Knowledgebase : Linux Server
Hi, For server administrators, it is essential to maintain your server upkeep in term of the hard ...
In order to deploy WordPress multisite, the following directives should be added to DOMAINS > EXAMPL...
#1: LS : WHAT’S IN THIS DIRECTORY? The command LS stands for LIST DIRECTORY CONTENTS. And, cleverl...
ABOUT FAIL2BAN Fail2Ban is a widely used tool for protecting the bruteforce attack analyzing the s...
For guide to Enable or Disable Authenticated Client SMTP Submission (SMTP AUTH) in Exchange Online C...
Using SSH can be a superior way to manage the files and databases on your account. Using a simple co...
This is a simple bash script to fix the permissions and ownership of files within a cpanel account. ...
This will probably help you to find out the IP which tried the malpractices in a server to get compr...
THERE IS A SCRIPT AVAILABLE ON EVERY CPANEL SERVERS BY DEFAULT TO ENABLE THE SPF AND DKIM RECORDS VI...
Brute-Force Attacks occur when an attacker attempts to calculate every possible combination that cou...
In order to reboot your VPS or Dedicated server via WHM follow these steps: 1. Log into WHM on you...
The Uncomplicated Firewall (UFW) is a frontend for iptables and is particularly well-suited for host...
To configure your FTP server, cPanel & WHM version 60 and later: PURE-FTPD SERVERS To edit the F...
MOST LINUX DISTRIBUTIONS WILL USE IPTABLES AS THE DEFAULT FIREWALL. HERE ARE THE COMMANDS TO WHITELI...
I) CPANEL/WHM There are a few ways to check your memory usage in WHM or cPanel control panels. Yo...
THE MYSQL TRIGGER IS A DATABASE OBJECT THAT IS ASSOCIATED WITH A TABLE. IT WILL BE ACTIVATED WHEN A ...
HOW TO TEST THE APACHE AND PHP CONFIGURATION Q. HOW CAN I BE SURE THAT MY PHP SERVER IS WORKING? AN...
MALDET (LINUX MALWARE DETECT):- Maldet is a malware detector which is mainly used in Linux based se...
STEP 1: BACKING UP THE DATABASES Before you attempt to repair any database, you should back it up f...
TO FIND WHICH MAILS ARE STUCK IN MAIL QUEUE AND WHY? If emails are getting delayed, its better to ...
By default SSH comes configured in a way that disables root user logins. This is done as a security ...
Many articles in this knowledge base advise editing configuration files. We usually recommend using ...
THESE INSTRUCTIONS ARE INTENDED SPECIFICALLY FOR REMOVING A USER ON CENTOS 7. STEP 1: DELETE THE U...
USE THESE COMMANDS TO SECURELY _DOWNLOAD FROM_ A SERVER STANDARD SSH PORT: rsync -avHe ssh _user_...
The Redundant Array of Inexpensive Disks or RAID, is a robust method of storing data efficiently. It...
Your server is only as secure as your weakest password. As a rule of thumb, the more lengthy and com...
If you have a website installed for the primary domain of your hosting account, by default your webs...
On a Linux server, if you are in need of changing the permissions of a bulk amount of files or direc...
CHECKING IF AN IP IS BLOCKED IN IPTABLES Check if IP is blocked: > iptables -L -n --line | grep [...
Here we provide sample of most popular iptables configuration. We will block all connections excep...
HOW TO CHANGE SSH PORT. Open the file _/etc/ssh/sshd_config_ with your favourite text editor. For e...
Please take note that Malaysia and in some countries, or better said some ISPs are now blocking SMTP...
Copyright © 1998 - 2021 Shinjiru International Inc. All Rights Reserved.