Log into SSH on your dedicated or cloud server.
# vi named.conf
Make sure following settings exists under Options { … } settings:
InetServices offers both Windows and Linux bare metal server hosting, and cloud server hosting for any small to medium size business. We also offer both PCI and HIPAA Compliant servers allowing you to achieve PCI or HIPAA Compliance without all the worries of figuring it out. InetServices offers much more than just dedicated servers and cloud servers, we offer you a complete solution to your hosting needs including Big Data, Disaster Recovery, and High Availability services.
Log into SSH on your dedicated or cloud server.
# vi named.conf
Make sure following settings exists under Options { … } settings:
All major system log files are located in the /var/log directory in Centos Linux. Below is a list of the standard log files that are located on a clean Centos install along with a short description.
Log into SSH on your dedicated or cloud server.
You can edit the sshd_config file located in /etc/ssh/.
# vi /etc/ssh/sshd_config
If you have repaired your system from a backup, or have installed another OS that may have overwritten the master boot record (MBR), you will need to repair the bootstrap area.
Re-install bootstrap code (GRUB)
Log into your dedicated or cloud server via SSH.
##Edit /etc/sysconfig/network and set “NETWORKING_IPV6” to “no”
##For 5.4 and later, replace in /etc/modprobe.conf
alias ipv6 off
The common philosophy with respect to system memory is that unused memory is wasted. Most operating systems, including both Windows and Linux maintain what’s called a memory “cache.” Technically this memory space is in use, however it is designed to be freed immediately if applications actually need the memory.
Samba and Samba Client
Samba allows both CentOS resources to be shared with Windows systems and Windows resources to be shared with CentOS systems. CentOS accesses Windows resources using a package named samba-client.
chkrootkit is a collection of tools to detect the presence of rootkits. chkrootkit uses C and shell scripts to perform a detailed process check, and scans systems binaries to detect kit signatures. Upon detection, in most cases, it can remove rootkits too.
Login as root user on your dedicated or cloud server.
Enter the following three commands to disable firewall.
1. # /etc/init.d/mysqld stop
2. Start MySQL server without password:
# mysqld_safe –skip-grant-tables &