Showing posts with label automatic. Show all posts
Showing posts with label automatic. Show all posts

Tuesday, August 6, 2013

How to Upgrade GOautodial CE 2.1 to the latest version (3.0)



 Upgrade GOautodial CE 2.1 to the latest version (3.0)

1. Make sure to BACKUP your data first!!!
2. Check if you are running GOautodial CE 2.1 and your MySQL password is set to "vicidialnow".
# cat /etc/vicidialnow-release
GoAutoDial CE 2.1
Skip command below if your MySQL password is "vicidialnow"

# mysqladmin password vicidialnow -p
Enter password:
3. Install the GOautodial yum repository
# cd /etc/yum.repos.d/
# wget http://downloads2.goautodial.org/centos/5/goautodial.repo
4. Remove conflicting old packages
# rpm -e dahdi-linux dahdi-linux-devel dahdi-linux-kmdl-2.6.18-238.9.1.el5.goPAE dahdi-tools munin munin-node --nodeps
5. Update system, install GOautodial specific configuration and reboot
# yum update
Total size: 290 M
Is this ok [y/N]: y
warning: rpmts_HdrFromFdno: Header V3 DSA signature: NOKEY, key ID e8562897
updates/gpgkey                                                                                                                                                                                                                                          | 1.5 kB     00:00    
Importing GPG key 0xE8562897 "CentOS-5 Key (CentOS 5 Official Signing Key) <centos-5-key@centos.org>" from /etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-5
Is this ok [y/N]: y
# yum install goautodial-ce goautodial-ce-config
# reboot
6. Edit PHP configuration file:
# nano /etc/php.ini
Make sure the entries below have the same value:
memory_limit = 128M
short_open_tag = On
max_execution_time = 360
max_input_time = 360
post_max_size = 64M
upload_max_filesize = 64M
default_socket_timeout = 360
7. Optional:
Install Sangoma Wanpipe drivers
Remove conflicting packages
# rpm -e wanpipe-util wanpipe-modules-2.6.18-238.9.1.el5.goPAE --nodeps --noscripts
Install updated Sangoma drivers
# yum install wanpipe
That's it folks! You're now running the latest and greatest open source GOautodial CE 3.0 system.
CentOS 5.9 base
DAHDI 2.6
DKMS DAHDI
DKMS Wanpipe
GOadmin
GOreports
GOagent
PHP 5.3
PHP-eAccelerator
Vicidial 2.4rc2

Wednesday, July 24, 2013

Enable EYEBEAM CALL RECORDING by Default

Dial the following: ***7469
Filter for record

Find the line: system:general:auto_record_all_calls

Double click on the line and change this value 1. Next save these settings and restart eyebeam

Friday, July 12, 2013

automatic Blocking Hackers ip who access ssh

Automatically Blocking the hackers ip who access the server via ssh with wrong password
using IPtables


Dependencies
1.Iptables
2.postfix/sendmail ( for email alert)


step 1

1.login to your server via ssh
2. go to cd /usr/src/
3. vi scan-secure.sh
4. copy and paste the below script there
#!/bin/sh

# scan /var/log/secure for ssh attempts
# use iptables to block the bad guys

# Looking for attempts on existing and non-existing users. For example:
# Nov 2 22:44:07 pbxer sshd[28318]: Failed password for root from 74.143.42.70 port 52416 ssh2
# Nov 3 00:06:57 pbxer sshd[31767]: Failed password for invalid user mat3 from 192.203.145.200 port 35841 ssh2

tail -1000 /var/log/secure | awk '/sshd/ && /Failed password for/ { if (/invalid user/) try[$13]++; else try[$11]++; }
END { for (h in try) if (try[h] > 4) print h; }' |
while read ip
do
# note: check if IP is already blocked...
/sbin/iptables -L -n | grep $ip > /dev/null
if [ $? -eq 0 ] ; then
# echo "already denied ip: [$ip]" ;
true
else
echo "Subject: denying ip: $ip" | /usr/sbin/sendmail urmailid@gmail.com
logger -p authpriv.notice "*** Blocking SSH attempt from: $ip"
/sbin/iptables -I INPUT -s $ip -j DROP
fi
done

5. type chmod 755 /usr/src/scan-secure.sh
6. make entry in the cron to run in every one or two minutes
crontab -e
* * * * * /usr/src/scan-secure.sh
7. now start the iptables
/etc/init.d/iptables restart


to check for the blocked hackers ip
type iptables -L -n