Proxmox upgrade from 3.x to 5.x (Debian wheezy to jessie)

Proxmox Virtual Environment (PVE) is an open source server virtualization management solution based on QEMU/KVM and LXC. You can manage virtual machines, containers, highly available clusters, storage and networks with an integrated, easy-to-use web interface or via CLI. Proxmox VE code is licensed under the GNU Affero General Public License, version 3. The project is developed and maintained by Proxmox Server Solutions GmbH.

Continue reading “Proxmox upgrade from 3.x to 5.x (Debian wheezy to jessie)”

The HTTP Authentication header is missing

The HTTP Authorization request header contains the credentials to authenticate a user agent with a server, usually after the server has responded with a 401 Unauthorized status and the WWW-Authenticate header.

If you are using Apache2, you may notice that the HTTP_AUTHORIZATION is missing from the list of variables sent to you. This is because Apache2 decides to not send clear passwords (even if base64 encoded) across processes.

Continue reading “The HTTP Authentication header is missing”

How to install OpenLiteSpeed and PHP 7.3 / 7.2 / 7.1 / 7.0 from LiteSpeed repositories on Debian 9 (stretch) / 8 (jessie)

We are going to install OpenLiteSpeed on Debian 9 (stretch) / 8 (jessie) server from LiteSpeed repository. OpenLiteSpeed is the open source edition of LiteSpeed Web Server Enterprise. Both servers are actively developed and maintained by the same team, and are held to the same high-quality coding standard. OpenLiteSpeed contains all of the essential features found in LiteSpeed Enterprise, and represents our commitment to support the Open Source community. It is recommended to use CentOS 7 / 6 for OpenLiteSpeed for stability.

Continue reading “How to install OpenLiteSpeed and PHP 7.3 / 7.2 / 7.1 / 7.0 from LiteSpeed repositories on Debian 9 (stretch) / 8 (jessie)”

How to install OpenLiteSpeed and PHP 7.3 / 7.2 / 7.1 / 7.0 / 5.6 from LiteSpeed repositories on CentOS 7 / 6

We are going to install OpenLiteSpeed on CentOS 7 / 6 server from LiteSpeed repository. OpenLiteSpeed is the open source edition of LiteSpeed Web Server Enterprise. Both servers are actively developed and maintained by the same team, and are held to the same high-quality coding standard. OpenLiteSpeed contains all of the essential features found in LiteSpeed Enterprise, and represents our commitment to support the Open Source community. It is recommended to use CentOS 7 / 6 for OpenLiteSpeed for stability.

Continue reading “How to install OpenLiteSpeed and PHP 7.3 / 7.2 / 7.1 / 7.0 / 5.6 from LiteSpeed repositories on CentOS 7 / 6”

DirectAdmin 1.57.3 has been released

Hello,

DirectAdmin pleased to announce the release of DirectAdmin 1.57.3.

All Changes:
directadmin.com/versions.php?version=1.573

New Features:

Bugs / Security:

Source: DirectAdmin

Our new partner “Hostinger.lt”

We have a new partner “Hostinger.lt”.

Hostinger International, Ltd. is an employee-owned web hosting provider and Internet domain registrar. Established in 2004, Hostinger now has over 29 million users, collectively with its subsidiaries in 178 countries. The company uses cloud web hosting technology and provides hosting with MySQL, FTP and PHP. Hostinger is a parent company of 000Webhost, Niagahoster and Weblink.

If you want to get 15% a discount on a new server, please contact me.

How to install Samsung SCX-4623FW unified printer driver on Ubuntu 19.04

Step 1: Download Samsung SCX-4623FW linux driver

Samsung SCX-4623FW Linux Driver Details
OS: LINUX
Size: 14.66 MB, GZ
Language: MULTI LANGUAGE
Version : V1.00.36_00.91

Download

Run command:

cd /tmp
wget http://downloadcenter.samsung.com/content/DR/201510/20151027164600281/uld_v1.00.36_00.91.tar.gz

Step 2: Extract archive

Run command:

tar xzfv uld_v1.00.36_00.91.tar.gz

Step 3: Install drivers

Run command:

cd uld/
sudo sh ./install.sh

For network Samsung scanners, put your scanner’s IP address and optionally port anywhere in the file /etc/sane.d/xerox_mfp.conf:

tcp host_address [port] 

Step 4: Reboot your computer

Run command:

reboot

Critical root vulnerability on server [CVE-2019-10149 Exim <4.92]

Today I received an email from Linux Malware Detect Software on the vulnerability of my server and would like to share with you how to resolve this issue. Below is the content an email.

Important security notice,
The Linux Malware Detect installation running on server has
detected that you may be vulnerable to a critical remote code execution
vulnerability. The currently installed version of Exim MTA v4 improperly
validates recipient addresses and can allow malicious code execution to
take place. This may provide a path for malicious actors to gain root
access, remotely, to this system. This vulnerability currently has known
exploits circulating with both targeted and automated compromises taking
place against vulnerable systems.

Please upgrade Exim to version 4.92 or a known patched earlier version
immediately. Alternatively, if upgrading is not an immediate option,
consider disabling the Exim MTA service as soon as possible.

Disable Exim:

touch /etc/eximdisable
service exim stop
systemctl disable exim
chkconfig exim off

Upgrade Exim:
1. DirectAdmin:

cd /usr/local/directadmin/custombuild
./build update
./build set exim yes
./build set eximconf yes
./build update
./build exim
./build exim_conf

2. cPanel https://documentation.cpanel.net/display/CKB/CVE-2019-10149+Exim

RedHat / CentOS
https://pkgs.org/download/exim

Further reading:
https://blog.cpanel.com/exim-cve-2019-10149-protect-yourself/
https://documentation.cpanel.net/display/CKB/CVE-2019-10149+Exim
https://www.exim.org/static/doc/security/CVE-2019-10149.txt
https://access.redhat.com/security/cve/cve-2019-10149