How to find out the spam mailing script’s location – Exim

The Exim mail server has a lot of options/commands to find out the details of spammers easily from the command line. We can find out the mail queue details, spam mail sender details, spam mail counts etc from the link I mentioned above. Here is a script/piped-command to find out the spam mailing script’s location/folder in the server. It would …

Read More »

Linux: Tarball Delete ( remove ) File

How do I delete or remove a single file from within a tar ball under Linux operating systems? You can use the following syntax to delete a file from a tar ball:   tar --delete -f example.tar filename Example: Delete a File From a Tar Ball First, create a tar ball for testing purpose using the tar command, enter: # cd …

Read More »

Install Memcache onto cPanel running CentOS

Memcached is a service that allows entire database tables to be stored in memory, drastically speeding up queries to those tables and alleviating database load. In WordPress and W3 Total Cache, the Memcached module allows you to store all cache tables in memory. This guide can be used to set up Memcached on CentOS. Install memcached through RPM The easiest way to install …

Read More »

Linux: Finding and Locating files with find command part # 1

Many newcomers find it difficult use the find command at shell prompt under Linux. Find is nifty tool on remote server where UNIX admin can find out lot of information too. Find command can perform a search based on a variety of search constraints. It searches through one or more directory tree(s) of a filesystem, locating files based on some user-specified criteria. …

Read More »

How To Monitor Remote Linux Host using Nagios

In the previous post How to install Nagios on CentOS 5 or 6 , I explained the overview, installation and configuration of Nagios 3.0 on a CentOS Server. In the following three chapters, I’ll explain how to monitor a remote Linux host and the various services running on the remote host.  Also, please refer to all our Nagios articles. I. Overview II. 6 …

Read More »

Open SSL Heartbleed vulnerability – A complete check and fix

In this time, we all are aware about the new Open SSL Heartbleed vulnerability. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. You will get more details from this link Heartbleed. The open SSL version 1.0.1 version has vulnerabilities except 1.0.1g and other versions. Different communities …

Read More »