SSH Port for Dedicated Server: 55000
SSH Port for VPS Server: 44200
Hi,
For server administrators, it is essential to maintain your server
upkeep in term of the hard ...
I) CPANEL/WHM
There are a few ways to check your memory usage in WHM or cPanel
control panels. You ...
To change the root password for your VPS or Dedicated server via WHM:
1. Log into WHM.
2. Go to SE...
This is a simple bash script to fix the permissions and ownership of
files within a cpanel account. ...
In order to deploy WordPress multisite, the following directives
should be added to DOMAINS > EXAMPL...
#1: LS : WHAT’S IN THIS DIRECTORY?
The command LS stands for LIST DIRECTORY CONTENTS. And, cleverl...
Brute-Force Attacks occur when an attacker attempts to calculate every
possible combination that cou...
ABOUT FAIL2BAN
Fail2Ban is a widely used tool for protecting the bruteforce attack
analyzing the s...
Using SSH can be a superior way to manage the files and databases on
your account. Using a simple co...
WHAT IS MY VPS OR DEDICATED SERVER SSH PORT?
- Dedicated and VPS customers automatically have root...
HOW TO SSH TO THE SERVER
DO NOTE: For our servers, we use SSH PORT: 44200 (VPS) AND (55000) FOR
OU...
HOW TO BLOCK BOTS USING ROBOTS.TXT FILE?
The robots.txt file is a simple text file placed on your w...
For guide to Enable or Disable Authenticated Client SMTP Submission
(SMTP AUTH) in Exchange Online C...
HOW TO TEST THE APACHE AND PHP CONFIGURATION
Q. HOW CAN I BE SURE THAT MY PHP SERVER IS WORKING? AN...
MALDET (LINUX MALWARE DETECT):-
Maldet is a malware detector which is mainly used in Linux based
se...
STEP 1: BACKING UP THE DATABASES
Before you attempt to repair any database, you should back it up
f...
When configuring your server settings, you may be asked to enter a
specific port number for a partic...
TO FIND WHICH MAILS ARE STUCK IN MAIL QUEUE AND WHY?
If emails are getting delayed, its better to ...
By default SSH comes configured in a way that disables root user
logins. This is done as a security ...
Many articles in this knowledge base advise editing configuration
files. We usually recommend using ...
THESE INSTRUCTIONS ARE INTENDED SPECIFICALLY FOR REMOVING A USER ON
CENTOS 7.
STEP 1: DELETE THE U...
USE THESE COMMANDS TO SECURELY _DOWNLOAD FROM_ A SERVER
STANDARD SSH PORT:
rsync -avHe ssh _user_...
METHOD #1: CHECKING THE VERSION OF CPANEL / WHM BY THE ‘CPANEL’
COMMAND
Using the cPanel command:
...
The Redundant Array of Inexpensive Disks or RAID, is a robust method
of storing data efficiently. It...
Your server is only as secure as your weakest password. As a rule of
thumb, the more lengthy and com...
HOW TO SETUP YOUR REMOTE ACCESS KEY IN WHM.
This demo assumes you've already logged in to WebHost ...
If you have a website installed for the primary domain of your hosting
account, by default your webs...
On a Linux server, if you are in need of changing the permissions of a
bulk amount of files or direc...
This will probably help you to find out the IP which tried the
malpractices in a server to get compr...
CHECKING IF AN IP IS BLOCKED IN IPTABLES
Check if IP is blocked:
> iptables -L -n --line | grep [...
Here we provide sample of most popular iptables configuration.
We will block all connections excep...
HOW TO CHANGE SSH PORT.
Open the file _/etc/ssh/sshd_config_ with your favourite text editor.
For e...
Please take note that Malaysia and in some countries, or better said
some ISPs are now blocking SMTP...