Knowledgebase : CentOS Linux Server
SSH Port for Dedicated Server: 55000 SSH Port for VPS Server: 44200
Hi, For server administrators, it is essential to maintain your server upkeep in term of the hard ...
I) CPANEL/WHM There are a few ways to check your memory usage in WHM or cPanel control panels. You ...
To change the root password for your VPS or Dedicated server via WHM: 1. Log into WHM. 2. Go to SE...
This is a simple bash script to fix the permissions and ownership of files within a cpanel account. ...
In order to deploy WordPress multisite, the following directives should be added to DOMAINS > EXAMPL...
#1: LS : WHAT’S IN THIS DIRECTORY? The command LS stands for LIST DIRECTORY CONTENTS. And, cleverl...
Brute-Force Attacks occur when an attacker attempts to calculate every possible combination that cou...
ABOUT FAIL2BAN Fail2Ban is a widely used tool for protecting the bruteforce attack analyzing the s...
Using SSH can be a superior way to manage the files and databases on your account. Using a simple co...
WHAT IS MY VPS OR DEDICATED SERVER SSH PORT? - Dedicated and VPS customers automatically have root...
HOW TO SSH TO THE SERVER DO NOTE: For our servers, we use SSH PORT: 44200 (VPS) AND (55000) FOR OU...
HOW TO BLOCK BOTS USING ROBOTS.TXT FILE? The robots.txt file is a simple text file placed on your w...
For guide to Enable or Disable Authenticated Client SMTP Submission (SMTP AUTH) in Exchange Online C...
HOW TO TEST THE APACHE AND PHP CONFIGURATION Q. HOW CAN I BE SURE THAT MY PHP SERVER IS WORKING? AN...
MALDET (LINUX MALWARE DETECT):- Maldet is a malware detector which is mainly used in Linux based se...
STEP 1: BACKING UP THE DATABASES Before you attempt to repair any database, you should back it up f...
When configuring your server settings, you may be asked to enter a specific port number for a partic...
TO FIND WHICH MAILS ARE STUCK IN MAIL QUEUE AND WHY? If emails are getting delayed, its better to ...
By default SSH comes configured in a way that disables root user logins. This is done as a security ...
Many articles in this knowledge base advise editing configuration files. We usually recommend using ...
THESE INSTRUCTIONS ARE INTENDED SPECIFICALLY FOR REMOVING A USER ON CENTOS 7. STEP 1: DELETE THE U...
USE THESE COMMANDS TO SECURELY _DOWNLOAD FROM_ A SERVER STANDARD SSH PORT: rsync -avHe ssh _user_...
METHOD #1: CHECKING THE VERSION OF CPANEL / WHM BY THE ‘CPANEL’ COMMAND Using the cPanel command: ...
The Redundant Array of Inexpensive Disks or RAID, is a robust method of storing data efficiently. It...
Your server is only as secure as your weakest password. As a rule of thumb, the more lengthy and com...
HOW TO SETUP YOUR REMOTE ACCESS KEY IN WHM. This demo assumes you've already logged in to WebHost ...
If you have a website installed for the primary domain of your hosting account, by default your webs...
On a Linux server, if you are in need of changing the permissions of a bulk amount of files or direc...
This will probably help you to find out the IP which tried the malpractices in a server to get compr...
CHECKING IF AN IP IS BLOCKED IN IPTABLES Check if IP is blocked: > iptables -L -n --line | grep [...
Here we provide sample of most popular iptables configuration. We will block all connections excep...
HOW TO CHANGE SSH PORT. Open the file _/etc/ssh/sshd_config_ with your favourite text editor. For e...
Please take note that Malaysia and in some countries, or better said some ISPs are now blocking SMTP...
Copyright © 1998 - 2021 Shinjiru International Inc. All Rights Reserved.