Monthly Archives: May 2009

­
29 05, 2009

How to disable IPv6

By |May 29th, 2009|Tips n Tricks|2 Comments

Both Red Hat Enterprise Linux 4 and 5 enable Internet Protocol Version 6 (IPv6) by default. Some users do not find it worth using, if that's the case with you then you can always disable the same. How to disable: ====================== To disable IPv6 support in RHEL 4, remove the following line, if it exists, [...]

23 05, 2009

DNS Terms you need to know

By |May 23rd, 2009|Articles|0 Comments

During my beginning years of System Administration, I was pretty much confused by the terms 'primary nameserver', 'secondary nameserver', 'master/slave nameserver' etc. Different websites have different views on these terms. I am sure many system admins (even experienced ones) have got their ideas wrong about these terms. My confusion ended the day I stumbled upon [...]

23 05, 2009

Chkrootkit Installation Guide

By |May 23rd, 2009|How to Install|0 Comments

chkrootkit (Check Rootkit) is a common Unix based program intented to help system administrators check their system for known rootkits. It is basically a shell script using common UNIX/Linux tools like strings and grep commands to check core system programs for signatures. If you doubt that your server has been hacked, chkrootkit is what you [...]

23 05, 2009

How to close Open DNS

By |May 23rd, 2009|Tips n Tricks|2 Comments

This tutorial describes how to close an Open DNS server. An Open DNS server allows anyone to use that server as a DNS lookup server. This is a potential threat and such access must either be blocked, or restricted to a few trusted IPs. This is how it is done. 1. Make a list of [...]

23 05, 2009

Ioncube Installation Guide

By |May 23rd, 2009|How to Install|5 Comments

This article describes how to install ionCube loader extension in PHP. ionCube provides tools for PHP source code protection. Usually, a PHP file is in plain-text format. Which means anyone who has access to the actual PHP file can use a text editor (like vim) to view the source code. If a skilled hacker/programmer gets [...]

Load More Posts