Knowledgebase
(27)WHM
(46)cPanel
(32)Plesk
(32)CentOS Linux Server
(5)Windows Server
(8)Cloud
(3)Billing
(1)MS Exchange
(3)Forex
(12)VPS (Virtual Private Server)
(192)MANUALS / GUIDES
(26)Applications
(43)CMS (Content Management System )
(112)Control Panel
(34)Database
(51)Dedicated Servers
(28)Domain Name
(17)Domain Name Server (DNS)
(6)Downloads / Tools
(6)Email Blasting (International)
(133)Email Hosting
(4)FAQ for ex-SmarterTeam customers
(3)Google Apps
(5)Network
(5)Reseller Tips
(2)FAQ for IPxCess
(166)Security
(109)Shared Hosting
(5)SSL
(2)Video Guide
(2)VPN (Virtual Private Network)
(9)Webserver
(13)Business Email Hosting (Dynamail)
(13)Wordpress Web Hosting
Linux Web Hosting (cPanel)
Windows Web Hosting (Plesk)
Strongbolt Email Hosting
Website Builder Hosting
Migrations
SSH Port for Dedicated Server: 55000
SSH Port for VPS Server: 44200
#1: LS : WHAT’S IN THIS DIRECTORY?
The command LS stands for LIST DIRECTORY CONTENTS. And, cleverly, it
will do just that: list a directory's contents! Using it with -F will
give a list of the directories contents, and denote items that are
other direct...
On a Linux server, if you are in need of changing the permissions of a
bulk amount of files or directories recursively, we can use 'find'
command to do it. The steps are explained below:
* Change to the directory in which you need to change the
permiss...
This will probably help you to find out the IP which tried the
malpractices in a server to get compromised.
First, we can try to find the IP which I need to monitor
1. This netstat script will list out the number of connections made by
an IP
> NETST...
By default SSH comes configured in a way that disables root user
logins. This is done as a security precaution and means that you
cannot directly login as the root user over SSH. However you can
usually get around the need for root ssh login by using the ...
HOW TO SETUP YOUR REMOTE ACCESS KEY IN WHM.
This demo assumes you've already logged in to WebHost Manager (WHM).
Now let's learn how to setup a remote access key.
A remote access key is what's needed if you want to have a script
automatically connect ...
Please take note that Malaysia and in some countries, or better said
some ISPs are now blocking SMTP Port 25 to mitigate Spam in their
network.
An approach lots of systems administrators are taking is to use port
26, so you can configure your email clie...
Here we provide sample of most popular iptables configuration.
We will block all connections except specific ports
First of all to exclude any errors because of previous config we will
delete all current iptables rules.
SSH to your server with root ...
HOW TO CHANGE SSH PORT.
Open the file _/etc/ssh/sshd_config_ with your favourite text editor.
For example:
nano /etc/ssh/sshd_config
Find the string which defines the port and edit it:
# What ports, IPs and protocols we listen for
Port 22
Now resta...
If you have a website installed for the primary domain of your hosting
account, by default your website is loaded from the public_html
folder. Public_html is the root folder for the primary domain and is
also called web root folder or document root direct...
To change the root password for your VPS or Dedicated server via WHM:
1. Log into WHM.
2. Go to SERVER CONFIGURATION > CHANGE ROOT PASSWORD menu.
3. Enter the new password in NEW ROOT PASSWORD and CONFIRM PASSWORD
fields (you may use built-in Password G...
CHECKING IF AN IP IS BLOCKED IN IPTABLES
Check if IP is blocked:
> iptables -L -n --line | grep [IP Address]
If IP appear as DROP or REJECT, the IP has been blocked
Unblock the IP Address:
> iptables -I INPUT -s [IP Address] -j ACCEPT
Blocking ba...
I) CPANEL/WHM
There are a few ways to check your memory usage in WHM or cPanel
control panels. You may check the general overview of the server
status via WHM > Server Information and WHM > Service Status, which
also includes information about memory usa...
METHOD #1: CHECKING THE VERSION OF CPANEL / WHM BY THE ‘CPANEL’
COMMAND
Using the cPanel command:
/usr/local/cpanel/cpanel -V
11.50.0 (build 27)
METHOD #2: CHECKING THE VERSION OF CPANEL / WHM BY LOOKING AT THE
VERSION FILE
Using the version file:...
ABOUT FAIL2BAN
Fail2Ban is a widely used tool for protecting the bruteforce attack
analyzing the server log files. This will help us to automatically
protect the server from malicious login attempts.
INSTALLING FAIL2BAN
Usually the default Centos Yu...
THESE INSTRUCTIONS ARE INTENDED SPECIFICALLY FOR REMOVING A USER ON
CENTOS 7.
STEP 1: DELETE THE USER
It's just one simple command to add a user. In this case, we're adding
a user called mynewuser:
userdel mynewuser
If you want to remove all of th...
STEP 1: BACKING UP THE DATABASES
Before you attempt to repair any database, you should back it up
first. To back up all of the files from all of your databases, follow
these steps:
* Log in to your server using SSH.
* Stop the MySQL server using th...
USE THESE COMMANDS TO SECURELY _DOWNLOAD FROM_ A SERVER
STANDARD SSH PORT:
rsync -avHe ssh _user_@_server_:_/path/to/file_
_/home/user/path/to/file_
* USER: The username of the remote user through which you'll be
logging into the target (remote) se...
HOW TO SSH TO THE SERVER
DO NOTE: For our servers, we use SSH PORT: 44200 (VPS) AND (55000) FOR
OUR DEDICATED SERVERS (DS) for security reasons.
DOWNLOAD PUTTY
Use the following steps to download and open PuTTY:
*
Download PuTTY from the PuTTY w...
HOW TO TEST THE APACHE AND PHP CONFIGURATION
Q. HOW CAN I BE SURE THAT MY PHP SERVER IS WORKING? AND HOW TO KNOW
THE VERSION AND MODULES ENABLED?
A. You can create a simple PHP script and load it from your browser in
order to know the version of PHP an...
MALDET (LINUX MALWARE DETECT):-
Maldet is a malware detector which is mainly used in Linux based
servers. It uses threat data from network edge intrusion detection
systems to extract malware that is actively being used in attacks and
generates signatures...
Using SSH can be a superior way to manage the files and databases on
your account. Using a simple command you can import or export a MySQL
database into an existing database on your account.
Please note that in the examples below the -P will prompt for ...
In order to deploy WordPress multisite, the following directives
should be added to DOMAINS > EXAMPLE.COM > APACHE & NGINX SETTINGS >
ADDITIONAL NGINX DIRECTIVES:
> # WordPress multisite subdirectory rules.
> index index.php;
>
> # This order might s...
Many articles in this knowledge base advise editing configuration
files. We usually recommend using your preferred text editor. At
Liquid Web, we prefer vim. Vim, or its older sibling vi, are installed
by default on nearly every server that we come across...
TO FIND WHICH MAILS ARE STUCK IN MAIL QUEUE AND WHY?
If emails are getting delayed, its better to inspect postfix mail
queues, coupled with postfix mail log.
STATUS/SHAPE OF MAIL QUEUE
Postfix maintains different queues for different purpose.active a...
Your server is only as secure as your weakest password. As a rule of
thumb, the more lengthy and complex a password, the stronger it is.
Follow the best practices below for generating difficult to crack
passwords.
Best Practices
DOS
* DO USE PASSWO...
This is a simple bash script to fix the permissions and ownership of
files within a cpanel account. To use, simply copy the script your
server, chmod 755, and pass the usernames as arguments:
> ./fixperms user1 user2 user3
You can also run a server-wid...
Hi,
For server administrators, it is essential to maintain your server
upkeep in term of the hard disk space. When the server hard disk is
full, there will be a serious downtime that will happen to your
server.
The most important sign when the hard di...
When configuring your server settings, you may be asked to enter a
specific port number for a particular application or service. Here's a
list of commonly requested port numbers you can use with your server:
* HTTP - Port 80
* HTTPS - 443
* FTP - ...
Brute-Force Attacks occur when an attacker attempts to calculate every
possible combination that could make up a password and test against
your site to see if it is a correct password. This can be done either
by using dictionary words or trying to guess t...
WHAT IS MY VPS OR DEDICATED SERVER SSH PORT?
- Dedicated and VPS customers automatically have root SSH access. Root
shell allows you to change anyone and anything on your server.
By default, all our VPS SERVERS use PORT NUMBER 44200 for SSH access.
...
The Redundant Array of Inexpensive Disks or RAID, is a robust method
of storing data efficiently. It uses techniques like striping,
mirroring, and parity to utilize multiple hard drives combined into
larger volumes.
RAID serves two main purposes, it can...
Copyright © 1998 - 2018 Shinjiru International Inc. All Rights Reserved.