error: field ‘st_atim’ has incomplete type FFMPEG


Cheap reseller Hosting


ffmpeg

 

 

 

 

While installing ffmpeg-php-0.6.0  on centos server, if you may came across the below error ,

 

In file included from /usr/include/sys/stat.h:107,
from /usr/include/php/main/php_streams.h:28,
from /usr/include/php/main/php.h:395,
from /root/ffmpeg-php-0.6.0/ffmpeg-php.c:40:
/usr/include/bits/stat.h:91: error: field ‘st_atim’ has incomplete type
/usr/include/bits/stat.h:92: error: field ‘st_mtim’ has incomplete type
/usr/include/bits/stat.h:93: error: field ‘st_ctim’ has incomplete type
/usr/include/bits/stat.h:152: error: field ‘st_atim’ has incomplete type
/usr/include/bits/stat.h:153: error: field ‘st_mtim’ has incomplete type
/usr/include/bits/stat.h:154: error: field ‘st_ctim’ has incomplete type
In file included from /usr/include/php/main/php_streams.h:28,
from /usr/include/php/main/php.h:395,
from /root/ffmpeg-php-0.6.0/ffmpeg-php.c:40:
/usr/include/sys/stat.h:367: error: array type has incomplete element type
/usr/include/sys/stat.h:374: error: array type has incomplete element type
In file included from /usr/include/php/main/php.h:401,
from /root/ffmpeg-php-0.6.0/ffmpeg-php.c:40:
/usr/include/php/TSRM/tsrm_virtual_cwd.h:218: error: expected specifier-qualifier-list before ‘time_t’
/usr/include/php/TSRM/tsrm_virtual_cwd.h:246: error: expected declaration specifiers or ‘…’ before ‘time_t’
/root/ffmpeg-php-0.6.0/ffmpeg-php.c: In function ‘zm_startup_ffmpeg’:
/root/ffmpeg-php-0.6.0/ffmpeg-php.c:94: warning: implicit declaration of function ‘avcodec_init’

 

To solve this issue follow the below steps and install the new repo :

 

git clone https://github.com/pbek/ffmpeg-php.git
cd ffmpeg-php
phpize
./configure
make && make install

 

 

 


Cheap web Hosting


ApacheBooster (2.5) new version available for download


Cheap reseller Hosting


apachebooster

 

 

 

An Apache based Performance booster plugin for Cpanel Servers. ApacheBooster is an integration of nginx and varnish. Apachebooster caches both the static and dynamic contents which help the web server to serve the content from the cache everytime it is requested. Apachebooster is a Cpanel featured plugin and serves as one stop solution for boosting apache performance in cpanel servers worldwide.

 

Below are the new update in Apache Booster

 

✔ Fixed domain dedicated IP issue
✔ Changed nginx embedded vhost template to perl template toolkit.
✔ Updated /scripts/generate_varnish_conf script to fix the varnish IP address conflict.
✔ Option to disable/enable apachebooster temporarily.
✔ Upgraded nginx and varnish to latest version

In this version, customers have the ability to customize nginx vhost config template as per their needs.
New nginx vhost config template file can be found in /var/ApacheBooster/templates directory.

You can use the below commands to disable or enable ApacheBooster, this will be helpful for administrators to troubleshoot some apache and php related issues.
$> /scripts/manage_apacheboooster --enable
$> /scripts/manage_apacheboooster --disable

 

 


Cheap web Hosting


cPanel vulnerability – TSR-2016-0001 Announcement


Cheap reseller Hosting


cpanel

 

cPanel TSR-2016-0001 Announcement

cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system.

cPanel has rated these updates as having CVSSv2 scores ranging from 2.1 to 10.0.

Information on cPanel’s security ratings is available at Security Levels – cPanel Knowledge Base – cPanel Documentation.

If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience.

RELEASES

The following cPanel & WHM versions address all known vulnerabilities:

11.54.0.4 & Greater
11.52.2.4 & Greater
11.50.4.3 & Greater
11.48.5.2 & Greater

The latest public releases of cPanel & WHM for all update tiers are available at Downloads | cPanel, Inc..

SECURITY ISSUE INFORMATION

The cPanel security team identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time.

Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 20 vulnerabilities in cPanel & WHM software versions 11.54, 11.52, 11.50, and 11.48.

Due to the severity of the issues addressed in this release, cPanel is extending the blackout period on additional information to a full week. Additional information is scheduled for release on January 25, 2016.

For information on cPanel & WHM Versions and the Release Process, read our documentation at:
cPanel & WHM Product Versions and the Release Process – cPanel Knowledge Base – cPanel Documentation

For the PGP Signed version of this announcement please visit https://news.cpanel.com/wp-content/uploads/2016/01/TSR-2016-0001-Announcement.txt


Cheap web Hosting


WHMCS Security Advisory TSR-2016-0001 – Admin Application Links CSRF Vulnerability


Cheap reseller Hosting


whmcs

 

WHMCS has released new updates for all supported versions of WHMCS. These updates include changes that address security concerns within the WHMCS product.

WHMCS has rated these updates as having a Trivial to Important security impact. Information on security ratings can be found at http://docs.whmcs.com/Security_Levels

==========
Releases
==========
Please update your installation to the latest version.

v6.2 – 6.2.1
v6.1 – 6.1.2 (LTS)
v6.0 – 6.0.4 (LTS)

== Patches ==

Incremental patches can be downloaded by following the links below.

These patch sets contain only the files that have changed between the previous release and this update. The previous release version that these patch sets are designed for is clearly indicated as the first and smaller number.

6.2.0 –> 6.2.1 http://go.whmcs.com/950/v620_incremental_to_v621_patch
MD5 Checksum: c8cc808c0d0718b13a486ca3dabd4125

6.1.1 –> 6.1.2 http://go.whmcs.com/954/v611_incremental_to_v612_patch
MD5 Checksum: c6fa1354f9523054d0107866f2e9550e

6.0.3 –> 6.0.4 http://go.whmcs.com/958/v603_incremental_to_v604_patch
MD5 Checksum: 7d86bb2ca32767f591a8a5c21c81fe6b

Hotfix for 5.3.14* http://go.whmcs.com/962/Backport_TSR-2016-0001_53
MD5 Checksum: bb5756fe02dc0b99d1a49783afd41dbb

Need a patch for an older version? Visit our downloads page: http://download.whmcs.com/

To apply a patch set release, download the files as indicated above. Then follow the upgrade instructions for a “Patch Set” which can be found at http://docs.whmcs.com/Upgrading#For_a_Patch_Set

* Some installations have yet to upgrade to v6. As a result, we are providing a backport patch for v5.3.14. It is important to remember that v5 is no longer supported. Future security and important maintenance issues will not be patched. We strongly encourage anyone running a version outside of Long Term Support (http://docs.whmcs.com/Long_Term_Support) to upgrade as soon as possible to ensure the performance, accuracy, and security of your business.

== Full Release ==

A full release distribution contains all the files of a WHMCS product installation. It can be used to both perform a new installation or update an existing one (regardless of previous version).

6.2.1 Full Version – Download Now http://download.whmcs.com/
MD5 Checksum: ff5c9b13a86f9041d52d94ada7e7cac9

6.1.2 Full Version LTS – Download Now http://download.whmcs.com/
MD5 Checksum: 91522bf1d33b20793f1aeb411a588118

6.0.4 Full Version LTS – Download Now http://download.whmcs.com/
MD5 Checksum: ae7695aae719aad249f82a8d86bdbd9c

To apply a full release, download the release from the URL above. Then follow the upgrade instructions for a “Full Release Version” which can be found at http://docs.whmcs.com/Upgrading#For_a_Full_Release_Version

=========================================
Security Issue Information
=========================================

The security changes for the v6.2 release address 2 issues, both of which were reported via the Security Bounty Program.

The security changes for all other releases address 1 issue, which was reported via the Security Bounty Program.

Once sufficient time has passed to allow WHMCS customers to update their installed software, WHMCS will release additional information regarding the nature of the security issues.

============================
Maintenance Issue Information
============================

The v6.2 release also provides resolution for 1 maintenance issue that affected upgrades of EOL versions of the product.

All versioned releases also contain the previously released update for the Kayako Loginshare and is provided for completeness.

For full details please refer to the changelog:
V6.2.1 – http://changelog.whmcs.com/WHMCS_V6.2
V6.1.2 – http://changelog.whmcs.com/WHMCS_V6.1
V6.0.4 – http://changelog.whmcs.com/WHMCS_V6.0

All published and supported versions of WHMCS are affected by one or more of these maintenance and security issues.

============================

Source :

========================================
WHMCS Security Advisory TSR-2016-0001
http://blog.whmcs.com/?t=110766
========================================

 

Thanks

 


Cheap web Hosting


CloudFlare (cPanel Plugin) v5.3.2 symlink attack vulnerability !


Cheap reseller Hosting


cloud

 

 

Type: Symlink Attack
Location: Local
Impact: High
Product: CloudFlare (cPanel Plugin)
Website: http://www.cloudflare.com
Vulnerable Version: 5.3.2
Fixed Version: 5.3.11
CVE: -
R911: 0187
Date: 2016-01-15

 

Product Description:

CloudFlare protects and accelerates any website online. Once your website is a part of the CloudFlare community, its web traffic is routed through our intelligent global network. We automatically optimize the delivery of your web pages so your visitors get the fastest page load times and best performance. We also block threats and limit abusive bots and crawlers from wasting your bandwidth and server resources. The result: CloudFlare-powered websites see a significant improvement in performance and a decrease in spam and other attacks.
Vulnerability Description:

Due to a carefully timed symlink attack directed at the cloudflare_data.yaml file, it is possible for a malicious user to change the permissions on any root owned file to 600 which could lead to the OS being disabled.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that should the malicious user target certain system files, such as /etc/passwd, it could render the OS inoperable.
Vulnerable Version:

This vulnerability was tested against CloudFlare (cPanel Plugin) v5.3.2 and is believed to exist in all prior versions.
Fixed Version:

This vulnerability was patched CloudFlare (cPanel Plugin) v5.3.11.
Vendor Contact Timeline:

2016-01-13: Vendor contacted via HackerOne.

2016-01-13: Vendor confirms vulnerability.

2016-01-14: Vendor issues update.

2016-01-15: RACK911 Labs issues security advisory.

 

 

How to Check the Latest Version of  Cloudflare cPanel Plugin on Server

cat /usr/local/cpanel/etc/cloudflare.json | grep version

 

To Update the Cloudflare version

/usr/local/cpanel/bin/cloudflare_update.sh force

 

Soure : RACK911 Labs

 

 

 

 

 


Cheap web Hosting


How to install MediaWiki from Softaculous


Cheap reseller Hosting


To Install MediaWiki from Softaculous

MediaWiki can easily be installed by using Softaculous in the cPanel Software / Services. This tutorial will explain how to install MediaWiki using Softaculous. Please follow the steps and install it.

How to install MediaWiki from Softaculous

 

Step 1 : Log into cPanel.

Step 2 : Find the Softaculous icon located in the Software Services section.

Step 3 : To locate MediaWiki you can either type mediawiki in the search box in the top right corner.

Step 4 : Click on Wikis in the left column.

Step 5 : When you click on the MediaWiki link, you will be taken to the home page for the MediaWiki package.

Step 6 : Click on the Install tab.

You will be asked to fill in the details of the installation.

Step 7 : If you have multiple domains associated with this account, you can select where to install it.

Step 8 :  The next two boxes require a Directory and Database Name, neither of which should exist on the server.

Step 9 : Under Site config, enter a Wiki Name and Email.

These can be changed later on from the application’s admin panel.

Step 10 : Type the desired Admin Username and Password that should be used.

Step 11 : Click Install.

After a moment, the software will be installed.

Step 12 : Once finished, you can view your new site by clicking this link.

You will be able to access your newly-installed MediaWiki by following the links on the page.

 

That’s it! 🙂 🙂


Cheap web Hosting


How to use the Exim Mail Queue Manager in WHM


Cheap reseller Hosting


To Using the Exim Mail Queue Manager in WHM

Exim is the mail software that runs on your server to control email delivery, there are mail queue management options you can use with Exim directly via the command line.

How to use the Exim Mail Queue Manager in WHM

In this article Hostripples will show you how you can manage your Exim mail queue on your VPS or dedicated server in WHM.

Step 1 : Log into WHM.

 

tep 2 : Find the Email menu.

 

Step 3 : Go to Mail Queue Manager.

 

Step 4 : In the Search box type in user@hostripples.com.

 

Step 5 : From the Select Query drop-down and select Search Recipients.

 

Step 6 : In Search Type Click on Begins With.

 

Step 7 : Click on the calendar icon and Specify the Start Date and End Date.

 

Step 8 : Next, specify the Start Time and End Time.

 

Step 9 : Then, click on Run Report.

 

Step 10 : We can see that our messages to user@hostripples.com are Frozen.

This means that Exim has detected an error trying to deliver the message, and it is going to hold the message and try again later.

 

Step 11 : Click on the magnifying glass icon to view the message in a new window.

In this message we can see that it’s not delivering to user@hostripples.com because their mail server is giving us back the error of Mailbox quota exceeded.

 

Step 12 : At the top of the message you can choose to Delete Message which will completely remove it from the mail queue.

 

Or

 

you can choose to Deliver Message Now which will attempt to send the message again, in this case if the user has freed up some space on their email account it should go through successfully now.

 

 

That’s it !! 🙂 

 


Cheap web Hosting


How to : Exim Remove All messages From the Mail Queue


Cheap reseller Hosting


 

Exim is a mail transfer agent (MTA) used on Unix-like operating systems. It aims to be a general and flexible mailer with extensive facilities for checking incoming e-mail. For more information you can see Exim documentation.

Web

In this article i will show some commands to removing all messages from the Mail Queue. Please Follow the Steps. 

 

Step 1 :  To print a list of the messages in the queue, enter the following command :

# exim -bp

 

Step 2 :  To remove a message from the queue, enter the following command :

# exim -Mrm {message-id}

exim-vps

Step 3 :  To remove all messages from the queue, enter the following command :

# exim -bp | awk ‘/^ *[0-9]+[mhd]/{print “exim -Mrm ” $3}’ | bash

 

Step 4 :  Dallas Marlow, suggested following clean command:

# exim -bp | exiqgrep -i | xargs exim -Mrm

 

 

That’s it ! 🙂 🙂


Cheap web Hosting


Exim commands : To remove emails from mail queue for a specific Sender/Receiver


Cheap reseller Hosting


In this article i will show you how to remove emails from mail queue for a specific Sender/Receiver.

exim-vps

How to remove all emails from a particular user using exiqgrep?

Do follow this command:

# exiqgrep -i -f $user | xargs exim -Mrm

                                                 Or

 

How to remove all emails to a particular user using exiqgrep?

Do follow this command:

# exiqgrep -i -r $user | xargs exim -Mrm

 

That’s it 🙂 🙂

 

Exim related post

 


Cheap web Hosting


Exim Commands : Searching the queue with exiqgrep


Cheap reseller Hosting


Searching the queue with exiqgrep

Exim-Commands-Searching-the-queue-with-exiqgrep

 

In this article I am explaining the command usages for finding emails in Exim mail queue for particular sender or receiver.

Exim includes a utility that is quite nice for grepping through the queue, called exiqgrep. Learn it. Know it. Live it. If you’re not using this, and if you’re not familiar with the various flags it uses, you’re probably doing things the hard way, like piping `exim -bp` into awk, grep, cut, or `wc -l`. Don’t make life harder than it already is.

First, various flags that control what messages are matched. These can be combined to come up with a very particular search.

 

 

1) Use -f ( To search the queue for messages from a specific sender )

Command :

 

root@localhost# exiqgrep -f [luser]@domain

 

2) Use -r ( To search the queue for messages for a specific recipient/domain )

Command :

 

root@localhost# exiqgrep -r [luser]@domain

 

3) Use -o ( To print messages older than the specified number of seconds. For example, messages older than 1 day )

Command :

 

root@localhost# exiqgrep -o 86400 […]

 

4) Use -y ( To print messages that are younger than the specified number of seconds. For example, messages less than an hour old )

Command :

 

root@localhost# exiqgrep -y 3600 […]

 

5) Use -s ( To match the size of a message with a regex. For example, 700-799 bytes )

Command :

 

root@localhost# exiqgrep -s ‘^7..$’ […]

 

“^3$” –> 3bytes
“^3.$” –> 3-30bytes
“^3..$” –> 3-300bytes
“^3…$” –> 3-3000bytes
And so on..

 

6) Use -z ( To match only frozen messages )

 

7) Use -x ( To match only unfrozen messages )

 

There are also a few flags that control the display of the output.

 

8) Use -i ( To print just the message-id as a result of one of the above two searches )

Command :

 

root@localhost# exiqgrep -i [ -r | -f ] …

 

9) Use -c ( To print a count of messages matching one of the above searches )

Command :

 

root@localhost# exiqgrep -c …

 

10) Print just the message-id of the entire queue

Command :

 

root@localhost# exiqgrep -i

 

That’s it 🙂 🙂

 

Exim related post

 

 


Cheap web Hosting


1 2 3 4 22