the glibc (GNU libc) in CentOS / Red Hat
Updating glibc on Red Hat Linux or CentOS Linux is a very simple process. Most commonly you will use the following command in the case of a security vulnerability, or perhaps just to verify that youâre running the most up-to-date...
How to Generate/Download a Full Backup
A full cPanel backup makes a copy of all of your files, email, databases, etc. Once initiated, you must allow the backup time to perform. The server can send you an email to an address you specify once the backup...
Every Mac Is Vulnerable to the Shellshock Bash Exploit: Here’s How to Patch OS X
Heartbleed, move over. There’s a new bug in town, and this time it’s also affecting Mac and Linux computers. It’s called Shellshock (its original official title is CVE-2014-6271), and it’s currently got a 10 out of 10 severity rating over...
How To use an SPF Record to Prevent Spoofing & Improve E-mail Reliability
Introduction A carefully tailored SPF record will reduce the likelihood of your domain name getting fraudulently spoofed and keep your messages from getting flagged as spam before they reach your recipients. Email spoofing is the creation of email messages with...
What is CloudLinux?
Reaching a high level of stability can be difficult, sometimes unachievable, for many shared hosting companies. Sudden resource usage spikes, increases in traffic, and hacker attacks are some of the problems system administrators cope with every day. For years, this...
Recent ICANN changes â WHOIS Verification Requirements
Just read that starting January 1, 2014, domain registrars will be required to send out emails to verify registration of a domain and if you donât respond to the verification email, you could end up having your website becoming non-functional...
How To Set File Attributes In Linux Using Chattr Command
Chattr is a command used to set / unset file attributes in Linux. Using chattr it is possible to make a file immutable. That is, even a root user will be prohibited from deleting the file.The trick lies in setting the appropriate...
How to fix “exim dead but subsys locked” issue
If you come across the issue “exim dead but subsys locked”. Please try following steps. root@server [/]# /etc/init.d/exim status exim dead but subsys locked If you see this error check for a file named eximdisable in /etc/ If you found the file then...