If you believe that you are under a SYN attack, run the
netstat -an |grep :80 |more command.
A list that is similar to the following example will appear, with several hundred entries:
tcp 0 0 220.127.116.11:80 18.104.22.168:1048 SYN_RECV tcp 0 0 22.214.171.124:80 126.96.36.199:1167 SYN_RECV tcp 0 0 188.8.131.52:80 184.108.40.206:1192 SYN_RECV tcp 0 0 220.127.116.11:80 18.104.22.168:1039 SYN_RECV tcp 0 0 22.214.171.124:80 126.96.36.199:1048 SYN_RECV
If your kernel was built with
syncookie support, run the
echo 1 > /proc/sys/net/ipv4/tcp_syncookies command as the
Yes. For more information, read our SSL certificate documenation.
To view the contents of a certificate, run the
openssl x509 -noout -text -in filename.crt command.
To view the contents of a private key, run the
openssl rsa -noout -text -in filename.key command.
If the modulus number and exponent of the certificate and key match, they paired correctly. If not, they are mismatched and Apache cannot start with SSL enabled.
If you were brought to this site inadvertently after you used a search engine, your system may be infected with a virus that affects Windows machines and forwards them to a server that it replaced with a blank cPanel server.
For more information on this virus, and methods of removal, visit the following sites:
Check these sites before you contact cPanel.