Within WHM there comes the ability to automatically kill processes that are related with IRC Bots and Servers. Usually this is more of a concern if there is shell access allowed for the cPanel user.
Where To Find The Background Process Killer
Step One: Log into your WHM Administrative Dashboard.
Step Two: From WHM, in the upper left, search for ‘System Health‘. In the available options will be Background Process Killer. Click on this to be brought to the Background Process Killer management page.
The Background Process Killer page may look like below, where you can select check boxes next to the disabled processes, and add Trusted users if needed.
Background Processes That Can Be Killed
With the list of Processes displayed on the Background Process Killer page, you may not be familiar with all of them. Normally it would be recommended to disable all of them by clicking on the check mark next to each one.
- BitchX – a popular Free IRC Client
- bnc – This is an IRC bouncer. A Bouncer can be used to hide the source connection to a server, and may be used in Denial Of Service Attacks
- eggdrop – eggdrop is an IRC bot that can be used to execute a set of commands on an IRC server. In some cases, may be used to create a botnet for Denial Of Service Attacks.
- generic-sniffers – Sniffers are typically used to collect and investigate packets of information that are transferred between computers.
- guardservices – This is another example of an IRC bot that can be used to execute a set of commands on an IRC server.
- ircd – This is the daemon that is used to host an IRC Server.
- psyBNC – Similar to bnc, this would also be an IRC Network Bouncer
- services – Like guardservices and eggdrop, services is another IRC bot.
Once you have selected the processes you don’t want to be running, click on the Blue Save button to save the changes.
Adding Trusted Users
From the Background Process Killer page, you can also add in Trusted users that will be allowed to run the processes that you have disabled without having the processes killed.
To add Trusted Users, from the Background Process Killer page, you can enter them into the text box underneath Trusted Users. Make sure the usernames are spelled correctly, and that there is only one username per line. Once you are done, click the Blue Save button to save the changes.
- Definition of Security Icons in cPanel – This article goes over the Security icons that can be found within cPanel, and what they may be used for.
- WHM Security Checklist / Best Practices – This article goes over how you can make your cPanel / WHM Server more secure.
- How To Manage SSH keys With WHM – This article goes over how you can manage the SSH keys for your cPanel / WHM Server.
If you should have any questions or would like assistance, do feel free to contact us through Live Chat, on our Phones, or by submitting a ticket with our Technical Support team.