Explore information related to ad


Connect Amazon EC2 using putty - Follow these steps


This article covers the step you should follow to connect Amazon EC2 using putty.


How to Generate a PuTTY Private Key (.ppk) File ?

  • Download and install PuTTY.
  • Open the folder that PuTTY was installed to (default path is C: > Program Files > PuTTY).
  • Double-click on the file puttygen.exe.
  • In PuTTY Key Generator, click the Load button and navigate to the folder that contains the private key file (.pem) created during the EC2 configuration process.
  • Click on the PuTTY Private Key Files button in the lower-right corner of the window and select All Files (*.*).
  • Select your private key file (.pem) and click Open.
  • Click OK to close the PuTTYgen Notice pop-up window.
  • In PuTTY Key Generator, make sure Type of key to generate value is set to RSA.
  • Click Save private key and then Yes to close the PuTTYgen Warning pop-up.
  • Navigate to the location you want to store your PuTTY Private Key file (.ppk) and give it a name.
  • Click Save.
  • Close the PuTTY Key Generator window.


What is Amazon EC2 Instance?

1. Amazon EC2 instance is the varying combinations of CPU, memory, storage, and networking capacity that allow you to run your websites.

2. The best part of the Amazon EC2 instance is that it will allow you to scale your resources to the requirements of your target workload.

Read More



Passive FTP Mode on a Plesk Google Cloud Instance


This article covers how to configure Passive FTP Mode on a Plesk Google Cloud Instance. In fact, If your Plesk server only allows active FTP connections, customers may find it difficult or impossible to connect to the server via FTP. We recommend enabling passive FTP.

Read More



Plesk Change IP address – Follow this guide


This article covers the best method to Change IP addresses in Plesk. In fact, To change the IP address hosting a live site on your server, you'll first want to update your DNS information. In some cases, you will need to update your zone file with your new IP manually with the DNS host.

Read More



"Undefined" error in elementor - How to Fix this WordPress error ?


This article covers tips to fix "Undefined" error in elementor for WordPress users. In fact, this is the most common issues faced by Elementor users when trying to import a Custom  saved template or one of the Elementor’s default Templates.

To resolve the issue you need to click on the Sync Library button on the Template Import section.

Once you refresh the Library, try importing the templates again and it should work perfectly fine.

Read More



Plesk error pool seems busy - Fix it Now ?


This article covers methods to resolve Plesk error pool seems busy. This error happens when the PHP-FPM pm.max_children has been reached by the website(s). 


To Increasing pm.max_children for one domain via a command-line interface:

1. Create a php.ini file in domain's system directory /var/www/vhosts/system/example.com/conf/:

$ touch /var/www/vhosts/system/example.com/conf/php.ini

2. Open the php.ini file in any text editor (for example, vi editor) and add the following records:

[php-fpm-pool-settings]
pm.max_children = 20

3. Save the changes and close the file.

4. Run the following command to apply the changes:

/usr/local/psa/bin/php_settings -u

Read More



PostgreSQL backup failed in Web help desk - Fix it Now ?


This article covers methods to resolve PostgreSQL database and fix PostgreSQL error. It may be necessary to create a backup and restore your Web Help Desk database.

This is how to back up and restore the Web Help Desk 12.x PostgreSQL embedded database. The process involves creating a backup from the web interface and restore using the embedded pgAdmin application on the Web Help Desk.

Read More



mysqldump error 1194 table is marked as crashed - Best Fixes ?


This article covers methods to resolve the mysqldump error 1194 for our customers. Generally database administrators use MySQL tables to store some important files along with their professional data or records. Though users store their important data but they are unaware of the situation that they can also lose their important data some day when the database gets corrupt or damaged. 

When MySQL database gets corrupted then it displays several error messages, one such error is "ERROR 1194 (HY000): Table 'table_name' is marked as crashed and should be repaired". And this error is very annoying so its very important to fix MySQL error 1194 as soon as you can.


Main causes of MySQL Error 1194:

  • Due to sudden system shutdown.
  • Virus/malware infection.
  • File system corruption after the newly installed program like hardware or software.

Read More



Enable Git on Virtualmin - Best way to do it ?


This article covers steps to enable Git on Virtualmin. 

To do this:

  • Go to Webmin -> Webmin Configuration -> Webmin Modules.
  • In the From ftp or http URL field, enter the URL .http://download.webmin.com/download/plugins/virtualmin-git.wbm.gz .
  • Click the Install Module button.


Once the plugin is installed, you can enable it in Virtualmin as follows :

  • Go to System Settings -> Features and Plugins.
  • Check the box in the left hand column next to Git repositories.
  • Click Save.

Read More



Webmin "Error code ssl_error_rx_record_too_long" - Fix it Now ?


This article covers how to troubleshoot "Error code ssl_error_rx_record_too_long" in Webmin. Usually the ssl_error_rx_record_too_long error means that the service is not speaking in SSL - for example, if you try to access an http-only service via https. 

Are you sure that webmin is set up to talk in ssl on port :10000?

Read More



AWS S3 403 Forbidden Error - Fix it Now ?


This article covers methods to fix HTTP 403 Forbidden error for our customers. 

To troubleshoot the HTTP 403 Forbidden error from the Amazon S3 console, check the following:

  • Missing permissions to s3:PutObject or s3:PutObjectAcl.
  • Missing permissions to use an AWS Key Management Service (AWS KMS) key.
  • Explicit deny statement in the bucket policy.
  • Bucket access control list (ACL) doesn't allow the AWS account root user to write objects.
  • AWS Organizations service control policy doesn't allow access to Amazon S3.

Read More



Postfix address already in use Plesk error - Fix it Now ?


This article covers methods to resolve Postfix address already in use error in Plesk. To fix this error, simply Edit file /etc/postfix/master.cf and comment out all duplicate lines in the configuration, for example:

203.0.113.2- unix - n n - - smtp -o smtp_bind_address=203.0.113.2 -o
smtp_bind_address6= -o smtp_address_preference=ipv4

Note: The line with the IP address should exist only once in the /etc/postfix/master.cf configuration file.

Read More



Autossl 403 (Forbidden) error – Fix it Now ?


This article covers AutoSSL not working on cPanel / WHM.

To fix it, just try to assign 755 permissions and the correct owner to your public_html directory:

$ chmod 755 /home/user/public_html -v
$ chown user.user /home/user/public_html/ -R

Make sure you change user.user with your real cPanel user for that website.

Read More



Error accessing file for config file ///etc/yum.conf – Fix it Now ?


This article covers methods to resolve the error, "CRITICAL:yum.cli: Config Error: Error accessing file for config file:///etc/yum.conf" occurs while performing certain actions with yum. 

The replacement of the source-compiled version of curl is to use the rpms instead, eg:

$ yum install libcurl-devel

As the libcurl and curl rpms should already be there by default, as yum needs them.

Read More



Install pgAdmin with Docker - Step by Step Process ?


This article covers how to go about installing pgAdmin with Docker. By using Docker, we don’t have to worry about the installation of the PostgreSQL or pgAdmin. Moreover, you can use Docker to run this project on macOS, Windows, and Linux distributions.

Database management via a command-line interface can be nerve-racking. To solve this issue, we can use a tool with an interface. The pgAdmin solves this problem. Moreover, Docker makes the entire process smoother. 


To fix pgAdmin using Docker Installation issues:

Issue with following command,

$ docker run -p 80:80 \
    -e PGADMIN_DEFAULT_EMAIL="atinesh.s@gmail.com" \
    -e PGADMIN_DEFAULT_PASSWORD="admin" \
    -d dpage/pgadmin4

Read More



pgAdmin "connection to the server has been lost" - Fix it Now ?


This article covers methods to resolve pgAdmin "connection to the server has been lost" error for our customers. When connecting to a PostgreSQL server, you may get this error message. From the error message you will be able to resolve the problem. 


If pgAdmin displays this message, there are two possible reasons for this:

  • the database server isn't running - simply start it.
  • the server isn't configured to accept TCP/IP requests on the address shown.


For security reasons, a PostgreSQL server "out of the box" doesn't listen on TCP/IP ports. Instead, it must be enabled to listen for TCP/IP requests. This can be done by adding listen_addresses=’*’; this will make the server accept connections on any IP interface.

Read More



Allow remote access to phppgadmin - The easy way


This article covers how to Install, configure and enable remote access to phpPgAdmin. Here you will learn how to enable remote access to PostgreSQL server on a Plesk server.


To Access PhpPgAdmin On Linux And MacOS:

1. Open a new terminal window on your local system (for example, using “Finder -> Applications -> Utilities -> Terminal” in macOS or the Dash in Ubuntu).

2. Make sure that you have your SSH credentials (.pem key file) in hand.

3. un the following command to configure the SSH tunnel using the SSH key file. Remember to replace KEYFILE with the path to your private key and SERVER-IP with the public IP address or hostname of your server:

$ ssh -N -L 8888:127.0.0.1:80 -i KEYFILE bitnami@SERVER-IP

Remember that if you are redirecting HTTP requests to the HTTPS port, you must use destination port 443 instead of 80.

4. Access the phpPgAdmin console through the secure SSH tunnel you created, by browsing to http://127.0.0.1:8888/phppgadmin.

5. Log in to phpPgAdmin by using the following credentials:

Username: postgres.
Password: application password.

Read More



SolusVM slave connection error - Fix it Now ?


This article covers how to fix solusVM connection error. Basically, while accessing SolusVM Admin control panel users often receive different connection errors related to solusVM slave.


To fix Master SolusVM error:

1. Install repository:

$ yum install solusvm-release

2. shutdown lighttpd service:

$ service lighttpd stop
$ chkconfig lighttpd off

3. install nginx and legacy configuration file

$ yum install svmstack-nginx svmstack-nginx-legacy-slave-config

4. start new service

$ service svmstack-nginx restart
$ service svmstack-fpm restart

Read More



"no input file specified" error in Joomla – Fix it Now ?


This article covers how to resolve Joomla error "no input file specified" which occurs due to issues with the installation.

To fix this error:

  • You can login to back-end and check the "Global configuration -> SEO Settings". 
  • Switch off Search Friendly URLs. 
  • Now all menu links should work fine.

Read More



Apache Error 'Failed to read FastCGI header' - Fix it Now ?


This article covers methods to resolve Apache Error 'Failed to read FastCGI header'. When this error occurs, the response sent to the browser will be "503 Service Unavailable". Basically, the error message "Failed to read FastCGI header" indicates that when Apache was communicating with PHP-FPM, the PHP process did not respond properly.

Read More



WHMCS error code 1013 - Fix it Now ?


This article covers WHMCS error code 1013. Basically, this error happens when the external_id entry is missing in psa.clients MySQL table. If the issue appears on WHMCS integrated with Plesk Multi Server, this database update should be done on the management node side.

Read More



Windows server 2016 vss error 12347 - Fix it Now ?


This article covers methods to resolve Windows server 2016 vss error 12347. Basically, 'Windows server 2016 vss error 12347' occurs when the Backup of Shadow Copy Component Fails. This usually happens when the registry Volume Shadow Copy Service (VSS) writer did not respond to a query from the VSS service.

To resolve this Windows error, simply Reboot the Server where the problem exists.

Read More



Plesk : error reading data from FastCGI server - Fix it Now ?


This article covers methods to resolve Plesk: Error reading data from fastcgi server. Basically, in most cases, this plesk error occurs when there are Corrupted WordPress plugins.

To fix Plesk error,  Connection reset by peer: mod_fcgid: error reading data from FastCGI server,

  • Log in to Plesk.
  • Deactivate one by one all plugins for the website at Domains > example.com > WordPress > Plugins until the issue is fixed.
  • Re-install or delete the plugin.

Read More



DirectAdmin error "can't connect to ssl" - Fix it Now ?


This article covers methods to fix DirectAdmin error "can't connect to ssl" for our customers. Every SSL/TLS connection begins with a "handshake" – the negotiation between two parties that nails down the details of how they’ll proceed. The handshake determines what cipher suite will be used to encrypt their communications, verifies the server, and establishes that a secure connection is in place before beginning the actual transfer of data. This all happens in the background, thankfully – every time you direct your browser to a secure site a complex interaction takes place to make sure that your data is safe.

Read More



Setup Rate Limit for IP Addresses in DigitalOcean Account


This article covers how to set up rate limit for IP Addresses in DigitalOcean for our customers. 

Basically, limit standard ssh like this:

$ sudo ufw limit ssh/tcp

or

$ sudo ufw limit 22/tcp

Both will limit port 22.

The /tcp allows only a tcp connection to allow only udp you simply add /udp and to allow it on both you simply leave off the /* example: ufw limit ssh.

Read More



Prestashop error err_too_many_redirects - Fix it Now ?


This article covers methods to tackle 'err_too_many_redirects' Prestashop error which generally affects certain pages in Prestashop admin panel. The ERR_TOO_MANY_REDIRECTS in your Chrome browser indicates that the page you're attempting to visit is caught in a "redirect loop". The phrase "redirect loop" simply means that the site you're visiting can't stop trying to send your browser to a different location.

Read More



Install DirectAdmin on AlmaLinux - Step by Step Process ?


This article covers how to install Directadmin on Almalinux. AlmaLinux OS is an open-source, community-driven project that intends to fill the gap left by the demise of the CentOS stable release. AlmaLinux OS is a 1:1 binary compatible fork of RHEL 8 guided and built by the community. 


Operating systems supported by DirectAdmin:

  • CloudLinux - 6.x 64-bit, 7.x 64-bit, 8.x 64-bit.
  • AlmaLinux / RHEL / CentOS - 7.x 64-bit, 8.x 64-bit.
  • Debian - 8.x 64-bit, 9.x 64-bit, 10.x 64-bit, 11.x 64-bit ALPHA.
  • Ubuntu - 16.04 64-bit, 18.04 64-bit, 20.04 64-bit.
  • FreeBSD - 11.x 64-bit, 12.x 64-bit.


To Install Directadmin on Almalinux:

Login as root to your server, download the installation script, and run it.

bash <(curl -Ss https://www.directadmin.com/setup.sh || wget -O - https://www.directadmin.com/setup.sh) auto


Main Features of AlmaLinux:

1. Stable, production-ready, RHEL-based

AlmaLinux is an enterprise-grade server Operating System and a stable Linux distribution with normal releases. AlmaLinux is able to run critical workloads. 

2. Easy to switch from CentOS

AlmaLinux will be a 1:1 binary compatible fork of RHEL, which implies that the applications and administrations will stay viable, so switching is simple from CentOS to AlmaLinux. 

3. Free Operating System, and supported by Cloudlinux

CloudLinux offers a support commitment with Patches and maintenance through 2029 for AlmaLinux with a great investment. They also deliver AlmaLinux free of limitations, fees, and charges.

Read More



Access Nagios Network Analyzer Reports - How to do it ?


This article covers how to access Nagios Network Analyzer Reports. This is done by configuring the Nagios Network Analyzer Component within Nagios XI. Having the Network Analyzer reports available in Nagios XI will allow quick and easy access to your Nagios Network Analyzer Network Report and Network Query report. 

Read More



Install and Configure SNMP on RHEL/CentOS/Fedora - How to do it ?


This article covers how to install and configure SNMP on RHEL. SNMP (Simple Network Management Protocol) is widely used for monitoring and central management purposes. 


To Install SNMPd Agent on Ubuntu Server:

1. Type the following commands as root, then click Enter:

$ sudo apt-get update
$ sudo apt-get install snmp snmp-mibs-downloader
$ sudo apt-get update
$ sudo apt-get install snmpd

2. You might also need to execute:

$ sudo download-mibs


SNMPd Configuration

The snmpd daemon must be configured to work with Atera. The configuration file is located at "/etc/snmp/snmpd.conf". 

Make sure you are editing the snmpd.conf file and not the snmp.conf file.

Read More



Time Based Temporary Group Membership in Active Directory on Windows


Basically, Temporary Group Membership (Time Based) is the version of Active Directory in Windows Server 2016 introduces an interesting feature that allows you to temporarily add a user to an AD security group. In order to use the Temporary Group Membership, you need to enable the Privileged Access Management Feature in your Active Directory forest. Like with AD Recycle Bin (which allows you to recover deleted objects), you cannot disable PAM after it has been enabled.

Read More



"403 forbidden" error in phppgadmin - Fix it Now ?


This article covers methods to tackle "403 forbidden" error messages in phpPgAdmin. Basically, the "Forbidden" error happens while accessing phpPgAdmin when permissions in the phpPgAdmin configuration file are not intact. 


To resolve 403 forbidden error, In the Apache configuration, simply replace:

<Directory /usr/share/phppgadmin>
    DirectoryIndex index.php
    Order deny,allow
    Allow from all
</Directory>

With:

<Directory /usr/share/phppgadmin>
   Require all granted
</Directory>

Read More



Reserve Google Cloud Static IP Address - How to do it ?


This article covers how to reserve static IP for our customers. In Compute Engine, each VM instance can have multiple network interfaces. Each interface can have both internal and external IP addresses. Forwarding rules can have external IP addresses for external load balancing or internal addresses for internal load balancing.


If a virtual machine (VM) instance requires a fixed external IP address that does not change, you can obtain a static external IP address for that instance by using one of the following options:

  • Reserve a new static external IP address and then assign the address to a new VM instance.
  • Promote an existing ephemeral external IP address to become a static external IP address.

Read More



"Login disallowed for security reasons" phppgadmin error – Fix it Now ?


This article covers how to resolve "Login disallowed for security reasons" phppgadmin error. Basically, the "Login disallowed for security reasons" error can happen when extra login security is enabled in the phpPgAdmin configuration file.


To fix this issue, You will need to edit the phppgadmin config file from following directory /etc/phppgadmin/config.inc.php.

Finally modify the line $conf['extra_login_security'] = true; to $conf['extra_login_security'] = false;

Read More



Use gMSA in Active Directory to launch services and tasks


This article covers how to use gMSA in Active Directory. When a gMSA is used as service principals, the Windows operating system manages the password for the account instead of relying on the administrator to manage the password. Group Managed Service Accounts (gMSAs) provide a higher security option for non-interactive applications/services/processes/tasks that run automatically but need a security credential.


The Install-ADServiceAccount cmdlet installs an existing Active Directory managed service account on the computer on which the cmdlet is run. The cmdlet also makes the required changes locally so that the managed service account password can be managed without requiring any user action.

Read More



Qualities of customer service agents – What to look out for ?


This article covers the Qualities of customer service agents. Customer Service Agents and Representatives (CSR) interact with customers and provide information about products or services as well as handling and resolving customer complaints. They communicate in a variety of ways – by telephone; by e-mail, fax, regular mail; or in person. Multi-channel support is providing different methods of communication for your customers to reach you. This can include (but is not limited to) email, phone, chat, social media, knowledge base, etc.

Read More



Windows Cannot Find Microsoft Software License Terms - Fix it Now ?


This article covers methods to fix Windows error, Cannot Find Microsoft Software License Terms. Basically, this error happens when trying to perform a clean install of Windows Server 2016 on a new Hyper-V virtual machine. A common cause for Windows cannot find the Microsoft license software terms can be your BIOS. Sometimes certain BIOS settings can interfere with your system and prevent Windows from installing.


To fix this Windows issue, users are suggesting entering BIOS and restore the default settings.

This is fairly simple to do, but if you don't know how to do it properly, we advise you to check your motherboard manual for detailed instructions. 

After restoring the default settings, try to install Windows again.


Another method to fix Windows cannot find the Microsoft license software terms message, is to,

Disconnect the installation media during the installation:

Follow the installation steps until you reach the Install Now screen.

Disconnect your installation media and click the Install Now button.

Continue the installation as you would do normally.

Once the setup is ready to start copying files, it will ask you to reconnect your installation media, so be sure to do so.

After you connect the installation media, follow the instructions on the screen to complete the installation.

Read More



Install Docker Swarm Cluster on Debian 10 -Step by Step Process ?


This article covers how to install Docker Swarm Cluster on Debian 10. Docker Swarm is a tool used to orchestrate docker hosts. We can create a high availability and a high performance Docker cluster with applications distributed among the hosts. Docker swam uses a manager host and worker nodes architecture. You can have one or several manager nodes in your docker swarm cluster. The manager nodes uses the native Docker API and share the database of the Docker Swarm cluster with the worker nodes. The manager hosts maintain the cluster state, schedule tasks and handle the HTTP API endpoints.

Read More



Windows Update Stuck At "Downloading 0%" On Server 2016 – Fix it Now ?


This article covers different methods of fixing Windows 10 Update not working, stuck at downloading 0%. 


To fix this Windows stuck at downloading 0% error:

  • Delete the deployment package.
  • Delete the software update group if exists.
  • Download once again the update and create a new software update group.
  • Create a new deployment package and distribute the content.
  • Refresh the SCCM policy on your SCCM clients.
  • Wait a few minutes and confirm if the Windows Update is installed.

Read More



Create Private Network Bridge on Proxmox VE 6 with NAT


This article covers how to create a Private Network Bridge on Proxmox. 

To do this:

1. Enable paket forwarding in /etc/sysctl.conf on the Proxmox host

2. Edit /etc/network/interfaces on the ProxMox host, to get 10.10.10.0/24 for your containers, that route through eth0 of the ProxMox host

Code:
# network interface settings; autogenerated# Please do NOT modify this file directly, unless you know what
# you're doing.
#
# If you want to manage parts of the network configuration manually,
# please utilize the 'source' or 'source-directory' directives to do
# so.
# PVE will preserve these directives, but will NOT read its network
# configuration from sourced files, so do not attempt to move any of
# the PVE managed interfaces into external files!
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet static
address YOUR-PUBLIC-STATIC-IP/YOUR-PUBLIC-MASK
gateway YOUR-STATIC-GATEWAY
auto vmbr1
iface vmbr1 inet static
address 10.10.10.1
netmask 255.255.255.0
bridge_ports none
bridge_stp off
bridge_fd 0
post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o eth0 -j MASQUERADE
post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o eth0 -j MASQUERADE


3. Configure a container inside 10.10.10.0/24 - as an example using 10.10.10.2 .

Read More



Let's Encrypt with Cloudflare - How to Configure ?


This article covers how to set up Let's Encrypt and Cloudflare Universal SSL for end-to-end encryption. Basically, Improper configuration settings while using Let's Encrypt, could cause connection errors.

Cloudflare will act as the CDN while Let's Encrypt performs the SSL (HTTPS) encryption (in lieu of Cloudflare's Universal SSL).


Let's Encrypt is great, but it's not really a comparison with Cloudflare, you can use them both. I use Lets Encrypt on my server with Cloudflare. What we suggest is that you should first get Lets Encrypt installed on your domain and make sure it works.



To add lets encrypt to Cloudflare:

1. Set up the domain.

2. Verify the Let's Encrypt certificate has been issued.

3. Sign up for Cloudflare.

4. Update nameservers and verify.

Read More



CDPUserSvc has stopped working – Fix it Now ?


This article covers different methods to fix CDPUserSvc has stopped working error. Basically, The function of the service as its description suggests is to make the connection with Bluetooth devices easier.

You can fix CDPUserSvc has Stopped Working in Windows 10 by isolating the process too.


1. Type cmd Cortana text field and from the suggestion, put a right-click on Command Prompt.

From the options that pop-up, click "Run as administrator".

2. Run the following command:

sc config cdpusersvc type=own

With this command, Windows will isolate this module forcibly. We know that isolation of any process is a default activity for that service.

As a result, Microsoft will find another correct way to run CDPuserSvc service in another mode by default.

Read More



MySQLdump: got error :1049 :unknown database - Fix it Now ?


This article covers the best method to fix the MySQL database error, "MySQLdump: got error :1049 :unknown database".

Generally, this error happens while performing cPanel backups and it simply indicates that the database does not exist in MySQL.


How to fix mysqldump unknown database when selecting the database?

In cases where this error occurs when you specify the password on the command line with -p flag and there is a space between -p and password.

For example, if you want to dump the database named wpdb using the user "root" and password "your-password".

Fix this error, by specifying the password with no space after -p switch as shown below:

mysqldump -u root -pyour-password wpdb > wpdb_backup.sql

Read More



Install Proxmox VE 6 on Debian Buster (Debian 10) - Step by Step Process ?


This article covers the installation of Proxmox VE 6 server on Debian 10 (Buster) Linux system. Please note that you need a 64-bit processor with support for the Intel 64 or AMD64 CPU extensions.

Visit Proxmox Documentation website  for advanced configurations and to master Proxmox VE Administration.


To Access Proxmox VE web interface:

1. Connect to the Proxmox VE admin web interface on (https://youripaddress:8006).

2. Select "PAM Authentication" and authenticate with server's root user password.

3. And add your first network interface to it.

Read More



Apache Error: "semget: No space left on device" - Fix it Now ?


This article covers methods to resolve Apache Error: "semget: No space left on device". This error indicates that apache failed and will not start again, so check the error log If you see an error similar to the following, it could indicate that your server has run out of semaphores and apache cannot be started:

[emerg] (12)Cannot allocate memory: mod_fcgid: Create process manager error
[error] (28)No space left on device: Cannot create SSLMutex Configuration Failed


To solve this problem you can restart Apache, Postgres and other services that consumer many IPC resources or increase limit of the resources in the system using 'sysctl'. When you stop all services the semaphores and shared memory segments have to be removed, if not, and you still able to see them using 'ipcs' command, try to remove them manually using 'ipcrm' command. 

1. For example to remove semaphore:

# ipcs -a

2. If this is a common problem for you, you may want to increase the semaphore limits on your VPS server. You can do that by adding the following to the /etc/sysctl.conf file:

# Increases the semaphore limits & extend Apache's uptime.

kernel.msgmni = 512
kernel.sem = 250 128000 32 512

3. Then load the new settings into the kernel:

sysctl -p

Read More



Exclude Files from Backups in cPanel - How to do it ?


This article covers how to set up both global and local exclude files. Basically, we would require to exclude certain files from backups in cPanel either for security purposes or to reduce the size of the backup file. 

When backing up large accounts, it can be desirable to skip certain large directories or exclude files for security reasons. Whatever the reason, cPanel offers two methods for excluding files from the standard backup process.


To exclude files or directories from your user backups, perform either of the following actions:

  • Exclude the files from all user's backups.
  • Exclude the files from an individual user's backups.


For one cPanel user

Users or administrators can modify the user-level exclude file. /home/username/cpbackup-exclude.conf excludes files from a specific user's home directory.

$ nano /home/username/cpbackup-exclude.conf

# add new entries here

example/
dir/example.php

Read More



Exclude Files from Backups in DirectAdmin - How to do it ?


This article covers how to Exclude Files from Backups in DirectAdmin. 


User ability to skip paths from their tar.gz backup files in DirectAdmin.

i. New optional file:

/home/username/.backup_exclude_paths

where User can add paths to this file that they wish to have skipped from their backup.

The format of the file must be relative to /home/user and should not include a "/home/user" prefix.

2. New default internal directadmin.conf setting:

allow_backup_exclude_path=1

can be disabled by setting it to 0 and restarting DA.

A sample line in the .backup_exclude_paths would look like:

domains/domain.com/awstats

so that the path:

/home/username/domains/domain.com/awstats

is skipped from the backup.

This will add:

--exclude-from=/home/username/.backup_exclude_paths

Just after the -C /home/username option in the creation of BOTH the home.tar.gz and the user's backup tar.gz.

So using the feature will truly exclude the path, regardless of if it's in /home/user/domains, or /home/user/*.

As you may have noticed, the option uses tar's exclude-file option.

This supports patterns, eg:

*.gz

So you have skip those types of files, regardless of what path they're under.

Read More



Active Directory Temporary Group Membership on Windows Server 2016


This article covers how to implement  Active Directory Temporary Group Membership on Windows Server 2016. Temporary Group Membership is a new feature that appeared in Windows Server 2016 and is a part of the Privileged Access Management (PAM) functionality.


By default, PAM is not active and the first thing you need to do is turn it on. You can do this with the PowerShell cmdlet Enable-ADOptionalFeature. For example, to enable PAM in domain contoso.com, run the following command with domain administrator privileges:

Enable-ADOptionalFeature -Identity ″Privileged Access Management Feature″ -Scope ForestOrConfigurationSet -Target ″contoso.com″

Read More



WHM Internal server error 500 - Fix it Now ?


This article covers different ways to troubleshoot and resolve WHM / cPanel Internal server error 500.

Basically, the "Internal server error 500" message happens while accessing WHM panel or cPanel and one of the cPanel process failing to load or still running in the background.


Other causes of 500 Internal Server Error in WHM?

  • Incorrect permissions settings, usually due to having a file as "world" writeable.
  • Incorrect permissions settings for use by another script (this is common with manual installs of forums or blogs).
  • Incorrect coding in the .htaccess file.

Read More



Configure Windows Firewall Rule using Group Policy


This article covers methods to Configure Windows Firewall Rule using Group Policy. Most of the procedures in this guide instruct you to use Group Policy settings for Windows Firewall with Advanced Security.


To open a GPO to Windows Firewall with Advanced Security:

1. Open the Group Policy Management console.

2. In the navigation pane, expand Forest: YourForestName, expand Domains, expand YourDomainName, expand Group Policy Objects, right-click the GPO you want to modify, and then click Edit.

3. In the navigation pane of the Group Policy Management Editor, navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security - LDAP://cn={GUID},cn=

Read More



Munin plugin fails to install due to missing dependencies - Fix it Now ?


This article covers methods to resolve Munin installation error.

A quick fix to this error is to run the following commands as root should allow the installation of Munin to complete:

yum-complete-transaction --cleanup-only
yum install pango cairo pixman
/scripts/check_cpanel_rpms --targets munin

Read More



PHPMyAdmin import database timeout - Fix it Now ?


This article covers methods to fix PHPMyAdmin import database timeout error. This error happens because of a huge file and the restoration process fails with timeout.


To resolve this error, 

1. Login to the server over SSH.

2. Create the file config.inc.php.

For Plesk Onyx and Plesk Obsidian below 18.0.30:

# cp -p /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/libraries/config.default.php /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/config.inc.php

For Plesk Obsidian 18.0.30 and above:

# cp -p /usr/local/psa/phpMyAdmin/libraries/config.default.php /usr/local/psa/phpMyAdmin/config.inc.php

3. Increase the value of $cfg['ExecTimeLimit'] in config.inc.php created on step 2:

$cfg['ExecTimeLimit'] = 3600;

4. Increase the settings in /etc/sw-cp-server/config to avoid '504 Gateway Timeout' error:

fastcgi_read_timeout 3600;
fastcgi_send_timeout 3600;

5. Restart sw-cp-server:

$ service sw-cp-server restart

Read More



Docker error "bind: address already in use" - Fix it Now ?


This article covers the best method to resolve Docker error "bind: address already in use".

Sometimes, when trying to start your docker instance, it's possible to be stunted by another process using the same port. 

Also, this docker error can happen when for any reason your host reboots. 

In this instance, try restarting your apache server. 

Stopping apache2 service in the host can solve it:

$ sudo /etc/init.d/apache2 restart 

If nginx is running globally this could be the reason too. 

Run the command:

$ sudo nginx -s stop

Read More



Database import hangs in Plesk - Fix it Now ?


This article covers methods to resolve Database importing hangs in Plesk with error reading communication packets. Generally, the database import task in Plesk fails due to non-optimized client databases.

The solution to this Plesk error is to simply optimize the databases.

Read More



Configure Windows Firewall Rules with PowerShell


This article covers method to Configure Windows Firewall Rules with PowerShell. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.

Some parameters are used to specify the conditions that must be matched for the rule to apply, such as the LocalAddress and RemoteAddress parameters. Other parameters specify the way that the connection should be secured, like the Authentication and Encryption parameters. Rules that already exist can be managed with the Get-NetFirewallRule and Set-NetFirewallRule cmdlets.

Filter objects, such as NetFirewallAddressFilter or NetFirewallApplicationFilter, are created with each firewall rule. The filter objects and rules are always one-to-one and are managed automatically.


To enable all three network profiles. Domain, Public and Private, use this command:

Set-NetFirewallProfile -All -Enabled True

Or set the specific profile instead All:

Set-NetFirewallProfile -Profile Public -Enabled True

To disable the firewall for all three network location, use the command:

Set-NetFirewallProfile -All -Enabled False

Read More



Adding Additional Instances To Nagios Log Server Cluster


This article covers method to add instances to Nagios Log Server Cluster. You will need to have an existing Nagios Log Server cluster before following the steps in this guide. An existing cluster is one or more instances of Nagios Log server.

Read More



Pluggable.php File Errors in WordPress – Fix it Now ?


This article covers methods to fix Pluggable.php File Errors in WordPress. Basically, this WordPress error triggers when we add a code snippet on our site or activate a new plugin.

This means that Pluggable.php file errors takes place as a result of a poorly coded theme or plugin. It could also be a result of code errors in your WP files. 


The first option when troubleshooting the Warning: cannot modify header information pluggable.php error is to manually edit the faulty file. You are already supplied with the necessary information to locate the problem in the error message (remember, it's the first file in the message). 

All you need to do is open up this file, either through an FTP client like FileZilla, or through File Manager.

Make sure to pay special attention to the starting and ending PHP tags. 

There should not be spaces before or after the <?php tag, as well as the ?> tag. 

Also, the last line of code should not be followed with a blank line or extra space.

Read More



NRPE Command Plugin Not Defined - How to fix it ?


This article covers methods to resolve 'NRPE Command Plugin Not Defined' for our customers.

This error is very straight forward. Usually this is caused by a mismatch between the command name declared in Nagios XI to be check through NRPE and the actual command name of the command directive in the remote host's nrpe.cfg file.

This problem will occur in versions of check_nrpe before v3. 

What is happening here is that the initial -c check_users is being overwritten by the -a -w 5 -c 10, as check_nrpe thinks the -c 10 argument is the command argument, not one of the -a arguments.

Read More



Install PHP 8 on Ubuntu 20.04 or 18.04 - Step by Step Process ?


This article covers steps to install PHP 8 on Ubuntu. PHP is arguably one of the most widely used server-side programming languages. It's the language of choice when developing dynamic and responsive websites. Basically, popular CM platforms such as WordPress, Drupal, and Magento are based on PHP.


To Install PHP as Apache Module

Run the commands:

$ sudo apt update
$ sudo apt install php8.0 libapache2-mod-php8.0

Once the packages are installed, restart Apache for the PHP module to get loaded:

$ sudo systemctl restart apache2


To Configure Apache with PHP-FPM

Php-FPM is a FastCGI process manager for PHP. 

1. Run the following command to install the necessary packages:

$ sudo apt update
$ sudo apt install php8.0-fpm libapache2-mod-fcgid

2. By default PHP-FPM is not enabled in Apache. 

To enable it, run:

$ sudo a2enmod proxy_fcgi setenvif
$ sudo a2enconf php8.0-fpm

3. To activate the changes, restart Apache:

$ systemctl restart apache2 


To install PHP 8.0 with Nginx

Nginx doesn't have built-in support for processing PHP files. We'll use PHP-FPM ("fastCGI process manager") to handle the PHP files.

Run the following commands to install PHP and PHP FPM packages:

$ sudo apt update
$ sudo apt install php8.0-fpm

Once the installation is completed, the FPM service will start automatically. 

To check the status of the service, run

$ systemctl status php8.0-fpm

Do not forget to restart the Nginx service so that the new configuration takes effect:

$ sudo systemctl restart nginx

Read More



Install PHP 8 on Debian 10 / Debian 9 - Step by Step Process ?


This article covers how to install PHP 8 on any Linux distribution.


To install Apache with PHP 8 module:

$ sudo apt install apache2 libapache2-mod-php8.0 

After successful installation, restart Apache service to reload newly installed modules:

$ sudo systemctl restart apache2 


To check loaded PHP modules use the command:

$ php -m

Read More



Set-ADUser Modify Active Directory Users with PowerShell - Do it now ?


This article covers how to use Set-ADUser Modify Active Directory Users with PowerShell.

Basically, the Set-ADUser cmdlet is part of the Active Directory module for Windows PowerShell.


The Identity parameter specifies the Active Directory user to modify. 

You can identify a user by its distinguished name, GUID, security identifier (SID), or Security Account Manager (SAM) account name. 

You can also set the Identity parameter to an object variable such as $<localUserObject>, or you can pass an object through the pipeline to the Identity parameter.

Read More



WordPress error "Destination Folder Already Exists" – Fix it Now ?


This article covers methods to fix WordPress error "Destination Folder Already Exists".

Basically, this WordPress error triggers when a folder with the same name as that of the plugin or theme already exists. 


To resolve WordPress "Destination folder already exists" error:

Since the error is caused by a plugin or theme folder that already exists, the easiest way to solve the error is by deleting the folder. 

The process of deleting a theme via FTP is the same one you use for deleting a plugin. 

The only exception is that you need to navigate to wp-content/themes instead of wp-content/plugins. 

1. To delete the plugin folder, connect to your server using your FTP credentials and navigate to your root WordPress directory, often called public_html.

2. Then, go to the wp-content/plugins directory.

3. Within the plugins directory, find the plugin folder mentioned in the error message.

4. When you've located the folder you need, right-click on it and press the Delete option from the menu that appears.

5. After that, you will be prompted to confirm your choice. Press the Yes button to proceed.

6. Then, you will have to wait a bit until the plugin folder, as well as all directories and files within it, are deleted. 

Read More



Plesk error FPM initialization failed - Fix it Now ?


This article covers methods to fix Plesk error, FPM initialization failed.

Basically, the error "FPM initialization failed" triggers in Plesk mainly in different formats. The is as a result of Incorrect PHP configuration file was generated during subdomain creation via XML API.


To fix this Plesk error:

i. Log in to Plesk server via SSH.

ii. Remove the excessive configuration file:

rm -f  /etc/php-fpm.d/subdomain.example.com.conf

Read More



DirectAdmin PhpMyAdmin error 500 - Fix it Now ?


This article covers methods to resolve DirectAdmin PhpMyAdmin error 500. This error happens as a result of a number of reasons that include PHP settings, modsecurity rules and so on.


To resolve this error, In the library is /usr/share/phpmyadmin/libraries/sql.lib.php,

You need to modify the file:

From && ($analyzed_sql_results['select_expr'][0] == '*')))

to && ($analyzed_sql_results['select_expr'][0] == '*'))

Read More



PrestaShop back office error 500 or blank page - Fix it Now ?


This article covers methods to resolve PrestaShop back office error 500.

The error happens when the Back-office is accessed only from Debug mode activated or in production mode activated. The characteristic of this error is that it only occurs in one of the modes and not in both.

Also, this is an error that is occurring ONLY IN PRESTASHOP STORES VERSION 1.7, and that makes it impossible for us to enter the Back-office, showing an error 500 or the page goes blank. 

That's why we call it a critical mistake, for leaving the store inoperative.


To fix a HTTP 500 error on PrestaShop online store website:

You can activate your web host's FTP or CPanel error reports in your PrestaShop shop.

1.  From PrestaShop v1.4 to v1.5.2

i. Open config/config.inc.php

ii. On line 29, you will find this line: @ini_set('display_errors','off');

iii. Replace it with: @ini_set('display_errors','on');


2. PrestaShop v1.5.3 and later versions (including 1.6 and 1.7)

i. Open config/defines.inc.php

ii. On line 28, you will find this line: define('_PS_MODE_DEV_', false);

iii. Replace it with: define('_PS_MODE_DEV_', true);

Once error reports from the FTP or CPanel are activated, you can browse your store's front or back office to find out what the problem is.


More about Server error 500:

Error 500 means Internal server Error. Whenever a 500 error occurs, the task to return information by the server to the web browser will stop. 

Therefore, as we mentioned above, this is a critical error that would leave the website inoperative.

The 500 errors, as we noted above, are internal server errors and their origin may be in a programming code error on any item that is included and related to the request for information returned by the server to the web browser. 

Therefore, not all 500 errors come from the same source.

Read More



Prestashop parse error – How to fix the syntax error ?


This article covers ways to resolve Prestashop parse error.

Basically, Prestashop parse error happens when we install Prestashop 1.7 or above or accessing the admin panel of the store.


To fix this error:

1. You can start with emptying your cache by deleting the /var/cache directory.

If that doesn't work copy lines 28-30 from another shop and save it.

2. Also you can try to remove the following:

# php -- BEGIN cPanel-generated handler, do not edit
# Set the “ea-php72” package as the default “PHP” programming language.
<IfModule mime_module>
  AddHandler application/x-httpd-ea-php72 .php .php7 .phtml
</IfModule>
# php -- END cPanel-generated handler, do not edit

From end of .htaccess. 

Just to be sure if that is not source of issues.

Read More



Cloudflare 502 error - Fix it Now ?


This article covers methods to resolve Cloudflare 502 error. Basically, the Cloudflare 502 error triggers when the origin web server responds with a standard HTTP 502 bad gateway or 504 gateway timeout error. 

This happens due to firewall restrictions and server resource issues.


Cause of 502 Bad Gateway Errors:

1. Domain name not resolvable

The domain name is not pointing to the correct IP or it does not point to any IP this problem may happen. Also, DNS propagation could take some time to make changes in DNS setting. It may take 24 to 48 hours to make reflect which is dependent upon the TTL defined per record on the DNS.

2. server down

The origin server is not reachable, this may due to the server is down for some reason or there is no communication to the server given.

3. Firewall blocks

A firewall interrupts the communication between the edge servers and the origin server. This may be caused by security plugins of your CMS.

As a part of DDOS protection and mitigation process or due to some strict firewall rules servers can be blocked from accessing the original server.

Read More



Nginx upstream timed out error - Fix it Now ?


This article covers methods to resolve Nginx upstream timed out error. Basically, this error happens as a result of server resource usage and software timeouts.

A possible issue here could be that PHP is using too much RAM and the PHP FPM process gets killed. 


Therefore, do the following to fix this nginx error:

1. Make sure that there is enough RAM on the server, to check that you could use the top, htop or free -m commands.

2. Make sure that the PHP memory limit is not too high compared to the actual available memory on the Droplet. 

For example if you have 1GB of RAM available your PHP memory limit should not be more than 64MB otherwise only a few processes could consume all of your memory.

3. Optimize your website by installing a good caching plugin, that way you would reduce the overall resource usage on the server.

4. Delete any plugins that are not being used. Generally speaking, it is always recommended to try and keep the number of your plugins as low as possible.

5. Consider using a CDN like Cloudflare, that way it would offload some of the heavy liftings from your Droplet. 

Read More



Nagios error Unable To Login Using Two Factor Authentication


This article covers how to resolve Two Factor Authentication error in Nagios. 


To Reset nagiosadmin account Password:

1. Open an SSH or direct console session to your Nagios XI host and execute the following command:

/usr/local/nagiosxi/scripts/reset_nagiosadmin_password.php --password=newpassword

Note: If you would like to use special characters in your password, you should escape them with "\".

For example, if you want to set your new password to be "$new password#", then you can run:

/usr/local/nagiosxi/scripts/reset_nagiosadmin_password.php --password=\$new\ password\#

Read More



WordPress error "Sorry this file type is not permitted for security reasons" - Fix it Now ?


This article covers methods to resolve WordPress error "Sorry this file type is not permitted for security reasons". Basically, "Sorry this file type is not permitted for security reasons" in WordPress occurs when we try to upload a document to the WordPress library.

As we explained above, WordPress default configuration limits the types of files that you can upload to your site for security reasons.


To Fix "Sorry, This File Type Is Not Permitted for Security Reasons" Error in WordPress, Try to Use the Free WP Extra File Types Plugin:

1. If you'd prefer not to edit your wp-config.php file and/or you want more control over exactly which file types can be uploaded to your site, you can use the free WP Extra File Types plugin at WordPress.org

2. Once you install and activate the plugin, go to Settings → Extra File Types in your WordPress dashboard.

3. There, you'll see a lengthy list of file types. Check the box next to the file type(s) that you want to be able to upload and then click Save Changes at the bottom.

4. If you don't see the file type that you'd like to upload on the list, you can also add your own custom file types at the bottom of the plugin's settings list.

Read More



SNMP MIB Upload Problems in Nagios – Fix it Now ?


This article covers Nagios SNMP MIB Upload Problems.

This issue happens while uploading SNMP MIB files and it could be as a result of insufficient permissions on the SNMP MIB files.


Execute the following commands to reset the permissions and ownership on the Nagios SNMP MIB files:

# chmod -R ug+rw /usr/share/snmp/mibs
# chown -R root:nagios /usr/share/snmp/mibs

After executing those commands you should be able to upload the MIB file that previously did not work.

Read More



Reset Upgrade Status In Nagios Web Interface - How to Perform it ?


This article covers how to Reset Upgrade Status In Nagios Web Interface.

When upgrading Nagios XI using the web interface the upgrade progress may stall with the message "Upgrade in progress". 

Sometimes you will need to clear this message manually due to unforeseen circumstances, this guide explains how to clear the message.


To Reset Upgrade Status in Nagios:

The following command will reset the upgrade status on Nagios XI (using the default username and password listed above):

For MySQL/MariaDB:

mysql -u'nagiosxi' -p'n@gweb' nagiosxi -e "update xi_commands set status_code = '2' where command = '1120';"

Read More



Nagios mysql_error out of range value for column - Fix it now ?


This article covers Nagios error, mysql_error out of range value for column which is evident in the /var/log/messages file on the Nagios XI server.

To resolve this issue you will need to define the SQL Mode in the MySQL / MariaDB my.cnf configuration file:

1. Locate the [mysqld] section and check to see if there is an sql_mode already defined:

[mysqld]
# Recommended in standard MySQL setup
sql_mode=NO_ENGINE_SUBSTITUTION,STRICT_TRANS_TABLES

2. If the sql_mode= line already exists you will need to replace it with the following. 

If the line does not exist you will need to add the following line:

[mysqld]
sql_mode=""

Read More



Prestashop error "an error occurred while sending the message" - Fix it Now ?


This article covers methods to fix Prestashop error "an error occurred while sending the message".

This error happens when the theme that we use does not adapt to the latest version of Prestashop.

To resolve this error, you can try modifying the contact form file.

Add this before the submit button :

<style>
input[name=url] {
display: none !important;
}
</style>
<input type="text" name="url" value=""/>
<input type="hidden" name="token" value="{$token}" />

Read More



Plesk Webmail Server Not Found - Fix it Now ?


This article covers methods to resolve the Plesk error "Webmail Server Not Found" which can happen while opening webmail/domain in a browser or when we issue Let's Encrypt on the domain. The main reason for this error is that the Webmail / domain does not resolve correctly in global DNS system because Plesk server is not set up to manage DNS.

To use DNS with a Plesk server:
1. DNS Server should be installed in Plesk Installer.
2. Log into Plesk and find your Name Servers in Plesk > Domains > example.com > DNS Settings, take the "value" for the record type "NS".
3. Then, it is required to change Name Server for your domain at your domain registrar's account.

Read More



503 bad sequence of commands - Fix it now ?


This article covers methods to fix the email error, "503 bad sequence of commands" which happens as a result of a number of reasons.

To resolve SMTP response: 503 Bad sequence of commands, consider the following and also read the complete guide here.
The IP that should be 10.0.0.0 - whatever that is, look at that box, this is where the problem is likely to be.
Your internal domain is domain.com or domain.net etc.
You may also add a test email account and check if it works as expected. If this works, then this could be an issue with the email account or with the service provider.

Read More



PiP is not recognized as an internal or external command - Fix it Now ?


This article covers different methods to resolve PiP is not recognized as an internal or external command.

Basically, the error, "PiP is not recognized as an internal or external command" happens when we try to install Python packages via a Command Prompt window.
PiP is a recursive acronym for "Pip Installs Packages".

It's essentially a package management system used to install and manage software packages written in Python. Most users make use of PiP to install and manage Python packages found in the Python Package Index.

To add PIP to the PATH environment variable using the Windows GUI:

1. Press Windows key + R to open up a Run dialog box. Then, type "sysdm.cpl" and press Enter to open up the System Properties screen.
2. Inside the System Properties screen, go to the Advanced tab, then click on Environment Variables.
3. In the Environment Variables screen, go to System variables and click on Path to select it. Then with the Path selected, click the Edit… button.
4. In the Edit environment variable screen, click on New and add the path where the PiP installation is located. For Python 3.4, the default location is C:\Python34\Scripts.
5. Once the path is added, open a fresh CMD window and try to install a python package that comes with PiP.

You should no longer see the "pip is not recognized as an internal or external command" error.

Read More



WordPress issue "Add Media button not working" - Fix it Now ?


This article covers how to Fix WordPress Add Media Button Not Working.
The main reason behind this error is usually custom scripts not working correctly, plugins, or themes.
You can pinpoint the cause of your woes using your browser's Inspect -> Console.
The console tool highlights script errors that can help you to identify where the problem lies.

To fix this WordPress error:

1. That aside, start by deactivating all of your plugins.
2. Then check if the Add Media button is working.
3. If the button is working, then it is obvious one of your plugin is causing the script conflict.
4. Next, reactivate the plugins one by one, and check the Add Media button after each activation.
5. When you find the responsible plugin, contact the developer for help or find a replacement.
6. If the problem persists after deactivating all plugins, you need to ensure you've cleared your caches first and then test if your theme is the cause of the WordPress Add Media button not working.
7. Just activate a default WordPress theme such as Twenty Seventeen and then check if the problem is gone.
If the button works, the issue here is your theme.

Read More



Undefined index notice in Joomla - Fix it now ?


This article covers how to resolve Undefined index notice in Joomla. A notice, in PHP terms (PHP is the scripting language that powers Joomla), is more or less a complaint. For example, if you're using a deprecated function such as ereg_replace (by the way, we have had quite a few sites with the ereg_replace() is deprecated notice that we needed to fix) then PHP will complain with a notice.
A notice may also be displayed if you're trying to use questionable casting that PHP thinks will not return the result that you want (for example, if you try to forcefully cast an array into a string).

To fix this Joomla warning:

Change PHP's error reporting in the .htaccess file to hide all errors.
You can do that by adding the following code to your .htaccess file:

php_flag display_startup_errors on
php_flag display_errors on
php_flag html_errors on

The above code will ensure that no error whatsoever will be displayed on your website.

Note that if you have an Error Reporting setting in your configuration settings other than "Default", then this setting will override the error reporting defined in your .htaccess.
For example, if your Error Reporting is set to "Maximum", then the above code in your .htaccess file has no effect.


Read More



WordPress error "This site ahead contains harmful programs" - Fix it Now ?


This article covers WordPress error "This site ahead contains harmful programs".

Basically, the error, This site ahead contains harmful programs happens when Google finds any suspicious code.


It's risky for Google users to visit hacked websites because they could become targets of the hacker:
1. Hackers could steal their data or redirect them to phishing sites.
2. Hackers could trick them into downloading malware onto their devices.
3. Visitors may be subjected to viewing inappropriate malicious content and ads.

Search engines like Google constantly crawl the web for new sites and new content to index.
They use bots and algorithms to check a website's content is original and relevant.
They can also check which websites are using deceitful tactics such as keyword stuffing.


During this process, they can also detect if there's malicious code on your website.
If they do, they proceed to:

1. Blacklist your website immediately.
2. Display "Site Ahead Contains Harmful Programs" or "This site contains malware" warnings to visitors.
3. Depending on the risk posed by your site, it gives users an option to bypass their security warning and proceed to your site by clicking on 'details'.
Or they can choose to leave the site and go 'back to safety'.

Read More



Can't read from the source file or disk - Fix it Now ?


This article covers how to fix "can't read from the source file or disk" error.
Basically, this error triggers when trying to copy certain files to or from an external hard disk.
Many users have reported that they got "Can't read from the source file or disk" error message while copying, deleting or moving files from one location to another.

To fix Error Message: Can't read from the source file or disk:
1. Restart the PC
If you can't read from the source file or disk while copying in Windows 10, and this happens for the first time, try restarting the computer (do not turn off and on, just restart).
Rebooting helps the computer deal with such errors on its own and returns it to an adequate working state.
2. Check the file name
Changing the file name is justified when the file was created in one OS, and its use occurs in another. You may not be able to read from the source file or disk while deleting after using this file on the command line. If this is your situation, be sure to rename the file properly and restart the computer after that.
3. Try to open the file on another PC
Try to do the same as in method 2, but on another PC. Better yet, if it will be a completely different OS (for example, you have Windows installed, then look for a computer with a Mac, etc.).
This will help get rid of any conflicts between the file and the computer, which can happen quite often.
4. Use chkdsk to fix bad sectors
The free chkdsk utility usually handles such errors with ease.

Read More



The source file names are larger than is supported by the file system


This article covers methods to resolve Windows error "The source file names are larger than is supported by the file system". Most Windows users encounter this issue when trying to copy or delete a file on the computer and they may receive an error message saying Source Path Too Long with the explanation of the source file name(s) are larger than is supported by the file system.


This Windows error error happens mainly because one or more files that are kept in a series of subfolders that have long names, but Windows only allows 258 characters at most in the folder path subfolder.
This will prevent you from moving the files or folders that are saved in this folder.

To fix this windows error, try the following:

Delete the File/Folder by Bypassing the Recycle Bin
You know that when you delete files from your computer, these files will be first moved to the Recycle Bin and they will stay there until you delete them permanently.
i. Click on the file or folder that is bothered by the Source Path Too Long error.
ii. Press the SHIFT and Delete buttons at the same time to permanently delete the file or folder.

Read More



"Are you sure you want to do this" error in WordPress - Fix it Now ?


This article covers methods to fix 'Are you sure you want to do this' error in WordPress for our customers.

One of the most common solutions is to revert your website to an older backup before the error occurred. If you update your backup regularly, it is one of the most powerful tools to use against errors.
If you do not update regularly, the backup is close to worthless because it is missing your regular content updates and website changes.

To fix "Are You Sure You Want to Do This" Error in WordPress:

1. You will not need any additional plugins to solve this issue and in fact, a plugin is likely causing the issue. The error is very simple to track but can become quite tedious if you have a lot of plugins and themes installed. The process includes disabling your themes and plugins while checking to see if the error is fixed. If you have a lot of plugins, this process may take a while. Deactivating the plugins will not be enough because they can still cause a problem. This is why it is recommended to uninstall a plugin if you are not using it.
2. Log into the cPanel and click on the File Manager. Click on the public-html directory and locate the wp-content folder. This folder contains all of the content on your website. Locate the plugins folder and right-click it.
Select the Rename option and rename it to "plugins off" or something similar.

Read More



WordPress error 'Another update currently in process' – Fix it Now ?


This article covers how to resolve WordPress error 'Another update currently in process'.
Basically, this issue usually occurs when a WordPress user, or multiple users, are simultaneously trying to perform a WordPress update while a WordPress core update is running.
During a core update, an additional row called core_updater.lock is placed within the wp_options table of the website’s database. It serves to prevent any other updates from being run while the core update is in progress.
After the WordPress core has been updated, the core_updater.lock row will be deleted, which will allow users to perform any other updates.
The error message will disappear then, or it will be gone automatically after 15 minutes.

To fix this WordPress error:

1. Log into the WordPress administration dashboard and select Plugins > Add New. Search for Fix Another Update, then install and activate the plugin.
2. Navigate to Settings > Fix Another Update In Progress and the database lock will be removed.
3. If you wish to remove the lock directly in the database, Select Databases > phpMyAdmin from the cPanel menu.
4. Select your WordPress database from the sidebar, then click the Browse button next to the wp_options database table (your database prefix may be different).
5. In the database rows that appear, look for an entry called ‘core_updater.lock’ and select the Delete button to remove. You can now proceed with your outstanding updates.

Read More



Install Bcrypt in Docker and resolve related errors


This article covers how to install Bcrypt in Docker and fix relating Docker errors.

To fix bcrypt error on Docker:

The error looks like this,

internal/modules/cjs/loader.js:807
app_1 | return process.dlopen(module, path.toNamespacedPath(filename));

To resolve, simply Add the following lines of code to the start.sh file,

#!/usr/bin/env bash

# install new dependencies if any
npm install
# uninstall the current bcrypt modules
npm uninstall bcrypt
# install the bcrypt modules for the machine
npm install bcrypt
echo "Starting API server"
npm start

Here,

i. npm uninstall bcrypt would remove bcrypt modules for the other operating system.
ii. npm install bcrypt would install for the current machine that the app would be running on.

Read More



WordPress error Failed to Load Resource - Fix it Now ?


This article covers how to resolve the WordPress error Failed to load resource in WordPress as a result of issues in WordPress URL settings.

To fix this WordPress error:

1. Replace The Missing Resource

The missing resource is an image in one of your blog posts or page, then try to look for it in the media library.

If you are able to see the media library, then try to add again by editing the post or page.

2. Replace theme or plugin files

In case, if the failed resource is a WordPress plugin or theme file, then the easiest way to replace it is by reinstalling the plugin or theme.

First, you need to deactivate your current WordPress theme.

All you have to do is visit the Appearance » Themes page.

Read More



NRPE: No Output Returned From Plugin - How to fix this Nagios error ?


This article covers how to resolve Nagios error, NRPE: No Output Returned From Plugin. This error happens as a result of Permissions or Missing plugin.

To fix this Nagios error:

1. The most common solution is to check the permissions on the check_nrpe binary on the Nagios XI server:

ls -la /usr/local/nagios/libexec/check_nrpe

The expected permissions should resemble:

-rwxrwxr-x. 1 nagios nagios  75444 Nov 21 01:38 check_nrpe

2. If not, change ownership to user/group "nagios" and fix up the permissions:

$ chown nagios:nagios /usr/local/nagios/libexec/check_nrpe
$ chmod u+rwx /usr/local/nagios/libexec/check_nrpe
$ chmod u+rx /usr/local/nagios/libexec/check_nrpe

Read More



Googlebot cannot access CSS and JS files – Resolve crawl errors ?


This guide covers website crawl errors, Googlebot cannot access CSS and JS files. Google bot and other search spiders will visit the robots.txt file of your website immediately after they hit the htaccess file.

Htaccess has rules to block ip addresses, redirect URLs, enable gzip compression, etc. The robots.txt will have a set of rules for the search engines too. 

They are the reason you received "Googlebot Cannot Access CSS and JS files". 

Robots.txt has few lines that will either block or allow crawling of files and directories. Google has started penalizing websites that block the crawling of js and css files.

The JavaScript and cascading style sheets are responsible for rendering your website and they handle forms, fire events, and so on.

If the JS is blocked, Google bot will not be able to crawl the code and it will consider the code as a spam or violation of link schemes. 

The same logic applies for the CSS files.


To resolve "Googlebot Cannot Access CSS And JS Files" Warning:

1. You need to remove following line: Disallow: /wp-includes/

Depending upon how you have configured your robots.txt file, it will fix most of the warnings. 

You will most likely see that your site has disallowed access to some WordPress directories like this:

User-agent: *

Disallow: /wp-admin/
Disallow: /wp-includes/
Disallow: /wp-content/plugins/
Disallow: /wp-content/themes/

2. You can override this in robots.txt by allowing access to blocked folders:

User-agent: *
Allow: /wp-includes/js/

Read More



Plesk error PHP has encountered an Access Violation - Fix it now


This article covers how to fix PHP has encountered an Access Violation which occurs in the Windows server with the Plesk control panel. 

Do a copy libmysql.dll from C:\Program Files (x86)\SWsoft\Plesk\Additional\PleskPHP5 to C:\WINDOWS\system32

Wait for few minutes and it should fix the issue.


To fix PHP has encountered an Access Violation at XXXXX in Plesk:

1. Connect to the server via SSH.

2. Create a backup of the psa database:

plesk db dump psa > /root/psa_backup.sql

3. Download the attached script:

$ wget https://plesk.zendesk.com/hc/article_attachments/115001860533/script_kb213376309

4. Make the script executable:

$ chmod +x script_kb213376309

5. Launch the script for the affected subscription:

Note: change the "example.com" website in the command below to the correct one.

$ ./script_kb213376309 example.com

6. If an error like below appears:

ERROR 1062 (23000) at line 5: Duplicate entry '123-789' for key 'PRIMARY' exit status 1

find the duplicate record in the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry.

plesk db "select * from IpAddressesCollections where ipCollectionId=123;"

7. Remove the duplicate record from the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry

Change the "456" ipAddressId in the command below to the correct one based on the output from the previous step.

$ plesk db "delete from IpAddressesCollections where ipCollectionId=123 and ipAddressId=456;"

Read More



Set Up Amazon WorkSpaces - Step by Step Process


This article covers how to set up Amazon WorkSpaces for our customers. Amazon WorkSpaces is a managed, secure Desktop-as-a-Service (DaaS) solution. With Amazon WorkSpaces, your users get a fast, responsive desktop of their choice that they can access anywhere, anytime, from any supported device.

With Amazon WorkSpaces, you can provision virtual, cloud-based Microsoft Windows or Amazon Linux desktops for your users, known as WorkSpaces.

Generally, Workspaces are meant to reduce clutter and make the desktop easier to navigate. Workspaces can be used to organize your work. For example, you could have all your communication windows, such as e-mail and your chat program, on one workspace, and the work you are doing on a different workspace.

The Amazon WorkSpaces Free Tier provides two Standard bundle WorkSpaces with 80 GB Root and 50 GB User volumes, running in AutoStop mode, for up to 40 hours of combined use per month, for two calendar months, from the time you create your first WorkSpace.


Key Features of Amazon WorkSpaces:

1. The end-users can access the documents, applications, and resources using devices of their choice such as laptops, iPad, Kindle.

2. Network Health Check-Up verifies if the network and Internet connections are working. Also, checks if  WorkSpaces and their associated registration services are accessible, and checks if port 4172 is open for UDP and TCP access or not.

3. Client Reconnect feature allows the users to access their WorkSpace without entering their credentials every time when they disconnect.

4. Auto Resume Session feature allows the client to resume a session that gets disconnected due to any reason in network connectivity within 20 minutes by default. This can be extended for 4 hours. However, the users can disable this feature any time in the group policy section.

5. Console Search feature allows Administrators to search for WorkSpaces by their user name, bundle type, or directory.


Some AWS Limitations:

1. AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Read More



Setup and Configure tmpmail - Step by Step Process


This article covers method to Setup and Configure tmpmail.

Basically, tmpmail is a handy utility for CLI warriors within the command line. 

By default, email addresses are created at random unless a specific email address follows the --generate flag.

Currently, w3m renders the emails in an HTML format within the terminal. If preferred, a user can use a GUI or text-based browser to view the email by passing the --browser flag followed by the command needed to launch the web browser of your choice.

TEMP-MAIL does not store your IP-address. This means you are reliably protected from all unauthorized actions that may endanger your information and compromise your privacy. All emails and data temporarily stored on our service are permanently deleted after the time expired.


How to install tmpmail ?

1. To install tmpmail, we can use the wget command or curl command to download the script from GitHub. 

Next, open a terminal and then copy or type in the following command:

# wget https://raw.githubusercontent.com/sdushantha/tmpmail/master/tmpmail

2. Now, run the chmod command against the script to modify the permissions, so the file is executable.

[root@host2 ~]# chmod -v +x tmpmail

3. Next, we will move the file to a location somewhere in our $PATH. Use the following command to accomplish this.

# mv tmpmail /bin/
# which tmpmail
/usr/bin/tmpmail


To Generate a New tmpmail Address:

To create a new temporary email address, run the following command.

# tmpmail --generate

Read More



DirectAdmin Email page failed to load - Fix it Now


This article covers how to fix the issue regarding the email page not loading in the DirectAdmin panel.


To fix this DirectAdmin error:

1. Edit DirectAdmin.conf

$ vi /usr/local/directadmin/conf/directadmin.conf

2. Add below line into the file to enable disk usage cache:

pop_disk_usage_cache=1

3. Edit /etc/cron.d/directadmin_cron

$ vi /etc/cron.d/directadmin_cron

and add below line

*/15 * * * * root echo "action=cache&type=popquota" >> /usr/local/directadmin/data/task.queue

4. Restart crond service

$ service crond restart

Read More



Nagios No lock file found - Fix this error now


This article covers different methods to resolve the error, Nagios: No lock file found.  Basically, "No lock file found in /usr/local/nagios/var/nagios.lock" means that the service isn't running.

To fix this Nagios error:
Execute the command:

$ /usr/local/nagios/bin/nagios -d /usr/local/nagios/etc/nagios.cfg

Running the command above simply starts the nagios daemon and points it to a specific config file.
The advantage to running this command manually over systemd is that when you run "service nagios start" this typically calls the /etc/rc.d/init.d/nagios script which contains a line with parametrized environment variables:

$NagiosBin -d $NagiosCfgFile

Because every system is different, not specifying either the bin nor config directories could lead to nagios breaking (stopping) when it tries to start using the default installation directory paths

Read More



Clear Solaris Service Maintenance Status in Nagios - Troubleshoot and Resolve


This article covers how to fix Clear Solaris Service Maintenance Status Nagios issue. Basically, When the Nagios Core service finds an invalid configuration, the core service will not start. 

To fix the problem you must fix the problem Nagios Core is complaining about.

This is normal behavior of Nagios Core, it is not specific to Solaris.

However on Solaris, after a service has failed to start several times, Solaris will put the service into what is called a Maintenance State. This state prevents a small problem from becoming a bigger problem. 

Even after fixing the problem Nagios Core is complaining about, you must also clear the maintenance state on the service before Solaris allows a service to be started again.

This means that the service is in a maintenance state, however there is not a lot of detail as to the cause of the issue except that the Start method failed repeatedly. 

It does however provide the name of a log file /var/svc/log/application-nagios:default.log.

Execute the following command to perform further troubleshooting:

tail -20 /var/svc/log/application-nagios:default.log


To Clear Maintenance State on Nagios:

1. Run the following command to clear the maintenance state:

$ svcadm clear nagios

2. Execute the following command to start Nagios:

$ svcadm enable nagios

3. Now check the state of the service:

$ svcs -xv nagios

Read More



Updating Windows VM Templates on VMWare with PowerShell - How to do it


This article covers how to update Windows VM Templates on VMWare. 

The update process of a VM template on VMWare consists of the following stages:

1. A template from the Content Library is converted to a virtual machine.;

2. After starting it, an administrator logs on, installs approved Windows updates using WSUS, updates the required software;

3. After the updates have been installed, the VM is restarted, then turned of and converted back to the template.

Read More



DirectAdmin error Headers and client library minor version mismatch


This article covers how to resolve DirectAdmin: Headers and client library minor version mismatch error. Basically, this error can come up even after MySQL update and PHP rebuild via custombuild.

To resolve this error:

Perform a cleanup in custombuild and rebuild PHP

$ cd /usr/local/DirectAdmin/custombuild

$ ./build clean

$ ./build php n


Alternatively you can set it like this:

cd /usr/local/directadmin/custombuild

./build set php5_ver 5.3

./build set mysql 5.1

./build update

./build clean

./build apache d

./build php d

./build mysql d


To rebuild zend:

cd /usr/local/directadmin/custombuild

./build zend

Read More



WordPress error Class wp_theme not found - Fix it now


This article covers method to resolve 'WordPress: Class wp_theme not found' error for our customers.


To perform a manual WordPress upgrade:

1. Get the latest WordPress zip (or tar.gz) file.

2. Unpack the zip file that you downloaded.

3. Deactivate plugins.

4. Delete the old wp-includes and wp-admin directories on your web host (through your FTP or shell access).

5. Using FTP or your shell access, upload the new wp-includes and wp-admin directories to your web host, overwriting old files.

6. Upload the individual files from the new wp-content folder to your existing wp-content folder, overwriting existing files. Do NOT delete your existing wp-content folder. Do NOT delete any files or folders in your existing wp-content directory (except for the one being overwritten by new files).

7. Upload all new loose files from the root directory of the new version to your existing WordPress root directory.

However, if you did not perform step 7, you would see this error message when trying to complete your upgrade:

Class WP_Theme not found in theme.php on line 106


Hence, to avoid this issue, or to fix this issue, make sure you perform step 7 and continue on the remaining steps for the manual WordPress updating process.

Read More



DirectAdmin User too large delete on background - Methods to resolve this error


This article covers method to fix the error, DirectAdmin: User too large delete on background. Basically, this error occurs when the sum of the disk usage of any user exceeds a certain threshold.

To prevent time-outs in your browser when deleting excessively large accounts, DirectAdmin will execute the deletion by adding the command to the background’s task.queue, instead of performing the execution on the foreground.


To fix DirectAdmin: User too large delete on background error, you can connect to the server through SSH using root access, then go to DirectAdmin's installed directory as below:

cd /usr/local/directadmin/conf/

Then edit the directadmin.conf file in the directory by running

vi directadmin.conf

If the variable "get_background_delete_size" value exists in the directadmin.conf file, it will be set to 10 GB by default (get_background_delete_size=10240). 

If the variable cannot be found in the file, simply add it in. 

You can modify the value of 10240 to define the value that you wish to set.

Read More



Amazon Redshift - Its features and how to set it up


This article covers an effective method to set up Amazon Redshift. Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud. This enables you to use your data to acquire new insights for your business and customers. The first step to create a data warehouse is to launch a set of nodes, called an Amazon Redshift cluster.

Amazon Redshift is a relational database management system (RDBMS), so it is compatible with other RDBMS applications. Amazon Redshift and PostgreSQL have a number of very important differences that you need to take into account as you design and develop your data warehouse applications.

Amazon Redshift is based on PostgreSQL.

Amazon Redshift is specifically designed for online analytic processing (OLAP) and business intelligence (BI) applications, which require complex queries against large datasets.


What is the difference between Amazon Redshift and Amazon Redshift Spectrum and Amazon Aurora?

Amazon Simple Storage Service (Amazon S3) is a service for storing objects, and Amazon Redshift Spectrum enables you to run Amazon Redshift SQL queries against exabytes of data in Amazon S3.

Both Amazon Redshift and Amazon RDS enable you to run traditional relational databases in the cloud while offloading database administration. 

Customers use Amazon RDS databases primarily for online-transaction processing (OLTP) workload while Redshift is used primarily for reporting and analytics.

Read More



Interworx vs cPanel - Which is Better


This article covers InterWorx and cPanel  and gives an idea of how to choose the best control panel for customers. Basically, many factors depends to choose the right panel like InterWorx and cPanel. 


InterWorx includes two main sections:

1.  NodeWorx (similar to WHM)

2. SiteWorx (the analog of cPanel)

NodeWorx is a system administrator interface to configuring, managing and monitoring your server. 

From the NodeWorx amin, you can securely manage multiple SiteWorx accounts.

SiteWorx is a separate control management account and website owner interface that provides access to the tools for managing your websites, email, and databases.


Differences between InterWorx and cPanel:

1. Unlike cPanel, with InterWorx, you can create multiple administrator accounts and provide them with the desired permissions. 

This is especially convenient if your clients have web developers or people who need to manage email only, for example. 

cPanel has only one administrative account, and no more additional accounts can be created.

2. InterWorx doesn't have complicated licensing options like cPanel. 

cPanel recently implemented an account-based pricing model that may have resulted in a substantial price increase. 

Whereas InterWorx lets you host multiple accounts on the server without increasing your license cost as it is licensed per server.

3. cPanel supports PostgreSQL, Mailman mailing lists, NodeJS, server-side Java, Ruby on Rails, and the DNSSEC protocol. 

InterWorx does not support those things at this time. Also, InterWorx does not support CloudLinux, only Linux and CentOS are supported.

4. InterWorx supports all of the same languages for NodeWorx as for SiteWorx. 

In addition, both NodeWorx and SiteWorx share a wide variety of supported themes. WHM only supports US English and one theme for now. cPanel has two themes.

Read More



Core Configuration Manager Displaying Issues in Nagios XI


This article covers how to resolve the issue with Nagios XI that stops displaying the core configuration manager or the components inside the core configuration manager.

If this is the case, When using Core Configuration Manager (CCM), the interface does not work as expected, it does not appear to display correctly and generally it feels like there is a bug. This issues is related to the web browsers implementation of JavaScript. If possible, use a browser that more closely implements the ECMAScript Language Specification.

A quick way to see if this is the problem is to see if you experience the same issue using another web browser.


To fix this Nagios configuration Problem:

1. In the event of the the Core Config Manager not visible or components missing from the page, this generally relates to a proxy and the following steps may resolve this issue:

pear config-set http_proxy http://proxy:port

2. Make sure to change proxy:port to match your proxy server, example:

pear config-set http_proxy http://192.168.44.20:8080

3. Then execute the following:

pear install HTML_Template_IT

 After performing these steps go back to CCM and see if it works.

Read More



Enable Built-in Administrator Account on Windows 10 - How to implement this


This article covers an easy way to activate the administrator account is from the command prompt with elevated privileges. Windows 10 includes a built-in Administrator account that, by default, is hidden and disabled for security reasons. Sometimes, you need to perform a bit of Windows management or troubleshooting or make changes to your account that requires administrator access.

Windows 10 administrator default password will not be required, alternatively you can enter password for local account and sign in.


To know if I have the built-in Administrator account in Windows 10:

1. Right-click the name (or icon, depending on the version Windows 10) of the current account, located at the top left part of the Start Menu, then click on Change account settings. 

2. The Settings window will pop up and under the name of the account if you see the word "Administrator" then it is an Administrator account.


To reset the built-in Administrator account in Windows 10:

1. Boot from Windows 10 bootable CD/DVD or USB.

2. When the install now screen shows up click on Repair your computer > Advanced Options >Troubleshoot > Command Prompt.

3. Once you can boot into the command prompt, type "net user administrator /active:yes".


To enable hidden administrator:

1. Go to Security Settings > Local Policies > Security Options. 

2. The policy Accounts: Administrator account status determines whether the local Administrator account is enabled or not. 

3. Check the "Security Setting" to see if it is disabled or enabled. 

4. Double-click on the policy and select "Enabled" to enable the account.

Read More



This App Has Been Blocked for Your Protection on Windows - Fix it now


This article covers methods to fix the 'This App Has Been Blocked for Your Protection on Windows' error. Windows Defender SmartScreen acts as a sort of guard dog while you use Windows 10.

It will block you from opening some apps if they come from an unknown place or are created by an unknown publisher. 

Some apps really are harmful and really will get you in a mess. Only go around the Windows 10 app block if you know for sure that the file is safe.


To unblock an app that is blocked by the administrator:

1. Locate the file, right-click it, and select "Properties" from the contextual menu. 

2. Now, find the "Security" section in the General tab and check the checkbox next to "Unblock" - this should mark the file as safe and let you install it. 

3. Click "Apply" to save the changes and try to launch the installation file again.


To Unblock Programs In Windows Defender Firewall:

1. Select the “Start” button, then type “Firewall“.

2. Select the “Windows Defender Firewall” option.

3. Choose the "Allow an app or feature through Windows Defender Firewall" option in the left pane.


To install a program that is blocked by administrator:

1. Disable Windows SmartScreen.

2. Execute the file via Command Prompt.

3. Install the app using the hidden administrator account.

4. Temporarily disable your antivirus program.

Read More



Steps to Run Program without Admin Privileges and to Bypass UAC Prompt


This article covers how to run a program without admin privileges. The trick to bypass UAC is to create a scheduled task (with highest privileges) for each program that you want to run, and then invoke the scheduled task item manually using schtasks.exe .

UAC helps keep your computer secure. If you reflexively disable UAC when setting up a computer, you should give it another try – UAC and the Windows software ecosystem have come a long way from when UAC was introduced with Windows Vista.


To  Eliminate UAC Prompts for Specific Applications:

1. In Task Scheduler, right-click "Task Scheduler Library" and select "New Folder" Name it whatever you would like.

2. Select the new folder and click "Create Task" (not "Create Basic Task")

3. Name the task something descriptive. ...

4. Under the Actions tab, select "Start a program" in the Action dropdown if it isn't already.


To bypass UAC administrator password:

1. Right-click Start button at left lower corner of PC, select Control Panel.

2. Click User Accounts and family Safety.

3. Click User Accounts.

4. Click Change your account type.

5. Enter Admin password and click Yes to continue.

6. Select Administrator as your new account type, and click Change Account Type.

Read More



Vital Command Line commands for Linux Admins with examples


This article covers a few Vital Command Line for Linux Admins. The Linux command line is a text interface to your computer. Allows users to execute commands by manually typing at the terminal, or has the ability to automatically execute commands which were programmed in “Shell Scripts”.


Common commands in Linux:

1. su command

The su command exists on most unix-like systems. It lets you run a command as another user, provided you know that user's password. When run with no user specified, su will default to the root account. The command to run must be passed using the -c option.


2. which command

which command in Linux is a command which is used to locate the executable file associated with the given command by searching it in the path environment variable. It has 3 return status as follows: 0 : If all specified commands are found and executable.


3. Who am I command line?

whoami command is used both in Unix Operating System and as well as in Windows Operating System. It is basically the concatenation of the strings “who”,”am”,”i” as whoami. It displays the username of the current user when this command is invoked. It is similar as running the id command with the options -un.


4. What does W command do in Linux?

w is a command-line utility that displays information about currently logged in users and what each user is doing. It also gives information about how long the system has been running, the current time, and the system load average.



Facts about the demand in Linux admins?

1. The job prospects for Linux System Administrator are favorable. 

2. According to the US Bureau of Labor Statistics (BLS), there is expected to be a growth of 6 percent from 2016 to 2026. 

3. Candidates who have a firm hold on cloud computing and other latest technologies have bright chances.

Read More



Configure software RAID on Linux using MDADM - Do it now


This article covers how to Configure software RAID on Linux using MDADM.


To Install a Software Raid Management Tool:

To install mdadm, run the installation command:

1. For CentOS/Red Hat (yum/dnf is used): $ yum install mdadm

2. For Ubuntu/Debian: $ apt-get install mdadm

3. SUSE: $ sudo zypper install mdadm

4. Arch Linux: $ sudo pacman -S mdadm


Terms related to Integrity of a RAID Array:

1. Version – the metadata version

2. Creation Time – the date and time of RAID creation

3. Raid Level – the level of a RAID array

4. Array Size – the size of the RAID disk space

5. Used Dev Size – the space size used by devices

6. Raid Device – the number of disks in the RAID

7. Total Devices – is the number of disks added to the RAID

8. State – is the current state (clean — it is OK)

9. Active Devices – number of active disks in the RAID

10. Working Devises – number of working disks in the RAID

11. Failed Devices – number of failed devices in the RAID

12. Spare Devices – number of spare disks in the RAID

13. Consistency Policy – is the parameter that sets the synchronization type after a failure, rsync is a full synchronization after RAID array recovery (bitmap, journal, ppl modes are available)

14. UUID – raid array identifier


To Recovering from a Disk Failure in RAID, Disk Replacement:

If one of the disks in a RAID failed or damaged, you may replace it with another one. First of all, find out if the disc is damaged and needs to be replaced.

# cat /proc/mdstat


To Add or Remove Disks to Software RAID on Linux:

1. If you need to remove the previously created mdadm RAID device, unmount it:

# umount /backup

2. Then run this command:

# mdadm -S /dev/md0

mdadm: stopped /dev/md0

3. After destroying the RAID array, it won’t detected as a separate disk device:

# mdadm -S /dev/md0

mdadm: error opening /dev/md0: No such file or directory

4. You can scan all connected drives and re-create a previously removed (failed) RAID device according to the metadata on physical drives. Run the following command:

# mdadm --assemble —scan


About Mdmonitor: RAID State Monitoring & Email Notifications:

The mdmonitor daemon can be used to monitor the status of the RAID. 

1. First, you must create the /etc/mdadm.conf file containing the current array configuration:

# mdadm –detail –scan > /etc/mdadm.conf

The mdadm.conf file is not created automatically. You must create and update it manually.

2. Add to the end of /etc/mdadm.conf the administrator email address to which you want to send notifications in case of any RAID problems:

MAILADDR raidadmin@woshub.com

3. Then restart mdmonitor service using systemctl:

# systemctl restart mdmonitor

Then the system will notify you by e-mail if there are any mdadm errors or faulty disks.

Read More



Create custom php ini in Litespeed Webserver - How to do it


This article covers how to Create custom php.ini in Litespeed Webserver. Basically, compared to the Apache web server, the Litespeed web server configuration may feel a bit complicated. In hosting environment with cPanel servers, it is necessary to edit the PHP variables for each domain or customer and this can be done using by creating a custom php.ini for each user's home directory. So the clients can change the PHP values according to their requirements.  

There should some steps need to be done on Litespeed admin panel on cPanel/WHM to enable custom php.ini and you can follow the below steps to enable it.


To Create Custom Php.Ini In A Litespeed Webserver:

1. Login into WHM.

2. Select Litespeed Web Server

3. Litespeed Configuration > Admin Console > Configuration > Server > External App > lsphp5

4. Under Environment section >> add “PHPRC=$VH_ROOT”

5. Under “suEXEC User ” section >> add the account username for which custom php.ini has to be enabled.

6. Under “suEXEC Group ” section >> add the group name of the same account.

7. Click save and return to Main >> Litespeed Web server

8. Under Quick Configuration of PHP suEXEC settings,>> Set Enable PHP suExec to yes.

9. After that put custom php.ini in the user’s home directory and check it using a phpinfo page.

Read More



SSH Servers Clients and Keys - More about it now


This article covers important information about SSH Servers, Clients and Keys. Use SSH keys for authentication when you are connecting to your server, or even between your servers.

They can greatly simplify and increase the security of your login process. 

When keys are implemented correctly they provide a secure, fast, and easy way of accessing your cloud server.


Turn off password authentication Linux:

With SSH key authentication configured and tested, you can disable password authentication for SSH all together to prevent brute-forcing. When logged in to your cloud server.

1. Open the SSH configuration file with the following command.

$ sudo nano /etc/ssh/sshd_config

2. Set the password authentication to no to disable clear text passwords.

PasswordAuthentication no

3. Check that public key authentication is enabled, just to be safe and not get locked out from your server. If you do find yourself unable to log in with SSH, you can always use the Web terminal control panel.

PubkeyAuthentication yes

Then save and exit the editor.

4. Restart the SSH service to apply the changes by using the command below.

$ sudo systemctl restart sshd

With that done your cloud server is now another step along towards security. 

Malicious attempts to connect to your server will results in authentication rejection, as plain passwords are not allowed, and brute-forcing an RSA key is practically impossible.

Read More



dhclient to persistently look for an IP address lease - Configure it Now


This article covers how to use dhclient command. Basically, Linux dhclient command can provide an IP lease until DHCP Server/Router grants one.

With this guide, you can easily configure Linux dhclient command to continuously requests an IP lease until one is granted by DHCP Server / Router.

Read More



Icons images and javascript files missing from frontend in Magento - Fix it now


This article covers methods to resolve Magento error related to with icons, images, and javascript files missing from frontend. Basically, icons, images, and javascript files might not appear if we use the wrong Magento update command to upgrade the version.


If you are in production mode, and are running setup:upgrade and you don't want regenerate static content because there is no need to, then you can use the following:

php bin/magento setup:upgrade --keep-generated

--keep-generated is an optional argument that does not update static view files. 

It should be used only in production mode. 

It should not be used in developer mode.


Solutions for the issue where stylesheets and images do not load after installing Magento ?

The following are possible solutions depending on the software you use and the cause of the problem:

If you are using the Apache web server, verify your server rewrites setting and your Magento server's base URL and try again. If you set up the Apache AllowOverride directive incorrectly, the static files are not served from the correct location.

If you are using the nginx web server, be sure to configure a virtual host file. The nginx virtual host file must meet the following criteria:

The include directive must point to the sample nginx configuration file in your Magento installation directory. For example:

include /var/www/html/magento2/nginx.conf.sample;

The server_name directive must match the base URL you specified when installing Magento. For example:

server_name ip_address;

If the Magento application is in production mode, try deploying static view files using the command magento setup:static-content:deploy.

Read More



Force DHCP Client to Renew IP Address - Perform it now


This article covers how to force DHCP client to renew IP address. You need to use Dynamic Host Configuration Protocol Client i.e., dhclient command. 

The client normally doesn't release the current lease as it is not required by the DHCP protocol. Some cable ISPs require their clients to notify the server if they wish to release an assigned IP address. 

The dhclient command, provides a means for configuring one or more network interfaces using the Dynamic Host Configuration Protocol, BOOTP protocol, or if these protocols fail, by statically assigning an address.


Linux renew ip command using dhcp:

The -r flag explicitly releases the current lease, and once the lease has been released, the client exits. 

For example, open terminal application and type the command:

$ sudo dhclient -r

Now obtain fresh IP address using DHCP on Linux:

$ sudo dhclient


To start DHCP client in Linux:

1. To start the DHCP service, type the following command: # /etc/init.d/dhcp start.

2. To stop the DHCP service, type the following command: # /etc/init.d/dhcp stop. 

The DHCP daemon stops until it is manually started again, or the system reboots.


How can I renew or release an IP in Linux for eth0?

To renew or release an IP address for the eth0 interface, enter:

$ sudo dhclient -r eth0

$ sudo dhclient eth0

In this example, I am renewing an IP address for my wireless interface:

sudo dhclient -v -r eth0

sudo dhclient -v eth0


Command to release/renew a DHCP IP address in Linux:

1. ip a - Get ip address and interface information on Linux

2. ip a s eth0 - Find the current ip address for the eth0 interface in Linux

3. dhclient -v -r eth0 - Force Linux to renew IP address using a DHCP for eth0 interface

4. systemctl restart network.service - Restart networking service and obtain a new IP address via DHCP on Ubuntu/Debian Linux

5. systemctl restart networking.service - Restart networking service and obtain a new IP address via DHCP on a CentOS/RHEL/Fedora Linux

6. nmcli con - Use NetworkManager to obtain info about Linux IP address and interfaces

7. nmcli con down id 'enp6s0' - Take down Linux interface enp6s0 and release IP address in Linux

8. nmcli con up id 'enp6s0' - Obtian a new IP address for Linux interface enp6s0 and release IP address using DHCP

Read More



Unable to add MySQL database in Plesk Customer Panel - Fix it now


This article covers how to fix issues that make it unable to add MySQL database in Plesk customer panel.


To resolve Cannot add MySQL database in Plesk Customer Panel:

1. Log in to Plesk and apply one of the following:

2. Enable Database server selection directive in Service Plans > Default > Permissions > Show more available permissions and press Update & Sync.

3. Switch MySQL default database server from None to localhost:3306 in Service Plans > Default > Hosting Parameters > Default Database Server and press Update & Sync.


Note:  it is also applicable to cases when Amazon RDS extension is installed. 

If it is needed to provide customer with the ability to select Amazon server, enable "database server selection" option.


How do I add a database to my Plesk Panel?

How to Create a New Database or Database User in the Plesk Control Panel

1. Log into your Control Panel.

2. Click on Databases.

3. Click on the Add New Database icon.

4. Next to Database Name enter the name you want to use.

For Type, choose either Microsoft SQL Server or MySQL (DNN uses the Microsoft SQL Server.).

Read More



Unable to add MS SQL database in Plesk - Fix it now


This article covers how to fix the error, Unable to add MS SQL database in Plesk.

Basically, the number of MS SQL databases is limited for the webspace, subscriptions, or reseller's plan.


In Web Admin Edition:

1. Log in to Plesk.

2. Go to Tools & Settings > License Management and check if Microsoft SQL Server support enabled or not:

a. If no, then it is required to purchase the MSSQL support first for the subscription.

MSSQL support is included in the Power Pack and Developer Pack.

b. If yes, then proceed to step 3.

3. Run the command below to get the current limit of MSSQL databases for the required webspace:

C:\> plesk bin subscription_settings --info example.com | findstr max_mssql_db

max_mssql_db 30 MS SQL databases

4. Increase the number of MSSQL databases for the required webspace (use the "-1" to set to the Unlimited value):

C:\> plesk bin subscription_settings -u example.com -max_mssql_db 100

plesk bin subscription_settings -u example.com -max_mssql_db -1


In Web Pro and Web Host Editions:

1. Log in to Plesk.

2. Go to Subscriptions > example.com > Account > Resources.

3. Find the MS SQL databases number.

a. If it reached its limit, increase it of the following ways:

Go to Subscriptions > example.com > Customize > Resources page and increase the MS SQL databases limit (changes will affect only this subscription).

Go to Subscriptions > example.com > Service Plan: Default > Resources page and increase the MS SQL databases limit (changes will affect all subscriptions assigned to this service plan).

b. If it is not reached the limit, then this limit is set on the reseller's level as also. Follow to the next step.

4. Go to Subscriptions > example.com > Subscriber: John Doe > Provider: Jane Doe.

5. Click the Change Plan button to increase the MS SQL databases number for all resellers assigned to this service plan.

Click the Customize button to increase the MS SQL databases number only for this reseller.

6. Find the MS SQL databases number and increase it to the required value.

Read More



Add MySQL database in Websitepanel and fix common errors


This article covers add MySQL database in Websitepanel and fix a common errors related to this task.

A database interface allows you to create and manage the existing MySQL databases. If you are creating a PHP based application or any application that uses a database, then you will need to create a database and a database user to access this database.


To create a MySQL database in WebsitePanel:

1. Click on the plan you want to add a MySQL database to.

2. Then click Databases.

3. Click MySQL.

4. Click Create Database.

5. Enter a name for your database.

6. Click Save.

7. You can click on the database you just added to edit it.

8. You can view existing users or delete or backup the database.

9. Click Save when you are finished


Success! You can view your added databases and see how many allowed databases you've used.

Read More



Code 9c57 Windows Update Error - Fix it now


This article covers fix the Code 9c57 Windows Update Error. Error Code 9c57 generally corresponds to a failed installation of Internet Explorer 11. In addition to that, the KB 2882822 update requires validation of genuine Windows installed on the system, so you may visit the link referred in the third question and check if your Windows requires activation.


What is 'Error code 9c57' in Windows Update?

Windows Update error 9c57 is an error that may occur when you are trying to install “Windows IE9 in Windows 7 for x64 Based System” update.


How can you fix ‘Error code 9c57’ in Windows Update?

Some of the common fixes include:

1. Manually installing Internet Explorer

2. Deleting SoftwareDistribution and running DISM command and sfc/ scannow command


Causes of Windows Update Error 9C57 - Error 9C57:

During software design, programmers code anticipating the occurrence of errors.

However, there are no perfect designs, as errors can be expected even with the best program design. Glitches can happen during runtime if a certain error is not experienced and addressed during design and testing.


To fix Windows Update Error 9C57 - Error 9C57:

1. When you get a runtime error, keep in mind that it is happening due to programs that are conflicting with each other. 

The first thing you can do to resolve the problem is to stop these conflicting programs.

2. Update / Reinstall Conflicting Programs

3. Virus infection causing runtime error on your computer must immediately be prevented, quarantined or deleted. Make sure you update your virus program and run a thorough scan of the computer or, run Windows update so you can get the latest virus definition and fix.

4. You might be getting the error because of an update, like the MS Visual C++ package which might not be installed properly or completely. What you can do then is to uninstall the current package and install a fresh copy.

5. You might also be experiencing runtime error because of a very low free space on your computer.

6. If the error is related to a bad graphics driver, then you may do the following:

Open your Device Manager, locate the graphics driver

Right click the video card driver then click uninstall, then restart your computer

Read More



Encrypt email messages in Outlook - Follow this guide now


This article covers the different methods to encrypt email messages in Outlook: using certificates (S/Mime), Office 365 Message Encryption (OME), and using encryption add-ins.


To Encrypt a single message:

1. In message that you are composing, click File > Properties. 

2. Click Security Settings, and then select the Encrypt message contents and attachments check box. 

3. Compose your message, and then click Send.


In Outlook, All attachments are encrypted.

Recipients who access the encrypted email via the Office Message Encryption portal can view attachments in the browser.

Note that if the recipient of the file is using an Outlook.com account, they can open encrypted Office attachments on the Office apps for Windows.


To view an encrypted email in Outlook:

1. Select Read the message.

2. You'll be redirected to a page where you can sign in and receive a single-use code.

3. Check your email for the single-use code. Enter the code in the browser window, then select Continue to read your message.


To encrypt a message in Office 365:

1. Sign in with Global Admin credentials.

2. Click on Admin.

3. Click on Settings.

4. Click on Services & add-ins.

5. Click on Microsoft Azure Information Protection.

Read More



WordPress 401 error - Fix it now


This article covers easy to follow methods to resolve WordPress 401 error. 

The 401 error has multiple names including Error 401 and 401 unauthorized error. 

These errors are sometimes accompanied by a message ‘Access is denied due to invalid credentials’ or ‘Authorization required’.


To fix the 401 error in WordPress:

1. Temporarily Remove Password Protection on WordPress Admin

2. Clear Firewall Cache to Solve 401 Error in WordPress

3. Deactivate All WordPress Plugins

4. Switch to a Default WordPress Theme

5. Reset WordPress Password

Read More



Unable to add bridge port vnet0 No such device - Fix it now ?


This article covers how to resolve the error, Unable to add bridge port vnet0: No such device which happens when the bridge device specified in the guest's (or domain’s) <interface> definition does not exist.

Theerror messages reveal that the bridge device specified in the guest's (or domain's) <interface> definition does not exist.

To verify the bridge device listed in the error message does not exist, use the shell command ifconfig br0.

A message similar to this confirms the host has no bridge by that name:

br0: error fetching interface information: Device not found

If this is the case, continue to the solution.


To fix the error, Unable to add bridge port vnet0: No such device :

1. Edit the existing bridge or create a new bridge with virsh

Use virsh to either edit the settings of an existing bridge or network, or to add the bridge device to the host system configuration.

2. Edit the existing bridge settings using virsh

Use virsh edit name_of_guest to change the <interface> definition to use a bridge or network that already exists.

For example, change type='bridge' to type='network', and <source bridge='br0'/> to <source network='default'/>.

Read More



Install PowerDNS and PowerAdmin on CentOS 7 - How to do it


This article covers the step by step procedure to install PowerDNS on CentOS 7. PowerDNS (pdns) is an open source DNS server written in C++ and released under GPL License. It has become a good alternative for the traditional DNS server Bind, designed with better performance and low memory requirements. 

PowerDNS provides two products, the Authoritative server, and the Recursor. 

The PowerDNS Authoritative server can be configured through the different backend, including the plain Bind zone files, RDBMS such as MySQL, PostgreSQL, SQLite3 or LDAP.


To Install PowerDNS on CentOS 7:

1. First let's start by ensuring your system is up-to-date:

$ yum clean all

$ yum -y update

2. Install PowerDNS and backend.

First, you need to enable EPEL repository and all required packages on your system:

$ yum install epel-release

$ yum install bind-utils pdns pdns-recursor pdns-backend-mysql mariadb mariadb-server

Enable PowerDNS on boot and start PowerDNS server:

$ systemctl enable mariadb

$ systemctl enable pdns

$ systemctl enable pdns-recursor

3. Configure MariaDB.

By default, MariaDB is not hardened. You can secure MariaDB using the mysql_secure_installation script. you should read and below each steps carefully which will set root password, remove anonymous users, disallow remote root login, and remove the test database and access to secure MariaDB:

mysql_secure_installation

4. Create PowerDNS Database and User in MariaDB.

Login as a MariaDB root and create a new database and tables:

### mysql -uroot -p

5. Configure PowerDNS.

Open the /etc/pdns/pdns.conf file.

Finally, restart the Power DNS service:

$ systemctl restart pdns.service

$systemctl enable pdns.service

6. Configure Recursor.

Open the /etc/pdns-recursor/recursor.conf file.

Read More



Install Drupal with Docker Compose


This article covers how to install Drupal with Docker Compose. Basically, installation process of Drupal can be simplified with the use of tools like Docker and Docker Compose. Docker Compose can be used to create a Drupal installation with an Nginx web server. 


Drupal and Docker needs the following to work:

1. HTTP Server with PHP: We can either use Apache with PHP or Nginx with PHP. I'm going to demonstrate building the Docker using Apache with PHP. A Drupal docker can also have services like SSH (for drush alias to work) and some important utilities like vim

2. SQL Server: Choose your favourite SQL Service (MySQL or PostGRESQL or SQLite). I'm going to be using a MySQL docker. The idea behind using a separate docker for SQL is so that you have a freedom to choose an internal SQL service or an external SQL Services like Amazon RDS without affecting your Drupal environment.


The need to Use Docker to Run Drupal:

Using the Drupal and PostgreSQL images from Docker Hub offers the following benefits:

1. The configuration of the software has been done for you, which means that you don’t need to follow a step-by-step process for each application to get them running on your system.

2. Updating your software is as simple as downloading the latest images from Docker Hub.

3. Images and containers are self-contained, which means that they are easy to clean up if you decide to remove them.


How to Set Up Drupal ?

1. Create a new directory in your home folder called my_drupal and cd into it:

mkdir ~/my_drupal/

cd ~/my_drupal/

2. Create a file named docker-compose.yml in this folder and add the following contents. Set your own password for the POSTGRES_PASSWORD option.

3. From the my_drupal directory, start your Docker containers:

docker-compose up -d

4. The Docker containers will take a minute or two to start up Drupal and PostgreSQL. Afterwards, you can visit your Linode’s IP address in your web browser .

5. On the Set up database page, select PostgreSQL as the Database type and enter the following values:

Database name: postgres

Database username: postgres

Database password: The password you set in the docker-compose.yml file

Host (under Advanced Options): postgres

6. When creating your Drupal user, be sure to enter a password that is different from your PostgreSQL password.

Read More



ModSecurity File Upload Error With SecRequestBodyNoFilesLimit


This article covers ModSecurity File Upload Error With SecRequestBodyNoFilesLimit error which happens when the ModSecurity parameter SecRequestBodyNoFilesLimit has reached the limit.

When this issue occurs, you will be Unable to upload file to the website: Request body no files data length is larger than the configured limit.

This error can occur when WAF_SECREQUESTBODYNOFILESLIMIT parameter value reached its limit.


Symptoms of ModSecurity File Upload Error:

1. Unable to upload a file to the website hosted in Plesk with the error:

413 Request entity too large

Request Entity Too Large

The requested resource

/upload-a-file/

does not allow request data with POST requests, or the amount of data provided in the request exceeds the capacity limit.

2. ModSecurity component is installed on the server.

3. The following error can be found in /var/www/vhosts/example.com/logs/error_log file:

[:error] [pid 21701] [client 203.0.112.2] ModSecurity: Request body no files data length is larger than the configured limit (1048576).. 

Deny with code (413) [hostname "www.example.com"] [uri "/wp-admin/admin-ajax.php"] [unique_id "Wakfj-fvNMmcLKLp-n8PjQAAAAE"]


Steps to resolve ModSecurity File Upload Error:

1. Log into the server via SSH.

2. Open /etc/asl/config file using the vi text editor.

3. Increase the value for the WAF_SECREQUESTBODYNOFILESLIMIT directive, for example to the value as below:

WAF_SECREQUESTBODYNOFILESLIMIT "10000000"

Note: it is specified in Bytes.

4. Execute the command below to update the rulesets:

for i in daily weekly monthly; do /usr/local/psa/bin/sw-engine-pleskrun /usr/local/psa/admin/plib/DailyMaintainance/script.php -f UpdateModSecurityRuleSet --period "${i}"; done

This way the change will remain persistent after any updates/rulesets changes.

Read More



Date Time in Laravel and PHP with Carbon


This article covers how to manage date/time easily in Laravel and PHP with Carbon. Basically, Carbon is a package that helps us to deal with date/time in Laravel and PHP in a much easier and systematic manner.

Working with date and time in PHP is not the easiest or most clear of tasks. We have to deal with strtotime, formatting issues, lots of calculations, and more.


Carbon provides some nice functionality to deal with dates in PHP such as:

1. Dealing with timezones

2. Getting current time easily

3. Converting a datetime into something readable

4. Parse an English phrase into datetime (first day of January 2016)

5. Add and Subtract dates (+ 2 weeks, -6 months)

6. Semantic way of dealing with dates


Carbon is already included in Laravel so there's no need to go and add it with Composer.

Whenever we need to use Carbon, we can import it like so:

<?php

use Carbon\Carbon;

After importing you can do a lot with this great package.

Read More



Install Monit monitoring system on CentOS 8 - How to do it


This article covers how to #install Monit on #Centos 8 system. Also, we dealt with how to configure Monit on Centos, adjusting the configuration and setting up alerts to notify the users.

#Monit is a free, open-source process supervision tool for Unix and Linux. With Monit, system status can be viewed directly from the command line, or via the native HTTP(S) web server. Monit is able to do automatic maintenance, repair, and run meaningful causal actions in error situations.


To enable web interface you need to make changes in monit configuration file. 

The main configuration file of monit located at /etc/monit. conf under (RedHat/CentOS/Fedora) and /etc/monit/monitrc file for (Ubuntu/Debian/Linux Mint). 

Monit is very easy to use nearly out of the box. By default, it is set up to check that services are running every 2 minutes and stores its log file in “/var/log/monit.


To Install Monit to monitor your server running CentOS:

1. Install EPEL repository: yum install epel-release yum update.

2. Install Monit: yum install monit.

3. Activate Monit to start automatically during the system boot and start it: systemctl enable monit systemctl start monit.


To #Install #Monit Package on #Ubuntu:

Run the commands given below;

sudo apt update

sudo apt install monit


After installing Monit, the commands below can be used to stop, start and enable Monit service;

sudo systemctl stop monit.service

sudo systemctl start monit.service

sudo systemctl enable monit.service

Read More



Adding users to the local admin group in PowerShell


This article covers how to add users to local admin group either via Group Policy Objective or directly via command line. 


To add a user to the local group in PowerShell:

You can add AD groups or users to the local admin group using the below Powershell command.

Add-LocalGroupMember -Group "Administrators" -Member "domain\user or group," "additional users or groups."


To add a user to the local admin group:

1. Right-click the newly created Group, select Properties, navigate to the Members tab, click Add… and enter designated users to the group, e.g. domain\administrator, domain\domain admins, domain\syskitmonitorservice. 

2. Add other users that also need administrative privileges, if necessary. 

3. Click OK to proceed.


To get local admin group members in PowerShell:

To get the local Administrators group members using PowerShell, you need to use the GetLocalGroupMember command. 

This command is available in PowerShell version 5.1 onwards and the module for it is Microsoft. PowerShell. LocalAccounts.


To Create a User Account in Windows 10 with PowerShell:

1. Open PowerShell as Administrator.

2. To create a new user account without a password, type New-LocalUser -Name "user_name" -Description "Description of your new account." -NoPassword .

3. To create a user account that has a password, firstly execute the following line: $Password = Read-Host -AsSecureString .

Read More



Advantages of NoSQL Databases - Get to know them now


This article covers the advantages of NoSQL Databases. #SQL databases are vertically scalable, NoSQL databases are horizontally scalable. SQL databases are table based, while NoSQL databases are document, key-value, graph or wide-column stores. 

SQL #databases are better for multi-row transactions, #NoSQL are better for unstructured data like documents or JSON.

#MongoDB, CouchDB, CouchBase, Cassandra, HBase, Redis, Riak, Neo4J are the popular NoSQL databases examples.

The structure of many different forms of data is more easily handled and evolved with a NoSQL database. 

NoSQL databases are often better suited to storing and modeling structured, semi-structured, and unstructured data in one database.


Main purpose of NoSQL?

NoSQL Database is a non-relational Data Management System, that does not require a fixed schema. 

It avoids joins, and is easy to scale. 

The major purpose of using a NoSQL database is for distributed data stores with humongous data storage needs. 

NoSQL is used for Big data and real-time web apps.


Reasons to Use a NoSQL Database includes:

1. Storing large volumes of data without structure. A NoSQL database doesn't limit storable data types.

2. Using cloud computing and storage. Cloud-based storage is a great solution, but it requires data to be easily spread across multiple servers for scaling.

3. Rapid development.


Main types of NoSQL databases?

There are four big NoSQL types: 

1. Key-value store

2. Document store, 

3. Column-oriented database,

4. Graph database. 

Each type solves a problem that can't be solved with relational databases. 

Actual implementations are often combinations of these. 

OrientDB, for example, is a multi-model database, combining NoSQL types.

Read More



Benefits of Data Warehouse in Business Organization


This article covers the Advantages of Data Warehouse. 

#Data #warehousing improves the speed and efficiency of accessing different data sets and makes it easier for corporate decision-makers to derive insights that will guide the business and marketing strategies that set them apart from their competitors. Improve their bottom line.

Unlike a database, which is focused on users inputting data, a data warehouse is architected for decision-making, ad hoc queries and analytics. Thus, enabling queries to be performed without any impact to your company's operational database.


A data warehouse is a type of data management system that is designed to enable and support business intelligence (BI) activities, especially analytics. Data warehouses are solely intended to perform queries and analysis and often contain large amounts of historical data.


A data warehouse can help support business needs, such as the ability to consolidate financial results within a complex company that uses different software for different divisions.


Benefits of a Data Warehouse:

1. Delivers enhanced business intelligence.

2. Saves times.

3. Enhances data quality and consistency.

4. Generates a high Return on Investment (ROI).

5. Provides competitive advantage.

6. Improves the decision-making process.

7. Enables organizations to forecast with confidence.

8. Streamlines the flow of information.


The key characteristics of a data warehouse are as follows:

1. Some data is denormalized for simplification and to improve performance.

2. Large amounts of historical data are used.

3. Queries often retrieve large amounts of data.

4. Both planned and ad hoc queries are common.

5. The data load is controlled.


A data warehouse is subject oriented because it provides information around a subject rather than the organization's ongoing operations.


Data warehouses will help you make better, more informed decisions for many reasons, including: 

1. Improved business intelligence

2. When you integrate multiple sources, you make decisions based on ALL of your data. 

3. Timely access to data: Quickly access critical data in one centralized location.

Read More



How to set up phpBB Forum on a website through cPanel


This article covers phpBB which is a completely free open-source Forum Software. It has lots of features while maintaining efficiency and ease of use. 

#phpBB, which is an abbreviation for PHP Bulletin Board, is one of the best free and open-source forum scripts for creating a forum. 


There are two ways to install phpBB on a website:

1. You can #install phpBB manually

2. Install phpBB via #cPanel Softaculous Apps Installer


To create a forum in phpBB:

1. Click Forums.

2. Enter the name of the new forum here.

3. Click Create new forum.

4. Enter a description for the new forum here.

5. Click Submit. 

That's it! The forum has been successfully created.


To Create a phpBB Forum:

1. Download and Install phpBB. The first thing you'll need to do is download the phpBB software.

2. Register Your phpBB Forum Administrator Account.

3. Set Up Your phpBB Forum.

4. Start Creating Content.


phpBB’s best features that you can use to help launch your first online forum:

1. Responsive design — supports the latest version of HTML5 and CSS3, thus providing you with a responsive and cross-browser compatible design.

2. Search engine crawler handling — comes with configurations and access control for over 100 crawlers for board optimization.

3. Unread message tracking — notifies users whether or not they have seen new published posts and topics.

4. Private message system — allows users to send direct messages to each other via the forum.

5. COPPA registration — prevents underage users from registering to the forum.

6. OAuth login — allows users to register using Google, Bit.ly, or Facebook accounts.

7. Data management — supports various popular database management tools like MySQL, Oracle Database, and SQLite.


Reasons why you should consider creating an online forum:

1. Encourage discussion and feedback — users can use the available space to exchange ideas and give you insights into the quality of your content for further improvement.

2. Support audience research — lets you observe visitor preferences and browsing habits in a closed environment.

3. Build a community — having great communication and sharing similar interests with other people will give your users a sense of belonging to a community.

Read More



Methods to reduce server load


This article covers tips to reduce server load. The load speed of websites mainly depends on the constant load that the server is maintained. 

Load expresses how many processes are waiting in the queue to access the computer processor. This is calculated for a certain period of time, and the smaller the number the better. 


Tips To optimize and speed up your server:

1. Enable caching.

2. Setup a fast reverse proxy.

3. Choose the right application server.

4. Fine tune your web server.

5. Turn on HTTP/2.

6. Defragment your database tables & optimize server settings.

7. Fix your DNS query speed.

8. Trim down your site's critical rendering path.


Why is your Website server slow?

The cause of slow servers usually lays with the web host. 

You could be having a slow site because you are hosted on a free web hosting. 

You are on a low quality hosting service with poor support. 

Or your site needs a higher spec hosting account with more resources eg a VPS.

A large volume of unoptimized images is usually the most common reason behind website slowness. 

High-resolution images can consume lots of bandwidth while loading. 

Uploading larger sized images and then scaling them down can unnecessarily increase the size of your web page – causing your website to load slowly.

Read More



MongoDB failed to load list of databases - Fix it now


This article covers how to resolve the error 'MongoDB failed to load the list of databases' can occur due to various reasons that include failed database user/password authentication, outdated Robo 3T version, and so on.

The error 'MongoDB failed to load the list of databases' means that you can't connect if there are no databases to list. 


To fix the error 'MongoDB failed to load the list of databases':

1. You can fix this issue with 1.2 connecting to a new mongo 4.2.

It's fixed when using robo3t version 1.3, which supports newer version of mongo.

2. You can create a database and a collection for it. 

Once you create a database and a collection, it works.

3. You will need to upgrade mongodb to the last version, so you can to connect in your local database.

Read More



Advantages of SAN over NAS


This article covers more insight about the advantages of SAN over NAS.

A storage area network (#SAN) is a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. Each server can access shared storage as if it were a drive directly attached to the server.

Network Attached Storage (#NAS) is a device that allows users to access files through a network. It allows users to access and share files from their individual stations through a central server. NFS (Network File System) is a protocol that is used to serve and share files on a network.


Some advantages of a SAN:

1. Reduces LAN bandwidth problems. A key benefit of SANs is bandwidth improvement. 2. Improved data security. Data security is paramount for every business.

3. Responsive backup.

4. Increased scalability.

5. Reliable disaster recovery.


What is the purpose of a SAN?

SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage. 

A SAN typically is a dedicated network of storage devices not accessible through the local area network (LAN).

Read More



MongoDB error network is unreachable - Fix it now


This article covers methods to resolve the error 'MongoDB error network is unreachable' which can occur due to many reasons that include network issues, if the mongo server is not started, and so on.

To resolve this #MongoDB #error:
1. On Ubuntu server, to open mongo shell run:

$ mongo

2. Inside mongo shell, type following command to create new a admin user.

> use admin;
> db.createUser({user:"admin", pwd:"password", roles:[{ role: "root", db: "admin" }]});

3. By default mongodb is configured to allow connections only from localhost(IP 127.0.0.1).
We need to allow remote connections from any ip address. The following change should only be done in your development server. Open up etc/mongod.conf file and do the following change.

# network interfaces
net:
port: 27017
bindIp: 0.0.0.0   #default value is 127.0.0.1


Also in the same mongod.conf file uncomment security option and add authorization option as shown below:

security:
authorization: enabled    


4. Save and exit the mongod.conf file and restart mongodb server:

$ sudo servcie mongod restart

Read More



Use Nmap to Scan Open Ports - How to


This article covers how to use Nmap to Scan Open Ports. Nmap is the world's leading port security network scanner. The Nmap hosted security tool can help you determine how well your firewall and security configuration is working.

How would you tell Nmap to scan all ports?
By default, Nmap scans the 1,000 most popular ports of each protocol it is asked to scan.
Alternatively, you can specify the -F (fast) option to scan only the 100 most common ports in each protocol or --top-ports to specify an arbitrary number of ports to scan.

The OS and Service scanning options are helpful for scanning a particular port or service to get more information.
If a service is running on a non-default port, it might be by design – or it might suggest there is a security breach.
Ports often have a default usage. Most ports under 1000 are dedicated and assigned to a specific service.

What file does Nmap use to determine which ports to scan?
Nmap needs an nmap-services file with frequency information in order to know which ports are the most common.

Malicious ("black hat") hackers (or crackers) commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.

Read More



Website Iframe malware injection


This article covers methods to secure websites from iframe attacks. Iframes Bring Security Risks. If you create an iframe, your site becomes vulnerable to cross-site attacks. You may get a submittable malicious web form, phishing your users' personal data.
One of the most popular online attacks that happens all the time has to do with thousands of legitimate websites being hacked with the “Iframe code injection” attack resulting in Cross Site Scripting (XSS) or silent redirections to malicious websites.
This means that unsuspicious visitors get infected with a malware virus when they visit that legitimate websites.

What happens is that an “Iframe html code” is injected at the end (usually) of “index.php” or “index.html” files of the legitimate websites.
This “iframe” code embeds into the legitimate site a malicious code which installs a virus to the visitor’s PC or tries to steal sensitive information.

Some tips to clean the infection of your site:
1. First of all scan and clean your own computer which you use to connect to your site. The Trojan might be undetectable by some antivirus, so you better format the windows OS and install a fresh copy.
2. Change ALL your passwords and most importantly the FTP passwords and the website control panel passwords.
3. Download all files from your website and store them in a safe place on your PC to further analyze the infection.
4. If you have a recent clean backup of your website, upload the backup files and replace all current files.
5. If you don’t have a backup (shame on you!!) then edit all source code (html or PHP files) and search for <iframe> html commands inside the code. Delete the suspicious <iframe> and re-upload all html, php files to your website.
6. Download an antivirus tool which scans the website for <iframe> content.
If you use WordPress there are some great security plugins which scan your website's source code for infections and also protect the site with a firewall.

Read More



Perform Monitoring with PRTG


This article covers how to use #monitoring with PRTG. With PRTG. Today, nearly every business relies on a computer and network infrastructure for internet, internal management, telephone, and email.
Here comes the role of PRTG to ensure that business data flows seamlessly between employees, offices, and customers.


Monitoring availability, bandwidth, and usage of your network is easy when you have PRTG. As a versatile solution, PRTG adapts to your needs and supports you with monitoring your application servers and services as whole and not only separate single aspects of these.
To set up your network monitoring, download the PRTG installer from the Paessler website and follow the steps in the installation wizard, or set up a PRTG Hosted Monitor instance on https://www.paessler.com/prtg-hosted-monitor and install a remote probe in your LAN.
PRTG Network Monitor is Paessler's powerful network monitoring solution.

In #PRTG, you can view Toplists for all xFlow sensors. xFlows are monitoring data pushed from network devices to PRTG.
You can use them to monitor where and how much data is traveling to and from.
This way, they determine which machine, protocol, or user is consuming bandwidth.

Remote probes allow you to monitor different sub-networks that are separated from your PRTG on premises core server by a firewall and to keep an eye on remote locations. You can install one or more remote probes.

The best network monitoring tools:
1. SolarWinds Network Performance Monitor (FREE TRIAL).
2. Datadog Network Performance Monitoring (FREE TRIAL).
3. ManageEngine OpManager (FREE TRIAL).
4. Progress WhatsUp Gold (FREE TRIAL).
5. Site24x7 Network Monitoring (FREE TRIAL).
6. Paessler PRTG Network Monitor (FREE TRIAL).
7. Nagios Core.
8. Zabbix.

Read More



Plesk Panel Database issues


This article covers the different #Plesk database errors. The main reason for database issues in Plesk is the misconfiguration of the PSA database.
Plesk employs the native functionality of database management tools for checking and repairing databases.
For example, for #MySQL databases it uses the mysqlcheck utility.

To check and repair a #database:
1. Go to Websites & Domains > Databases > Check and Repair in a database tools pane.
2. If problems are found, click the link See Details and Resolve.
3. The list of tables and corresponding problems will open.
For MySQL databases, you can choose the tables that you would like to repair.
For Microsoft SQL databases, you can repair an entire database only.
Click Repair Selected (for MySQL) or Repair (for Microsoft SQL).

Read More



Nginx ingress on DigitalOcean kubernetes using Helm


This article covers how to set up Nginx ingress on DigitalOcean Kubernetes using Helm. To implement this successfully, an Ingress Controller must be present; its role is to implement the rules by accepting traffic (most likely via a Load Balancer) and routing it to the appropriate Services.
Most Ingress Controllers use only one global Load Balancer for all Ingresses, which is more efficient than creating a Load Balancer per every Service you wish to expose.

To install the Nginx Ingress Controller to your cluster, run the following command:
$ helm install nginx-ingress stable/nginx-ingress --set controller.publishService.enabled=true
This command installs the Nginx Ingress Controller from the stable charts repository, names the Helm release nginx-ingress, and sets the publishService parameter to true.

Read More



Limit cPanel bandwidth using mod_cband


This article covers how to limit cPanel bandwidth using mod_cband. In order to compile mod_cband, we must have apxs2 installed.
We can achieve that by doing this:
$ apt-get install apache2-prefork-dev

Next we download and install mod_cband like this:
cd /tmp
wget http://cband.linux.pl/download/mod-cband-0.9.7.4.tgz
tar xzvf mod-cband-0.9.7.4.tgz
cd mod-cband-0.9.7.4
./configure
make
make install

The make install command should have added the mod_cband module to /etc/apache2/httpd.conf. Run:
$ vi /etc/apache2/httpd.conf
and check if you find a line like this:
LoadModule cband_module       /usr/lib/apache2/modules/mod_cband.so

Finally restart Apache:
/etc/init.d/apache2 restart
The mod_cband installation is now finished.

Read More



Ubuntu error Some index files failed to download


This article covers methods to fix #Ubuntu #error "Some index files failed to download". You can resolve this error by copying the contents of the sources list file from another functional Ubuntu system and paste them into your system's sources list file.

To install community-supported #software packages, proprietary packages, and packages not available under a completely free license, you might consider enabling the following repositories:
1. Universe – Community-maintained free and open-source software.
2. Restricted – Proprietary drivers for devices.
3. Multiverse – Software restricted by copyright or legal issues.

To enable these #repositories, invoke the commands below:
$ sudo add-apt-repository restricted
$ sudo add-apt-repository multiverse
$ sudo add-apt-repository universe

Then update your package lists:
$ sudo apt update

Read More



Migrate database from MySQL to PostgreSQL using pgLoader


This article covers how to migrate a database using pgLoader with a single #command.
PostgreSQL, also known as “Postgres,” is an open-source relational database management system (RDBMS).
It has seen a drastic growth in popularity in recent years, with many developers and companies migrating their data to Postgres from other database solutions.
The prospect of migrating a database can be intimidating, especially when migrating from one database management system to another.

Facts about pgLoader:
1. pgLoader is an open-source #database migration tool that aims to simplify the process of migrating to #PostgreSQL.
2. It supports #migrations from several file types and RBDMSs — including #MySQL and SQLite — to PostgreSQL.
3. #pgLoader is a flexible tool that can perform a database migration in a single command.
4. With a few configuration tweaks, it can migrate an entire database from one physical machine to another using a secure SSL/TLS connection.

Read More



DirectAdmin error is not a valid username


This article covers tips to resolve DirectAdmin error: is not a valid username which happens if the username length of the account is larger than the value set in the DirectAdmin configuration file.
To fix DirectAdmin Admin Backup/Transfer restore error with no details,  try to restore to a number than 10 characters.
You have to edit directadmin configuration and set this variable.
[root@mx ~]# vi /usr/local/directadmin/conf/directadmin.conf
then edit max_username_length to larger value. I my example 20.
max_username_length=20

Read More



DirectAdmin invalid characters in mail autoresponder


This article covers tips to resolve invalid character error in mail-in DirectAdmin.
The reason for this error is that Oracle sees a character that it considers invalid.
If you use a special character in a table or column name, then try putting double quotation-marks around the name.
If you use a special character in a value, put quotation marks around it.
If you look closely, you'll notice a punctuation mark of some sort between "Character" and "Invalid."
This means you have included punctuation marks in the information you typed into that field.
Remove all punctuation marks, symbols, or other special characters and you will be able to proceed.

To fix #DirectAdmin #error: Invalid characters in mail autoresponder:
1. You have to set correct encoding for Directadmin theme that is used. In this case, default “enhanced” theme was used so I edited accordingly:
vi /usr/local/directadmin/data/skins/enhanced/lang/en/lf_standard.html
2. Then find variable “LANG_ENCODING” and correct it to your needs. In my case:
LANG_ENCODING=UTF-8

Read More



Docker error while loading shared libraries


This article covers how to fix docker #error while loading shared libraries which happens in the process of building a docker image.
The docker run command creates a container from a given image and starts the container using a given command. It is one of the first commands you should become familiar with when starting to work with #Docker.
Docker containers make it easy to put new versions of software, with new business features, into production quickly—and to quickly roll back to a previous version if you need to.
They also make it easier to implement strategies like blue/green deployments.

To stop all running containers:
1. kill all running #containers with docker kill $(docker ps -q)
2. delete all stopped containers with docker rm $(docker ps -a -q)
3. delete all images with docker rmi $(docker images -q)
4. update and stop a container that is in a crash-loop with docker update --restart=no && docker stop.

Read More



Configure AWS load balancer with Cloudformation


This article will guide you on how to create an Application Load balancer and its dependencies using CloudFormation. 

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. 

Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

Software load balancers is that hardware load balancers require proprietary, rack-and-stack hardware appliances, while software load balancers are simply installed on standard x86 servers or virtual machines.

Another critical difference between hardware and software load balancers lies in the ability to scale.


Elastic Load Balancing supports the following types of load balancers: 

1. Application Load Balancers, Network Load Balancers, and Classic Load Balancers. 

2. Amazon ECS services can use either type of load balancer. 

3. Application Load Balancers are used to route HTTP/HTTPS (or Layer 7) traffic.

Read More



Shadow Redundancy Exchange Server 2016


This article will guide you on the features of Shadow Redundancy #Exchange Server 2016. 

To remove all messages from a particular queue, click the Queues tab. 

Select a queue, right-click, and then select Remove #Messages (with NDR) or Remove Messages (without NDR).

Submission queue. #Mailbox servers and Edge Transport servers. Holds messages that have been accepted by the Transport service, but haven't been processed. Messages in the Submission queue are either waiting to be processed, or are actively being processed.


Advantages and Features of Exchange Server 2016:

1. Improved search experience. Thanks to the asynchronous and decentralized architecture.

2. New cloud-focused architecture that supports mobility.

3. Easier collaboration on SharePoint and OneDrive.

4. Faster failover and failure isolation.

5. Outlook on the web and Outlook app feature enhancement.

Read More



Install Linux Software Via Command line


This article will guide you on methods to install #Linux #Software via command line. #Debian, Ubuntu, Mint, and other Debian-based distributions all use . deb files and the dpkg package management system. There are two ways to install apps via this system. You can use the apt application to install from a repository, or you can use the dpkg app to install apps from .


To compile a program from a source in Linux:

i. Open a console.

ii. Use the #command cd to navigate to the correct folder. If there is a README file with installation instructions, use that instead.

iii. Extract the files with one of the commands.

iv. ./configure.

v. make.

vi. sudo make install (or with checkinstall ).


To Check os version in Linux:

1. Open the #terminal application (bash shell)

2. For remote server login using the ssh: ssh user@server-name.

3. Type any one of the following command to find os name and version in Linux: cat /etc/os-release. lsb_release -a. hostnamectl.

4. Type the following command to find Linux kernel version: uname -r.

Read More



Docker error initializing network controller


This article will guide you on tips to resolve the error 'Docker error initializing network controller'. This docker error happens in the process of trying to start the docker service. 

To fix docker failed to start daemon: Error initializing network controller no network available:

Add a docker0 bridge interface;

# ip link add name docker0 type bridge

# ip addr add dev docker0 172.17.0.1/16


Docker originally used Linux Containers (LXC) and was designed for Linux kernel only.

In the case of Windows, Docker uses Hyper-V which is in-built virtualization technology provided by Windows. Docker uses Hypervisor framework in the case of MacOs for virtualization.

Docker is a platform and tool for building, distributing, and running Docker containers.

Kubernetes is a container orchestration system for Docker containers that is more extensive than Docker Swarm and is meant to coordinate clusters of nodes at scale in production in an efficient manner.

Read More



Install Azure PowerShell module


This article will guide you on how to install the Azure PowerShell module using the cmdlets method and through offline.

Azure CLI is available on #Windows, Mac, Linux, etc. Azure cloud shell is another option that can be browser-accessible and authenticated. 

Azure cloud shell gives you options to choose from either bash or Powershell. 

The Get-Command cmdlet gets all #commands that are installed on the computer, including cmdlets, aliases, functions, filters, scripts, and applications. 

Get-Command gets the commands from #PowerShell modules and commands that were imported from other sessions.

We can use Windows Powershell for managing Azure resources by installing az module.

To install the Azure PowerShell #module, run the following command. Make sure that the Windows PowerShell ISE is opened in "run as administrator” mode. 

By default, the PowerShell gallery is not configured as a Trusted repository for PowerShellGet. 

Click on “Yes to All” to continue with the installation.


Modules included in Azure PowerShell:

1. Azure PowerShell Az. Automation.

2. Azure PowerShell AzureRM. Automation.

3. Other PowerShell modules.

4. Internal Orchestrator. AssetManagement. Cmdlets module.

5. Python 2 modules.

6. Custom modules that you create.

Read More