How to remove “Proudly powered by WordPress”

To remove the inscription «Proudly powered by WordPress», which is usually displayed at the bottom of each page, you need to edit the footer.php file of the active theme (for example, if the twentyfifteen theme is active, then /wp-content/themes/twentyfifteen/footer.php).

Namely, clear the content between the following tags:

<div class="site-info">
...clear what's here...
</div><!-- .site-info -->

Also noticed that if you use Jetpack with infinite scrolling, then it adds its footer, to open it you will open the file /wp-content/plugins/jetpack/modules/infinite-scroll/infinity.php and delete the line:

<?php echo $credits; ?>

The AMP plug-in’s footer is here – /wp-content/plugins/amp/templates/footer.php.

After updating the theme or Jetpack may have to repeat.

Done.

Installing oVirt

oVirt — virtualization management system.

On the test, I will install oVirt in CentOS 7.

First of all, let’s add an official repository:

yum install http://resources.ovirt.org/pub/yum-repo/ovirt-release42.rpm

Update the packages:

yum update

It is desirable to reboot the system if the kernel was updated:

reboot

Install the oVirt Engine and all dependencies:

yum install ovirt-engine

This completes the installation of the oVirt Engine and you can proceed to setup by following the on-screen instructions:

engine-setup

By the end of the configuration, access information will be displayed and the oVirt panel can be opened in the browser https://example.com/ovirt-engine.

Installing Nessus on Linux

Nessus – vulnerability scanner in Linux.

Go to the official website http://www.tenable.com/products/nessus/select-your-operating-system and download Nessus for the operating system that you have installed.

Switch to the root user:
su

Run the installation of the downloaded file, for example:

dpkg -i Nessus-7.0.2-debian6_amd64.deb

Run Nessus:

/etc/init.d/nessusd start

After that, you can open Nessus in the browser by clicking https://IP:8834/

For further work, you need to register with https://www.tenable.com/products/nessus/activation-code.

Installing and Using HTTrack on Linux

HTTrack — an offline browser that allows you to download Web sites to your local computer.

Switch to the root user:
su

The installation command in Ubuntu/Debian:

apt-get install httrack

The installation command in CentOS:

yum install httrack

Create a separate directory and go into it so that when downloading the files are not scattered around the current one:

mkdir sitename
cd sitename

Let’s start downloading the site:

httrack sitename.com

If the operating system is Linux with a graphical interface, then you can install WebHTTrack which has a graphical interface:

apt-get install webhttrack

How to enter pressure data manually into the Health program on the iPhone

To add pressure data manually to the Health program on iPhone or iPod touch, follow these steps:

1) Open the application “Health” and select “Meddanny”, then “Basic indicators.”

2) In the window that opens, select “Pressure”.

3) In the upper right corner, click on the plus.

4) In the column “Systola” – we indicate the upper pressure, and in the column “Diastole” the bottom, after that press “Add” to save the data.

Done.

How to start ClamAV scanning from the command line on the cPanel server

Here is an example of checking the public_html directory with the removal of infected files:

/usr/local/cpanel/3rdparty/bin/clamscan -ri --remove /home/user/public_html

Similarly, other directories are checked.

To start checking only the mail and public_html directory for all users:

/usr/local/cpanel/3rdparty/bin/clamscan -ri /home/*/mail
/usr/local/cpanel/3rdparty/bin/clamscan -ri /home/*/public_html

To update the anti-virus database, use the command:

/usr/local/cpanel/3rdparty/bin/freshclam

See also my article:
Installing and using ClamAV antivirus software

IPTables rules for the web server

To open the web server port in IPTables, execute the following command:

iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT

If HTTPS is used, then also:

iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT

To open only a particular network, for example 192.168.0.0/24:

sudo iptables -A INPUT -s 192.168.0.0/24 -p tcp -m tcp --dport 80 -j ACCEPT

You can also restrict access by the IP configuration of the web server itself, for example, as I described for Apache2 in this article – Access Control Apache2.

To set the connection limit on port 80:

iptables -A INPUT -p tcp --dport 80 -m limit --limit 50/second -j ACCEPT

To remove a rule, we’ll specify the same command, replacing -A with -D, for example:

sudo iptables -D INPUT -p tcp -m tcp --dport 80 -j ACCEPT

To view the list of rules, use the command:

sudo iptables -nvL

See also:
Configuring IPTables