I'm writing this on the behalf of our remote administration team, Rackloop. We are a small group of friends working as a Freelancers in Server Security and Linux Server Administrator for past few years. We have been hosting companies and Data centers as a Technical Support Engineer / Team Leader. Our team includes experts with bachelor degree in Computer Science Engineering and MSc Computer Networking with RHCE certification. Currently, we have our techies working in India and UK providing remote support.
Let us give you a basic idea of what we do. A few among the many tasks that we perform are:
Installation, configuration and fine tuning of Apache, Exim, FTP, DNS, mySQL
Installation and configuration of PHP and Perl on the server.
Installation and configuration of extra PHP modules and plugins like IonCube loader, Zend Optimizer etc
Installation and configuration of additional WHM plugins like WHMXtra, RVSkin Manager and RVSite Builder etc
If your server is a target of DDOS attacks or Spam attacks (inbound and outbound) or Brute force attacks, and don't know how to tackle them, then I am the guy you are looking for.
These type of attacks mentioned above can easily cause the server load to rise to such an extend that it goes down. In general, a server once online remains online until there occur a network or hardware failure, or till the sys admin restarts it. If you find yourself submitting reboot tickets with the NOC every other day, then maybe you should harden the server. Here are the things I could help you with:
Installation, configuration and fine tuning of APF, BDF and CSF to prevent DDOS attacks
Install and configure PRM to check load spikes and kill unwanted processes automatically
Configure exim to trace spammers on your server
Create and install shell scripts that automatically delete unwanted mails from the mail queue every hour
Configure exim to reject mails from IPs that are listed in common RBLs. This could reduce a lot of incoming spam issues on the server
Install and configure Apache modules like mod_security, mod_throttle, mod_bandwidth and many more (whichever required) to stop Cross scripting attacks and Remote file inclusion attacks
Fine tuning of FTP and DNS servers
Has your server been hacked recently?? How did he get in? Is the server still vulnerable? Are you receiving abuse reports originating from your server? Well, I may help you with all these:
Tweak built-in Linux parameters to increase security
Search for vulnerable files and directories on the server
Search for common hacker installed shell scripts like c99 and r57
Search and find suspicious processes and ports open on the server
Install and run Rootkit hunters like chkrootkit, rkhunter etc to look for compromised binaries
Nowadays we could find so many websites affected with iframe scripts/codes. These are mainly caused due to the vulnerability in servers. I can clean all the injected iframe scripts from all files of your account using some custom scripts and also make the server more secure and stable :-)
We would be pleased to help you out with your server related issues.
If you have any ticketing system and would like me to support your clients, please let me know. I am also available to look after your helpdesk/ticketing systems :-)
You can contact me via email (email@example.com). Please let me know if you are interested.
Hope to hear from you soon.
Practical Task Scheduling Deployment
July 20, 2016 12:00 pm CDT
One of the best things about the UNIX environment (aside from being stable and efficient) is the vast array of software tools available to help you do your job. Traditionally, a UNIX tool does only one thing, but does that one thing very well. For example, grep is very easy to use and can search vast amounts of data quickly. The find tool can find a particular file or files based on all kinds of criteria. It's pretty easy to string these tools together to build even more powerful tools, such as a tool that finds all of the .log files in the /home directory and searches each one for a particular entry. This erector-set mentality allows UNIX system administrators to seem to always have the right tool for the job.
Cron traditionally has been considered another such a tool for job scheduling, but is it enough? This webinar considers that very question. The first part builds on a previous Geek Guide, Beyond Cron, and briefly describes how to know when it might be time to consider upgrading your job scheduling infrastructure. The second part presents an actual planning and implementation framework.
Join Linux Journal's Mike Diehl and Pat Cameron of Help Systems.
Free to Linux Journal readers.Register Now!
- SUSE LLC's SUSE Manager
- My +1 Sword of Productivity
- Murat Yener and Onur Dundar's Expert Android Studio (Wrox)
- Managing Linux Using Puppet
- Non-Linux FOSS: Caffeine!
- SuperTuxKart 0.9.2 Released
- Doing for User Space What We Did for Kernel Space
- Parsing an RSS News Feed with a Bash Script
- Google's SwiftShader Released
- Rogue Wave Software's Zend Server
With all the industry talk about the benefits of Linux on Power and all the performance advantages offered by its open architecture, you may be considering a move in that direction. If you are thinking about analytics, big data and cloud computing, you would be right to evaluate Power. The idea of using commodity x86 hardware and replacing it every three years is an outdated cost model. It doesn’t consider the total cost of ownership, and it doesn’t consider the advantage of real processing power, high-availability and multithreading like a demon.
This ebook takes a look at some of the practical applications of the Linux on Power platform and ways you might bring all the performance power of this open architecture to bear for your organization. There are no smoke and mirrors here—just hard, cold, empirical evidence provided by independent sources. I also consider some innovative ways Linux on Power will be used in the future.Get the Guide