Tuning / Tweaking MySQL

There are a couple of good scripts out there that will help you to tune your mysql usage for better perfomance.  I’ve used both of these, and they are very intuative.  Personally, I prefer the latter, however, I still use both for tweaking.

Read More »

How to install RKHunter

I’ve taken on a couple of new servers, so I figured I would share this little tidbit of information.  RKHunter stands for root kit hunter, which will scan your system for nasty root kits.  A quote from the site: Rootkit scanner is scanning tool to ensure you for about 99.9%* you’re clean of nasty tools. […]

Read More »

How to virus scan FTP uploads

To help protect your server, you may want to scan your users FTP uploads.  Here is a great way of doing this, if you are using Pure-FTP and ClamAV.  Pure-FTP has an option to run a file after an upload, called the pure-uploadscript.  What you do, is tie the virus scanner into this script, so […]

Read More »

Server Admininstration

Just wanted to let everyone know that I am open to doing some small server adminstration jobs if anyone has a need.  Looking for something to pass the time :-) Most of my work has been on RHEL/Centos, though I have worked with other systems. If you need a hand setting up your new server, […]

Read More »

More SSH security

For added security, I modified the .bashrc profile for any users that may have shell access, and added the following, so that when the user logs in, it sends out an email, letting you know that someone has logged in. echo ‘ALERT – Root Shell Access (YourserverName) on:’ `date` `who` | mail -s “Alert: Root […]

Read More »

Adding a new user to your system

If you need to add a new user to your systemm just run the following commands: useradd username That will create a new user, and a new group, for the ‘username’ that you placed in there.  Now, to change the password for that user, run this: passwd username The system will ask you to input […]

Read More »

SSH Security

There are many things one can do to help keep your ssh access secure on a shared hosting enviroment.  Grab your client (putty links can be found on the software page), log in, and lets go! The first one, don’t allow it!  Pretty simple huh?  In a shared hosting environment, there are very few reasons […]

Read More »