SSH (Secure Shell) is an open-source network protocol for connecting local and remote Linux servers to transfer files, make remote backups, run remote commands, and perform other network-related tasks using the SCP or sftp commands between two servers connected over a secure network channel. In this article, I’ll show you some easy tools and strategies […]
Posts by samama:
How to Block all ports in IPtables
We’ve included an example of one of the most common iptables configurations. Except for particular ports, we will block all connections. To begin, we’ll erase all present iptables rules to eliminate any errors caused by the prior configuration. SSH into your server as root and run the following commands: iptables -t filter -F iptables -t […]
Differences Between Shared, VPS, and Dedicated Web Hosting
It might be difficult to know which form of web hosting is suitable for you with so many options. Do you want Managed VPS Hosting, Shared Hosting, or Dedicated Web Hosting? We’ll break down the differences between shared, VPS, and dedicated hosting plans in this post so you can figure out which is best for […]
How to Check if IP is blocked from IPtables
Iptables is an application that uses policy chains to allow or block traffic using the IP packet filter rules of the Linux kernel firewall. For example, to secure your server workloads, you can install this firewall on your Linux Dedicated or Virtual Server. If a user tries to connect to your server using SSH, iptables […]
Useful Linux Commands for Managing the Apache Web Server
Apache is a free, open-source Web server application that is most commonly used on Unix-like operating systems, but it can also be used in Windows. Knowing about the Apache web server will be very useful for you as a developer or system administrator. It includes a lot of noteworthy features, one of which is virtual […]
Checking a hosting account viruses with built-in cPanel tool
The cPanel hosting control panel features allow you to check for harmful code if you suspect your hosting account has been hacked. Of course, this does not guarantee that all viruses will be discovered in this manner; in many cases, you will need to manually inspect each file: many harmful scripts masquerade as the site’s […]
What is Raid (& Why is It Used)?
Dedicated Servers While RAID is a commonly used technique, how it is applied has changed dramatically with the emergence of Solid State Drives, Many clients have inquired about RAID, including what it is, how it affects them, and how they can get the best reliability and performance while staying within their budget. So I decided […]
Benefits of Unmetered Dedicated Servers
Unmetered dedicated servers provide you with a server with no monthly bandwidth use restrictions. The amount of data transmitted to and from your server is measured as bandwidth. Your dedicated server will connect to the network at a specific port speed, and you will have complete control over how much or how little bandwidth is […]
Why I can’t access my website?
If you’re having troubleshooting accessing your website, there could be a lot of reasons for this, please check them before contacting us. First-level checks: Make sure you typed your website address into the address bar of your browser correctly. e.g.http://www.example.com Is your internet connection up and running? Are you able to access other websites, such […]
How to Enable Two-Factor Authentication (2FA) in WHM
Two-factor authentication provides an extra degree of security to your account by forcing you to input a unique code in addition to your usual password each time you log in. Software on your smartphone generates this code, which changes every 60 seconds. Nobody can log in unless they know your password and have access to […]