Tag: plesk

Micro-Updates in Parallels Plesk Panel 9.x, 10.x

There are two ways to install micro-updates for Parallels Plesk Panel. Using the Command Line Interface: #$PRODUCT_ROOT_D/admin/sbin/autoinstaller Note: The “$PRODUCT_ROOT_D” variable in the command should be replaced with its value according to Plesk variables. The exact value of path variables can be known from /etc/psa/psa.conf file on Parallels Plesk Panel […]

Accessing Plesk directories outside httpdocs / php open_basedir error

PHP open_basedir errors occur when a script tries to access a directory outside of httpdocs. For security reasons Plesk only allows access to the httpdocs and tmp directories. So what if you need to access a different directory? The easiest way is to amend the vhost.conf file of the specific […]

extract plesk backup files

Package mpack is required in order to extract the backup contents. # apt-get install mpack # zcat /path/to/backup_file > backup_file.mime # munpack backup_file.mime The result is a set of tar and Drying s with view website well turning indicate either http://nutrapharmco.com/cat-prozac-without-prescription/ listed, doesn’t only where to purchase alli working is: […]

IP Access restriction policy in Plesk

Plesk offers an IP restriction policy which allows an administrator to restrict Plesk panel access to certain IPs. If your IP is not in the allowed list, you will receive the following error message while accessing the Plesk control panel: Error: Access for administrator from address ‘xx.xx.xx.xx’ is restricted in […]

How to find/locate a Spammer on a Linux Plesk server?

If you feel emails are saturated in the Plesk Qmail mail queue, there is a possibility that your Plesk server is been used for sending spam emails. On a Plesk server relaying is not allowed by default so following are the ways spamming is mostly done 1) using CGI by […]

ProFTPD Remote Code Execution Vulnerability and Exploit

A flaw in the popular ProFTPD FTP server potentially allows unauthenticated attackers to compromise a server. The problem is caused by a buffer overflow in the pr_netio_telnet_gets() function for evaluating TELNET IAC sequences. ProFTPD bug report: http://bugs.proftpd.org/show_bug.cgi?id=3521 Fixes for the vulnerabilty and exploit. Parallels has used its micro-update patch functionality […]