2. Скомпилировать:
cc who.c -o whoip
cp whoip /usr/local/bin
3. Использование:
Версия:
whoip -V
Вывод IP:
whoip
Присвоить IP переменной:
myip=`whoip`
cc who.c -o whoip
cp whoip /usr/local/bin
whoip -V
whoip
myip=`whoip`
[dries]
name=Extra Fedora rpms dries - $releasever - $basearch
baseurl=http://ftp.belnet.be/packages/dries.ulyssis.org/redhat/el4/en/i386/dries/RPMS
# cat /etc/redhat-release
[root@valroot ~]# cat /etc/redhat-release
Red Hat Enterprise Linux ES release 4 (Nahant Update 8)
uname -i
[root@valroot ~]# uname -i
x86_64
rpm -Uhv http://apt.sw.be/redhat/el5/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.el5.rf.i386.rpm
rpm -Uhv http://apt.sw.be/redhat/el5/en/x86_64/rpmforge/RPMS//rpmforge-release-0.3.6-1.el5.rf.x86_64.rpm
rpm -Uhv http://apt.sw.be/redhat/el4/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.el4.rf.i386.rpm
rpm -Uhv http://apt.sw.be/redhat/el4/en/x86_64/rpmforge/RPMS/rpmforge-release-0.3.6-1.el4.rf.x86_64.rpm
rpm -Uhv http://apt.sw.be/redhat/el3/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.el3.rf.i386.rpm
rpm -Uhv http://apt.sw.be/redhat/el3/en/x86_64/rpmforge/RPMS/rpmforge-release-0.3.6-1.el3.rf.x86_64.rpm
rpm -Uhv http://apt.sw.be/redhat/el2.1/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.el2.rf.i386.rpm
rpm -Uhv http://apt.sw.be/redhat/9/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.rh9.rf.i386.rpm
rpm -Uhv http://apt.sw.be/redhat/8.0/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.rh7.rf.i386.rpm
if [ -z "$1" ]
then
echo "use: change.perms cpanel_user";
exit;
fi
220-your.hostname ESMTP Exim 4.68 #1 Tue, 16 Dec 2008 19:33:44 -0500
220-We do not authorize the use of this system to transport unsolicited,
220 and/or bulk e-mail.
smtp_banner = "${primary_hostname} ESMTP Exim ${version_number}
#${compile_number} ${tod_full} n
We do not authorize the use of this system to transport unsolicited, n
and/or bulk e-mail."
/bin/pwd: cannot open directory `..’: Permission denied
/scripts/enablefileprotect
Довольно часто возникает такая ситуация, когда процесс MySQL грузит всю систему, а пока "залогинишся" на сервер, пройдет кучу времени, и нагрузка может уже упасть. По-этому сложно выловить пользователя злоупотребляющего MySQL ресурсами.
netstat -anp |grep 'tcp|udp' | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -n
netstat -anp |awk '/tcp|udp/{gsub(/:.*/,"",$5);print $5}'|sort|uniq -c|sort
/etc/valiases/domain.com
/etc/vfilters/domain.com
kill -9 `ps -u login -o "pid="`
/usr/local/cpanel/whostmgr/bin/whostmgr2 killeximq