23/09/2007, 03:36 AM
Woo-hoo! It's US$40/month down for me :P
Anyways, I've finally shifted over to a VPS host. I've spent hours over the past few days trying to get this to work. Being a Linux n00b doesn't help either, especially when I'm not prepared to pay extra licensing fees for a nice control panel (like Plesk or cPanel).
But I have got some experience with some Linux commands now :) I must say, what's really surprising is how easy it is to install stuff, I mean:
On a side note, yesterday, I got the following email from my server:
Anyways, I've finally shifted over to a VPS host. I've spent hours over the past few days trying to get this to work. Being a Linux n00b doesn't help either, especially when I'm not prepared to pay extra licensing fees for a nice control panel (like Plesk or cPanel).
But I have got some experience with some Linux commands now :) I must say, what's really surprising is how easy it is to install stuff, I mean:
Code:
|
does everything for you - downloads the package, extracts it etc etc. So much easier than going to a website, downloading the package and installing.
But then, Apache and Bind have been giving me headaches over the past two days :( But now I finally get it XD
I just hope I don't stuff the whole thing over by issuing some dumb command or something :P
On a plus side, I've noticed page generation times have basically been cut in half ;)
EDIT: Actually, about 3-4 times if the scripts are properly cached :P
From where I live, at time of writing, the DNS thingy-me-bob hasn't propagated here yet, so I'm actually using a (slow) proxy to write this.
What does it mean to you? Nothing really :P
On a side note, yesterday, I got the following email from my server:
Quote:The remote system 195.207.15.120 was found to have exceeded acceptable login failures on ---; there was 192 events to the service sshd. As such the attacking host has been eXx1l3d from further accessing this system. For the integrity of your host you should investigate this event as soon as possible....and I didn't have anything on the server at that time. Wow, people have already been trying to attack me. And I thought SSH brute forcing was lame... Lol @ usernames they've used though.
Executed ban command:
/etc/apf/apf -d 195.207.15.120 {bfd.sshd}
The following are event logs from 195.207.15.120 on service sshd (all time stamps are GMT -0700):
Sep 21 17:25:55 vps17 sshd[17436]: Received disconnect from 195.207.15.120: 11: Bye Bye
Sep 21 10:25:56 vps17 sshd[17474]: Invalid user mom from 195.207.15.120
Sep 21 10:25:58 vps17 sshd[17474]: Failed password for invalid user mom from 195.207.15.120 port 34590 ssh2
Sep 21 17:25:58 vps17 sshd[17476]: Failed password for invalid user mom from 195.207.15.120 port 34590 ssh2
Sep 21 17:25:59 vps17 sshd[17476]: Received disconnect from 195.207.15.120: 11: Bye Bye
Sep 21 10:26:00 vps17 sshd[17518]: Invalid user mom from 195.207.15.120
Sep 21 10:26:02 vps17 sshd[17518]: Failed password for invalid user mom from 195.207.15.120 port 34728 ssh2
Sep 21 17:26:02 vps17 sshd[17521]: Failed password for invalid user mom from 195.207.15.120 port 34728 ssh2
Sep 21 17:26:02 vps17 sshd[17521]: Received disconnect from 195.207.15.120: 11: Bye Bye
Sep 21 10:26:04 vps17 sshd[17575]: Invalid user festival from 195.207.15.120
Sep 21 10:26:06 vps17 sshd[17575]: Failed password for invalid user festival from 195.207.15.120 port 34861 ssh2
Sep 21 17:26:06 vps17 sshd[17578]: Failed password for invalid user festival from 195.207.15.120 port 34861 ssh2
Sep 21 17:26:06 vps17 sshd[17578]: Received disconnect from 195.207.15.120: 11: Bye Bye
etc etc