Step 1.
install mutt ( email client )
Ubuntu/Debian :
apt-get install mutt
Centos :
yum -y install mutt
Step2
download script and edit this line as you see the samples.
echo "backup in proccess" | mutt -a "/var/mcsbackup.tar.gz" -s "mcsbackup" -- YourEmail@whatever.com
Step3.
upload it at /usr/script/
( if you dont have a “script” folder just create it.
Step4.
Edit your Crontab and add this line before “Exit 0”
0 0 * * * root /var/script/autobackup.sh
Download Script
now restart your vps. and your script will run every midnight.
Webmin is a web-based system administration tool for Unix-like systems. It provides an easy alternative to command line system administration and can be used to manage various aspects of a system, such as users and services, through the use of the provided Webmin modules. If you want to manage your own server but you are uncomfortable with the command line, Webmin is a good tool to help you get started.
This tutorial covers the installation of Webmin with SSL using apt-get on Ubuntu 14.04.
To install Webmin, you will need to have access to a user with root privileges. It is recommended that you set up a non-root user with sudo access by following steps 1-3 of this link: Initial Server Setup with Ubuntu 14.04. This user will also be used to login to the Webmin interface, and Webmin will use the credentials to administer your server.
Note that you are required to use password-based authentication enabled to log in to your server via Webmin.
Log in to your server as the new user that you created (or root) via SSH (substitute your user name and server IP address here):
ssh new_user@server_IP_address
Answer the password prompt to complete the login process.
Let’s get started with the Webmin installation!
To install Webmin via apt-get, you must first add the Webmin repository to your sources.list
file.
On your server, open the sources.list
file in your favorite text editor. We will use nano
in this tutorial:
sudo nano /etc/apt/sources.list
If you are prompted for a “[sudo] password”, enter your user’s password.
Now press Ctrl-W
then Ctrl-V
to navigate to the end of the file, then add the following lines to the file:
deb http://download.webmin.com/download/repository sarge contrib
deb http://webmin.mirror.somersettechsolutions.co.uk/repository sarge contrib
When you are finished editing, save the file by pressing Ctrl-X
, then y
, RETURN
.
Now add the Webmin GPG key to apt, so the source repository you added will be trusted. This command will do that:
wget -q http://www.webmin.com/jcameron-key.asc -O- | sudo apt-key add -
Before installing Webmin, you must update apt-get’s package lists:
sudo apt-get update
Now run this apt-get command to install Webmin:
sudo apt-get install webmin
Enter y
to confirm the installation.
After the installation is complete, the Webmin service will start automatically.
In a web browser, access your server’s Webmin login page via its public IP address (the same IP address you used to login via SSH) on port 10000
. By default, Webmin will start with SSL/TLS enabled, so you will need to use HTTPS to connect to it.
Open this URL in your web browser (substitute the IP address):
https://server_IP_address:10000
You will be prompted with a warning that says your server’s SSL certificate is not trusted. This is because Webmin automatically generates and installs an SSL certificate upon installation, and this SSL certificate was not issued by a certificate authority that is trusted by your computer. Although your computer cannot verify the validity of the certificate, you know that you are, in fact, accessing your own server. It is fine to proceed.
Instruct your web browser to trust the certificate. If you are using Chrome, for example, click the Advanced link, then click the Proceed to server_IP_address (unsafe) link. If you are using Firefox, click I Understand the Risks, then the Add Exception… button, then the Confirm Security Exception button.
At this point, you will see the Webmin login screen:
Enter the same login credentials that you used to log in to your server via SSH. This user must have root privileges via sudo.
Congratulations! You have successfully installed Webmin, and it is ready to be used. Remember that, because you are using a privileged user to access Webmin, the Webmin application has full access to your server—keep your login credentials secure!
When you first log into Webmin, you will be taken to the System Information page, which will show you an overview of your system’s resources and other miscellaneous information. This view also shows you any Webmin updates that are available.
On the left side, you will see the navigation menu, which you can use to access the various Webmin modules and manage your server. The navigation menu is organized into categories, and each category has its own set of modules. The Webmin category is special because contains modules that are used to configure the Webmin application, while the other categories are used to perform various system administration tasks.
Take some time to explore the modules that are available, to familiarize yourself with Webmin.
A basic system administration task that you can perform with Webmin is user management. We will show you how to create a new user with the Users and Groups module.
Expand the System category in the navigation menu, then click on Users and Groups.
Then click the Create a new user. link.
Enter the Username and any other settings you want to assign to the new user, then click the Create button.
The user will be created on the server, with the specified settings.
The Users and Groups module can also be used to perform other user management tasks, such as deleting and disabling users and groups.
Webmin comes with a large variety of modules that manage different software packages. We will demonstrate how to install a web server using the the Apache Webserver module, as an example.
In the navigation menu, click Un-used Modules to expand the category, and then click Apache Webserver.
If you do not have Apache installed on your server, the module will notify you and provide you with a way to install Apache.
Use the Click here link (in the last sentence) to install Apache via apt-get through Webmin.
After the Apache installation is complete, your server will be running the default Apache server.
The Apache Webserver module will be moved to the Servers category, and you may use it to manage the configuration of your Apache server.
Now that you have Webmin installed on your Ubuntu server, you should be able to use it to perform basic system administration tasks.
BOOTICE is a portable utility developed for power users who need to either modify or backup and restore MBR (Master Boot Record) and PBR (Partition Boot Record) of local drives or removable media including external hard drives, USB drives, etc. For those who don’t have clue of these boot records, MBR is generally referred to as first sector (size : 512 bytes) of any partitioned drive whereas volume or partition boot record holds code to initiate booting and is invoked by MBR.
Warning for beginners: It is not advisable to fiddle around with master boot record or with volume boot record, as it can change system booting process and can leave your PC unbootable. We will recommend that you use BOOTICE with removable media and not with auxiliary storage disks.
Coming back to features, it lets you backup MBR of selected drives (primary or external) and enables you to create disk images (IMG & IMA format), fill up disk space with random data, manage partitions while allowing you to edit Boot Configuration Data (BCD file) to tweak with system booting process.
It supports multiple boot record types ranging from Windows NT 5/6, Plop Boot Manager, SYS Linux, to Grub4Dos. On the main interface, it displays all attached external storages along with primary disk. Underneath it, you have options to process MBR & PBR, to bring up partition manager and check out disk data sector-wise. Process MBR and Process PBR buttons let users backup and restore the boot record. Before starting out, you need to choose the boot record type to begin the process. The backup is created in BIN format. It’s must be noted here that before restoring boot record, you will need to specify the correct boot type with which boot record backup was created.
Partition Manager allows user to backup and restore partition table, change and remove drive ID, format/re-format disk with a facility to format only selected part of disk.
As mentioned beforehand, it is capable of processing disk images in IMG or IMA format, you can select the disk image file to backup its master boot record & volume boot record and view the data distribution in sectors. Depending on the OS type, it can bring up BCD file editor with relative options to change booting process. Under BCD Edit tab, BCD file can be specified manually or you can let it find out the location of currently active OS BCD file.
Random data filling makes data on selected disk unrecoverable. With its Disk filling feature you can fill selected disk with 0x00, 0xFF or with custom data in snap to ensure data safety.
We found BOOTICE to be very useful. Since it is a portable application, you can carry it anywhere to modify and backup MBR and PBR of almost all types of disks. With other complementary options like BCD editing and data filling, booting behavior can be altered on the fly without having to search for BCD file while you can destroy disc data by filling random junk to prevent recovery operations. It supports Windows 2000, Windows XP, Windows Vista, and Windows 7.
ubuntu-12.0.4.5-server-i386.iso
ubuntu-14.0.4.3-server-i386.iso
ubuntu-14.0.4.4-server-amd64.iso
ubuntu-15.10-server-amd64.iso
ubuntu-15.10-server-i386.iso
ubuntu-16.10-server-i386.iso
ubuntu-16.10-server-amd64.iso
debian-Last-Update-amd64-DVD-1.iso
debian-Last-Update-amd64-DVD-2.iso
debian-Last-Update-amd64-DVD-3.iso
debian-Last-Update-i386-DVD-1.iso
debian-Last-Update-i386-DVD-2.iso
debian-Last-Update-i386-DVD-3.iso
debian-Last-Update-amd64-CD-1.iso
debian-Last-Update-amd64-CD-2.iso
debian-Last-Update-amd64-CD-3.iso
debian-Last-Update-amd64-CD-4.iso
debian-Last-Update-amd64-CD-5.iso
debian-Last-Update-amd64-CD-6.iso
debian-Laste-Update-amd64-CD-7.iso
debian-Last-Update-amd64-CD-8.iso
debian-Last-Update-amd64-kde-CD-1.iso
debian-Last-Update-amd64-lxde-CD-1.iso
debian-Last-Update-amd64-netinst.iso
debian-Last-Update-amd64-xfce-CD-1.iso
debian-mac-Last-Update-amd64-netinst.iso
debian-Last-Update-i386-CD-1.iso
debian-Last-Update-i386-CD-2.iso
debian-Last-Update-i386-CD-3.iso
debian-Last-Update-i386-CD-4.iso
debian-Last-Update-i386-CD-5.iso
debian-Last-Update-i386-CD-6.iso
debian-Last-Update-i386-CD-7.iso
debian-Last-Update-i386-CD-8.iso
debian-Last-Update-i386-kde-CD-1.iso
debian-Last-Update-i386-lxde-CD-1.iso
debian-Last-Update-i386-netinst.iso
debian-Laste-Update-i386-xfce-CD-1.iso
debian-mac-Last-Update-i386-netinst.iso
This section gives insight into the most important commands of your SuSE Linux system. Along with the individual commands, parameters are listed and, where appropriate, a typical sample application is introduced. To learn more about the various commands, it is usually possible to get additional information with the man program followed by the name of the command, for example, man ls.
In these manual pages, move up and down with PgUp and PgDn and move between the beginning and the end of a document with Home and End. End this viewing mode by pressing Q. Learn more about the man command itself with man.
There are many more commands than listed in this chapter. For information about other commands or more detailed information, we recommend the O’Reilly publication Linux in a Nutshell. In the following overview, the individual command elements are written in different typefaces.
Adjust possible specifications to your needs. It makes no sense to write ls file(s), if no file named file(s) actually exists. You can usually combine several parameters, for example, by writing ls -la instead of ls -l -a.
The mode parameter has three parts: group, access, and access type. group accepts the following characters:
For access, access is granted by the + symbol and denied by the - symbol.
The access type is controlled by the following options:
tar is a quite complex command with a number of options available. The most frequently used options are:
The archive files created by tar end with .tar. If the tar archive was also compressed using gzip, the ending is .tgz or .tar.gz. If it was compressed using bzip2, .tar.bz2.
Application examples can be found in Section “Archives and Data Compression”.
The database can be generated by root with updatedb.
This is frequently used by programmers who need only send their program alterations and not the entire source code.
For hard disks not defined in the file /etc/fstab, the device type must also be specified. In this case, only root can mount. If the file system should also be mounted by other users, enter the option user in the appropriate line in the /etc/fstab file (separated by commas) and save this change. Further information is available in mount.
kill sends a TERM signal that instructs the program to shut itself down. If this does not help, the following parameter can be used:
Do not use telnet over a network on which third parties can eavesdrop. Particularly on the Internet, use encrypted transfer methods, such as ssh, to avoid the risk of malicious misuse of a password (see the man page for ssh).
Linux Commands pdf