×


Blog


MRTG Reports SNMP_Session Errors in Nagios - Fix it now

This article covers how to fix Nagios issue, MRTG Reports SNMP_Session Errors while using Nagios.

You can see this error when running MRTG at the command line such as:

LANG=C LC_ALL=C /usr/bin/mrtg /etc/mrtg/mrtg.cfg --lock-file /var/lock/mrtg/mrtg_l --confcache-file /var/lib/mrtg/mrtg.ok


When this Nagios error happens, you will receive error similar to this:

Subroutine SNMP_Session::pack_sockaddr_in6 redefined at /usr/local/share/perl5/Exporter.pm line 66.

at /usr/bin/../lib/mrtg2/SNMP_Session.pm line 149.


Core Configuration Manager Displaying Issues in Nagios XI

This article covers how to resolve the issue with Nagios XI that stops displaying the core configuration manager or the components inside the core configuration manager.

If this is the case, When using Core Configuration Manager (CCM), the interface does not work as expected, it does not appear to display correctly and generally it feels like there is a bug. This issues is related to the web browsers implementation of JavaScript. If possible, use a browser that more closely implements the ECMAScript Language Specification.

A quick way to see if this is the problem is to see if you experience the same issue using another web browser.


To fix this Nagios configuration Problem:

1. In the event of the the Core Config Manager not visible or components missing from the page, this generally relates to a proxy and the following steps may resolve this issue:

pear config-set http_proxy http://proxy:port

2. Make sure to change proxy:port to match your proxy server, example:

pear config-set http_proxy http://192.168.44.20:8080

3. Then execute the following:

pear install HTML_Template_IT

 After performing these steps go back to CCM and see if it works.


Enable Leech Protection in cPanel - Do it with ease

This article covers step by step process to configure Leech Protection in cPanel. Basically, Leech Protection is an easy to configure security feature by cPanel. Leech Protect is a security feature offered within cPanel that allows you to detect unusual levels of activity in password-restricted directories on your website.


Importance of Leech Protection in cPanel:

1. Leeching is when users publicly post their username and password, unauthorized visitors can use those credentials to access secure areas of your website.

2. With the Leech Protection feature in cPanel, you can limit the number of times a user can access a secure area of your website within a two-hour period. 

3. After you set the maximum number of logins within a two-hour period, the system redirects or suspends users who exceed it. 

4. This is useful, also, say someone is trying to login to restricted areas of your website by guessing combinations of usernames and passwords.


To Enable Leech Protection in cPanel:

1. Click Leech Protection under Security in cPanel.

2. Click on the name of the directory that you want to protect. You can click the folder icon next to the folder name to open the folder.

3. Under Set up Leech Protection, enter the number of logins allowed per username in a two-hour period.

4. To redirect users who exceeded the maximum number of logins within a two-hour period, enter a URL to which you wish to redirect them.

5. To receive an email alert when an account is compromised, select the Send Email Alert to option and enter the email address in the text field.

6. To disable compromised accounts, check the Disable Compromised Accounts option.

7. When ready, click Enable.


Website statistics using Google Analytics - How it works

This article covers the features to find Website statistics using Google Analytics. Basically, Google Analytics is a powerful web tracking software that tracks a website's web metrics. Google Analytics is used to track website activity such as session duration, pages per session, bounce rate etc. of individuals using the site, along with the information on the source of the traffic.

Google's official recommendation for adding the Google Analytic tracking code is place the tracking code in the HEADER SECTION ( <head>) of the website.


To see my website traffic using Google Analytics:

Google Analytics tool gives lots of useful website data such as: 

1. Number of visitors per month or per day, percentage of new users, bounce rate and length of visitor sessions. 

2. You can check your website's SEO now.


To Add the tracking code directly to your website:

1. Find the tracking code snippet for your property. Sign in to your Analytics account, and select the Admin tab.

2. Find your tracking code snippet.

3. Copy the snippet.

4. Paste your snippet (unaltered, in its entirety) into every web page that you want to track.

5. Check your setup.


Add user in VestaCP - How to do it

This article covers how to add a user in VestaCP. Vesta control panel (VestaCP) is an open source hosting control panel, which can be used to manage multiple websites, creat and manage email accounts, FTP accounts, and MySQL databases, manage DNS records and so on.


To Add / Edit User in VestaCP:

1. First, click the USER tab on top, then click the green coloured “+” to add a new user.

2. Fill in the details for the new user. Click “Add” when you’ve completed the info.

3. This message will pop up if all the info are filled in correctly.

Now, you will see 2 users to choose from. Access the newly created user by clicking on “Login as (username)”. 

Each user can manage their own web, DNS, mail and database, etc.

You can also perform edit, deletion or suspension of user accounts using the buttons shown in the red box.


To uninstall Vesta Control panel:

1. Stop vesta service. service vesta stop.

Remove vesta packages and software repository. RHEL/CentOS: yum remove vesta* rm -f /etc/yum.repos.d/vesta.repo. Debian/Ubuntu: apt-get remove vesta* rm -f /etc/apt/sources.list.d/vesta.list.

2. Delete data directory and cron.


Enable Built-in Administrator Account on Windows 10 - How to implement this

This article covers an easy way to activate the administrator account is from the command prompt with elevated privileges. Windows 10 includes a built-in Administrator account that, by default, is hidden and disabled for security reasons. Sometimes, you need to perform a bit of Windows management or troubleshooting or make changes to your account that requires administrator access.

Windows 10 administrator default password will not be required, alternatively you can enter password for local account and sign in.


To know if I have the built-in Administrator account in Windows 10:

1. Right-click the name (or icon, depending on the version Windows 10) of the current account, located at the top left part of the Start Menu, then click on Change account settings. 

2. The Settings window will pop up and under the name of the account if you see the word "Administrator" then it is an Administrator account.


To reset the built-in Administrator account in Windows 10:

1. Boot from Windows 10 bootable CD/DVD or USB.

2. When the install now screen shows up click on Repair your computer > Advanced Options >Troubleshoot > Command Prompt.

3. Once you can boot into the command prompt, type "net user administrator /active:yes".


To enable hidden administrator:

1. Go to Security Settings > Local Policies > Security Options. 

2. The policy Accounts: Administrator account status determines whether the local Administrator account is enabled or not. 

3. Check the "Security Setting" to see if it is disabled or enabled. 

4. Double-click on the policy and select "Enabled" to enable the account.