Web Solutions and Technical Support Resources





Enable Leech Protection in cPanel - Do it with ease

This article covers step by step process to configure Leech Protection in cPanel. Basically, Leech Protection is an easy to configure security feature by cPanel. Leech Protect is a security feature offered within cPanel that allows you to detect unusual levels of activity in password-restricted directories on your website.


Importance of Leech Protection in cPanel:

1. Leeching is when users publicly post their username and password, unauthorized visitors can use those credentials to access secure areas of your website.

2. With the Leech Protection feature in cPanel, you can limit the number of times a user can access a secure area of your website within a two-hour period. 

3. After you set the maximum number of logins within a two-hour period, the system redirects or suspends users who exceed it. 

4. This is useful, also, say someone is trying to login to restricted areas of your website by guessing combinations of usernames and passwords.


To Enable Leech Protection in cPanel:

1. Click Leech Protection under Security in cPanel.

2. Click on the name of the directory that you want to protect. You can click the folder icon next to the folder name to open the folder.

3. Under Set up Leech Protection, enter the number of logins allowed per username in a two-hour period.

4. To redirect users who exceeded the maximum number of logins within a two-hour period, enter a URL to which you wish to redirect them.

5. To receive an email alert when an account is compromised, select the Send Email Alert to option and enter the email address in the text field.

6. To disable compromised accounts, check the Disable Compromised Accounts option.

7. When ready, click Enable.

Read More




Website statistics using Google Analytics - How it works

This article covers the features to find Website statistics using Google Analytics. Basically, Google Analytics is a powerful web tracking software that tracks a website's web metrics. Google Analytics is used to track website activity such as session duration, pages per session, bounce rate etc. of individuals using the site, along with the information on the source of the traffic.

Google's official recommendation for adding the Google Analytic tracking code is place the tracking code in the HEADER SECTION ( <head>) of the website.


To see my website traffic using Google Analytics:

Google Analytics tool gives lots of useful website data such as: 

1. Number of visitors per month or per day, percentage of new users, bounce rate and length of visitor sessions. 

2. You can check your website's SEO now.


To Add the tracking code directly to your website:

1. Find the tracking code snippet for your property. Sign in to your Analytics account, and select the Admin tab.

2. Find your tracking code snippet.

3. Copy the snippet.

4. Paste your snippet (unaltered, in its entirety) into every web page that you want to track.

5. Check your setup.

Read More




Add user in VestaCP - How to do it

This article covers how to add a user in VestaCP. Vesta control panel (VestaCP) is an open source hosting control panel, which can be used to manage multiple websites, creat and manage email accounts, FTP accounts, and MySQL databases, manage DNS records and so on.


To Add / Edit User in VestaCP:

1. First, click the USER tab on top, then click the green coloured “+” to add a new user.

2. Fill in the details for the new user. Click “Add” when you’ve completed the info.

3. This message will pop up if all the info are filled in correctly.

Now, you will see 2 users to choose from. Access the newly created user by clicking on “Login as (username)”. 

Each user can manage their own web, DNS, mail and database, etc.

You can also perform edit, deletion or suspension of user accounts using the buttons shown in the red box.


To uninstall Vesta Control panel:

1. Stop vesta service. service vesta stop.

Remove vesta packages and software repository. RHEL/CentOS: yum remove vesta* rm -f /etc/yum.repos.d/vesta.repo. Debian/Ubuntu: apt-get remove vesta* rm -f /etc/apt/sources.list.d/vesta.list.

2. Delete data directory and cron.

Read More




Enable Built-in Administrator Account on Windows 10 - How to implement this

This article covers an easy way to activate the administrator account is from the command prompt with elevated privileges. Windows 10 includes a built-in Administrator account that, by default, is hidden and disabled for security reasons. Sometimes, you need to perform a bit of Windows management or troubleshooting or make changes to your account that requires administrator access.

Windows 10 administrator default password will not be required, alternatively you can enter password for local account and sign in.


To know if I have the built-in Administrator account in Windows 10:

1. Right-click the name (or icon, depending on the version Windows 10) of the current account, located at the top left part of the Start Menu, then click on Change account settings. 

2. The Settings window will pop up and under the name of the account if you see the word "Administrator" then it is an Administrator account.


To reset the built-in Administrator account in Windows 10:

1. Boot from Windows 10 bootable CD/DVD or USB.

2. When the install now screen shows up click on Repair your computer > Advanced Options >Troubleshoot > Command Prompt.

3. Once you can boot into the command prompt, type "net user administrator /active:yes".


To enable hidden administrator:

1. Go to Security Settings > Local Policies > Security Options. 

2. The policy Accounts: Administrator account status determines whether the local Administrator account is enabled or not. 

3. Check the "Security Setting" to see if it is disabled or enabled. 

4. Double-click on the policy and select "Enabled" to enable the account.

Read More




This App Has Been Blocked for Your Protection on Windows - Fix it now

This article covers methods to fix the 'This App Has Been Blocked for Your Protection on Windows' error. Windows Defender SmartScreen acts as a sort of guard dog while you use Windows 10.

It will block you from opening some apps if they come from an unknown place or are created by an unknown publisher. 

Some apps really are harmful and really will get you in a mess. Only go around the Windows 10 app block if you know for sure that the file is safe.


To unblock an app that is blocked by the administrator:

1. Locate the file, right-click it, and select "Properties" from the contextual menu. 

2. Now, find the "Security" section in the General tab and check the checkbox next to "Unblock" - this should mark the file as safe and let you install it. 

3. Click "Apply" to save the changes and try to launch the installation file again.


To Unblock Programs In Windows Defender Firewall:

1. Select the “Start” button, then type “Firewall“.

2. Select the “Windows Defender Firewall” option.

3. Choose the "Allow an app or feature through Windows Defender Firewall" option in the left pane.


To install a program that is blocked by administrator:

1. Disable Windows SmartScreen.

2. Execute the file via Command Prompt.

3. Install the app using the hidden administrator account.

4. Temporarily disable your antivirus program.

Read More




Run Scripts on Remote Computers – Implementing with PowerShell Remoting

This article covers how to Run Scripts on Remote Computers. You can run commands on one or hundreds of computers with a single PowerShell command. Windows PowerShell supports remote computing by using various technologies, including WMI, RPC, and WS-Management.

PowerShell Core supports WMI, WS-Management, and SSH remoting. In PowerShell 6, RPC is no longer supported. In PowerShell 7 and above, RPC is supported only in Windows.


Windows PowerShell Remoting

Using the WS-Management protocol, Windows PowerShell remoting lets you run any Windows PowerShell command on one or more remote computers. 

You can establish persistent connections, start interactive sessions, and run scripts on remote computers.

To use Windows PowerShell remoting, the remote computer must be configured for remote management.

Once you have configured Windows PowerShell remoting, many remoting strategies are available to you.


How to Start an Interactive Session ?

To start an interactive session with a single remote computer, use the Enter-PSSession cmdlet. 

For example, to start an interactive session with the Server01 remote computer, type:

Enter-PSSession Server01

The command prompt changes to display the name of the remote computer. 

Any commands that you type at the prompt run on the remote computer and the results are displayed on the local computer.

To end the interactive session, type:

Exit-PSSession

Read More