Webmin Server Status will monitor your critical webserver components and will alert you by email or SMS. A great feature that you should consider using.
Overview of the Webmin Monitoring Tools Settings
By default the root account automatically have SSH access remotely. After installing CentOS and the SSH server, open any SSH client and attempt to sign on as root. Access will be granted.
To disable that, open SSH configuration file using the commands below.
sudo vi /etc/ssh/sshd_config
Then change the line as shown below :
#Authentication:
#LoginGranceTime 2m
PermitRootLogin no
#StrictMode yes
#MaxAuthTries 6
#MaxSessions 10
Change the highlighted line above by removing the # symbol. It should be like this:
PermitRootLogin no
Save the file and restart the SSH server by running the commands below.
sudo systemctl restart sshd.service
Now try logging in as root and you’ll be denied or access won’t be granted.
To re-enable the root account, just put the # symbol for the PermitRootLogin directive in the file and save it. The restart SSH server.
Another thing to remember is that SSH traffic blocked on the firewall by default. You won’t be able to access the SSH server remotely by default.
You must enable SSH through the firewall. To do that in CentOS 7, run the commands below.
firewall-cmd --permanent --zone=public --add-service=ssh
Then reload the firewall to connect.
firewall-cmd –reload
That’s it!
Enjoy!
Some unexpected behaviour on a Linux server could be a result of malware infection, while other malicious software might not alert to their presence. Scanning your system for different types of unwanted programs can help identify issues, or at least give you the peace of mind for having a clean server.
There are multiple options for making sure your cloud server is clean of any malware, this guide goes over a couple of scanning software you can utilise for checking your system.
ClamAV
ClamAV is a popular open source antivirus engine available on multitude of platforms including the majority of Linux distributions. Install it on CentOS 7 with the following command
sudo yum install clamav clamav-update clamav-scanner-systemd clamav-server-systemd
Afterwards you’ll need to edit the configuration a little by commenting out the Example text from two files, the simplest way to do so is to use sed for some fast editing with the these commands
sudo sed -i -e "s/^Example/#Example/" /etc/freshclam.conf sudo sed -i -e "s/^Example/#Example/" /etc/clamd.d/scan.conf
With the required modules installed and configured, next you should update the virus database for ClamAV by running the updater application with
sudo freshclam
When you’ve finished updating the virus definitions, do a test scan to your home directory just to make sure the scanning works as it should, use the following command
sudo clamscan -r /home
Granted that your home directory didn’t contain any viruses or other type of malware, the scan should come back empty.
So how do you know it works?
For this, you can download an anti-virus test file, which is a small completely harmless program that most anti-virus software report as infected, though with an obvious test file name EICAR-AV-Test. Use the following command to download the test file to your home directory.
wget -P ~/ http://www.eicar.org/download/eicar.com
Now scan your home folder again with the same command as above, you should receive notice of one infected file at the end summary after the scan is completed. When you’ve confirmed that ClamAV finds the test file correctly, use the command below to scan it again and remove the infected file once found.
sudo clamscan --infected --remove --recursive /home
Be careful when using the –remove parameter. First run a broader scans without it, and then more localized scan when removing files, or remove them manually.
To perform a complete scan of your cloud server, use the this command
sudo clamscan --infected --recursive --exclude-dir="^/sys" /
The scan goes through each directory in your system root recursively, but skips /sys just to avoid unnecessary warning printouts, as the virtual file system consists of some unreadable files, which could not contain viruses anyway.
Rkhunter is a common options for scanning your system for rootkits and general vulnerabilities. It can be easily installed from the package manager on CentOS using the following command:
sudo yum install rkhunter
Once installed and before scanning you’ll need to update the file properties database with:
sudo rkhunter --propupd
This lets the scanner to know the current state of certain files to prevent some false alarms. After the update, simply run the scanner with the following:
sudo rkhunter --checkall
The scanner goes through some system commands, checks for actual rootkits and some malware, network and local host settings, and then gives you the summary as well as recording the findings to a log file.
Afterwards you can get a condensed look at the scan log with this command:
sudo cat /var/log/rkhunter/rkhunter.log | grep -i warning
Go through the output to get some tips on what you could do to improve your system security.
Slack is…
Channels
Organize your team conversations in open channels. Make a channel for a project, a topic, a team, or anything—everyone has a transparent view of all that’s going on.
Private Channels
For sensitive information, create private channels and invite a few team members. No one else can see or join your private channels.
Direct Messages
To reach a colleague directly, send them a Direct Message. It’s completely private and secure.
Drag, drop, and share your files
Not just your messages, but all your files, images, PDFs, documents, and spreadsheets can be dropped right into Slack and shared with anyone you want. Add comments, star for later reference, and it’s all completely searchable.
If you use any services like Google Drive, Dropbox, or Box, just paste the link and that document is immediately in sync and searchable too.
All your tools in one place
Connect all the tools you use to Slack and avoid all that constant switching between apps. Set up your integration so that you get all your notifications directly within Slack—from support requests, code check-ins, and error logs to sales leads—all of them searchable in one central archive.
Search your entire archive
Everything in Slack—messages, notifications, files, and all—is automatically indexed and archived so that you can have it at your fingertips whenever you want. Slack also indexes the content of every file so you can search within PDFs, Word documents, Google docs, and more. With one search box and a set of powerful search operators, you can slice and dice your way to that one message in your communication haystack.
To the Moon!
Very useful tool to have! Work perfectly on Opencart version 2.1.0.2
I was at a friend network farm today!
Installation
1. Upload tesla-login-customizer to the /wp-content/plugins/ directory
2. Activate the plugin through the ‘Plugins’ menu in WordPress
3. Enable one of our Login Templates or easily make one of yours by changing options
4. Enjoy your custom login page
Add Free WordPress Live Chat with Pure Chat!
With more and more business being conducted online, with mobile, or at work, you need a way to deliver a great client experience no matter where your client is.
A great website is a good start, but how do you provide great customer service with just a website? Interaction with clients is key to good customer service, and only using email does not provide that interaction. Customers want a human being to answer their questions, solve their problems, or help them make a buying decision.
Live chat delivers that interaction. That means 5 star reviews, more sales, more recommendations, and repeat business. Here, I am going to show you how to add free WordPress live chat to any WordPress website, easily, and for free with Pure Chat plugin.
Compatible for mobile phone!