• 0 Posts
  • 12 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle

  • If you’ve actually been hacked you want to get your data off to another computer and then wipe the hacked server. You can try and run a rootkit to see if it can detect any signs of being hacked.

    Before using any files from the serer, check them carefully for virus and trojans.

    If you just locked yourself out of the server by mistake, boot into single-user mode and reset your password.

    Either way, unplug the network cable until you figure out if you’ve been hacked or not.








  • The standard is to retry for 5 days before bouncing emails as undeliverable (and send a warning message that the email hasn’t yet been delivered after 4 hours). However, every server can configure it to be whatever they want, so there’s no guarantee.

    You can’t just use any old provider as a secondary mx, you need a server which is configured to accept mail for your domain but not try and deliver it locally. It’s pretty simple to set up. The biggest issue is that you need the same spam protections on the secondary as on the primary, as spammers will send directly to the secondary to try and bypass spam protections.



  • Use bind mounts instead of docker volumes. Then you just have normal directories to back up, the same as you would anything else.

    In general, it’s not a problem to back up files while the container is running. The exception to this is databases. To have reliable database backups, you need to stop the container (or quiesce/pause the database if it supports it) before backing up the raw database files (including SQLite).