Explore information related to port

Improve phone support efficiency - Facts you need to know ?

This article covers some key points to improve phone support efficiency.
In the contact centre environment, becoming more efficient involves reviewing internal processes, eliminating unnecessary steps and duplicate handling, and often implementing new processes. 

The main aims are to reduce call handling times and improve first call resolution.

Methods to Boost Contact Centre Efficiency:
1. Migrate to a cloud hosted solution
Cloud hosted technology solutions don't rely on equipment infrastructure, and therefore scale from five agents to one thousand and back again without incurring any downtime.
2. Improve your self-service options
Customers want choice.  They want to be able to take care of routine and straightforward interactions themselves.
3. Implement automatic call distribution
Poor call traffic distribution results in customers being sent to the wrong department, which ties up personnel and delays them in getting on with helping the right people.
4. Improve your verification process
The average time to verify the identity of a user using Personal Verifiable Questions (PVQs) is 45-90 seconds.
5. Offer a call back service
A cost-effective way to improve team efficiency, and the customer experience, is to use call-backs to defer calls until a later time. 

There are two options for call backs.

i. Virtual queuing – whereby the customer's place in the queue is held and called when her turn arrives
ii. A timed call-back, where customers are offered a selection of time slots for their call-back. This option allows you to schedule the call back to take place during a "trough" period, and so keeps staff productive during quieter periods.

Read More


Manage Scheduled Tasks with PowerShell - How to do it

This article covers how to use the PowerShell features to create scheduled tasks. The Get-ScheduledTask cmdlet gets the task definition object of a scheduled task that is registered on a computer. You can use PowerShell to create and manage scheduled tasks. Managing scheduled tasks with PowerShell is made possible with the use of the ScheduledTasks module that’s built-in to Windows.
With the PowerShell Scheduled Tasks module, setting up scheduled tasks using PowerShell commands is made possible. This module provides the opportunity and means to create and deploy scheduled tasks programmatically on the local and remote computers.

Important scheduled task component:
1. Action – the action that is executed by the scheduled task. An action is typically to run a program or a script. A scheduled task can have more than one actions.
2. Trigger – controls when the scheduled task runs. Triggers can be time-based, like, setting a schedule for daily or hourly recurrence. Triggers can also be activity-based, which runs a task based on detected activities like computer startup, a user logs in, or logged events.
3. Principal – controls the security context used to run the scheduled task. Among other things, a principal includes the user account and the required privilege used by the scheduled task.
4. Settings – is a set of options and conditions that controls how the scheduled task behavior. As an example, you can customize a task to get removed after a consecutive number of days that the task is unused.

To add a Trigger for a scheduled task using PowerShell:
The cmdlet to use for creating a trigger is the New-ScheduledTaskTrigger cmdlet.
The command below creates a trigger to run daily at 3 PM.

Copy and run the code in PowerShell:

# Create a new trigger (Daily at 3 AM)
$taskTrigger = New-ScheduledTaskTrigger -Daily -At 3PM
$tasktrigger

This will Create a Trigger (Daily at 3 AM)

Read More


Cannot download Docker images behind a proxy - Fix it Now

This article covers the error, Cannot download Docker images behind a proxy. 

You can fix this docker issue by doing the following:

1. In the file /etc/default/docker, add the line:

export http_proxy='http://<host>:<port>'

2. Restart Docker:

$ sudo service docker restart


Also, you can Follow the steps given below to fix this docker error:

1. Create a systemd drop-in directory for the docker service:

$ mkdir /etc/systemd/system/docker.service.d

2. Create a file called /etc/systemd/system/docker.service.d/http-proxy.conf and add the HTTP_PROXY env variable:

[Service]
Environment="HTTP_PROXY=http://proxy.example.com:80/"

3. If you have internal Docker registries that you need to contact without proxying you can specify them via the NO_PROXY environment variable:

Environment="HTTP_PROXY=http://proxy.example.com:80/"
Environment="NO_PROXY=localhost,127.0.0.0/8,docker-registry.somecorporation.com"

4. Flush changes:

$ sudo systemctl daemon-reload

5. Verify that the configuration has been loaded:

$ sudo systemctl show --property Environment docker
Environment=HTTP_PROXY=http://proxy.example.com:80/

6. Restart Docker:

$ sudo systemctl restart docker

Read More


Best Ubuntu APT Repository Mirror - How to get it

This article covers methods to find the best APT mirror on the Ubuntu server. 


To Find Best Ubuntu APT Repository Mirror Using Apt-smart:

Apt-smart is yet another command line tool written in Python. It helps you to find APT mirrors that provides best download rate for your location. It can smartly retrieve the mirrors by querying the Debian mirror list, Ubuntu mirror list and Linux mint mirror list and choose best mirror based on the country in which the user lives in. The discovered mirrors are ranked by bandwidth and their status (like up-to-date, 3-hours-behind, one-week-behind etc).

Another notable feature of Apt-smart is it will automatically switch to any other different mirrors when the current mirror is being updated. The new mirrors can be selected either automatically or manually by the user. Good thing is Apt-smart will backup the current sources.list before updating it with new mirrors.


To Install Apt-smart in Ubuntu:

Make sure you have installed Pip and run the following commands one by one to install Apt-smart:

$ pip3 install --user apt-smart
$ echo "export PATH=\$(python3 -c 'import site; print(site.USER_BASE + \"/bin\")'):\$PATH" >> ~/.bashrc
$ source ~/.bashrc


To List all mirrors based on rank:

To list all available ranked mirrors in the terminal, run:

$ apt-smart --list-mirrors

Or,

$ apt-smart -l


To Automatically update mirrors:

Instead of manually finding and updating the best mirror in Ubuntu, you can let Apt-smart to choose a best Apt mirror and automatically update the sources.list with new one like below:

$ apt-smart --auto-change-mirror

To get help, run:

$ apt-smart --help

Read More


Listen on Privileged Ports with Nagios Log Servers - How to set it up

This article covers how to configure Nagios Log Servers to listen on privileged ports. Now Nagios Log Server Administrators who would like configure Nagios Log Server to listen on ports below 1024 which are privileged in Linux. This can be useful if you have legacy devices that can only send on specific ports (e.g. syslog on port 514).

Ports below 1024 are privileged on Linux and only allow the root user to listen on them. 

This can be implemented via two solutions:

1. Run Logstash as root

2. Use setcap


To use Use setcap for Listening On Privileged Ports:

Here, you can use the logstash running as the nagios user but this method may be less secure in some environments as it will allow any Java process to listen on privileged ports.

i. The logstash init configuration file requires three lines to be added to the end of it, open the file with the following command:

On Debian | Ubuntu:

$ vi /etc/default/logstash

or

$ sudo /etc/default/logstash

2. Then, Add the following three lines to the end of the file:

echo $(dirname $(find /usr/lib -name libjli.so)) | awk '{print $1}'> /etc/ld.so.conf.d/java.conf

eval "$(which ldconfig)"

setcap 'cap_net_bind_service=+ep' $(readlink -f $(which java))

3. Save the file and close vi.

4. Restart Logstash Service

The logstash service needs to be restarted for these changes to apply:

$ sudo systemctl restart lagstash.service

Read More


Internal error Account getPassword cannot decrypt password to be plain - Fix this Plesk error Now

This article covers how to resolve Plesk error, 'Internal error: [Account :: getPassword] cannot decrypt password to be plain'. It happens when A database user whose password is encrypted can now import and export the domain database after providing the database password.

However this issue is resolved in Plesk Obsidian.


To fix this Plesk error:

1. Updating Plesk via the Plesk interface

Make sure that port 8447 is opened in a firewall. If it is closed and cannot be opened for some reason, use the command-line instructions.

i. In Plesk, go to Tools & Settings and click Updates and Upgrades.

ii. On the Updates and Upgrades page, click Update Components.

iii. Click Continue to begin the update procedure.

2. Updating Plesk via a command-line interface

i. Connect to a Plesk server via SSH (Linux) / RDP (Windows Server).

ii. Run Plesk Installer Update (on Windows Server, start a command prompt as an Administrator):

plesk installer update


By default, Plesk installs updates automatically by means of the Plesk daily task (executed every night), if the option Automatically install Plesk updates is enabled at Tools & Settings > Update Settings.

During the update process:

1. Plesk may go offline for several minutes, if updates require a Plesk restart

2. Websites will stay online

Note: If a service component is going to be updated, its service will be restarted.


To find out what Plesk update is currently installed on the system, go to the Home page > System Overview.

Alternatively, execute the following command in a command-line interface:

plesk version

Read More


Port 113 IDENT Requests - How to Disable it on Nagios

This article covers how to disable Port 113 IDENT Requests on Nagios. 

You are seeing port 113 return requests either from your Nagios XI server (when submitting NSCA passive results) to the originating host OR you are seeing port 113 return requests when checking NRPE services).

You will see this behavior on your firewall logs as you will most likely not have a firewall rule for port 113.

This is usually because you are running an NRPE check through XINETD with USERID included on the log_on_success or log_on_failure options in your remote hosts /etc/xinetd.d/nrpe file.

OR this could be because you are submitting passive results to the XI server through NSCA (which is running under XINETD) /etc/xinetd.d/nsca with the same options as above.


To disable Port 113 IDENT Requests:

1. Then remove the USERID option from the log_on_failure AND log_on_success to stop the IDENT from occurring. The file you need to change depends on:

i. NRPE on remote host

/etc/xinetd.d/nrpe

ii. NSCA on Nagios XI server

/etc/xinetd.d/nsca

2. After making the changes you need to restart the xinetd service using one of the commands below:

RHEL 7+ | CentOS 7+ | Oracle Linux 7+ | Debian | Ubuntu 16/18/20

$ systemctl restart xinetd.service


What is filter ident port 113?

Filter IDENT(port 113) (Enabled) IDENT allows hosts to query the device, and thus discover information about the host.

On the VPN Passthrough screen, you can configure the router to transparently pass IPSec, PPPoE, and PPTP traffic from internal hosts to external resources.

Read More


Prometheus Distributed Monitoring System - A brief review

This article covers an overview of what Prometheus Distributed Monitoring System is and how it works.

Prometheus is an open-source systems monitoring and alerting toolkit with an active ecosystem.


Why is Prometheus used?

Prometheus is an open-source monitoring software that is very popular in the industry. Prometheus is easy to customize, and produces metrics without impacting application performance.

Along with this, Prometheus monitoring can be used to provide clarity into systems and how to run them.


What is Prometheus monitoring used for?

Prometheus is a free software application used for event monitoring and alerting. It records real-time metrics in a time series database (allowing for high dimensionality) built using a HTTP pull model, with flexible queries and real-time alerting.


What is AWS Prometheus?

Amazon Managed Service for Prometheus (AMP) is a Prometheus-compatible monitoring service that makes it easy to monitor containerized applications at scale.

AMP automatically scales as your workloads grow or shrink, and is integrated with AWS security services to enable fast and secure access to data.


What metrics does Prometheus collect?

At this moment, for Prometheus, all metrics are time-series data. The Prometheus client libraries are the ones in charge of aggregating metrics data, like count or sum. Usually, these client libraries—like the Go library from the graphic above—have four types of metrics: counter, gauge, history, and summary.


What is the difference between Grafana and Prometheus?

Grafana and Prometheus, both help us in tackling issues related to complex data in a simplified manner. 

Grafana is an open-source visualization software, which helps the users to understand the complex data with the help of data metrics.

Prometheus is an open-source event monitoring and alerting tool.


How does Prometheus monitoring work?

Prometheus scrapes metrics from instrumented jobs, either directly or via an intermediary push gateway for short-lived jobs. 

It stores all scraped samples locally and runs rules over this data to either aggregate and record new time series from existing data or generate alerts.

Read More


Your system requires smb2 or higher Windows error - Fix it now

This article covers how to fix the Windows error 'Your system requires smb2 or higher'. SMB1 protocol is vulnerable and your system will give you a warning message saying that it requires SMB2. 

Most Windows 10 users reported Your system requires SMB2 or higher error message on their PC. 

SMB stands for Server Message Block, and it's a protocol for sharing files. The protocol has two versions, the SMB1, and the SMB2, and while both can be used, the latter is the more secure one.


To enable SMB2 on Windows 10:

Check if your system can install SMB2

1. Start PowerShell as administrator. Press the Windows Key+ X and select PowerShell (Admin).

2.Type Get-SmbServerConfiguration | Select EnableSMB2Protocol in the command prompt of the Window PowerShell and press Enter.

3. If your system can run SMB2 protocol, type windows features in the Search box and select Turn Windows features on or off.

4. Once the Windows Features window opens, check SMB1/CIFS File Sharing Support option and hit OK.

5. Restart your PC and check if the problem with SMB2 is resolved.


To enable SMB2 on Windows 10 using Powershell:

1. Start PowerShell as administrator. We already showed you how to do that in our previous solution.

2. Enter Set-SmbServerConfiguration –EnableSMB2Protocol $true and press Enter.

3. Press Y to confirm.

Read More


Redirect FreeBSD Console To A Serial Port for KVM Virsh - How to do it

This article covers how to redirect FreeBSD in KVM to the serial port.

FreeBSD does support a dumb terminal on a serial port as a console.


This is useful for quick login or debug guest system problem without using ssh. 

1. First, login as root using ssh to your guest operating systems:

$ ssh ibmimedia@freebsd.ibmimedia.com

su -

2. Edit /boot/loader.conf, enter:

# vi /boot/loader.conf

3. Append the following entry:

console="comconsole"

4. Save and close the file. Edit /etc/ttys, enter:

# vi /etc/ttys

5. Find the line that read as follows:

ttyd0  "/usr/libexec/getty std.9600"   dialup  off secure

6. Update it as follows:

ttyd0   "/usr/libexec/getty std.9600"   vt100   on secure

7. Save and close the file. Reboot the guest, enter:

# reboot

8. After reboot, you can connect to FreeBSD guest as follows from host (first guest the list of running guest operating systems):

# virsh list

Sample outputs:


 Id Name                 State

----------------------------------

  3 ographics            running

  4 freebsd              running

9. Now, connect to Freebsd guest, enter:

virsh console 4

OR

virsh console freebsd

Read More


Unable to add bridge port vnet0 No such device - Fix it now ?

This article covers how to resolve the error, Unable to add bridge port vnet0: No such device which happens when the bridge device specified in the guest's (or domain’s) <interface> definition does not exist.

Theerror messages reveal that the bridge device specified in the guest's (or domain's) <interface> definition does not exist.

To verify the bridge device listed in the error message does not exist, use the shell command ifconfig br0.

A message similar to this confirms the host has no bridge by that name:

br0: error fetching interface information: Device not found

If this is the case, continue to the solution.


To fix the error, Unable to add bridge port vnet0: No such device :

1. Edit the existing bridge or create a new bridge with virsh

Use virsh to either edit the settings of an existing bridge or network, or to add the bridge device to the host system configuration.

2. Edit the existing bridge settings using virsh

Use virsh edit name_of_guest to change the <interface> definition to use a bridge or network that already exists.

For example, change type='bridge' to type='network', and <source bridge='br0'/> to <source network='default'/>.

Read More


Install and Configure Mahara on Ubuntu

This article covers how to install Mahara. Basically, Mahara is a popular ePortfolio and social networking system that helps educators to develop a digital classroom in a remote learning environment and track student's progress. 

Mahara also has many non-student applications. You can use it to build a blog, a resume-builder, a file-repository, or a competency framework.

Mahara is a fully featured web application to build your electronic portfolio. 

You can upload files, create journals, embed social media resources from the web and collaborate with other users in groups. 


To install Mahara on Ubuntu:

1. 1. Login to your VPS via SSH

ssh user@vps

2. Update the system

[user]$ sudo apt-get update && sudo apt-get -y upgrade

3. Install MariaDB

To install MariaDB, run the following command:

[user]$ sudo apt-get install -y mariadb-server

4. Create MariaDB database for Mahara

Next, we need to create a database for our Mahara installation.

[user]$ mysql -u root -p
MariaDB [(none)]> CREATE DATABASE mahara character set UTF8;
MariaDB [(none)]> GRANT ALL PRIVILEGES ON mahara.* TO 'maharauser'@'localhost' IDENTIFIED BY 'your-password';
MariaDB [(none)]> FLUSH PRIVILEGES;
MariaDB [(none)]> \q

Do not forget to replace 'your-password' with a strong password.

5. Install Apache2 Web Server

Install Apache2 web server

[user]$ sudo apt-get install apache2

6. Install PHP

Install PHP and required PHP modules

To install the latest stable version of PHP version 5 and all necessary modules, run:

[user]$ sudo apt-get install php5 libapache2-mod-php5 php5-mcrypt php5-mysql php5-gd

7. Download and extract Mahara

Download and extract the latest version of Mahara on your server:

[user]$ sudo cd /opt && wget https://launchpad.net/mahara/16.04/16.04.1/+download/mahara-16.04.1.zip
[user]$ sudo unzip mahara-16.04.1.zip
[user]$ sudo mv mahara-16.04.1 /var/www/html/mahara
Create Mahara’s upload directory
[user]$ sudo mkdir /var/www/html/mahara/upload/

8. Configure Mahara

Create Mahara’s config.php

In the Mahara ‘htdocs’ directory there is config-dist.php file. Make a copy of this called config.php.

[user]$ cd /var/www/html/mahara/htdocs/
[user]$ sudo cp config-dist.php config.php

Open the config.php and make the necessary changes where appropriate.

[user]$ sudo nano config.php
$cfg->dbtype   = 'mysql';
$cfg->dbhost   = 'localhost';
$cfg->dbport   = null;
$cfg->dbname   = 'mahara';
$cfg->dbuser   = 'maharauser';
$cfg->dbpass   = 'your-password';
$cfg->dataroot = '/var/www/html/mahara/upload/';

All files have to be readable by the web server, so we need to set a proper ownership

[user]$ sudo chown www-data:www-data -R /var/www/html/mahara/

9. Configure Apache Web Server

Create a new virtual host directive in Apache. For example, create a new Apache configuration file named ‘mahara.conf’ on your virtual server:

[user]$ sudo touch /etc/apache2/sites-available/mahara.conf
[user]$ sudo ln -s /etc/apache2/sites-available/mahara.conf /etc/apache2/sites-enabled/mahara.conf
[user]$ sudo nano /etc/apache2/sites-available/mahara.conf
Then, add the following lines:
<VirtualHost *:80>
ServerAdmin admin@yourdomain.com
DocumentRoot /var/www/html/mahara/htdocs/
ServerName your-domain.com
ServerAlias www.your-domain.com
<Directory /var/www/html/mahara/htdocs/>
Options FollowSymLinks
AllowOverride All
Order allow,deny
allow from all
</Directory>
ErrorLog /var/log/apache2/your-domain.com-error_log
CustomLog /var/log/apache2/your-domain.com-access_log common
</VirtualHost>

10. Restart and Verify

Restart the Apache web server for the changes to take effect:

[user]$ sudo service apache2 restart

Open your favorite web browser, navigate to http://your-domain.com/ and if you configured everything correctly the Mahara installer should be starting.

Read More


No guest machines present libvirtd - Fix it now

This article covers how to troubleshoot and fix No guest machines present libvirtd for our customers. 

The virsh program is the main interface for managing virsh guest domains. The program can be used to create, pause, and shutdown domains. 

It can also be used to list current domains. Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes).

The libvirt daemon is successfully started, but no guest virtual machines appear to be present.


There are various possible causes of this problem.

Performing these tests will help to determine the cause of this situation:

1. Verify KVM kernel modules

Verify that KVM kernel modules are inserted in the kernel:

$ lsmod | grep kvm

If you are using an AMD machine, verify the kvm_amd kernel modules are inserted in the kernel instead, using the similar command lsmod | grep kvm_amd in the root shell.

If the modules are not present, insert them using the modprobe <modulename> command.

Note: Although it is uncommon, KVM virtualization support may be compiled into the kernel. In this case, modules are not needed.

2. Verify virtualization extensions

Verify that virtualization extensions are supported and enabled on the host:

# egrep "(vmx|svm)" /proc/cpuinfo

Enable virtualization extensions in your hardware's firmware configuration within the BIOS setup.

3. Verify client URI configuration

Verify that the URI of the client is configured as desired:

# virsh uri


How to fix No guest machines present #libvirtd #error:

After performing these tests, use the following command to view a list of guest virtual machines:

# virsh list --all

Read More


Benefits of Data Warehouse in Business Organization

This article covers the Advantages of Data Warehouse. 

#Data #warehousing improves the speed and efficiency of accessing different data sets and makes it easier for corporate decision-makers to derive insights that will guide the business and marketing strategies that set them apart from their competitors. Improve their bottom line.

Unlike a database, which is focused on users inputting data, a data warehouse is architected for decision-making, ad hoc queries and analytics. Thus, enabling queries to be performed without any impact to your company's operational database.


A data warehouse is a type of data management system that is designed to enable and support business intelligence (BI) activities, especially analytics. Data warehouses are solely intended to perform queries and analysis and often contain large amounts of historical data.


A data warehouse can help support business needs, such as the ability to consolidate financial results within a complex company that uses different software for different divisions.


Benefits of a Data Warehouse:

1. Delivers enhanced business intelligence.

2. Saves times.

3. Enhances data quality and consistency.

4. Generates a high Return on Investment (ROI).

5. Provides competitive advantage.

6. Improves the decision-making process.

7. Enables organizations to forecast with confidence.

8. Streamlines the flow of information.


The key characteristics of a data warehouse are as follows:

1. Some data is denormalized for simplification and to improve performance.

2. Large amounts of historical data are used.

3. Queries often retrieve large amounts of data.

4. Both planned and ad hoc queries are common.

5. The data load is controlled.


A data warehouse is subject oriented because it provides information around a subject rather than the organization's ongoing operations.


Data warehouses will help you make better, more informed decisions for many reasons, including: 

1. Improved business intelligence

2. When you integrate multiple sources, you make decisions based on ALL of your data. 

3. Timely access to data: Quickly access critical data in one centralized location.

Read More


Difference between BACPAC and DACPAC - More insight

This article covers more information about BACPAC and DACPAC and the difference between BACPAC and DACPAC.
A BACPAC file is a ZIP file with an extension of BACPAC containing the metadata and data from the #database. A BACPAC file can be stored in Azure Blob storage or in local storage in an on-premises location and later imported back into Azure SQL Database, Azure SQL Managed Instance, or a SQL Server instance.
DACPAC = Data Tier AppliCation Package. DACPAC is a single file which contains database model i.e. all files represent database objects. It's a binary representation of database project compatible with SSDT. The name comes from an extension of these files.
Once you extract the contents of the #DACPAC file, you'll see there are four different XML files within it.
These XML files do not contain any data from the database.
The database is scripted out only with the model information.

To import from a #BACPAC file into a new single database using the Azure portal:
1. Open the appropriate server page and then, on the toolbar, select Import database.
2. Select the storage account and the container for the BACPAC file and then select the BACPAC file from which to import.

Data tier controls the servers where the information is stored;
1. It runs a relational database management system on a database server or a mainframe and contains the computer data storage logic.
2. The data tier keeps data independent from application servers or processing logic and improves scalability and performance.

To import a .BAK file into #SQL Server:
1. Open #SSMS and click on Connect.
2. First let us go with Bak File importing.
3. Check the Device Button and Click on it.
4. Click on Add Button, choose the Appropriate bak file and then click on Ok.

Read More


Use Nmap to Scan Open Ports - How to

This article covers how to use Nmap to Scan Open Ports. Nmap is the world's leading port security network scanner. The Nmap hosted security tool can help you determine how well your firewall and security configuration is working.

How would you tell Nmap to scan all ports?
By default, Nmap scans the 1,000 most popular ports of each protocol it is asked to scan.
Alternatively, you can specify the -F (fast) option to scan only the 100 most common ports in each protocol or --top-ports to specify an arbitrary number of ports to scan.

The OS and Service scanning options are helpful for scanning a particular port or service to get more information.
If a service is running on a non-default port, it might be by design – or it might suggest there is a security breach.
Ports often have a default usage. Most ports under 1000 are dedicated and assigned to a specific service.

What file does Nmap use to determine which ports to scan?
Nmap needs an nmap-services file with frequency information in order to know which ports are the most common.

Malicious ("black hat") hackers (or crackers) commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.

Read More


Install OpenBSD As Guest Operating System using KVM virt-install

This article covers how to install OpenBSD as guest operating while using KVM. OpenBSD is well know for focus on security features such as Memory protection, cryptography, randomization and much more in default base installation.
virt-install provides the option of supporting graphics for the guest operating system installation. This is achieved through use of QEMU.

virt-install is a command line tool for creating new KVM, Xen, or Linux container guests using the libvirt hypervisor management library
The virt-install tool provides a number of options that can be passed on the command line.

To see a complete list of options run the following command:
# virt-install --help

Read More


Back Pressure in Exchange server

This article will guide you on Back Pressure which is a feature that helps the Transport Service monitor system resources and stop message submission when it runs low on resources. 

Microsoft Exchange Transport Service Resource Monitoring.

Microsoft Exchange enables email to be delivered directly to a server. 

It works by sending the emails back to your individual workstations in which your staff can access. 

Small and medium-sized companies can achieve three benefits from using Microsoft Exchange. 

Centralize emails so that they can be backed up.


Exchange server roles:

1. Mailbox servers contain the transport services that are used to route mail.

2. Mailbox servers contain mailbox databases that process, render, and store data.

3. Mailbox servers contain the Client Access services that accept client connections for all protocols.

Read More


SSH Connection Refused

This article will guide you on how to resolve SSH connection error occur.

Sometimes while connecting to SSH servers, users often encounter "Connection refused" error by port 22. It happens because of several reasons like SSH service is not running, the port is blocked by the firewall, or the server is using a different port. 

It can also occur because of the IP conflict issue.

To SSH on Ubuntu, Open your terminal either by using the Ctrl+Alt+T keyboard shortcut or by clicking on the terminal icon and install the openssh-server package by typing: sudo apt update sudo apt install openssh-server. Once the installation is completed, the SSH service will start automatically.

To resolve ssh connection refused:

1. Install an SSH tool such as OpenSSH on the server you want to connect to using the sudo apt install openssh-server command. 

2. If your firewall is blocking your SSH connection. Disable the firewall rules blocking your SSH connection by changing the destination port's settings to ACCEPT.

Read More


ACK scan DOS attack

This article will guide you on how the ACK scan DOS #attack works as well as methods to mitigate this. 

A port scan can help an attacker find a weak point to attack and break into a computer system. 

Just because you've found an open port doesn't mean you can attack it. But, once you've found an open port running a listening service, you can scan it for vulnerabilities.

Denial of service attack (DOS) is an attack against computer or network which reduces, restricts or prevents accessibility of its system resources to authorized users. The network of Bots is called botnet.

A Fraggle Attack is a denial-of-service (#DoS) attack that involves sending a large amount of spoofed UDP traffic to a router's broadcast address within a network. 

It is very similar to a Smurf Attack, which uses spoofed ICMP traffic rather than UDP traffic to achieve the same goal.

Common DoS attacks:

1. Buffer overflow attacks – the most common DoS attack.

2. ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine.

3. SYN flood – sends a request to connect to a server, but never completes the handshake.

To prevent port scan attacks:

i. Install a Firewall: A firewall can help prevent unauthorized access to your private network.

ii. TCP Wrappers: TCP wrapper can give administrators the flexibility to permit or deny access to the servers based on IP addresses or domain names.

Read More


AWS security vulnerabilities

This article will guide you on how to create a virtual machine using #Lightsail in AWS.

AWS Cloud Compliance enables you to understand the robust controls in place at AWS to maintain security and data protection in the cloud. 

The IT infrastructure that AWS provides to its customers is designed and managed in alignment with best #security practices and a variety of IT security standards.

AWS WAF is a web application #firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources.

List of AWS Limitations:

1. #AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Read More


Roundcube empty startup greeting

This article will guide you on methods to resolve #Roundcube empty startup greeting error which occurs due to many reasons which include improper configuration of SSL, network #problem, firewall #error and so on.

Roundcube is a webmail client with strong security features and extensive customization options from its plugin repository.

It is important to set Roundcube config file as follows:

$config['default_host'] = 'imaps://domain.tld';

// TCP port used for IMAP connections

$config['default_port'] = 993;


To fix cPanel Roundcube Webmail "An error occurred":

This error indicates a potentially corrupt index file. 

1. establish an SSH session with the server and navigate to:

/home/<username>/mail/<domain name>/<email account name>/

2. Find dovecot.index and rename it to dovecot.index.bak.

Read More


Customer Service Strategy Best Methods

This article will guide you on the customer service strategies that we follow to refresh the existing one based on some aspects.

The Purpose of the Service Strategy is to define the perspective, position, plans, and patterns that a service provider needs to be able to execute to meet an organization's #business Outcomes.

There are five major aspects of service design. These are service solutions, management information systems and tools, technology and management architectures and tools, processes and measurement systems.

Winning #Customer #Service #Strategies:

1. Optimize Agent Training. Invest in an agent training program to ensure your agents are empowered and prepared to meet customer needs.

2. Choose the Right Tools..

3. Improve Call Center KPIs..

4. Personalize the Experience..

5. Make Data-Drive Decisions..

6. Optimize Quality Assurance (QA).

7. Offer Omnichannel Support.

Read More


NTP amplification attack

This article will guide you on steps to mitigate this #NTP amplification attack. An Amplification Attack is any attack where an attacker is able to use an amplification factor to multiply its power. Examples of #amplification #attacks include Smurf Attacks (ICMP amplification), Fraggle Attacks (#UDP amplification), and DNS Amplification.

DNS flood is a type of Distributed Denial of Service (#DDoS) attack in which the attacker targets one or more Domain Name System (#DNS) servers belonging to a given zone, attempting to hamper resolution of resource records of that zone and its sub-zones.

To harden your DNS server:

1. Audit your DNS zones. First things first.

2. Keep your DNS servers up-to-date.

3. Hide BIND version.

4. Restrict Zone Transfers.

5. Disable DNS recursion to prevent DNS poisoning attacks.

6. Use isolated DNS servers.

7. Use a DDOS mitigation provider.

8. Two-Factor Authentication.

Read More


Reporting services configuration manager

This article will guide you on how to setup reporting services configuration manager. Report Manager is Web based interface that can be used to perform different tasks such as. Administer the Report Server,View the Reports and Manager the Report, and so on. You need to have the URL to access the Report Server by using Report Manager interface.

SQL Server Reporting Services (#SSRS) is a reporting #software that allows you to produce formatted reports with tables in the form of data, #graph, images, and charts. These reports are hosted on a server that can be executed any time using parameters defined by the users.

Report server items are always stored in libraries or in a folder within a library. 

When you access the SharePoint site, you see the Browse page and the Library Tools tab.

In #Reporting Services, URLs are used to access the Report Server Web service and the web portal. A test link of the URL appears on page when you define the URL so that you can immediately confirm that the settings you specified result in a valid connection.

To connect to Reporting Services Configuration Manager:

1. Click Start, then click #Programs, then click #Microsoft #SQL Server, then click Configuration Tools, and then click Report Server Configuration Manager. 

2. The Report Server Installation Instance Selection dialog box appears so that you can select the report server instance you want to configure.

Read More


Improve sales with customer service

In summary, we saw how to improve sales with reliable customer service. Along with some of the reasons to invest on customer service.

Basically, good customer service will always increase the likelihood of making a sale. It's not always guaranteed, and pressuring customers to buy won't get you anywhere. 

But keeping the human-to-human sentiment in mind will help people feel like they're not just there to make you money.

Providing excellent customer service means going the extra mile in making sure a customer is happy and satisfied with a company's products or services. 

It also involves providing service to a customer in a timely, pleasant manner.

To to deliver great customer service:

1. Know your product.

2. Maintain a positive attitude.

3. Creatively problem-solve.

4. Respond quickly.

5. Personalize your service.

6. Help customers help themselves.

7. Focus support on the customer.

8. Actively listen.

Read More


Copy rds snapshot to s3

This article will guide you on resolve common rds #error. Basically, the process to copy rds snapshot to s3 is simple and creates and saves backups of the DB instance in the Amazon S3 bucket. 

Amazon Relational Database Service (#Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups.

RDS creates a storage volume snapshot of your #DB instance, backing up the entire DB instance and not just individual databases. RDS saves the automated backups of your DB instance according to the backup retention period that you specify.

To copy a #RDS snapshot from one region to another:

1. Create a #snapshot of your RDS.

2. In your newly created snapshot go to Actions -> Copy Snapshot.

3. Click orange View snapshots in destination region.

4. In the target region's snapshots table find your copied snapshot, and wait until status "Copying" becomes "Completed".

5. Select the snapshot, click Actions -> Restore Snapshot.

Read More


WHM Mail Queue Manager

This article will guide you on use different features available in the #WHM Mail Queue Manager. Basically, the #Mail #Queue Manager feature in WHM is a handy tool that allows us to view, delete, and attempt to deliver queued emails that have not yet left the server. 

Postfix is a free and open-source mail transfer agent (#MTA) that routes and delivers electronic mail.

postfix flush helps to Flush queued mail.

This command will attempt to redeliver all queued mail. Use the command sparingly, multiple flushes will impact the overall performance of your mail server

To check my mail queue in cPanel:

i. Log into WHM.

ii. Go to Main >> Email >> Mail Queue Manager.

iii. You can click on the message to see the details.

Read More


Install Vesta control panel in Ubuntu

This article will guide you on easy steps to install Vesta control panel in #Ubuntu. VestaCP is a control panel for Linux with many features that facilitate the administration of a #server. 

Vesta Development team provides an installer script that automates setting up of Vesta hosting control panel on Ubuntu / Debian and RHEL based Linux distributions. Login to your Ubuntu / #Debian system and ensure the system is updated. Download #Vesta installer. Run install with sudo if you're logged in as standard user.

To install vestaCP on Ubuntu:

1. # Connect to your server as root via #SSH

ssh root@your.server

2. # Download installation script

curl -O http://vestacp.com/pub/vst-install.sh

3. # Run it

bash vst-install.sh

To change my VestaCP port:

i. conf file and change the port that NGINX listens on from 8083 to 2083 (or the port you chose to use). listen 2083; 

ii. Once the port has been changed, press CTRL+X , followed by y , and then hit enter to save your changes. 

iii. The final step is removing the firewall entry for the previous port we were using.

Read More


Modify MSSQL port

This article will guide you on the right steps to change the #MSSQL port using #SQL Server Configuration Manager. 

You can check TCP/IP connectivity to SQL Server by using telnet. For example, at the command prompt, type telnet 192.168. 0.0 1433 where 192.168. 0.0 is the address of the #computer that is running SQL Server and 1433 is the port it is listening on.

To specify a port in SQL Server Management Studio (#SSMS)?

1. You'll need the SQL Server Configuration Manager. 

2. Go to Sql Native Client Configuration, Select Client Protocols.

3. Right Click on #TCP / #IP and set your default port there.

Read More


Cloudflare error 1014 CNAME Cross-User Banned

This article will help to resolve #Cloudflare #error 1014 by applying different methods. By default, Cloudflare prohibits a DNS CNAME record between domains in different Cloudflare accounts. #CNAME records are permitted within a domain (www.example.com CNAME to api.example.com) and across #zones within the same user account (www.example.com CNAME to www.example.net).

To fix error 520:

1. Start by logging into Cloudflare. Then, find your site on the list and click on it. Click on your listed site.

2. Next, click on the #DNS tab, then on the orange cloud under the Proxy status section in the table. 

You'll know Cloudflare was disabled because the cloud will have turned gray.

Read More


Enable firewalld in Centos 7 How to do it

This article will guide you on steps to enable firewalld on #centos 7 servers for our customers. The firewall is one of the most important features of webservers. The #firewalld supports both IPv4 and IPv6 #firewall #settings.

Never run the iptables service and FirewallD service at the same time! The #iptables service is now provided by a separate package called iptables-services: Stop and disable the firewalld service first. # systemctl stop firewalld.

The firewalld daemon manages groups of #rules using entities called "zones". Zones are basically sets of rules dictating what traffic should be allowed depending on the level of trust you have in the networks your #computer is connected to.

To use FirewallD:

1. Installing and Managing FirewallD.

2. To start the service and enable FirewallD on boot: sudo systemctl start firewalld sudo systemctl enable firewalld.

3. Check the firewall status.

4. To view the status of the FirewallD daemon: sudo systemctl status firewalld.

5. To reload a FirewallD configuration: sudo firewall-cmd --reload.

Read More


Install NET framework 4.8 on windows server 2016

This article will guide you on how to #install .NET framework 4.8 on windows server 2016. 

Can't install .NET Framework 3.5 #Windows 10 0x800f0954?

NET Framework 3.5 or Any Optional #Feature. If the error 0x800f0954 occurs installing optional Windows features, it may be because the system is unable to access the Windows Update server. This is especially true in case of domain-joined computers which is configured to downloads updates from a WSUS server.

By using the Windows server 2016, we can install . NET Framework 3.5 which can be easily installed through Server Manager. 

i) Open the 'Server Manager' and navigate to the 'Manage' and then select 'Add Roles and Features'. 

ii) Click next to 'Features' section and select the option '.

To install Microsoft . #NET Framework 3.5. 1 on Windows Server 2012 R2:

1. Open Server Manager and select Features.

2. Select Add roles and features to launch the Add Roles and Features wizard.

3. In the Add Roles and Features wizard, click.

4. In the Confirm Installation Selections dialog box, click Install.

When you try to install the Microsoft . NET Framework 4.7 on a #computer that runs Windows 7 Service Pack 1 (SP1), Windows Server 2008 R2 SP1, or Windows Server 2012, the setup is blocked and cannot continue. 

This issue occurs when the computer does not have the update for D3DComplier (D3DCompiler_47. dll) installed.

Read More


Windows Live Mail Error 0x800ccc0e

This article will guide you on steps to fix #Outlook #Error #0x800ccc0e. Usually, this error occurs due to bad #email settings or because of minor problems with the email server or internet connection. Also, the customer may experience this error while receiving the mail on the email #client.

Try to run Windows Live Mail as Administrator in compatibility mode. Try to re-configure the Windows Live Mail account. Remove the existing WLM account and create a new one. Try reinstalling Windows Essentials 2012 on your Windows 10.

To get rid of Windows Live Mail error:

1. Open your Windows Live mail program.

2. Select the Home tab at the top right of your Windows Live Mail.

3. Click the Outbox to the left. Find any emails that are not sending out.

4. Once you send the email again, you can delete the email in the Outbox. 

The error will go away after the sent email is deleted.

Read More


Transfer Files with Rsync on Windows using SSH connection

This article will guide you on steps to perform Rsync from Windows to Linux over SSH.

#Rsync can use #SSH as a secure transport agent. Make sure rsync is installed by opening a #terminal session and typing rsync --version on each machine.

Most #Linux distributions can now read the FAT32 or NTFS disk formats natively, so you could copy your files to an external hard drive formatted in Windows with either of those file systems, which will then allow you to read the data back easily in Linux.

1. cwRsync is an implementation of rsync for Windows. 

2. rsync uses a #file #transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. 

3. #cwRsync can be used for remote file #backup and #synchronization from/to Windows systems.

Read More


Configure Reporting Services in SQL Server

The article will guide you on the steps to follow to configure #reporting services after renaming the #SQL server. Also , you will learn how to rename the SQL server instance. 

To Configure #Report Server After Renaming SQL Server #Instance:

1. Go to #Database Setup page. 

2. Enter SQL Server name in Server Name and then click Connect. 

3. If Reporting Services is configured using the server name, you must update the database connection information whenever the server name is changed.

To change the service account for SQL Server Reporting Services:

i. Open Reporting Services Configuration Manager, and then connect to the instance of SQL Server Reporting Services.

ii. Click #Microsoft service Identity on the left pane.

iii. Change the account and the password in the Account text box and the Password text box, and then click Apply.

Read More


Improve SQL Server Bulk Data Import Performance

This article will guide you improve #bulk #data #import #performance. The BULK INSERT command is much faster than bcp or the data pump to perform text file import operations, however, the BULK INSERT statement cannot bulk copy data from #SQL Server to a data file. Use the bcp utility instead of DTS when you need to export data from the SQL Server table into a text file.
To Speed up SQL Bulk Insert with #transactions:
1. Declare the variables that store the number of desired items ( @items ), the size of the chunks( @chunk_size ) and the counter of the number of executed inserts( @counter )
2. Open the first transaction and initialize the while loop.

Read More


Pros and Cons of Outsourcing Customer Service

In this article, you will see the different pros and cons to #outsourcing #customer #service. However, each case is unique. We should know best if outsourcing customer service could be the right way.

Outsourcing to someone who specialises in delivery of that part of your process, and therefore has up-to-date systems, technology and staff, can improve the quality of that service by reducing costs, improving final output quality or freeing up your internal staff for other roles they could be performing.

However, the flexible solutions allow you to consider the best-case scenario. Consider all possibilities and pick a scaleable, high-quality solution that best fits the business profile.

Benefits of outsourcing customer service:

1. Focus on core tasks.

2. Lower costs.

3. Promote growth.

4. Maintain operational control.

5. Offer staffing flexibility.

6. Provide continuity and risk management.

7. Develop internal staff.

Read More


Could not load file or assembly Microsoft ReportViewer WebForms

This article will guide you on ways to resolve Could not load #file or #assembly 'Microsoft.ReportViewer.WebForms' #error occurs when #ReportViewer files are missing from the #bin folder.
You need to reference both Microsoft.ReportViewer.WebForms and Microsoft.ReportViewer.Common and set the CopyLocal property to true. This will result in the dll's being copied to our bin #directory (both are necessary).

Read More


Lets encrypt new auth status 429 error

This article will guide you on methods to troubleshoot and fix 429 error which occurs due to creation of multiple #SSL #certificates for a #domain. 

1. 429 means you went over the rate #limits. 

2. You issued 5 certificates in the last week.  This is why you get a #429 answer.

3. You need to wait two days to get another one. do you have access to the certificates you issued?

Read More


SQL server Error 1053

This article will guide you on different methods of fixing error #1053 SQL server which occurs when attempting to pause or stop the SQL Server service in the #Windows Services Console. 

The most common cause of this error is when one of the files needed by sql server was not on a shared resource, and Sql Server, once failed to the other node, couldn't access it.

The #SQL #Server Agent error log may include a path or a file name that is not correct.

In this case, verify that the path and file name for SQLAgent.out is valid:

1. In SQL Server Enterprise Manager, expand the Management folder.

2. Right-click SQL Server Agent, and then click Properties.

3. Under Error Log, make sure that the path that is specified next to File Name is valid.

4. Make sure that the file name is SQLAGENT.out.

Read More


How to create bacpac file from SQL server

This article will guide you on how to export an existing #database into a #BACPAC file is through #SSMS. A bacpac is a dacpac + data, while a dacpac only contains the schema of the database.

To create a Bacpac file:

a. To #export a database using the Azure portal, open the page for your database and click Export on the toolbar.

b. Specify the BACPAC filename, select an existing Azure storage account and container for the export, and then provide the appropriate credentials for access to the source database.

c. Click OK.

To import from a BACPAC file into a new single database using the Azure portal:

1. Open the appropriate server page.

2. On the toolbar, select Import database. 

3. Select the storage account and the container for the BACPAC file and then select the BACPAC file from which to import.

Read More


NFS Data ISO and Export Storage Domain to oVirt RHEV

This article will guide you on steps to add Export Storage #Domain & #NFS #Data to an oVirt/RHEV environment. NFS is the most common protocol for sharing #files between #Unix #systems over a #network. NFS servers export directories from their local hard disks to NFS clients, which mount them so that they can be accessed like any other #directory.

To modify etc #exports:

1. Open the /etc/exports file in a text editor on an NFS client that has root access to the storage system.

2. Make your changes.

3. Save the file.

Read More


Install Cockpit Web Console on Ubuntu

This article will guide you on the steps to #install the #Cockpit web console on #Ubuntu. Basically, Cockpit web console provides a #graphical overview of the core components and overall status of a #Linux #machine.

To access cockpit in Linux:

1. Open the Interface by Opening a web #browser and enter the server's IP address with port 9090 in the address bar. If the web browser is on the Cockpit server, open localhost:9090 or hostname:9090.

2. Log into the Cockpit interface with the same user name and password that you would normally use to log into the #system.

Read More


Deploying Kohana PHP application on Debian

This article will guide you on how to deploy Kohana on #Debian. Kohana offers powerful event handling, multiple session drivers, simple database abstraction using #SQL helpers, and libraries that transparently handle external APIs. Its generous BSD license lets developers use and modify the framework to build commercial applications.

The #AppDynamics platform provides full, code-level visibility into the performance of your PHP application built on the Kohana framework. With rapid installation and the most scalable #architecture in the industry, AppDynamics solutions help you deploy your #applications more quickly and with more confidence.

Read More


Monitor Azure virtual machines with RDP

This article will guide you on how to monitor virtual #machines #RDP using Azure.
You can View performance directly from an Azure VM:
1. In the #Azure portal, select Virtual Machines.
2. From the list, choose a #VM and in the #Monitoring section choose Insights.
3. Select the #Performance tab.

Read More


How to set up Amazon S3 through WHM

This article will guide you on how to configure Amazon S3 via WHM by accessing the 'Backup Configuration'.
To configure your #backups:
i. Login to #WHM and access "Backup Configuration >> Additional Destinations".
ii. Select #Amazon #S3 and click “Create new destination”.

Read More


Export data into Excel in Ionic Application using XLSX

This article will guide you on the steps to #export data into excel file using #XLSX.

How do I export #data from angular to excel?

Environment setup involves;

Step 1: Downloading the XLSX Module.

Step 2: Downloading the File-Saver Module.

Step 3: Creating a Download #Excel button.

Step 4: Writing exportexcel() method.

Step 5: HTML #Table from which the data will be downloaded.

Read More


Send NXLogs with SSL TLS to Nagios Log Server

This guide will guide you on how to send NXLogs with SSL/TLS to #Nagios #Log #Server. Encryption ensures that the traffic between the #Windows machine and Nagios Log Server is not sent in plain text.

Read More


Backup Outlook PST files

This article will guide you on how to perform #backup outlook PST files containing messages and all other Outlook data that is saved on the system which should be backup regularly.

#pst files created by using #Outlook 2010 are saved on your computer in the #Documents\Outlook Files folder. If you are using #Windows XP, these files are created in the My Documents\Outlook Files folder.

Read More


Cloning existing KVM virtual machine images on Linux

This article will guide you on how to use the virt-clone command which provides a number of options to clone a #KVM #VM. You can use the virt-sysprep if you need to clone the VM and make/reset anything inside the guest #OS.

Read More


Testing RPC ports with PowerShell

This article will guide you on how to go about pinging available RPC ports with PowerShell and #Sysinternals tools and we can test #RPC #ports with #PowerShell.

In #Windows, do this by typing "cmd" in the search box in the Start Menu and clicking the command prompt icon. In the command prompt window, type "telnet" followed by a space, then an IP address or domain name followed by another space, and then the port number.

Read More


Install and Configure Free VMware Hypervisor

This article will guide you on the process to Configure Free VMware Hypervisor, to create a virtual #machine, and install a guest operating system.

“VMware vSphere Hypervisor #VMware #vSphere #Hypervisor is a free product that provides a simple and easy way to get started with #virtualization at no cost.

Read More


Outlook PST Error 0x80040116

This article will guide you on the methods to resolve #Outlook #PST #error #0X80040116 which signifies that the PST file is faulty.

Read More


Blocking Memcached Exploit in Zimbra

This article will guide you on the steps to fix Blocking #Memcached Exploit in #Zimbra. Memcached by default checks the #IP addresses of servers, in #networks, and on the Internet, where there is no #firewall.

Read More


Process to recover a permanently deleted email in Outlook

This article will guide you on the steps to retrieve permanently deleted emails from Outlook and an Outlook #PST. We can recover deleted emails in Outlook from the Deleted Items folder. 

If you purge an item from the “Deleted Items” folder, you can find it in the “Recoverable Items” folder. This is where #Outlook keeps permanently deleted files, #emails or events.

In Outlook, click the #Folder tab, and then click #Recover Deleted Items. Select the item you want to recover and click Recover Selected #Items.

Read More


Steps to deploy DACPAC with SSMS

This article will guide you on the steps to deploy DACPAC which involves registering a DAC instance by storing the DAC definition in the #msdb system database. 

A DAC is a self-contained unit of #SQL Server #database deployment that enables data-tier developers and database administrators to package SQL #Server objects into a portable artifact called a #DAC package, also known as a #DACPAC.

Read More


Install and configure Grafana on CentOS 7

This article will guide you on the steps to #install #Grafana on #CentOS 7 which is a #visualization and #analytics #monitoring software. Grafana is Free and Open Source which Runs on all major #OS operating systems.

Read More


IIS Security for Sites Steps for server hardening

This article will guide you on the process to #secure sites in IIS to prevent site infections or defacing on a #Windows Server include poor file security or poor #configuration. 

In conclusion, the modular nature of #IIS allows for more granular control over web server resources and #security. However, this can either make your #web #applications more or less secure—depending on the person or group responsible for security.

Read More


Outsourcing server administration Best Services

In conclusion, #outsourcing server #administration provides 24×7 server monitoring by an #Expert Team at an #affordable cost. We specialize on #Hosting #Tech #Support, IT Infrastructure Management, IT Infrastructure Support, #Linux Server Managed #IT Services, #Outsourced Web Hosting Support, Server Management, Server Monitoring, Server Support, System Administration, #Whitelabel #Helpdesk Support

Read More


VPN Error 806 Steps to fix it

This article will guide you on the steps to resolve #VPN #error 806 which occurs when the connection between our #Windows #computer and the VPN server has been established but the VPN remains incomplete. 

Read More


Install Prometheus Network Monitoring Server on CentOS 7

#Prometheus collects metrics from targets by scraping 3metrics #HTTP endpoints. Since Prometheus exposes #data in the same manner about itself, it can also scrape and monitor its own health. 

This article will guide you on the steps to perform #installation of Prometheus on #CentOS 7 along with the method used for the #setup.

Read More


Crashed Database Tables in Nagios XI

This article will guide you through the steps to fix Crashed #Database #Tables in #Nagios which occurs if the #MySQL process appears to be consuming large amounts of #CPU.

Read More


Invalid State of a Virtual Machine on VMWare ESXi

This article will guide you on the steps to resolve the Invalid State of a Virtual Machine on VMWare #ESXi error which relates to #orphaned virtual machines.

A virtual machine can show up as invalid or orphaned in these situations. After a vMotion or #VMware DRS migration. After a VMware HA #host failure occurs, or after the #ESX host comes out of maintenance mode. A virtual machine is deleted outside of vCenter Server. #vCenter Server is restarted while a migration is in progress.

Read More


Adding Multi Language Translation Feature in Ionic Application using ngx-translate

This article will guide you on the steps to add a #multi-language translation feature in #Ionic Application using #NGX-translate. This is possible by first creating an ionic app. Next, installing the Language Translation library. Then adding the language files for each language. After that, we create #languageConfig service to have translation-related methods in one place. Finally, we use translation pipes to translate text into HTML pages.

Read More


After hours tech support Common issues and how to prevent them

After Hours Tech Support Help Desk is designed to meet your immediate technology support needs during scheduled outside of regular business hours.  We encourage you to use this service for any unexpected technology support troubleshooting needs that may arise.

Read More


247 hosting remote support

24/7 hosting support is offered by every web host these days. But very often poorly implemented support operations does more damage then good. Today we’ve seen how you can stand out from the crowd by delivering 24 hour personalized phone support that gives you a powerful marketing edge, and doesn’t cost you a lot of money.

Read More


24 7 365 hosting tech support

Whether you need technical support at any time of the day, With Ibmi Media, we give support remotely to our Customers. Also, we offer technical support, cloud computing, and website development and hosting support.

Our support team is available to assist you 24/7/365 with any hosting or WordPress problem. Get world-class support when you need it.

Read More


RAM Disk in Nagios XI

This article will guide you on how to make use of a RAM disk can provide huge performance improvements on larger systems or any system where check latencies are greater than 2 seconds.

Read More


Time Command How to know execution time in Linux

This article will guide you on how to use the time command in Linux which is important in determining the duration of execution of a command.

Read More


Outlook error 0x80040600 Steps to fix it

This article will guide you on the steps to run scanpst or Inbox Repair tool to fix corrupt pst file as well as creating a new pst file to get away from the problematic pst permanently.

Read More


Redis Latency Monitoring How to enable it

This article will guide you on the aspects of Latency Monitoring and how it helps Redis which helps the user to check and troubleshoot possible latency problems.

Read More


Set up LDAP Client on Ubuntu

This article will guide you on the steps to set up LDAP client on Ubuntu.

Read More


Solve Oversized OST File issues in Outlook

This article will guide you on the different methods to fix an over-sized OST file which affects data accessibility and synchronization.

Read More


Configure Postfix as a Send Only SMTP Server

This article will guide you on how to perform configuration of Postfix as a Send Only SMTP Server which involves a series of steps that include installing postfix and modifying the configuration file.

Read More


PHPMailer smtp error could not authenticate

This article will guide you on how to fix PHPMailer error "smtp error: could not authenticate" which generally occurs when the application can’t establish an SMTP connection to the mail server. This is experienced when users send emails via PHPMailer using SMTP authentication.

Read More


Microsoft Outlook conflicting or unsupported encryption capabilities

This article will help to fix "Outlook conflicting or unsupported encryption capabilities" by simply turning off e-mail address matching for certificates and it depends on the version of Outlook you are running.

Read More


Outlook Error 0x8004210b How to fix it

This article will guide you on how to solve "Outlook Error 0x8004210b" which occurs in the process of installation, Windows shutdown, or while installing the Windows operating system.

Read More


TigerVNC Server installation and configuration

This article will guide you on how to install TigerVNC server CentOS 7.

Read More


How to use netsh to configure port forwarding on windows

This article will guide you on how to configure port forwarding on windows using netsh in order to redirect an incoming TCP connection from the local TCP port to any other port number.

Read More


How to resolve apache not listening on port 443

This guide will help you to solve Apache not listening on port 443 which occurs as a result of Incorrect configuration settings, firewall restrictions and other factors.

Read More


Cannot resolve host address Openvpn

This article will help to fix OpenVPN error "cannot resolve host address" which generally happens when there is a firewall restriction or as a result of configuration errors in the OpenVPN client.

Read More


VirtualBox installation on CentOS 7

This article will help you to install VirtualBox on Centos. VirtualBox Software helps to create and run virtual machines on a single hardware machine.

Read More


How to install and configure Fail2ban on Ubuntu 16.04

Improving Server security by installing Fail2ban on your server to help protect all kinds of services such as sshd, httpd from brute force attacks.

Read More


Our DigitalOcean Active Server Support service

We offer Emergency support and Server management services to help your monitor your infrastructure and quickly resolve and issues that could disrupt your services.

Read More


How to fix ModSecurity Error Failed deleting collection

This article will show you exactly what we did to fix ModSecurity error: collections_remove_stale: Failed deleting collection.

Read More


Solve rsync error code 19

Best method of fixing Rsync error code 19.

Read More


Fix Docker port is already allocated

How we solved Docker error port is already allocated in any Linux and Windows Operating System.

Read More


Fix SQL server error 10048

SQL server error 10048 occurs when the SQL server is about to start. This could be a frustrating experience for the user.

Read More


How to solve SQL error 17835

SQL error 17835 occurs when there is an issue with encryption in the process of connecting to the SQL server.

Read More


Fix SQL server error 772

SQL server error 772 occurs when an outdated version of ODBC drivers is used and in other cases the client might be using Forced protocol Encryption.

Read More