Our Corporate Blog


This article explains how to use the ls command to check Linux file permissions. Being able to check the permissions on a file is useful, especially for troubleshooting. You can ensure that a user can read a particular file, for example, or examine a directory structure to ensure that users can follow the hierarchy to the files that they need.

ls command

Use the ls command (the first letter is a lowercase L) to see what files are

Categories : Blog, Our Blog
Posted by W3bM@st3r
, , , ,
No Comments

Over the course of the last two years, rumors have swirled over Google’s position concerning forcing the move to HTTPS encryption. Last year, Google began officially warning website owners that non HTTPS sites would incur consumer messaging that identified the site as non-secure. The exact “when’ and the “how,” however, have eluded site owners up until today. On February 8th, Google made clear its intentions to formally mark websites lacking

Categories : Blog, Our Blog
Posted by W3bM@st3r
, , , , ,
No Comments

Being a web host, your servers are constantly being attacked by hackers by denial-of-service (DoS) and other brute force attacks. There is no foolproof method to stop 100% of all attacks, but there are ways to protect your servers by applying firewall rules, and detecting and banning attacking IPs. This article makes use of the APF, BFD, DDoS Deflate and RootKit to detect and protect your server from denial-of-service type attacks. To apply those utilities, please follow the

Categories : Our Blog
Posted by W3bM@st3r
, ,
No Comments

When moving sites from one host to another, for example client sites, I have from time to time found that the user password gets corrupted after importing to the new database, resulting in an inability to login. Why this happens is hard to say, but it could be anything from a poor export/import of the database backup to different versions of MySQL on the old/new host. I’ll leave the reasons why to the experts, but

Categories : Blog, Our Blog
Posted by W3bM@st3r
No Comments

This article is not dealing with technical terms and concentrates to deliver the content simple. If you are a programmer let me tell you, why you should prefer Framework ahead of Core PHP for your projects. If you are a business guy let me tell you, why it is so important to insist your software vendor to develop your web applications and websites with PHP Framework. The comparison between Core PHP and PHP Framework can

Categories : Our Blog
Posted by W3bM@st3r
No Comments

Run the following command as root user.

/scripts/fixquotas

Try finding other files owned by the user.

find -user username > /tmp/username.txt

This will list all files owned by this user that could be affecting the quota reported by Cpanel. Cpanel/WHM sometimes has problems with the user quota files causing all users accounts to have unlimited disk space available or 0 megs of disk space in use. *To enable user quota support

Categories : Our Blog, Uncategorized
Posted by W3bM@st3r
No Comments

One thing you’ll probably run into sometime is changing the hostname and IP address of a cPanel machine.. whether you’re cloning it for a quick start or if you’ve taken it over.. moving it to a different datacenter, etc.. This is based on CentOS 6… First, grab a license for the new IP address you’re going to use.. Next, edit the following files with the new information and restart the network: /etc/sysconfig/network-scripts/ifcfg-eth0 /etc/sysconfig/network Next,

Categories : Our Blog, Uncategorized
Posted by W3bM@st3r
No Comments

One of our client server’s was affected by virus and he can’t control it. And he is aks me to look into the issues. I have verified on server and found that one account got affected severely and run the below steps to remove it. Note : If you installed the clamav from WHM Plugin, your clamav installation location is follow. If you installed manually find the exact path and use it according that.

1)

Categories : Our Blog, Uncategorized
Posted by W3bM@st3r
No Comments

Problem After configuring port 25 or 1025, as it is described in the article, the following error appears while sending a test message in Outlook: Send test e-mail message: None of the authentication methods supported by this client are supported by your server. Cause The error occurs if encryption type is not specified in mail client. Solution Change the encryption type from None to TLS or Auto : Open Outlook and click Tools. In the

Categories : Our Blog, Uncategorized
Posted by W3bM@st3r
, , , , , ,
No Comments

How do I clear my Mac so I can sell it? You just have to reformat your hard drive and reinstall a clean version of the operating system.

It is that time again. Time to decide whether to keep or replace your Mac laptop or desktop computer. If you are reading this article, chances are you’ve already come to the decision to replace your Mac, and you’re thinking about selling your old model.

Categories : Our Blog, Uncategorized
Posted by W3bM@st3r
No Comments

Technologies We Use

Powered By:
pamirwebhost.com
Top