This is how
php_flag display_startup_errors on
php_flag display_errors on
php_flag html_errors on
php_flag log_errors on
php_value error_log /home/path/to/domain/PHP_errors.log
This is how
php_flag display_startup_errors on
php_flag display_errors on
php_flag html_errors on
php_flag log_errors on
php_value error_log /home/path/to/domain/PHP_errors.log
When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it.
Tails is a kind of computer-in-a-box. You install it on a DVD or USB drive, boot up the computer from the drive and, voila, you’re pretty close to anonymous on the internet. At its heart, Tails is a version of the Linux operating system optimized for anonymity. It comes with several privacy and encryption tools, most notably Tor, an application that anonymizes a user’s internet traffic by routing it through a network of computers run by volunteers around the world.
Read more at: http://www.wired.com/2014/04/tails/
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:
Witsbits enables you to set up your servers with virtualization and deploy virtual machines faster than ever before. It’s a complete virtualization solution with a self-upgrading hypervisor and cloud-based centralized management, reducing time spent on maintenance to a fraction of what other solutions require. The self-configuring hypervisor comes as a Live CD, delivering the fastest time-to-deployment by removing the need for spending time on installation and configuration.
Read more at http://www.linux-kvm.org/page/Management_Tools
THE FASTEST PATH TO CLOUD MANAGEMENT
Your bare-metal servers will be ready to host virtual machines within 10 minutes. You will never have to upgrade your servers. You don’t have to install centralized management.
You can use any 64bit x86 PC with 2GB of RAM and a CPU with virtualization extensions (Intel® VT-x or AMD-V™).
Info: Most CPUs has virtualization extensions, for details see Intel‘s and AMD‘s respective lists of virtualization capable processors.
Info: You may successfully use a CPU that lacks virtualization extensions with Witsbits to host Linux VMs. It will work, but with reduced performance. Windows VMs will however not work without enabled virtualization extensions.
For local storage devices you need a hard drive of at least 20GB. Alternatively you may use NFS for completely diskless servers. Or any combination of the two.
The following network ports are required to be open in firewall for outgoing traffic: 443/TCP and 873/TCP.
$path = $filename;
$ext = pathinfo($path, PATHINFO_EXTENSION);
You will get, for example .jpg
All the awesome wrapped up into a one hour superdemo
If you are getting this erros – probably from a script on cron – that is trying to call sendmail, you need to write the full path to it.
Probably
/usr/lib/sendmail
This is the little sh that i’m using to send cronjobed emails.
( echo "From: root@localhost"; echo "To: [email protected]"; echo "Subject: Title"; echo "Content-Type: text/html"; echo "MIME-Version: 1.0"; echo ""; echo "Hello,<br /><br />"; echo "This is our text!"; ) | /usr/lib/sendmail -t
This will list you the IPs connected to port 80.
netstat -tn 2>/dev/null | grep :80 | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -nr | head
Read detailed instructions of it in http://www.mkyong.com/linux/list-all-ip-addresses-connected-to-your-server/
Patching affected systems to OpenSSL 1.0.1g
Revocation of the old keypairs that were just supersceded
Changing all passwords
Invalidating all session keys and cookies
Evaluating the actual content handled by the vulnerable servers that could have been leaked, and reacting accordingly.
Evaluating any other information that could have been revealed, like memory addresses and security measures
“Leaked secret keys allows the attacker to decrypt any past and future traffic”
http://heartbleed.com/