LXD for Minimalists: The Fastest Way to Spin Up Ubuntu 24.04 LTS

When working with LXD, most users default to the standard ubuntu: remote. While reliable, those images are designed for general cloud use and can be unnecessarily “heavy.” If you want a leaner, faster, and more secure container, you should be using Ubuntu Minimal. In this guide, we’ll skip the confusing image tables and show you … Read more

How to run SSH commands on multiple servers from a list

How to run SSH commands on multiple servers from a list If you need to run the same SSH command on multiple servers, you can automate it using either a while loop or a for loop in Bash. Both methods work, but they have subtle differences that are important to understand. Using a while read … Read more

OpenSSL Checks for SSL Files: Validate the Key, Certificate, and Chain Before Installing

When you receive SSL certificate files from a Certificate Authority (CA), you typically end up with three pieces: Before installing anything, you should verify that: This guide uses only modern OpenSSL methods, which work for RSA and ECDSA keys alike (no old “modulus” tricks). 1) Verify that the private key matches the certificate (modern method) … Read more

The Importance of Reserved IP Addresses in cPanel/WHM

The Importance of Reserved IP Addresses in cPanel/WHM Managing IP addresses correctly in a hosting environment is crucial for security, stability, and preventing accidental service disruption. In cPanel/WHM, one of the most overlooked features is the Reserved IPs system — a mechanism that prevents specific IP addresses from being used or reassigned improperly. Understanding IP … Read more

Exploring .tar Archives Without Unpacking

Exploring .tar Archives Without Unpacking Inspecting the contents of a .tar or .tar.gz archive is a common task for system administrators and developers. You may want to peek inside without actually extracting anything, and without getting overwhelmed by recursive file listings. This guide walks through several methods—ranging from basic to advanced—and weighs the pros and … Read more

Managing and Cleaning up the Eximstats SQLite Database in cPanel

Managing and Cleaning up the Eximstats SQLite Database in cPanel What Is the Eximstats Database? The eximstats database is used by cPanel servers to store statistics about email traffic. It captures data such as messages sent, failed deliveries, deferrals, and more. This data is useful for mail reporting in WHM or for scripts parsing mail … Read more

Search for WordPress plugin in a cPanel server using Bash

WordPress plugins play a crucial role in extending the functionality of websites. However, from a security perspective, it is important to be aware of the plugins installed on a server, as outdated or vulnerable plugins can be exploited by attackers. This guide provides a simple Bash one-liner to search for a specific WordPress plugin across … Read more

Run Local Scripts Remotely Over SSH in Linux

Run Local Bash Scripts Remotely Run local bash script.sh over ssh, with sudo as root, using custom ssh key and sudo user. Run local bash script.sh over ssh, simplified version Run Local Perl Scripts Remotely Run local Perl perlscript.pl over ssh, quietly (-q)

cPanel Tips: Troubleshooting the Imunify360 Agent

Troubleshooting the Imunify360 Agent Understanding the Imunify360 Agent vs. imunify360-agent Command For system administrators working with Imunify360, it is important to differentiate between the Imunify360 Agent as the core functionality of the security suite and the imunify360-agent command-line tool. The Imunify360 Agent is a service that runs continuously in the background, providing real-time security monitoring, … Read more