Drupal Ajax error 500

This article will guide you on steps to resolve drupal #ajax error 500 which occurs due to various reasons like insufficient memory, bad permissions, and broken modules.

An internal server error happens when the server encounters a situation it doesn't know how to handle. 

Any syntax #errors will cause a 500 Internal Server Error message to be displayed instead of your #website. 

To confirm whether a misconfiguration . htaccess is the cause of the 500 Internal Server error, either remove or rename the . htaccess file temporarily and then try to reload the page.

To Resolve 500 Internal Server #Error in #Drupal:

1. Debugging the Issue. The first step is to make sense of the situation and try to make sense of the error.

2. Check if the Admin Works.

3. Revert Recent Changes.

4. Audit Your Plugins/Extensions/Modules.

5. Check File Permissions.

6. Increase PHP Memory Limit.

Read More




Prestashop 404 error on homepage

This article will guide you on how to resolve Prestashop 404 error on homepage which mainly occurs due to many reasons which include bad permissions, memory limit, a problem with .htaccess file, and many more. 

The HTTP error 404, or more commonly called "404 error", means that the page you are trying to open could not be found on the server.

This is a client-side incident which means either the page has been deleted or moved, and the URL has not been modified accordingly, or that you have misspelled the URL.

In other words, this means that there is no web page corresponding to the entered URL.

To resolve a #Prestashop HTTP 404 error:

1. The first thing to do is to refresh the page. Press F5 to refresh the URL.

An error may have occurred if the page wasn't loaded correctly.

2. Clear the browser cache and delete cookies. If you are able to connect to the site via another device such as your mobile phone, clearing the cache and clearing cookies should easily solve the problem.

3. Check the #URL and make sure it is spelled correctly.

Check spelling, hyphens, page extension, etc.

4. Remove malware: some malware can cause a 404 error to occur. It is imperative to make sure that your computer is protected and that it does not contain viruses.

5. Contact the site owner to report the 404 error. If you are the website owner, contact your web host and request further information.

Read More




Install WireShark CentOS

This article will guide you on how to install WireShark on #CentOS. WireShark is one of the leading #network analyzing tools. It helps in troubleshooting the traffic problems of a server and malicious activity. 

Wireshark is an open-source, free network packet analyzer, used to capture and analyze network traffic in real-time.

Basically, with Wireshark you can capture and view data traveling through your network.

You can install WireShark with yum install wireshark-gnome . 

After you install it, the Wireshark application will be at /usr/sbin/wireshark .

To install #wireshark on RHEL 8 / CentOS 8 Linux step by step instructions:

1. Install package called Whireshark using the dnf command. For a GUI Wireshark application execute: # dnf install wireshark To install Wireshark command line tool only execute: # dnf install wireshark-cli.

2. Launch Wireshark.

To install Wireshark from #terminal:

Open terminal and type the #commands:

i. sudo apt-get install wireshark.

ii. sudo dpkg-reconfigure wireshark-common.

iii. sudo adduser $USER wireshark.

iv. wireshark.

Read More




Install SQL Server 2019 on Linux

This article will guide you the process to install #MSSQL Server 2019 on #CentOS 7 and Ubuntu 16.04.

SQL Server 2019 #Developer is a full-featured free edition, licensed for use as a development and test database in a non-production environment.

SQL Server 2019 allows us to integrate data from structured and unstructured data sources. 

We can now process diverse big data and relational data sources using Transact-SQL from SQL Server using PolyBase. 

We can see below PolyBase support external databases.

SQL Server Express can be used in production (beware of the limitations, like the 10GB cap), but according to this link Express is available for Linux. SQL Server Express is available to use in Production.

Starting with SQL Server 2017, SQL Server runs on Linux. It's the same SQL Server database engine, with many similar features and services regardless of your operating system. It's the same SQL Server database engine, with many similar features and services regardless of your operating system.

To run a SQL script in #Linux terminal:

1. Open Terminal and type mysql -u to Open the MySQL command line.

2. Type the path of your #mysql bin directory and press Enter.

3. Paste your #SQL file inside the bin folder of mysql server.

4. Create a #database in MySQL.

5. Use that particular database where you want to import the SQL file.

Read More




Node js Application with Docker on Ubuntu

This article will guide you on how to build a Node.js Application with Docker on Ubuntu. npm install downloads a package and it's dependencies. #npm install can be run with or without arguments. When run without arguments, npm install downloads dependencies defined in a package. json file and generates a node_modules folder with the installed modules.

The #docker build command builds Docker images from a Dockerfile and a “context”. 

A build's context is the set of files located in the specified PATH or URL . The build process can refer to any of the files in the context. 

With Dockerfile written, you can build the image using the following command: $ docker build .

Containerizing an #application is the process of making it able to run and deploy under Docker containers and similar technologies that encapsulate an application with its operating system environment (a full system image).

Some Docker #commands:

1. docker run – Runs a command in a new container.

2. docker start – Starts one or more stopped containers.

3. docker stop – Stops one or more running containers.

4. docker build – Builds an image form a Docker file.

5. docker pull – Pulls an image or a repository from a #registry.

Read More




Memcached DDOS attack

This article will guide you on methods to mitigate Memcached DDOS attacks which occur mostly by accident. To mitigate this attack, you can Disable #UDP, #Firewall #Memcached servers, and so on.

 DoS attack is a denial of service attack where a computer is used to flood a server with TCP and UDP packets. A DDoS attack is where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations.

DDoS attacks are illegal under the Computer Fraud and Abuse Act. Starting a DDoS attack against a network without permission is going to cost you up to 10 years in prison and up to a $500,000 fine.

There are three essential security measures that all small businesses should take to protect themselves from #DDoS #attacks: Use a web application firewall (#WAF): The absolute best way to prevent a DDoS attack is through the use of a WAF that blocks bad traffic and prevents DDoS attacks from accessing your web server.

A Denial-of-Service (#DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Different DDoS attack method:

1. UDP flood.

2. ICMP (Ping) flood.

3. SYN flood.

4. Ping of Death.

5. Slowloris.

6. NTP Amplification.

7. HTTP flood.

Read More





Focus on your business, not your servers.

Click Here to Learn More




Recent Post