Separate names with a comma.
This solved the problem.
Some users are asking for PHP Iconv module. How do we enable it? Recompile php?
We are getting following error in cPanel backup job:
The backup process encountered the following errors:
abx_xyz[2017-06-01 04:30:35 +0200]...
Support ticket: 8416647
Support Request ID: 8409211
We have since terminated the affected accounts. So, it would be difficult to replicate the issue.
But we'll still raise a ticket and see if we...
There are no cron jobs for the user:
# crontab -l -u user
no crontab for user
# cat /var/spool/cron/crontabs/user
We decided to raise support ticket as it's taking too long to get solution from forum:
Support ticket: 8405145
This issue is first reported at cpanel uses jailshell for cron (problem) but no solution provided.
We are running cPanel on CentOS 7.2...
Actually there's nothing wrong with start script.
Our suspicion is that there's a spammer who's invoking exim directly. That's why the process...
The mail logs show mails from cron but we don't where those cron jobs are.
We just want to block all cron jobs except those run by the system.
We're seeing a lot of spam emails via cron. Is it possible to block all emails via cron, esp. for non-root users?
We tried using...
Wouldn't this interfere with normal operation of exim?
How can one block all emails to a specific address , e.g. block all emails to email@example.com?
We have noticed several attacks on cPanel that looks like exploits. The attacker first makes a call to change email then after that makes...
The link you provide doesn't say anything about how to prevent a user from sending from server hostname.
We also enabled "Reject remote mail sent...
If I understand well the option `Reject remote mail sent to the server's hostname` means any mail send to the server hostname is rejected. What we...
We have seen many emails send from server domain (e.g. firstname.lastname@example.org), majority of which are spam from exploits.
We would like...
Thanks everyone for commends. Using the information in the logs we were able to trace the source of attacks.
I haven't received response on this. It appears cPanel has a history of 'resetpass' being exploited:
1. cPanel Resetpass Remote Command Execution...