Plesk External component has thrown an exception


Cheap reseller Hosting


Following error can come in plesk control panel while setting up/updating physical hosting for a domain in the plesk control panel…
——————
External component has thrown an exception.
In IIS7NativeProvider module
Exception type: System.Runtime.InteropServices.SEHException
at _CxxThrowException(Void* , _s__ThrowInfo* )
at ServerManagerFactory.getHttpRedirectSection(String location)
at IIS7ServerManager.getSitesInfo(IIS7ServerManager* , list:allocator >* sitesInfo)
—————–
Here is the quick workaround :
Open IIS, expand sites.
In my case, I found an entry “SITE_*****” under sites which was stopped. I was not able to delete it directly from IIS. I used the following command to remove the entry from IIS.
——————-
C:\> cd %systemroot%\System32\inetsrv
C:\Windows\System32\inetsrv>APPCMD delete site SITE_*****
SITE object “SITE_*****” deleted
——————-
You need to restart the IIS.
If you still find the entry “SITE_*****” under sties in IIS, then you need to manually delete the respective entries from the applicationhost.config file.
Note : It is highly recommended to take the backup of applicationhost.config file before making any changes. You can also copy the entire “inetserv” folder as a backup.

Cheap web Hosting


Inbound spam to domain/email users


Cheap reseller Hosting


Inbound spam is the scourge of the modern internet and, the inconvenience to users aside, can cause serious performance and resource issues on the server. These can affect both the server overall and the timely deliver of clean email in particular.
The best way to tackle inbound spam is at the entry point into the server – the MTA, i.e. exim the SMTP server of choice for cPanel. By blocking spam before it has even entered the server you save both on server resources used when delivering the email in addition to 3rd party tools to help detect spam further along the email relay process.
To do this you need to do work at the RCPT stage of the SMTP protocol. This occurs during the transaction between the sender and recipient SMTP servers and comes before the actual body of an email arrives on a server. The primary form of spam attack is the Dictionary Attack:
A common technique for spammers to use is what is known as a dictionary attack on a domain. A dictionary attack, in our context, is a single SMTP connection that attempts to send email from a spam source to a random set of names on our domain, e.g. bob@ourdomain.com fred@ourdomain.com harry@ourdomain.com, in the hope that one of the many hundreds that we try will get a hit and deliver our spam.
This technique is used by spammers mainly because most people don’t advertise their email addresses (due to spam!) and they want to access this untapped market.
To prevent this type of spam getting through, it is essential that you do not use the Default Address (catchall) feature within cPanel to receive emails wherever possible. You should always setup specific Forwarders (aliases) for any email addresses you use and set the Default Address to :fail: for each domain.
By using :fail: exim will automatically reject email at the SMTP RCPT stage and make dictionary attacks redundant. Additionally, you can use exim ACLs to block such spammers who repeatedly perform dictionary attacks to further relieve the server of the load from dealing with them
Another preventative measure is to enable the WHM options:
WHM > Exim Configuration Editor > Verify the existance of email senders.
WHM > Exim Configuration Editor > Use callouts to verify the existance of email senders.
These two options have exim check that any server that attempts to relay email to your server can actually receive email in reply. This is part of the RFC requirements of an SMTP server and the inability of a server to do so indicates a likely spammer.
There are numerous other checks that you can also perform at the SMTP RCPT stage in exim ACLs. Examples are using RBL checks to reject email from IP addresses that originate from IP addresses that are know to harbour spammers, e.g.:
deny message = Message rejected – $sender_fullhost is in an RBL, see $dnslist_text
!hosts = +relay_hosts
!authenticated = *
dnslists = bl.spamcop.net : sbl-xbl.spamhaus.org
You can also check the format of email headers to ensure that they’re RFC compliant, which many spam servers are not. A typical example is checking the SMTP HELO/EHLO protocol command to ensure it’s correctly structured, e.g.:
deny message = HELO/EHLO set to my IP address
condition = ${if match {$sender_helo_name}{11.22.33.44} {yes}{no}}
(where 11.22.33.44 is your servers main IP address)
deny message = EHLO/HELO does not contain a dotted address
condition = ${if match{$sender_helo_name}{\\.}{no}{yes}}
Finally, once the email has passed through these hoops, you can implement a 3rd party application to scan emails and tag them as likely spam. cPanel has an inbuilt solution that uses SpamAssassin to score email likely to be spam. You can then have such emails filtered to a special account or the client can filter such emails based on the email header record modifications made by SpamAssassin.
An alternative is to use a more thorough tool such as MailScanner which can be very effective at scoring spam emails.

Cheap web Hosting


Access denied for user ‘mailwatch’@’localhost’ (using password: YES)


Cheap reseller Hosting


In MailWatch I am getting MySQL Errors such as “Could not connect to database: Access denied for user ‘mailwatch’@’localhost’ (using password: YES)”. How can I fix it?
perl /usr/local/cpanel/whostmgr/docroot/cgi/mailwatch/install/mwadd.pl

Above command should fix your issue.

Cheap web Hosting


WordPress showing Blank page !!


Cheap reseller Hosting


If WordPress Permalink shows blankpage, do below
[root@server1 ~]# vi /wp-admin/includes/misc.php and change the line as indicated below

Search for function got_mod_rewrite
and replace below like in it .

From
$got_rewrite = apache_mod_loaded(‘mod_rewrite’, true); //old line with false negative;
To
$got_rewrite = true;//force the response to true as we know mod_rewite is installed

Cheap web Hosting


enable or disable mod_security for particulate account[error for mod_security, access denied with error code 403]


Cheap reseller Hosting


=====================================================
If you are receiving the error for mod_security, access denied with error code 403 when you check
the error logs for any account. You can disable the mod_security for that account by adding a
=====================================================
simple code in his .htaccess
==================
SecFilterEngine Off
SecFilterScanPOST Off
==========================
And to enable just remove these two line from .htaccess.
============================================
OR
============================================
=====================================================
Disable Mod_Security for any User Domain :
=====================================================
Go to :
pico /usr/local/apache/conf/modsec2.conf
and add following lines within file :
=====================================================
SecRule SERVER_NAME “yourdomain.com” phase:1,nolog,allow,ctl:ruleEngine=off
=====================================================
NOte:Replace yourdomain.com with the actual Domain name
=====================================================

Cheap web Hosting


How to enable register_globals for a single website without putting an entire server security at risk?


Cheap reseller Hosting



How to enable register_globals for a single website without putting an entire server security at risk?


* Go to your control panel and then click on File manager.
* In your file manager, enter the public_html folder.
* In the public_html folder you will see a file called .htaccess.
* Select  the .htaccess  file and click on edit in the upper right hand corner.
* Copy and paste the text line shown below at the bottom of .htaccess file and then save it:
php_value register_globals 1
This will turn your register_globals on and your script will work properly. Why is register_globals
disabled in the first place? Leaving register_globals turned on poses a security risk for an entire web
server. It should therefore only be enable on a case by case situation and only per website.

Cheap web Hosting


cPanel backend configuration files and Log Files Paths


Cheap reseller Hosting


cPanel backend configuration files and log files paths
=======================================
/var/cpanel
=======================================
accounting.log – Contains a list of accounting functions performed such as account removal and creation
cpanel.config – Tweak settings for whm can be done in this file
mainip – Main ip of the server is specified in this file
maxemail – Maximum emails per hour for a domain can be specified here The format is like the following domainname=number
Run the script /scripts/build_maxemails_config after editing this file This will create a file named after the corresponding domain name inside the directory maxemailsperdomain with the value specified in it.
Maxemailsperhour – Server wide maximum emails per hour can be set in this file. It applies to the whole domains in the server. You only need to insert the corresponding value in the file. A value of zero means unlimited.
Resellers-nameservers – This file gives you the name of the nameservers used by reseller users
resellers – This file lists the privileges of different reseller users
=======================================
packages/ – This directory contains files for all the packages created under the WHM and the corresponding files will give all the details related to that package
=======================================
suspended/ – This directory contains files for all the suspended users. You can get the
reason for suspension from the corresponding user file.
=======================================
Users/ – This directory contains cpanel user files which contain all the information
related to a cpanel account.
=======================================
Zonetemplates/ – This directory contains templates for zone files, which will be used for creating zone file for a particular domain when a user is created
=======================================
bandwidth/ – This directory contains files named after the domain names which give separate http and all bandwidth usages for a particular day
=======================================
datastore/ – This directory contains sub directories named after the cpanel user name which contains two files named mysql-db-count and mysql-disk-usage .These files give you the number of databases a user have and the total disk space used by all these databases respectively.
=======================================
/etc
=======================================
localdomains – This file contains domains which are using the local mail server.
remotedomains – This file contains domains which are using a remote mail server instead of the local mail server
userdomains – All the domains of users are listed in this file including the addon, parked and subdomains along with their username.
trueuserdomains – The main domains of all cpanel uesrs are listed in this file along with their username
trueuserowners – All cpanel users along with their owners are listed in this file
wwwacct.conf – This is the default file used in cpanel account creation Information from this file is taken when an account is created
mailips – The ip which should be used for sending mails can be specified in this file Different ips can be set for different domains for sending mails and that can be specified in the file like the following domainname: ip address
ips – This file lists all the ips in the file except the main shared ip
ips.dnsmaster – This file lists all the ips of nameservers used by different domains
ipaddrpool – Lists the ip addresses in the server which are free
cpupdate.conf – Cpanel updation configuration can be done in this file Once you edit this file do not forgot to run the script /scripts/upcp
cpbackup.conf – Cpanel backup configuration can be done in this file You can enable or disable cpanel backup using this file.
Valiases/ – Email forwarders and catchall for a domain can be specified in the corresponding file inside this directory.
The format is like the following *: accountname
vfilters – Email filters can be specified in the corresponding file inside this directory.
=======================================
/usr/local/cpanel
=======================================
bin/ – Cpanel binaries are located in this directory
version – You can get cpanel version from this file
=======================================
logs/ – All log files of cpanel are located inside this directory.
They are
error_log – cpanel logs any error it incurs in this file
license_log – All cpanel license update attempts are logged in this file stats_log – The stats daemon logs the output from all
the status generators like awstats, webalizer.
access_log – General information pertaining to cPanel requests is logged in this file
=======================================
base/ – Files of phpmyadmin, webmail etc are located in this directory
3rdparty/ – Files of mailman, fantastico etc are located in this directory
Important Log Files
=======================================
Apache
=======================================
/usr/local/apache/logs – It is the main log for apache
/usr/local/apache/domlogs/ – Domain specific logs are located inside this directory
/usr/local/apache/logs/access_log – This log records all requests processed by the server
=======================================
Exim
=======================================
/var/log/exim_mainlog – An entry is created inside this log every time a message is received or delivered
/var/log/exim_rejectlog – An entry is created inside this log every time a message is rejected based on either ACLs or other policies
/var/log/exim_paniclog – An entry is created inside this log when exim doesn’t know how to handle an error
/var/log/messages – General information and login attempts of FTP are logged here
/var/log/secure – General information and login attempts of SSHD are logged here
/var/log/maillog – The IMAP, POP, and SpamAssassin services all log here. This includes all general logging information (login attempts, transactions, spam scoring), along with fatal errors.
/var/log/mysqld.log /var/lib/mysql/$(hostname).err – Mysql general informations and errors are logged in either of these two files
/var/log/chkservd.log – The service monitoring daemon (chkservd) logs all service checks here. Failed services are represented with a [-], and active are represented with [+]
/var/log/cron – An entry is created in this file when a cron is executed
/var/log/messages – General informations and errors of named are logged in this File
/var/log/dcpumon/toplog.[timestamp] – This log lists the top processes running Each five minute a new log is created
/usr/local/apache/logs/suexec_log – This log file contains auditing information reported by suexec each time a CGI application is executed.
/var/log/cpanel*install* – These log files contain verbose logs of the cPanel installation.
/var/cpanel/updatelogs/update-[timestamp.log] – It is the log file for upcp. Log entries are created when upcp runs
=================================================================================

Cheap web Hosting


SMTP error 535 authentication failed in roundcube OR SMTP Error (435): Authentication failed


Cheap reseller Hosting


If you face SMTP error 535 Authentication Failed while sending an email from round cube, then you can check the following things.
vi /usr/local/cpanel/base/3rdparty/roundcube/config/main.inc.php
and change
$rcmail_config[‘smtp_user’] = ‘%u’;
to
$rcmail_config[‘smtp_user’] = ”;
Save the file
FIXED….

Cheap web Hosting


sendmail: Not running with correct effective GID. Is sendmail binary setgid mailtrap?


Cheap reseller Hosting


===================================
sendmail: Not running with correct effective GID. Is sendmail binary setgid mailtrap?
[Error above error message shows in login SSH screen directly or you are getting this message]
just change the send mail permission using below command:

chmod 2755 /usr/sbin/sendmail
That’s it..:)
===================================

Cheap web Hosting


1 2 3 4 5 6