-
Content Count
454 -
Joined
-
Last visited
-
Days Won
76 -
Feedback
N/A
Everything posted by NickTheGreek
-
αν και μπορεί κάποιος απλά να παίξει με CloudLinux όπου και διοατηρούνται repo για τόσο παλιές εκδόσεις PHP υπάρχουν και άλλοι τρόποι να έχεις PHP 5.2.17 μέσα από EasyAPache 3 https://www.interserver.net/tips/kb/install-php-5-2-latest-cpanel-server/ https://softescu.com/blog/knowledge-centre/how-install-php-52-cpanelwhm-1140-your-old-drupal-6x-drupal-cpanel-apache
-
Μολις έτυχε να βρω 11GB μεσα στο ~/.cpanel/comet σε VPS και διαβάζω https://kunwardharmesh.wordpress.com/2013/03/31/clean-up-comet-directory-in-cpanel/ root 100% full Strange directory inside /root : Solution: You can safely clean up the comet directory by running the following command that will remove all files in this directory that have not been accessed in more than three days. /usr/local/cpanel/bin/purge_dead_comet_files >> ήδη ξεκίνησε και βλεπουμε root@server [~/.cpanel/comet]# /usr/local/cpanel/bin/purge_dead_comet_files ******Cleaning up comet for root
-
Καλώς ήρθατε στο designhost.gr.
Νιώστε ελεύθερα και πλοηγηθείτε στην κοινότητα μας όπου μπορείτε να βρείτε διάφορες πληροφορίες και να γνωριστείτε με τα υπόλοιπα μέλη.
Μην διστάσετε να μας ρωτήσετε για οποιαδήποτε απορία σας ή διευκρίνηση.
-
MySQL Tuner + Tuning Primer αυτοί είναι οι φίλοι σου
-
Καλημέρα, όλα αυτά που αναφέρεις είναι χρήσιμα αλλά ίσως επωφεληθείς περισσότερο από MySQL tuning ώστε να μπορείς και να ξεπεράσεις τα spikes αλλά και να βελτιωθεί το όλο Performance. Γράφεις restart ο server, φαντάζομαι μόνο το MySQL service και όχι όλο το box / VPS ?
-
Corporate website hosting For a strong internet presence! Today, in order to communicate with your clients effectively you must have an internet presence. The more essential communication method is via the corporate website. WIND gives you the ability to host your corporate website on the Internet for free, using the Microsoft IISplatform, for a constant internet presence, securely and without limitations. Information is being managed from a modern, user-friendly panel that offers full control over your corporate website. In addition, as your needs grow, you may add extra services, in order to have the flexibility to make your own package. Below, you will find details on the main features of the hosting platform. Service features Capacity 1 GB Traffic 1 GB Web Technologies ASP, ASP.NET, Frontpage Extensions, Perl, Python, PHP4, PHP5, CGI-BIN Password Protected directories √ File manager √ FTP Account √ Shared SSL Certificate √ Site management Control Panel √ Flash √ Data Backup (from within the panel) √ Content Management Umbraco, Dotnetnuke, mojoportal, Drupal, Silverstripe, Joomla Blogs Wordpress, Blogengine.net, DasBlog, Subtext Galleries Photo Gallery Wikis Screwturn Wiki, FlexWiki, kbwiki Extra DNS Hosting (per domain)s √ (extra cost) Extra Web Storage 1GB √ (extra cost) Extra Traffic 1 GB √ (extra cost) Extra Domain Name (.gr) - 2 years √ (extra cost) MySQL Database √ (extra cost) Sql Server 2005/2008 √ (extra cost) https://www.wind.gr/en/gia-tin-epiheirisi/smart-combinations/wind-business-cloud-services/wind-business-communication-/description-of-services/filoxenia-etairikis-istoselidas/
-
Hello glouk,
Welcome to designhost.gr.
Feel free to browse our community accessing all sorts of information and getting to know our members.
Do not hesitate to ask anything in our forums.
designhost.gr
-
hol web hosting Εμπιστευτείτε την εταιρική σας ταυτότητα στο Internet στην hellas on line Τα πακέτα hol web hosting προσφέρουν την πλέον αξιόπιστη επιλογή φιλοξενίας για την παρουσία σας στο Internet αλλά και την υποστήριξη του εταιρικού σας e-mail. Όλα τα πακέτα προσφέρουν: Δωρεάν domain name .gr και .eu και εξυπηρέτηση domain (Primary DNS) Επαρκή χώρο για αποθήκευση σελίδων Απεριόριστους e-mail λογαριασμούς στο δικό σας domain name Online στατιστικά επισκεψιμότητας 24ωρη τεχνική υποστήριξη. Τεχνικά χαρακτηριστικά Windows OS Basic Plus Power Plus Χώρος για τη φιλοξενία εταιρικού website 500 MB 1 GB 3 GB Χώρος για βάσεις δεδομένων,MSSQL 10 MB 50 MB 100 MB Windows File Manager, FTP, AWStats Web Statistics & Web Site Builder App ASP , ASP.NET 2.0, 4.0, Active Perl , SSI, SSL Proxy, PHP IIS Web Sites 1 1 1 Traffic Unlimited Unlimited Unlimited Linux OS Basic Plus Power Plus Χώρος για τη φιλοξενία εταιρικού website 500 MB 1 GB 3 GB Χώρος για βάσεις δεδομένων, MySQL5 10 MB 50 MB 100 MB Linux File Manager, FTP, Log files access, Web Site Builder App CGI, WAP, SSI, SSL, PHP 4, PHP 5, Webalizer Apache Web Sites 1 1 1 Traffic Unlimited Unlimited Unlimited Επιπλέον υπηρεσίες Κατοχύρωση επιπλέον ονομάτων χώρου .gr και .eu ή μεταφορά από άλλους καταχωρητές και ανακατεύθυνση στο βασικό web site Εταιρικό e-mail της μορφής name@mycompany.gr με δωρεάν 5GB χώρο και απεριόριστα mailboxes Πρόσθετος χώρος για υπηρεσία e-mail : αναβάθμιση σε 10 GB ή 15 GB συνολικά για όλο το domain. Σημειώσεις: 1. Η χρήση των υπηρεσιών ηλεκτρονικού ταχυδρομείου προϋποθέτει ότι ο πελάτης διατηρεί δικούς τους DNS διακομιστές (DNS servers) ή εναλλακτικά χρησιμοποιεί τους διακομιστές της hellas online ή κάποιου Internet παρόχου, προϋποθέτει δηλαδή την παροχή υπηρεσιών εξυπηρέτησης domain name. 2. Δεν υποστηρίζονται ονόματα χώρου με εληνικούς χαρακτήρες. Τιμοκατάλογος Κατεβάστε τον αναλυτικό κατάλογο εδώ. Αν είστε ενεργοποιημένοι στο hol web hosting πριν τις 20/05/2013, κατεβάστε τον αναλυτικό τιμοκατάλογο για την προγενέστερη υποδομή εδώ Ενεργοποίηση και επικοινωνία Για να ενεργοποιήσετε τη συνδρομή σας στην hellas online ακολουθήστε τα παρακάτω βήματα: 1. Κατεβάστε και τυπώστε την αίτηση ενεργοποίησης 2. Συμπληρώσετε την αίτηση 3. Στείλτε την υπογεγραμμένη στην hellas online μαζί με αντίγραφο της ταυτότητας σας (και τις δύο όψεις) μέσω ταχυδρομείου στην παρακάτω διεύθυνση: hellas online Αδριανείου 2 & Παπαδά, 115 25 Αθήνα Υπόψη: Direct Telesales ή μέσω fax: 213 000 5769 ή μέσω e-mail στο sales@hol.gr Για πληροφορίες και τεχνική υποστήριξη καλέστε στο 13845 https://statheri.vodafone.gr/page-accordion/6418/hosting-e-mail
-
Χαρακτηριστικά Forthnet Web Hosting For All Αξιόπιστη φιλοξενία σε Windows ή Linux. Συνολικός διαθέσιμος χώρος 1GB! Εύκολη και γρήγορη κατασκευή απεριόριστων σελίδων σε 5 απλά βήματα. Εύκολη και άμεση παραμετροποίηση του πακέτου φιλοξενίας σας μέσω φιλικού control panel. Απεριόριστος αριθμός e-mail λογαριασμών. Απεριόριστη μεταφορά δεδομένων. Δωρεάν στατιστική ανάλυση του website σας. Φιλοξενία σε ιδιόκτητα Data Centers της Forthnet, με αξιοπιστία, ασφάλεια και υψηλή διαθεσιμότητα. 24ωρη τεχνική υποστήριξη από εξειδικευμένο τεχνικό προσωπικό στο 13832. 'Αμεση εξυπηρέτηση από τα Καταστήματα Forthnet σε όλη την Ελλάδα. Μόνο με 117,55 €/χρόνο ! Σημειώσεις Στις παραπάνω τιμές περιλαμβάνεται ΦΠΑ 24%. Ελάχιστη διάρκεια συνδρομής: 1 έτος. Οι υπηρεσίες απαιτούν την προπληρωμή της συνδρομής τους. Σε περίπτωση που επιθυμείτε επιπλέον χώρο στην υπηρεσία: 50ΜΒ: 30,24€ /χρόνο, 200ΜΒ: 50,40€ /χρόνο, 1GΒ: 80,64€ /χρόνο. O χώρος ειδικά για MSSQL βάση δεδομένων δεν περιλαμβάνεται στο συνολικό αποθηκευτικό χώρο του 1GB. Αναλυτικότερα τεχνικά χαρακτηριστικά: Συνολικός διαθέσιμος χώρος 1GB που μπορεί εύκολα, ανά πάσα στιγμή και ανάλογα με τις εκάστοτε ανάγκες σας να κατανεμηθεί σε web, e-mail και database χώρο. Επιλογή από 500+ προκαθορισμένα πρότυπα (templates) για εύκολη και γρήγορη κατασκευή του δικού σας website σε 5 απλά βήματα και από οπουδήποτε μέσω της web εφαρμογής Sitebuilder. Control Panel Plesk για την παραμετροποίηση του πακέτου φιλοξενίας ανάλογα με τις δικές σας ιδιαίτερες ανάγκες. Υποστήριξη .NET 4, PHP 5.4.20, PERL 5.10 Υποστήριξη MSSQL, MySQL, MS Access βάσεων δεδομένων (Για την ενεργοποίηση MSSQL βάσης δεδομένων απαιτείται η επιλογή extra χώρου ειδικά για το σκοπό αυτό). Απόλυτη συμβατότητα με τη χρήση των Windows (πιστοποιημένο από τη Microsoft ως Windows Certified). Υποστήριξη Δυναμικών Εργαλείων (Blog, Forums, Photo Gallery, Community). Δημιουργία απεριόριστων subdomains. Στατιστική ανάλυση μέσω Webalizer 2.21 και AWstats 7.1. Παρακολούθηση του bandwidth και της χρήσης του χώρου (GB). Apache 2.2.15 με παραμετροποιήσιμους κανόνες firewall, διασφαλίζοντας από custom web attacks. Δυνατότητα δημιουργίας πολλαπλών χρηστών με διαφορετικό ρόλο - FTP user, mail user, internet user, upload user (Windows). Διαχείριση της βάσης δεδομένων MySQL (χώρος και δεδομένα με PHP Myadmin). Υψηλά επίπεδα ασφάλειας: H ανανεωμένη έκδοση βασίζεται στην αρχιτεκτονική Virtual Private File System, η οποία εξασφαλίζει τα υψηλότερα επίπεδα ασφάλειας για τα δεδομένα των χρηστών (Linux). http://www.forthnet.gr/ServicesDefault.aspx?a_id=1411
-
COSMOTE Web Hosting Τεχνικά Χαρακτηριστικά & Πρόσθετες Υπηρεσίες Παρακάτω μπορείς να δεις αναλυτικά χαρακτηριστικά για κάθε πλατφόρμα, υπηρεσίες που απολαμβάνεις δωρεάν ή και υπηρεσίες που θα ήθελες να προσθέσεις στο πακέτο Web hosting της επιλογής σου. Πακέτα και Χαρακτηριστικά COSMOTE Web Hosting Μ COSMOTE Web Hosting L Παρεχόμενη Πλατφόρμα Linux / Windows Linux / Windows Domain Name Services (DNS) Hosting Διαθέσιμες Βάσεις 1 1-5 Web Hosting Space 500MB 2GB Database Hosting Space 100MB 500MB Πρόσθετα χαρακτηριστικά πλατφόρμα Windows Πρόσθετα χαρακτηριστικά πλατφόρμα Windows: 1 Free Domain Name .gr" ή ".eu" 1 FTP Accounts (24X7) Audio-Video Files (Not Streaming - Flash,MP3, Wav, Wmv, Real audio, Quick Time, Midi etc) Static Pages (HTML, WML, Java Script, DHTML, XML) Dynamic Pages: ASP, ASPX Supported Language Versions: ASP.ΝΕΤ 2.0, ASP.ΝΕΤ 3.0, ASP.ΝΕΤ 3.5, ASP.ΝΕΤ 4.0 Razor Supported CMS: DotNetNuke Umbraco SSL support (with exclusive IP) Protection through ACLs on Network Devices DDOS Protection/Prevention Next-Generation Firewall Protection Host-Based Firewall Protection Backup 24x7 network monitoring Δωρεάν Sitebuilder PDF Indexing Password Protected Pages Frontpage Extensions Server Side Includes (SSI) Antivirus Software Daily & Monthly Statistics Log Files DLL Support σε ASP.ΝΕΤ Web Server Specs: Windows 2008, IIS 7.0, FPSE 2002, AJAX EXT., Silverlight, .NET full trust, Isolated Application Pool, ASPSMARTUPLOAD, CDONTS & CDOSYS Βάσεις Δεδομένων: MSSQL 2008, Microsoft Access (OLEDB connection) Gigabit Ethernet Σελίδες Λάθους Πρόσθετα Χαρακτηριστικά - Cloud Hosting σε Linux πλατφόρμα Η λύση cloud hosting, στην linux υποδομή, παρέχει υψηλή διαθεσιμότητα, σταθερότητα, ασφάλεια και υψηλά πρότυπα ποιότητας υπηρεσιών. Το περιβάλλον είναι clustered και load-balanced, δηλαδή ένα website εξυπηρετείται από πολλούς web servers ταυτόχρονα. Με αυτόν τον τρόπο επιτυγχάνεται καλύτερη απόδοση (optimal performance) καθώς οι επισκέπτες διαμοιράζονται σε πολλούς web servers. Επιπλέον, αυξάνεται η διαθεσιμότητα και η σταθερότητα ενός website (redundancy) καθώς σε περίπτωση οποιασδήποτε δυσλειτουργίας ενός server, αναλαμβάνουν την εξυπηρέτηση του website οι υπόλοιποι με αποτέλεσμα να μην υπάρχει downtime. Για την ασφάλεια της web hosting υποδομής (linux και windows) χρησιμοποιούνται οι πιο εξελιγμένες τεχνολογικά λύσεις. Η περιμετρική ασφάλεια περιλαμβάνει next-generation firewalls, intrusion prevention systems , routers ACLs και antivirus λογισμικά τα οποία θωρακίζουν τα websites από πιθανές επιθέσεις. Επίσης, τα δεδομένα σας αποθηκεύονται σε δίσκους SAN/NAS υψηλής διαθεσιμότητας και αξιοπιστίας. Σε συνδυασμό με υψηλού επιπέδου τεχνολογίες backup-αντιγράφων ασφαλείας διασφαλίζεται πως δεν θα υπάρξει καμία απώλεια δεδομένων. Χαρακτηριστικά: 1 Free Domain Name .gr" ή ".eu" 1 FTP Accounts (24X7) Audio-Video Files (Not Streaming - Flash,MP3, Wav, Wmv, Real audio, Quick Time, Midi etc) Static Pages (HTML, WML, Java Script, DHTML, XML) Dynamic Pages: PHP Supported Language Versions: PHP 5.6.7 Custom PHP.ini Support Supported .htaccess files Supported CMS:Joomla Wordpress Drupal SSL support (with exclusive IP) Protection through ACLs on Network Devices DDOS Protection/Prevention Next-Generation Firewall Protection Host-Based Firewall Protection Backup Cron management 24x7 network monitoring Δωρεάν Sitebuilder Password Protected Pages CGI-BIN (Preinstalled cgi scripts για mail forms και counter) Antivirus Software Firewall/Access Lists Daily & Monthly Statistics Log Files Web Server Specs: Linux Kernel 2.6.x, Apache 2.2.x, Zend, Optimizer, GD, XML, Pear, TTF, Mail PHP Functions Βάσεις Δεδομένων: MySQL 5.5.x Gigabit Ethernet Σελίδες Λάθους Εργαλεία διαχείρισης database COSMOTE Web Hosting Εργαλεία διαχείρισης database MSSQL 2008 Web GUI: myLittleAdmin MySQL Web GUI: phpmyadmin Δωρεάν επιπλέον υπηρεσίες Στα πλαίσια της συνεχούς βελτίωσης των παρεχόμενων υπηρεσιών μας, προχωρήσαμε σε αναβάθμιση της πλατφόρμας Φιλοξενίας Ιστοσελίδων. Oι επιπλέον δυνατότητες των νέων υποδομών Web Hosting περιλαμβάνουν: Nέες δυνατότητες στο Web Hosting Control Panel: Πλήρως εξελληνισμένο περιβάλλον και δυνατότητα παραμετροποίησης του, σύμφωνα με τις ανάγκες σου όπως δυνατότητα start- stop του site / ftp κ.α. και νέες επιμέρους δυνατότητες στους τελικούς χρήστες όπως διαχείριση αρχείων, δικαιωμάτων, βάσεων δεδομένων, χρηστών FTP. Επιπλέον νέες δυνατότητες εγκατάστασης λογισμικού, ενεργοποίησης framework, ενεργοποίηση CMS εργαλείων (drupal, wordpress κ.α.), ενεργοποίηση στατιστικού εργαλείου, ενεργοποίηση και εγκατάσταση πιστοποιητικών, δυνατότητα backup & restore κ.α Δυνατότητα κεντρικής διαχείρισης πολλών sites ταυτόχρονα (Group Site Management) Νέες ενσωματωμένες δυνατότητες για το Εργαλείο κατασκευής site (Site Builder). Web Hosting Control Panel Με συνδρομή σε οποιοδήποτε πακέτο COSMOTE Web Hosting έχεις δωρεάν άμεση πρόσβαση στο νέο Web Hosting Control Panel, ένα δυναμικό εργαλείο διαχείρισης και παρακολούθησης του λογαριασμού σου και του web site σου, που πέρα από τις παραπάνω δυνατότητες που προστέθηκαν με την αναβάθμιση της πλατφόρμας , οι βασικές λειτουργίες του περιλαμβάνουν: Πληροφορίες Λογαριασμού: συλλογικές πληροφορίες για τον λογαριασμό σου και το πακέτο COSMOTE Web Hosting που έχεις επιλέξει, όπως είναι η πλατφόρμα υλοποίησης, ο χρησιμοποιούμενος Web Server, το βασικό Domain κ.α Αξιοποίηση Δυνατοτήτων Web Server: δυνατότητες όπως έλεγχος και διαχείριση της πρόσβασης στους καταλόγους του δικτυακού τόπου (Lock Directories), διαχείριση εικονικών καταλόγων (Virtual Directories), Directory browsing, έλεγχος ενεργοποίησης των front page extensions, κ.α Διαχείριση Αρχείων: εύκολη και εύχρηστη διαχείριση των αρχείων του δικτυακού σου χώρου με δυνατότητα επισκόπησης, δημιουργίας καινούργιου αρχείου, αναζήτησης αρχείου, αντιγραφής, μετακίνησης, διαγραφής αρχείου, ανέβασμα" (Upload), "κατέβασμα" (Download Τροποποίηση (Edit) αρχείου. Επίσης, πλήρης ενημέρωση σχετικά με το συνολικό χώρο που καταλαμβάνουν τα αρχεία στο χώρο φιλοξενίας μας καθώς και δυνατότητα δημιουργίας back-up αρχείων. Βάσεις Δεδομένων: άρτια διαχείριση της βάσης δεδομένων σου (MS SQL, MySQL, PostgreSQL, ODBC) μέσω web, ανάλογα με την προεπιλεγμένη πλατφόρμα (Microsoft, LINUX) Στατιστικά: αναλυτικές στατιστικές πληροφορίες σχετικά με τo Δικτυακό Τόπο του πελάτη, αλλά και παρακολούθηση των τελευταίων ημερολογιακών εγγραφών (πρόσφατων αλλά και παλαιότερων) Το μόνο που χρειάζεσαι για την πρόσβαση σου, είναι username και password (τα οποία είναι αντίστοιχα το όνομα πρόσβασης και ο κωδικός πρόσβασης που χρησιμοποιείς για την είσοδο σου στην FTP υπηρεσία). Αν είσαι ήδη συνδρομητής σε κάποιο από τα πακέτα φιλοξενίας πάτησε εδώ για να εισέλθεις στο Web Hosting Control Panel. Εργαλείο Κατασκευής Site Δημιουργήσε τώρα εύκολα, γρήγορα και οικονομικά το εταιρικό σου web site, χρησιμοποιώντας το εργαλείο κατασκευής site. Το εργαλείο κατασκευής site απευθύνεται σε εκείνους που επιθυμούν να έχουν μια πρώτη παρουσία στο Internet αλλά δεν έχουν ακόμα προετοιμαστεί τεχνολογικά για κάτι μεγάλο και δεν έχουν προβλέψει αντίστοιχα τον σχετικό προϋπολογισμό τόσο για τη δημιουργία, όσο και για τη συντήρηση ενός προγράμματος προβολής και διαφήμισης της εταιρίας τους στο Web. Με το εργαλείο κατασκευής site η παρουσία της εταιρίας σου στο Internet γίνεται απλή γιατί: Δεν απαιτείται γνώση HTML προγραμματισμού. Επιλέγεις μέσα από ένα μεγάλο αριθμό τυποποιημένων προτάσεων εκείνη που εκφράζει καλύτερα τη φιλοσοφία της εταιρίας σας. Η εισαγωγή του περιεχόμενου του site (κείμενα, τίτλοι και φωτογραφίες) στο επιλεγμένο layout είναι πολύ εύκολη διαδικασία. Περιέχει περιληπτικές οδηγίες αλλά και δυνατότητα αναλυτικής βοήθειας ανά πάσα στιγμή κατά τη διάρκεια δημιουργίας του site. Η δυνατότητα δημοσιοποίησης αυτής της παρουσίας είναι άμεση και απλή σε διεύθυνση της μορφής www.etairia.gr. Σημείωση: Η υπηρεσία παρέχεται από την ΟΤΕ A.E Πρόσθετες Υπηρεσίες Μηνιαίο τέλος Επιπλέον DNS Services 1,51€ Επιπλέον χώρος Φιλοξενίας Ιστοσελίδας 1GB 0,81€ Επιπλέον χώρος βάσης δεδομένων 500 MB 1,51€ Για να αποκτήσεις οποιαδήποτε πρόσθετη υπηρεσία από τις παραπάνω, επικοινώνησε με την Εξυπηρέτηση Εταιρικών Πελατών COSMOTE στο 13818. https://www.cosmote.gr/cs/cosmote/gr/web_hosting.html
-
Η υπηρεσία Φιλοξενίας Ιστοσελίδων της Cyta σου προσφέρει τον απαραίτητο διαδικτυακό χώρο που χρειάζεσαι για τη φύλαξη των επαγγελματικών σου ιστοχώρων. Επιπρόσθετα με την υπηρεσία σου προσφέρουμε το εργαλείο Plesk για διαχείριση των ιστοσελίδων σου. Επίλεξε το πακέτο με τα χαρακτηριστικά που ικανοποιούν τις ανάγκες της επιχείρησής σου και επωφελήσου τις δωρεάν διευκολύνσεις που σου προσφέρονται. Για να γίνεις συνδρομητής στην υπηρεσία τηλεφωνήστε στο 8000-8080, χωρίς χρέωση, ή στο email: cytanet@call-centre.cyta.com.cy Χωρητικότητα 150ΜΒ 5GB 100GB Μηνιαία Συνδρομή €4,65 €9,33 €26,88 Τέλος σύνδεσης €11,90 €11,90 €11,90 Κίνηση / Traffic 100GB ανά μήνα απεριόριστη απεριόριστη Domain 1 1 1 Subdomains 1 10 20 Alias domains - 5 20 Databases 1 10 20 Διαθέσιμες εφαρμογές για εγκατάσταση WordPress Drupal Joomla Περισσότερο από 50 άλλες εφαρμογές - Ssh - Δυνατότητα εγκατάστασης SSL Scheduled tasks - Αριθμός δωρεάν ηλεκτρονικών διευθύνσεων 10 30 30 Υποστήριξη τεχνολογιών html, cgi, και php Διευκόλυνση δυναμικών ιστοσελίδων FTP account 1 1 1 Πρόσβαση με FTP Ημερήσια Back ups Δωρεάν τεχνική υποστήριξη DNS διαχείριση Εργαλείο διαχείρισης Plesk WEB statistics management Log rotation management Πρόσβαση στο WordPress Toolkit Custom error documents Σημειώσεις: Οι τιμές συμπεριλαμβάνουν το ΦΠΑ. Δωρεάν Τεχνική Εξυπηρέτηση στο 8000-8080, καθημερινά Δευτέρα μέχρι Παρασκευή από τις 08.00 – 24.00 και το Σάββατο και Κυριακή από τις 10.00 – 24.00. Για περισσότερες πληροφορίες μπορείς να επισκεφθείς ένα από τα cytashop, ή κάλεσε το Κέντρο Τηλεφωνικής Εξυπηρέτησης στο τηλέφωνο 132. https://www.cyta.com.cy/web-hosting/el
-
πιστεύεις θα γινεται inACP upgrade ?
-
OpenVZ: Stop an unstoppable openvz container
NickTheGreek replied to NickTheGreek's topic in Διαχείριση Linux server
θα δοκιμασω κι αυτο καποια στιγμη https://gist.github.com/pavel-odintsov/3e7351ba4ceca33b8cc6 vzprocess: ps with CTID filtration for OpenVZ -
Q: I have an openvz container that is NOT stopping with the standard vz tools. How can I kill it? I tried a VZ destory but that wont work. A: It's a little harsh, but the best way I've found to stop a stubborn container is to forcefully kill the container's processes. Command vzpid with grep makes it easy to find: ps ax | awk '{print $1}' | xargs vzpid | grep <container ID> | awk '{print $1}' | xargs kill -9 https://serverfault.com/questions/318711/stop-an-unstoppable-openvz-container
-
Heatmap showing Symantec detections for WannaCry, May 11 to May 15 https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware
-
Ransomware: An executive guide to one of the biggest menaces on the web Everything you need to know about ransomware: how it started, why it's booming, how to protect against it, and what to do if your PC's infected. By Danny Palmer | March 7, 2017 -- 12:01 GMT (12:01 GMT) | Topic: Security All you need to know about ransomware in 60 seconds What is a ransomware attack? Ransomware is one of the biggest problems on the web right now. It's a form of malware which encrypts documents on a PC or even across a network. Victims can often only regain access to their files and PCs by paying a ransom to the criminals behind it. A ransomware infection often starts with someone clicking on what looks like an innocent attachment, and it can be a headache for companies of all sizes. Cybercriminals didn't use to be so obvious. If hackers infiltrated your corporate network, they would do everything possible to avoid detection. It was in their best interests not to alert a victim that they'd fallen victim to cybercrime. But now, if you are attacked with file-encrypting ransomware, criminals will brazenly announce they're holding your corporate data hostage until you pay a ransom in order to get it back. It might sound too simple, but it's working: cybercriminals pocketed over $1bn from ransomware attacks during 2016 alone. What is the history of ransomware? While ransomware exploded last year, increasing by an estimated 748 percent, it's not a new phenomenon; the first instance of what we now know as ransomware appeared in 1989. Known as AIDS or the PC Cyborg Trojan, the virus was sent to victims -- mostly in the healthcare industry -- on a floppy disc. The ransomware counted the number of times the PC was booted: once it hit 90, it encrypted the machine and demanded the user 'renew their license' with 'PC Cyborg Corporation ' by sending $189 or $378 to a post office box in Panama. The AIDS demand for payment - by post. Image: Sophos How did ransomware evolve? This early ransomware was a relatively simple construct, using basic cryptography which mostly just changed the names of files, making it relatively easy to overcome. But it set off a new branch of computer crime, which slowly but surely grew in reach -- and really took off in the internet age. Before they began using advanced cryptography to target corporate networks, hackers were targeting general internet users with basic ransomware. One of the most successful variants was 'Police ransomware', which tried to extort victims by claiming to be law enforcement and locking the screen with a message warning the user they'd committed illegal online activity, which could get them sent to jail. However, if the victim paid a fine, the 'police' would let the infringement slide and restore access to the computer. Of course, this wasn't anything to do with law enforcement -- this was criminals exploiting innocent people. An example of 'Police ransomware' threatening a UK user. Image: Sophos While somewhat successful, these forms of ransomware often simply overlaid their 'warning' message on the user's display -- and rebooting the machine could get rid of the problem. Criminals learned from this and now the majority of ransomware schemes use advanced cryptography to truly lock down an infected PC. What are the main types of ransomware? Ransomware is always evolving, with new variants continually appearing in the wild and posing new threats to businesses. However, there are certain types of ransomware which have been much more successful than others. Perhaps the most notorious form of ransomware is Locky, which terrorised organisations across the globe throughout 2016. It infamously made headlines by infecting a Hollywood hospital. The hospital gave into the demands of cybercriminals and paid a $17,000 ransom to have its networks restored. Locky remained successful because those behind it regularly update the code with changes which allow it to avoid detection. They even update it with new functions, including the ability to make ransom demands in 30 languages, helping criminals more easily target victims in around the world. Locky became so successful, it rose to become most prevelant forms of malware in its own right. Cryptowall is another form of ransomware which has found great success for a prolonged period of time. Starting life as doppleganger of Cryptolocker, it's gone onto become one of the most successful types of ransomware. Like Locky, Cryptowall has regularly been updated in order to ensure its continued success and even scrambles file names to make it harder for victims to know which file is which, putting additional pressure on the victim to pay. While some ransomware developers -- like those behind Locky or Cryptowall -- closely guard their product, keeping it solely for their own use, others happily distribute ransomware to any wannabe hacker keen to cash in on cyber extortion - and it's proved to be a very successful method for wide distribution. One of the most common forms of ransomware distributed in this way is Cerber, which has been known to infect hundreds of thousands of users in just a single month. The original creators of Cerber are selling it on the dark web, allowing other criminals to use the code in return for receiving 40 percent of each ransom paid. Cerber has become so successful that after it has surpassed Locky - which appeared to mysteriously disappear over Christmas, although remerged in April with new attack techniques - to become the most dominant form of ransomware on the web - accounting for 90 percent of ransomware attacks on Windows as of mid-April 2017. In exchange for giving up some of the profits for using Cerber, wannabe cyber fraudsters are provided with everything they need in order to successfully make money through extortion of victims. Indeed, now some criminal groups offer this type of ransomware-as-a-service scheme to potential users at no cost at the point of entry. Instead of charging a fee for the ransomware code, they want a 50 percent cut. How much will a ransomware attack cost you? Obviously, the most immediate cost associated with becoming infected with ransomware -- if paid -- is the ransom demand, which can depend on the type of ransomware or the size of your organisation. Recent research revealed that a quarter of companies which paid a ransom paid over £5,000 to retrieve their data, while a further quarter paid hackers between £3,000 and £5,000. The most common ransom paid amongst small and medium-sized businesses was between £500 and £1500, proving that there's still easy money to be made from targeting organisations of this size. There are also examples of high-profile targets paying five-figure fees in order to regain access to their networks, especially in cases where criminals threaten to delete data if they're not paid. Ultimately, whatever the size of the company, time is money and the longer your network is down, the more it's going to cost your business. Even if you regain access to your networks by paying a ransom, there will be additional costs on top of that. In order to avoid future attacks -- especially if you've been marked as an easy target -- be prepared to invest in additional cybersecurity software and to pay for additional staff training. There's also the risk of customers losing trust in your business because of poor cybersecurity and taking their custom elsewhere. Why should businesses worry about ransomware? To put it simply: ransomware could ruin your business. Being locked out of your own network for even just a day will impact on your revenue. But given that ransomware takes most victims offline for at least a week, or sometimes months, the losses can be significant. Systems go offline for so long not just because ransomware locks the system, but because of all the effort required to clean up and restore the networks. And it isn't just the immediate financial hit of ransomware which will damage a business; consumers become wary of giving their custom to organisations they believe to be insecure. How does ransomware infect your PC? It's the modern enterprise's reliance on the internet which is enabling ransomware to boom. Everyday, every employee receives hundreds of emails and many roles require these employees to download and open attachments, so it's something which is often done on autopilot. Taking advantage of employees' willingness to open attachments from unknown senders is allowing cybercriminals to successfully run ransomware campaigns. Like other forms of malware, botnets send ransomware out en masse, with millions of malicious phishing emails sent every single second. Criminals use a variety of lures to encourage targets to open a ransomware email, ranging from offers of financial bonuses, fake online purchase receipts, job applications from prospective employees, and more. A spam email claiming the target has purchased a flight - complete with fake invoice containing the ransomware. Image: Symantec While some messages give away clues to their malicious nature with poorly-worded messages or strange return addresses, others are specially tailored to look as convincing as possible, and appear no different from any other message the victim might be sent. Once the malicious attachment has been opened, the user is encouraged to enable macros in order to view and edit the document. It's when this is enabled that the ransomware code hidden within the macros strikes. It can encrypt files in seconds, leaving the victim with a ransom note demanding a payment ranging from a few hundred dollars to tens of thousands of dollars in order to get them back. Which organisations are targets for ransomware? Any business can find itself a victim of ransomware, but perhaps the most high-profile incident occurred when the Hollywood Presbyterian Medical Center in Los Angeles became infected with Locky ransomware. The infection left doctors and nurses unable to access patient files for days, until the hospital opted to give into the ransom demands of hackers in order to restore services. "The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key," Allen Stefanek, CEO of the hospital, said at the time. Locky is one of the most successful forms of ransomware. Image: F-Secure Hospitals and other healthcare organisations are popular targets for ransomware attacks, because they are often willing to pay. Losing access to data is a life-or-death matter for them -- and hospitals don't want to be held responsible for letting people die due to poor cybersecurity. However, there are even cybercriminals who think attacking hospitals is too despicable an activity. But there are plenty of other sectors criminals will happily target, including educational institutions, such as the University of Calgary, which paid a ransom of $20,000 to hackers. Any large business is at threat and there's even the prospect of ransomware infecting industrial systems. Why are small businesses targets for ransomware? Small and medium -ized businesses are a popular target because they tend to have poorer cybersecurity than large organisations. Despite that, many SMEs falsely believe they're too small to be targeted -- but even a 'smaller' ransom of a few hundred dollars is still highly profitable for cybercriminals. Why is ransomware so successful? You could say there's one key reason why ransomware has boomed: because it works. Organisations can have the best antivirus software in the world, but all it takes for ransomware to infect the network is for one user to slip up and launch a malicious attachment. If organisations weren't giving in to ransom demands, criminals would stop using ransomware. But businesses do need access to data in order to function so many are willing to pay a ransom and get it over and done with. Meanwhile, for criminals it's a very easy way to make money. Why spend time and effort developing complex code or generating fake credit cards from stolen bank details if ransomware can result in instant payments of hundreds or even thousands of dollars from large swathes of infected victims at once? There are even ransomware-as-a-service schemes available on the dark web which allow the most technically inept wannabe cybercriminals to start sending out ransomware -- in exchange for a percentage of their ill-gotten gains going directly into the pockets of the creators. What does Bitcoin have to do with the rise of ransomware? The rise of crypocurrencies like Bitcoin has made it easy for cybercriminals to secretly receive extorted payments, without the risk of the authorities being able to identify the perpetrators. The secure, untraceable method of making payments makes it the perfect currency for criminals who want their financial activities to remain hidden. Cybercriminal gangs are becoming more professional -- some even offer customer service and help for victims who don't know how to acquire or send Bitcoin, because what's the point of making ransom demands if users don't know how to pay? Globe3 ransom demand for 3 Bitcoin - including a 'how to ' guide for those who don't know how to buy it Image: Emsisoft Lab How do you prevent a ransomware attack? With email being by far the most popular attack vector for ransomware, you should provide employees with training on how to spot an incoming attack. Even picking up on little indicators like poor formatting or that an email purporting to be from 'Microsoft Security' is sent from a obscure address which doesn't even contain the word Microsoft within it might save your network from infection. There's also something to be said for enabling employees to learn from making mistakes while within a safe environment. For example, one firm has developed an interactive video experience which allows its employees to make decisions on a series of events then find out the consequences of those at the end. This enables them to learn from their mistakes without suffering any of the actual consequences. On a technical level, stopping employees from being able to enable macros is a big step towards ensuring that they can't unwittingly run a ransomware file. Microsoft Office 2016 -- and now Microsoft 2013 -- both carry features which allow macros to be disabled. At the very least, employers should invest in antivirus software and keep it up-to0date, so that it can warn users about potentially malicious files. How do I get rid of ransomware? The 'No More Ransom' initiative -- launched by Europol and the Dutch National Police in collaboration with a number of cybersecurity companies -- offers free decryption tools for ransomware variants to help victims retrieve their data without succumbing to the will of cyber extortionists. The portal offers decryption tools for ransomware varients including Crypt XXX, MarsJoke, Teslacrypt, and Wildfire. It's updated as often as possible in an effort to ensure tools are available to fight the latest forms of ransomware. The No More Ransom portal offers free ransomware decryption tools. Image: Europol Another way of working around a ransomware infection is to ensure your organisation regularly backs up data offline. It might take some time to transfer the backup files onto a new machine, but if a computer is infected and you have backups, it's possible just to isolate that unit then get on with your business. Should I pay a ransomware ransom? There are those who say victims should just pay the ransom, citing it to be the quickest and easiest way to retrieve data -- and many organisations do pay. But be warned: if word gets out that your organisation is an easy target for cybercriminals because it paid a ransom, you could find yourself in the crosshairs of other cybercriminals who are looking to take advantage of your weak security. And remember that you're dealing with criminals here and their very nature means they may not keep their word. There are stories of victims paying ransoms and still not having files returned. What's the future of ransomware? Ransomware is continually evolving, with an increasing number of variants now engaging in additional activities such as stealing data or weakening infected computers in preparation for future attacks. Researchers even warn that ransomware could soon hold whole operating systems hostage, to such an extent that the only two options available to the user would be to pay, or to lose access to the entire system. And ransomware isn't just a problem for Windows PCs; Apple Macs are vulnerable to it too. Can you get ransomware on your smartphone? Absolutely. Ransomware attacks against Android devices have increased massively, as cybercriminals realise that many people aren't aware that smartphones can be attacked. In fact, any internet-connected device is a potential target for ransomware, which has already been seen locking smart TVs. Researchers demonstrate ransomware in an in-car infotainment system. Image: Intel Security Ransomware and the Internet of things Internet of things devices already have a poor reputation for security. As more and more of these make their way onto the market, they're going to provide billions of new attack vectors for cybercriminals, potentially allowing hackers to hold your connected home or connected car hostage. There's even the potential that hackers could infect medical devices, putting lives directly at risk. As ransomware continues to evolve, it's therefore crucial for your employees to understand the threat it poses, and for organisations to do everything possible to avoid infection, because ransomware can be crippling. http://www.zdnet.com/article/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web/
-
IPS Community Suite 4.1.19.4 Released 05/10/2017 This is a security release and we recommend all clients upgrade as soon as possible. Key Changes We know security updates can be distracting but we take security very seriously and do not want to delay getting you the latest enhancements. As we continue to audit security hardening, we will do these focused update releases. This release addresses two possible XSS scenarios.
-
IPS Community Suite 4.1.19.3 Released 05/03/2017 This is a security release and we recommend all clients upgrade as soon as possible. Key Changes Fixes a security issue related to importing profile photos from URL. Release Patches We sometimes release patches for issues that come up frequently between full releases. If you are experiencing any of the issues below on this version you can download and apply the patches using the instructions provided. An issue has been identified with PHP7.1 when using the Zend Opcache extension that may cause features on your site, such as member posting, not to work correctly. If you are experiencing problems posting, please disable the Zend Opcache PHP extension. The underlying issue is related to a third party library used by the Community Suite which has been updated in our upcoming 4.2 release, at which point the Opcache extension may be re-enabled.
-
Hello Nauman446,
Welcome to designhost.gr.
Feel free to browse our community accessing all sorts of information and getting to know our members.
Do not hesitate to ask anything in our forums.
designhost.gr
-
CageFS is a virtualised file system which gives each user an isolated ‘cage’, similar to how VPSs work in relation to a whole dedicated server, but with a number of differences including enhanced security. There are a number of advantages to using CageFS, which include: Complete user isolation, individual filesystem, processes, resources etc. Users are prevented from seeing server files such as Apache configuration files Users can still see the /proc filesystem, but cannot see other users’ processes and have a limited view of their own. As each user is isolated, they cannot affect other users which are on the same server. For example, processes such as Apache, Cron Jobs, SSH etc. are all unique and individual for each user. So be rest assured that as a customer of ours, we do our best to ensure hacking is a thing of the past.
-
We like to watch movies to have some entertainment. But robbery, hacking or mystery movies appear in Hollywood movies in the last few years. Here we’ve bought 15 best hacking movies that would worth to watch. These movies are of good interest for security researchers and hackers as well to get inspired ad thrilled. Let’s drive it. 1. The Social Network The social network has created by Fight Club, directed by David Fincher and it tells the story of Mark Zuckerberg and the creation of Facebook. The Social network is a weird movie to watch if you know programmers. Literally everything Zuckerberg says in the above scene make sense, and it’s the one of the most realistic movie I’ve ever seen. 2. The Fifth Estate (2013) The Fifth Estate is an unauthorized account of Julian Assange and WikiLeaks. Cumberbatch plays a believable Assange as a egotistical, idealist that is out to change the world. Few Americans know that Assange is a famous (or infamous) hacker in his native country of Australia. He broke into the Pentagon, Citibank, NASA, and Stanford University, among other facilities, before being caught. 3. Hackers (1995) This cult classic got a lot of things right, especially the way they showed kids using technology to create their own community. In Hackers, Angelina Jolie and Jonny Lee Miller portray two youthful and hip hackers. Miller portrays a hacker who got caught as a very young child (11) after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday. 4. The Matrix (1999) This is one of the greatest science fiction movie. The movie depicts a dystopian future in which reality as perceived by most humans is actually a simulated reality called “the Matrix”, created by sentient machines to subdue the human population, while their bodies’ heat and electrical activity are used as an energy source. 5. Blackhat (2015) Blackhat, a recent film starring Chris Hemsworth (AKA Thor), follows a joint Chinese-American task force investigating a series of incidents of cyberterrorism. The protagonist is a former hacker who is saved from a 15-year sentence to consult on the effort. The filmmakers clearly did their research, and the result is a remarkably accurate portrayal of modern hacking and cyberterrorism. The virus which is used in the initial attack on a nuclear plant bears a striking resemblance to Stuxnet, a real virus which was used to attack Iranian centrifuges. 6. Live Free or Die Hard When franchises go on for too long, it’s often the third film where it all falls apart. Alien 3, Shrek 3, Terminator 3. The Die Hard franchise managed to hold on a little longer, getting out three decent films. Then it all got a little weird. It’s not even that Live Free or Die Hard is a bad movie – it’s just that the world was not ready for a Die Hard that included Justin Long as a main character. The villains in Live Free or Die Hard are computer hackers – which, in this movie, is pretty much the same thing as “wizard”. The hackers can hack traffic lights, the stock market, cellphones, bank accounts, military jets – and, in one memorable scene, the abstract concept of fire. Hacking, in the Die Hard universe, is basically just necromancy for electronic devices. It’s absurd, but I think this is an example that crosses the line into the genuinely enjoyable. 7. Eagle Eye (2008) In this movie, two people get a call from an unknown number by a woman. They get a task on phone that if they don’t follow the phone call they would die. This movie displays supercomputer hack on all networks and military networks. 8. Algorithm: The Hacker Movie (2014) A freelance computer hacker breaks into secret government contractor and downloads a program. He must choose between his own curiosity and the lives of his friends. 9. Nerve Industrious high school senior Vee Delmonico (Emma Roberts) is tired of living life on the sidelines. Pressured by her friends, Vee decides to join Nerve, a popular online game that challenges players to accept a series of dares. It’s not long before the adrenaline-fueled competition requires her to perform increasingly dangerous stunts. When Nerve begins to take a sinister turn, Vee finds herself in a high-stakes finale that will ultimately determine her entire future. 10. Who Am I – No System Is Safe (2014) Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world’s stage. Did you find this article something interesting. Do let us know if you want to add a movie in the list via comment box. https://techxerl.net/best-hacking-movies/
-
How To Add Secondary IP / Alias On Network Interface in RHEL / CentOS 7 Mattias Geniar, Sunday, August 2, 2015 - last modified: Monday, August 24, 2015 This guide will show you how to add an extra IP address to an existing interface in Red Hat Enterprise Linux / CentOS 7. There are a few different methods than on CentOS 6, so there may be some confusion if you're trying this on a CentOS 7 system for the first time. First, determine if your network interfaces are under the control of the Network Manager. If that's the case, you'll want to keep using the Network Manager to manage your interfaces and aliases. If it's not under Network Manager control, you can happily modify your configs by hand. View your IP Addresses The "old" days of Linux used to be all about ifconfig. It would show you all interfaces and their IP aliases on the server. In CentOS/RHEL 7, that's not the case. To see all IP addresses, use the ip tool. $ ip a | grep 'inet ' inet 127.0.0.1/8 scope host lo inet 10.0.2.15/24 brd 10.0.2.255 scope global dynamic eth0 inet 172.28.128.3/24 brd 172.28.128.255 scope global dynamic eth1 This syntax is more inline with most routers/switches, where you can grep for inet and inet6 for your IPv4 and IPv6 IP addresses. $ ip a | grep 'inet6 ' inet6 ::1/128 scope host inet6 fe80::a00:27ff:fe19:cd16/64 scope link inet6 fe80::a00:27ff:fefd:6f54/64 scope link So remember: use ip over ifconfig. Using Network Manager Check if your interface you want to add an alias to, uses the Network Manager. $ grep 'NM_CONTROLLED' /etc/sysconfig/network-scripts/ifcfg-ens160 NM_CONTROLLED="yes" If that's a yes, you can proceed with the next configurations using the Network Manager tool. You may be used to adding a new network-scripts file in /etc/sysconfig/network-scripts/, but you'll find that doesn't work in RHEL / CentOS 7 as you'd expect if the Network Manager is being used. Here's what a config would look like in CentOS 6: $ cat ifcfg-ens160:0 NAME="ens160:0" ONBOOT="yes" BOOTPROTO="static" IPADDR="10.50.10.5" NETMASK="255.255.255.0" After a network reload, the primary IP address will be removed from the server and only the IP address from the alias interface will be present. That's not good. That's the Network Manager misinterpreting your configuration files, overwriting the values from your main interface with the one from your alias. The simplest/cleanest way to add a new IP address to an existing interface in CentOS 7 is to use the nmtui tool (Text User Interface for controlling NetworkManager). $ nmtui Once nmtui is open, go to the Edit a network connection and select the interface you want to add an alias on. Click Edit and tab your way through to Add to add extra IP addresses. Save the configs and the extra IP will be added. If you check the text-configs that have been created in /etc/sysconfig/network-scripts/, you can see how nmtui has added the alias. $ cat /etc/sysconfig/network-scripts/ifcfg-ens192 ... # Alias on the interface IPADDR1="10.50.23.11" PREFIX1="32" If you want, you can modify the text file, but I find using nmtui to be much easier. Manually Configuring An Interface Alias Only use this if your interface is not controlled by Network Manager. $ grep 'NM_CONTROLLED' /etc/sysconfig/network-scripts/ifcfg-ens160 NM_CONTROLLED="no" If Network Manager isn't used, you can use the old style aliases you're used to from CentOS 5/6. $ cat ifcfg-ens160:0 NM_CONTROLLED="no" DEVICE="ens160:0" ONBOOT="yes" BOOTPROTO="static" IPADDR="10.50.10.5" NETMASK="255.255.255.0" Bring up your alias interace and you're good to go. $ ifup ens160:0 Don't use this if Network Manager is in control. Adding a temporary IP address Want to add an IP address just for a little while? You can add one using the ip command. It only lasts until you reboot your server or restart the network service, after that -- the IP is gone from the interface. $ ip a add 10.50.100.5/24 dev eth0 Perfect for temporary IPs! https://ma.ttias.be/how-to-add-secondary-ip-alias-on-network-interface-in-rhel-centos-7/
-
You have probably needed to change the hostname of your CentOS 7 install for one reason or the other. Changing the hostname in CentOS 7 is now much simpler than ever. If you are ready open up your terminal and follow through this tutorial, and in less than 10 minutes you will have changed your hostname! Check Hostname To check the hostname open your terminal and type the following command: $ hostname By default the hostname is localhost.localdomain. To change this you can follow the following steps Edit /etc/hostname File The easiest way to change the hostname is to edit the /etc/hostname file. Open your terminal and with your favourite text editor delete localhost.localdomain and change to whatever name you like. $ sudo vi /etc/hostname Save changes and then confirm your hostname by using hostname command. If it has not changed then you need to restart the CentOS 7 server. Using Hostnamectl Hostnamectl is a tool that is used control the Linux system hostname. You can also use this tool to change the hostname in a few easy steps. First and foremost confirm the hostname by using hostnamectl as follows: $ hostnamectl status To change the hostname type the command: $ hostnamectl set-hostname grace It may be necessary to restart the systemd-hostnamed daemon so that as to reflect the change in Static hostname. $ sudo systemctl restart systemd-hostnamed Note: Hostnamectl recognizes three types of hostnames: pretty, static and transient. Pretty is stored in /etc/machine-info and is a human readable format while static hostname is stored in /etc/hostname. Transient hostname is more of a temporary hostname which may take up the static hostname when network connectivity is lost. Using Nmtui To change the hostname you can also use the NetworkManager text interface tool (nmtui). This is also another very easy method and fairly straight forward. From the command line invoke nmtui: $ sudo nmtui This will present to you a text user interface like this. Using the arrow keys select Set system hostname and use tab to select OK. Edit the hostname which by default is localhost.localdomain and change it to whatever you prefer. After changing the hostname, choose okay, then the following confirmation message will appear. If the hostname is as you desire you can choose OK. You can confirm changes using the hostname command. Using Nmcli Nmcli is a command line tool for controlling the NetworkManager and can also be used to change the hostname. To check the hostname with nmcli, type in your terminal: $ nmcli general hostname This will print out the hostname to your terminal. By default in CentOS 7 it should be localhost.localdomain. To change this use the command: $ nmcli general hostname grace This will request for your password via a GUI interface. If you are running this command remotely remember to use root or sudo: $ sudo nmcli general hostname grace You can then check the hostname with the command hostname or nmcli general hostname. Conclusion See how easy it was? CentOS 7 is now much easier to administer compared to the previous releases. http://linoxide.com/linux-command/change-hostname-in-rhel-centos-7/
-
Καλώς ήρθατε στο designhost.gr.
Νιώστε ελεύθερα και πλοηγηθείτε στην κοινότητα μας όπου μπορείτε να βρείτε διάφορες πληροφορίες και να γνωριστείτε με τα υπόλοιπα μέλη.
Μην διστάσετε να μας ρωτήσετε για οποιαδήποτε απορία σας ή διευκρίνηση.