How to Block all ports in IPtables

We’ve included an example of one of the most common iptables configurations. Except for particular ports, we will block all connections. To begin, we’ll erase all present iptables rules to eliminate any errors caused by the prior configuration. SSH into your server as root and run the following commands: iptables -t filter -F  iptables -t […]

Continue Reading…

How to Check if IP is blocked from IPtables

Iptables is an application that uses policy chains to allow or block traffic using the IP packet filter rules of the Linux kernel firewall. For example, to secure your server workloads, you can install this firewall on your Linux Dedicated or Virtual Server. If a user tries to connect to your server using SSH, iptables […]

Continue Reading…

What is Raid (& Why is It Used)?

Dedicated Servers While RAID is a commonly used technique, how it is applied has changed dramatically with the emergence of Solid State Drives, Many clients have inquired about RAID, including what it is, how it affects them, and how they can get the best reliability and performance while staying within their budget. So I decided […]

Continue Reading…

Benefits of Unmetered Dedicated Servers

Unmetered dedicated servers provide you with a server with no monthly bandwidth use restrictions. The amount of data transmitted to and from your server is measured as bandwidth. Your dedicated server will connect to the network at a specific port speed, and you will have complete control over how much or how little bandwidth is […]

Continue Reading…

Why I can’t access my website?

If you’re having troubleshooting accessing your website, there could be a lot of reasons for this, please check them before contacting us. First-level checks: Make sure you typed your website address into the address bar of your browser correctly. e.g.http://www.example.com Is your internet connection up and running? Are you able to access other websites, such […]

Continue Reading…

How to Enable Two-Factor Authentication (2FA) in WHM

Two-factor authentication provides an extra degree of security to your account by forcing you to input a unique code in addition to your usual password each time you log in. Software on your smartphone generates this code, which changes every 60 seconds. Nobody can log in unless they know your password and have access to […]

Continue Reading…