Hi,
For server administrators, it is essential to maintain your server
upkeep in term of the hard ...
In order to deploy WordPress multisite, the following directives
should be added to DOMAINS > EXAMPL...
#1: LS : WHAT’S IN THIS DIRECTORY?
The command LS stands for LIST DIRECTORY CONTENTS. And, cleverl...
ABOUT FAIL2BAN
Fail2Ban is a widely used tool for protecting the bruteforce attack
analyzing the s...
Using SSH can be a superior way to manage the files and databases on
your account. Using a simple co...
This is a simple bash script to fix the permissions and ownership of
files within a cpanel account. ...
This will probably help you to find out the IP which tried the
malpractices in a server to get compr...
THERE IS A SCRIPT AVAILABLE ON EVERY CPANEL SERVERS BY DEFAULT TO
ENABLE THE SPF AND DKIM RECORDS VI...
Brute-Force Attacks occur when an attacker attempts to calculate every
possible combination that cou...
In order to reboot your VPS or Dedicated server via WHM follow these
steps:
1. Log into WHM on you...
The Uncomplicated Firewall (UFW) is a frontend for iptables and is
particularly well-suited for host...
To configure your FTP server, cPanel & WHM version 60 and later:
PURE-FTPD SERVERS
To edit the F...
MOST LINUX DISTRIBUTIONS WILL USE IPTABLES AS THE DEFAULT
FIREWALL. HERE ARE THE COMMANDS TO WHITELI...
I) CPANEL/WHM
There are a few ways to check your memory usage in WHM or cPanel
control panels. Yo...
THE MYSQL TRIGGER IS A DATABASE OBJECT THAT IS ASSOCIATED WITH A
TABLE. IT WILL BE ACTIVATED WHEN A ...
For guide to Enable or Disable Authenticated Client SMTP Submission
(SMTP AUTH) in Exchange Online C...
MALDET (LINUX MALWARE DETECT):-
Maldet is a malware detector which is mainly used in Linux based
se...
STEP 1: BACKING UP THE DATABASES
Before you attempt to repair any database, you should back it up
f...
TO FIND WHICH MAILS ARE STUCK IN MAIL QUEUE AND WHY?
If emails are getting delayed, its better to ...
By default SSH comes configured in a way that disables root user
logins. This is done as a security ...
Many articles in this knowledge base advise editing configuration
files. We usually recommend using ...
THESE INSTRUCTIONS ARE INTENDED SPECIFICALLY FOR REMOVING A USER ON
CENTOS 7.
STEP 1: DELETE THE U...
USE THESE COMMANDS TO SECURELY _DOWNLOAD FROM_ A SERVER
STANDARD SSH PORT:
rsync -avHe ssh _user_...
The Redundant Array of Inexpensive Disks or RAID, is a robust method
of storing data efficiently. It...
Your server is only as secure as your weakest password. As a rule of
thumb, the more lengthy and com...
If you have a website installed for the primary domain of your hosting
account, by default your webs...
On a Linux server, if you are in need of changing the permissions of a
bulk amount of files or direc...
HOW DO I CONNECT TO MY LINUX SERVER VIA SSH?
DO NOTE: For our servers, we uses custom SSH port (YO...
CHECKING IF AN IP IS BLOCKED IN IPTABLES
Check if IP is blocked:
> iptables -L -n --line | grep [...
Here we provide sample of most popular iptables configuration.
We will block all connections excep...
HOW TO CHANGE SSH PORT.
Open the file _/etc/ssh/sshd_config_ with your favourite text editor.
For e...
Please take note that Malaysia and in some countries, or better said
some ISPs are now blocking SMTP...