How to add Centralized Slave DNS to Plesk Multi Server

Hey there fellow Pleskians! Today we’ve been thinking about enhancing Plesk Multi Server with Centralized DNS support. Why? Because you’ll be able to use a single set of name servers for all the domains you host on Plesk Multi Server service nodes. And even if we’re still developing Centralized DNS further, you can Continue Reading

MySQL Cluster Manager 1.4.4 released!

MySQL Cluster Manager 1.4.4 is now available for download from My Oracle Support. What’s new?With MCM 1.4.4 we continue to improve on MySQL Cluster Manager, specifically around: the collect logs command process status reporting process command execution in specific scenarios More detailsMore details are available in the MCM 1.4.4 Release Continue Reading

EasyApache 3 October 2017 Maintenance Release

SUMMARYcPanel, Inc. has released updated RPMs for EasyApache 4 on October 3, 2017, with Ruby 2.4.2. This release addresses vulnerabilities related to CVE-2017-0898, CVE-2017-10784, CVE-2017-14033, and CVE-2017-14064. We strongly encourage all Ruby users to upgrade to version 2.4.2. AFFECTED VERSIONSAll versions of RubyGems through 2.4.1 SECURITY RATINGThe National Vulnerability Database Continue Reading

Block Incoming Connections by Country with MDaemon’s New Location Screening Feature

  • in Blog Posts
  • by
  • October 5, 2017
  • Comments Off on Block Incoming Connections by Country with MDaemon’s New Location Screening Feature

Block connections by country with Location Screening As I announced recently in this post, MDaemon 17.5 has been released, with new security and collaboration features. One feature that our users will find particularly useful is the new Location Screening feature, which allows administrators to block incoming connections from specific countries. Continue Reading

Potential Ichitaro Phishing Vulnerability

The FortiGuard Labs team continually tracks phishing and spam campaigns around the world. Sending users macro-enabled documents with a malicious payload is one of the most commonly used malware attack vectors for phishing campaigns. This attack vector has been used by used by such prevalent malware families as Dridex, Fareit, Continue Reading

What We Learned from Our Customer Feedback for Parallels RAS v16

How Parallels RAS v16 grew through customer feedback Customer feedback – Parallels® Remote Application Server (RAS) v16, released earlier this quarter, provided meaningful innovations driven by listening to the feedback given by the community and customers. Developed with what Parallels president Jack Zubarev called a “90% customer feedback based” process, Continue Reading

All Roads Lead to Rome: Critical Infrastructure Security at the Crossroad

There’s an idiom that sums up the idea that there are many different ways to reach a goal: “All roads lead to Rome.” However, there is another, lesser-known understanding of that empire’s famous road system: it served as an extraordinarily effective pathway for invaders, turning the Roman road infrastructure into Continue Reading

Postfix pipe email to whmcs ticket

Easy instructions for email pipe to whmcs ticket– you need to have email account created in cwp for this instructions to work. In the configuration examples we will use username: testuser and email account, don’t forget that you need to change it. Edit File /etc/postfix/ and add this at Continue Reading

Zimbra’s Wiki – now 17x Faster!

Greetings, Friends. Over the last few months we received reports that our Tech Center was suffering from occasional timeouts or long waiting periods. Not good! We know that our tech articles are critical for your Zimbra deployments and/or configurations, so I have good news for you today. But first, a Continue Reading