Search results

  1. bhawanisingh

    Steps to enable Greylisting in WHM

    Steps to enable Greylisting in WHM Administrator of the dedicated server use tools for streaming a large amount of spam. Greylisting is a tool available in WHM and it stops getting spam and incoming emails that are not needed. This tool rejects the mails temporarily from a particular user in...
  2. bhawanisingh

    Steps to Blacklist/Whitelist an IP Address in WHM

    Steps to Blacklist/Whitelist an IP Address in WHM WHM or Web Host Manager is a program that is used to access the administrative control of VPS or dedicated server of cPanel. You can resell the web hosting services or use the old server. It’s the reseller of cPanel. Hosting accounts in the...
  3. bhawanisingh

    Disabling Password Authorization in WHM

    Disabling Password Authorization in WHM Through WHM or Web Host Manager, you can access the VPS administration or cPanel’s dedicated servers. With this, you can run the old server or resell the web hosting services. WHM is the cPanel’s reseller. Using cPanel, hosting accounts are managed in the...
  4. bhawanisingh

    Enabling cPHulk on your Dedicated Server

    Enabling cPHulk on your Dedicated Server Your server may be open and exposed to the whole Internet, through which many people can access your services like WHM, cPanel, email accounts, and FTP. Brute Force Attack is unauthorized attacks that access all the services through various automatic...
  5. bhawanisingh

    503 This mail server requires authentication when attempting to send to a non-local e-mail address

    Unable to send an email via PHP or ASP.NET script: This error occurs mostly in Windows system. The users can send emails to local domain systems but can’t send emails to external addresses. Why they do server sends this message: 503 This mail server requires authentication when attempting to...
  6. bhawanisingh

    Error: "APS application installation fails: There is not enough space on the disk"

    APS application installation fails: There is not enough space on the disk APS is Application Packaging Standard that is used for integrating application software and hosting platforms. Your system will behave badly if it doesn’t have sufficient space or sufficient memory on the disk. An...
  7. bhawanisingh

    Steps to downgrade WordPress to a previous version using Plugin

    Steps to downgrade WordPress to a previous version using Plugin WordPress is an open source tool used in online for creating websites that are written in PHP language. Website and blogging CMS (Content Management System) which is easily manageable and available. The WordPress code is updated...
  8. bhawanisingh

    How to Blacklist/Whitelist a Country in WHM?

    Blacklist/Whitelist a Country in WHM WHM is a Web Host Manager that allows you to access the administration of VPS or dedicated sever of cPanel. It also allows you to access the custom support of the hosting provider. WHM helps you to run your old server or resell the services for web hosting...
  9. bhawanisingh

    [RESOLVED] Error : "ERR_TOO_MANY_REDIRECTS" in WordPress

    ERR_TOO_MANY_REDIRECTS Error on WordPress ERR_TOO_MANY_REDIRECTS error is one of the most familiar error in WordPress occurred due to server misconfiguration, redirection functionality of plugin or improper WordPress setting. This error makes your website look into redirection loop and the...
  10. bhawanisingh

    [RESOLVED] MySQL Error : "Your Password does not satisfy the Current Policy Requirements"

    Error Your Password does not satisfy the Current Policy Requirements One can set many variables for validating a password. The password policy has to be strong if not you will get “Your Password does not satisfy the Current Policy Requirements” error when to try to set any password in MYSQL...
  11. bhawanisingh

    A complete guide of Linux Top command

    A complete guide of Linux Top command Linux Top Command: Linux Top command is an interactive utility which displays the character-based screen of all processes that runs on the current system. Screen content can be sorted by characteristics like CPU usage and memory usage. The top command...
  12. bhawanisingh

    Changing WordPress Address (URL) Through Database

    Changing WordPress Address (URL) Through Database WordPress Address (URL) holds the WordPress core files. In WordPress, SQL database is used to store all the data like posts, configuration and pages. In SQL tables, WordPress URLs should be changed if the WordPress website is changes to...
  13. bhawanisingh

    Error "Failed to fetch zone file for 'domainname.com'"

    Error "Failed to fetch zone file for 'domainname.com'". DNS Zone is used for the administration of the DNS (Domain Name System) and it directs the domain traffic to the perfect locations. All the DNS records are kept in the DNS Zone. DNS zone of all the domains can be managed and edited using...
  14. bhawanisingh

    Email Bounce: Retry Timeout Exceeded

    Email Bounce: Retry Timeout Exceeded Email Bounce: Retry Timeout Exceeded is the error message that is automatically created by mail delivery software. This permanent error message occurs when there is a problem in sending or receiving mail through the server. The message ID is added to...
  15. bhawanisingh

    Transferring the website data from one cPanel to another remotely

    CPanel is the online website hosting control panel and it is Linux based. GUI and automation tools are used for simplifying the website hosting process. cPanel functions are virtual private server or dedicated server. It cannot be uninstalled easily and the server has to be reformatted for...
  16. bhawanisingh

    Steps to create software RAID 1

    Linux and RAID1: Linux is an operating system which is based on UNIX and it is an open source OS. RAID 1 is disk mirroring is reconstruction of data to two or more disks. Applications which need high availability and high performance use RAID 1. The data can be read from both the disk at the...
  17. bhawanisingh

    How to prevent Brute Force attack on Joomla website with modsecurity rule?

    Block Brute force attack is a threat faced by web developers and this attack involves in guessing the password. Passwords are guessed with the combinations of symbols, letters and numbers. The current combinations has to be found and the guessing continues till that. Website that is in need of...
  18. bhawanisingh

    Importing Pages and Posts between WordPress Websites

    WordPress allows the user to make dynamic blogs and websites and the contents can be edited very easily. Currently WordPress supports to import data in form of posts. It creates different roles for the users in the website like admin, editor, contributor and author. Importing pages and post from...
  19. bhawanisingh

    Steps to change ASP session timeout from IIS 7

    ASP (Active Server Page) is a server-side technology used to build dynamic web pages. It is a technology used to execute scripts on the web server. When a server request for an ASP file, the ASP engine gets the request from the server and the ASP engine reads the ASP file. Then the server...
  20. bhawanisingh

    Choose Let’s Encrypt in Plesk and Enjoy with Secured Data

    Today data privacy is somewhat challenging, especially in internet. Don’t worry. SSL/TLS Certificates protect sensitive data by encryption method. With valid SSL/TLS Certificate, SSL/TLS Certificate is required to protect data in internet. Thus, to provide security with Plesk and Plesk Mail...
Top