Archive for the ‘Uncategorized’ category

Dell Server updating – tool

October 16th, 2017

Simple tool to allow you to run updates on your dell hardware:

https://linux.dell.com/repo/hardware/dsu/

if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

How to reset your zcashd wallet without losing your wallet addresses

August 30th, 2017

If your running into issues restarting/starting zcashd after stopping it, it could be that your installation has been corrupted. This is not a major issue thankfully.

First, just in case, backup your wallet as instructed at the following location.

ZCASH WALLET BACKUP - Official

make a backup of your .zcash folder

sudo cp .zcash .zcash.todaysdate

You shouldn’t need the above, but better safe than sorry.

Next go into the .zcash folder and type:

/bin/rm blocks/ chainstate/ db.log debug.log  fee_estimates.dat -Rf

Once complete, restart zcashd, it will re-download the blocks and you’ll be good to go.

NOTE: Till all the blocks are downloaded the commands

zcash-cli z_gettotalbalance

0 ZEC, don’t panic. Once it’s done downloading, it will show the proper amounts.

Hopefully this saves some people some time.

if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

WordPress Scan script

December 27th, 2016

Good script to scan sites for malicious stuff

https://github.com/gregzem/aibolit/tree/master/tools

if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

Run an command on all virtuozzo containers on a node

December 11th, 2015

The following script will run a command on all containers on a virtuozzo node.

for i in `cat /proc/vz/veinfo | awk '{print $1}'|egrep -v '^0$'`; \
do echo "Container $i"; vzctl exec $i COMMANDTORUNGOESHERE; done
if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz

WordPress site hacked – places to look

May 9th, 2015

I recently had to clean a wordpress installation that got hacked.

I got the warning because I was getting emails saying that

Subject: Cron  echo '' > /var/www/vhosts/domainname/httpdocs/.cache.php
Content-Type: text/plain; charset=ANSI_X3.4-1968
X-Cron-Env: 
X-Cron-Env: 
X-Cron-Env: 
X-Cron-Env: 

/bin/sh: cannot create /var/www/vhosts/domainname/httpdocs/.cache.php: Permission denied

Looking at the issue, I found recently uploaded files by the apache user in the wp-content/ folder (and sub folders). I removed them and verified/changed the permissions on the folder as needed (generally 755) to prevent uploads. Once done, I still got those messages though, every 27 minutes.

This was because the command itself was actually a crontab job that was running. I found it by doing the following:

#su www-data
#crontab -e

I could now see the cron’s being run as the www-data user and there it was. The “su www-data” command makes me that user (i was already root, you might need to add sudo) and crontab -e showed me that users cron jobs.

Once i remove the line calling it, the messages stopped.

This, along with hardening the install (I also installed a wordpress security addon) should keep it safe.

if you found this helpful feel free to donate to:
ZEC: t1NQp1UuqQbmnXzazbLTSreS2AbaZpRBuTM
LTC: LZyNF1qkBUA7XFz83m5xwzGgmmj1owQn9d
BTC: 1PY95KFPTEJTR7f2NnSgaB6xB9pwDJkcJz