Customizing Service Links for Domain Registration and Management Services
To customize the Register Domain Names button URL:
On Linux systems, issue the following command:
/usr/local/psa/bin/interface_template -p -domain_registration_url [url]
Customizing Service Links
This chapter describes how to customize items of the Panel graphical user interface which let your customers do the following:
* Register domain names.
* Purchase SSL certificates.
* Access you website providing the mentioned or other services.
These items are customized using the interface_template command line utility.
The utility is located in /usr/local/psa/bin directory on Linux systems.
Using the Plesk Service Control Utility
In addition to the service management facilities provided within control panel, there is the Service Control utility available from the system taskbar. It allows managing the following services:
* Plesk Control Panel - the control panel’s web server engine,
* Plesk Management Service - handles control panel settings, security and statistics,
* Plesk Miscellaneous Service - handles IP assignment, time management, Plesk utilities and user accounts,
* Plesk Scheduler - task scheduling and management,
* Plesk List Connector - mail service,
* Plesk Mail Transfer Agent - mail service,
* Plesk POP Service - mail service,
* Plesk Postoffice Connector - mail service,
* Plesk SMTP Connector - mail service,
* Plesk SQL Server - MySQL database that stores all Plesk objects,
* Stunnel - enables SSL support for mail server,
* Plesk Name Server - DNS service,
* Plesk Java Servlet Container - enables support for Java applets.
Denial of Service (DoS) Attacks
Attacker or group of attackers coordinate against an organization’s network or server resources by sending unauthorized packets to the target host (either server, router, or workstation). This forces the resource to become unavailable to legitimate users.
The most reported DoS case in the US occurred in 2000. Several highly-trafficked commercial and government sites were rendered unavailable by a coordinated ping flood attack using several compromised systems with high bandwidth connections acting as zombies, or redirected broadcast nodes.
Source packets are usually forged (as well as rebroadcasted), making investigation as to the true source of the attack difficult.
Advances in ingress filtering (IETF rfc2267) using iptables and Network Intrusion Detection Systems such as snort assist administrators in tracking down and preventing distributed DoS attacks.
How to include the crond service to chkservd
First we need to create a crond file under the chkservd.d directory where all the services files are placed:
Add the following line to the file:
service[crond]=x,x,x,/etc/init.d/crond restart,crond,root
Now we need to edit the chkservd configuration file and enable the crond service for monitoring
vi /etc/chkserv.d/chkservd.conf
add the following line at the end of the file
Restart the chkservd service for the new changes to take affect:
/scripts/restartsrv chkservd
Stop the service manually and watch chkservd logs to verify auto-restart.
service crond stop; tail -f /var/log/chkservd.log
You should notice that the crond service is restarted automatically.