Explore information related to port


AWS ElastiCache error - Fix it Now ?


This article covers methods to fix ElastiCache error. Basically, the sort of error messages are returned by Amazon ElastiCache. You may receive other error messages that are returned by ElastiCache, other AWS services, or by Redis.

Read More



PostgreSQL backup failed in Web help desk - Fix it Now ?


This article covers methods to resolve PostgreSQL database and fix PostgreSQL error. It may be necessary to create a backup and restore your Web Help Desk database.

This is how to back up and restore the Web Help Desk 12.x PostgreSQL embedded database. The process involves creating a backup from the web interface and restore using the embedded pgAdmin application on the Web Help Desk.

Read More



AWS RDS MySQL Error 1227 - Fix it Now ?


This article covers how to fix AWS RDS MySQL Error 1227 for our customers. In order to fix this issue, you’ll need to leverage DB parameter groups. To modify parameter values in a customer-created DB parameter group, you can’t change the parameter values in a default DB parameter group. Changes to parameters in a customer-created DB parameter group are applied to all DB instances that are associated with the DB parameter group.

To modify a DB parameter group, use the AWS CLI modify-db-parameter-group command with the following required parameters:

--db-parameter-group-name
--parameters

Read More



Postfix address already in use Plesk error - Fix it Now ?


This article covers methods to resolve Postfix address already in use error in Plesk. To fix this error, simply Edit file /etc/postfix/master.cf and comment out all duplicate lines in the configuration, for example:

203.0.113.2- unix - n n - - smtp -o smtp_bind_address=203.0.113.2 -o
smtp_bind_address6= -o smtp_address_preference=ipv4

Note: The line with the IP address should exist only once in the /etc/postfix/master.cf configuration file.

Read More



Install pgAdmin with Docker - Step by Step Process ?


This article covers how to go about installing pgAdmin with Docker. By using Docker, we don’t have to worry about the installation of the PostgreSQL or pgAdmin. Moreover, you can use Docker to run this project on macOS, Windows, and Linux distributions.

Database management via a command-line interface can be nerve-racking. To solve this issue, we can use a tool with an interface. The pgAdmin solves this problem. Moreover, Docker makes the entire process smoother. 


To fix pgAdmin using Docker Installation issues:

Issue with following command,

$ docker run -p 80:80 \
    -e PGADMIN_DEFAULT_EMAIL="atinesh.s@gmail.com" \
    -e PGADMIN_DEFAULT_PASSWORD="admin" \
    -d dpage/pgadmin4

Read More



Plesk git authentication failed - Fix it Now ?


This article covers how to authenticate via HTTP when connecting to a remote Git repository in Plesk. HTTP/HTTPS authentication is not supported.

Authentication should be performed with an SSH key generated by Plesk (refer to Use SSH Connection for details).

It is possible to use HTTP/HTTPS protocol only if a repository does not require authentication.

Read More



SolusVM html5 and vnc consoles not working - Fix it Now ?


This article covers how to fix "Server disconnected (code:1006)". Basically, this error happens as a result of misconfiguration in the noVNC feature or when SSL settings required for NoVNC to work are not configured.

Read More



ec2 key permission denied – "Authentication failed, permission denied"


This article covers method to fix the error, ec2 key permission denied. 

"Permission denied (publickey)" and "Authentication failed, permission denied" errors occur if:

  • You're trying to connect using the wrong user name for your AMI.
  • The permissions are incorrect on the instance.
  • The incorrect SSH public key (.pub) file is in the authorized_keys file.


To fix this error, simply:

  • Verify that you're using the correct user name for your AMI.
  • Also Verify that the instance's permissions are correct and that the correct SSH public key is in the authorized_keys file.

Read More



Access Nagios Network Analyzer Reports - How to do it ?


This article covers how to access Nagios Network Analyzer Reports. This is done by configuring the Nagios Network Analyzer Component within Nagios XI. Having the Network Analyzer reports available in Nagios XI will allow quick and easy access to your Nagios Network Analyzer Network Report and Network Query report. 

Read More



Enable Firewall On AlmaLinux - How to implement this ?


This article covers how to enable Firewall On AlmaLinux. Basically, we can allow certain ports through the firewall, which lets incoming connections reach our services.


To open the port for HTTP to the public zone, run the command:

# firewall-cmd --zone=public --add-service=http --permanent

To Allow DNS through firewall, run the command:

# firewall-cmd --zone=public --add-service=dns --permanent

Allow PostgreSQL through firewall, run the command:

# firewall-cmd --zone=public --add-service=postgresql --permanent

Allow telnet through firewall, run the command:

# firewall-cmd --zone=public --add-service=telnet --permanent

Read More



Export config database in Nagios - How to do it ?


This article covers how to export config database in Nagios. Basically, Manual exports are useful when debugging configuration problems, including failures of Nagios XI to apply new configuration changes.

Read More



Install Docker Swarm Cluster on Debian 10 -Step by Step Process ?


This article covers how to install Docker Swarm Cluster on Debian 10. Docker Swarm is a tool used to orchestrate docker hosts. We can create a high availability and a high performance Docker cluster with applications distributed among the hosts. Docker swam uses a manager host and worker nodes architecture. You can have one or several manager nodes in your docker swarm cluster. The manager nodes uses the native Docker API and share the database of the Docker Swarm cluster with the worker nodes. The manager hosts maintain the cluster state, schedule tasks and handle the HTTP API endpoints.

Read More



Digitalocean err_connection_refused - Fix it Now ?


This article covers methods to resolve DigitalOcean error. SSH service uses sshd daemon to listen to the incoming connections and handles user authentication, terminal connections, and many more. If this service crashes, the connection fails, and results in SSH Connection refused error in DigitalOcean servers.

To fix this error, start by identifying and researching on the root cause of service failures. 

The reasons can be traffic impales, disk errors, resource breakdowns, DDoS attacks, and many more.

Sometimes the backend service fails or doesn't respond. 

In this case, we kill the dead process and restart the service. 

For example, In CentOS 7 droplet, we restart the SSH service using the below command:

$ systemctl restart sshd

Read More



Enable Memcached Support In Nagios - How to do it ?


This article covers how to enable Memcached for our customers. You can setup one or more memcached servers (hosts) for use by Nagios XI.

Each memcached host must have its firewall configured to allow traffic on TCP port 11211 to allow Nagios

XI to contact the memcached server. 


To create the firewall rules, run the commands:

$ ufw allow proto tcp from any to any port 11211
$ ufw reload

Read More



How FCR improves Customer Satisfaction


This article covers how to use First contact resolution to increase customer satisfaction. Basically, The role of First contact resolution or FCR is important in improving customer service satisfaction. First Call Resolution (FCR) is a term used in call and contact centres to measure the number of customer support queries successfully resolved first time.


Best Practices to increase your first call resolution rate in no time:

  • Create an informative knowledge base.
  • Require minimal customer effort.
  • Get clear on the issue.
  • Be precise and don't overwhelm.
  • Anticipate customer needs.
  • Empower your customers.
  • Answer all of their questions.
  • Provide your team with quality training.

Read More



Create Private Network Bridge on Proxmox VE 6 with NAT


This article covers how to create a Private Network Bridge on Proxmox. 

To do this:

1. Enable paket forwarding in /etc/sysctl.conf on the Proxmox host

2. Edit /etc/network/interfaces on the ProxMox host, to get 10.10.10.0/24 for your containers, that route through eth0 of the ProxMox host

Code:
# network interface settings; autogenerated# Please do NOT modify this file directly, unless you know what
# you're doing.
#
# If you want to manage parts of the network configuration manually,
# please utilize the 'source' or 'source-directory' directives to do
# so.
# PVE will preserve these directives, but will NOT read its network
# configuration from sourced files, so do not attempt to move any of
# the PVE managed interfaces into external files!
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet static
address YOUR-PUBLIC-STATIC-IP/YOUR-PUBLIC-MASK
gateway YOUR-STATIC-GATEWAY
auto vmbr1
iface vmbr1 inet static
address 10.10.10.1
netmask 255.255.255.0
bridge_ports none
bridge_stp off
bridge_fd 0
post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o eth0 -j MASQUERADE
post-down iptables -t nat -D POSTROUTING -s '10.10.10.0/24' -o eth0 -j MASQUERADE


3. Configure a container inside 10.10.10.0/24 - as an example using 10.10.10.2 .

Read More



MySQLdump: Got error: 1044 when selecting the database - Fix it Now ?


This article covers methods to resolve MySQLdump: Got error: 1044 when selecting the database. 

When this error happens, you will get an error message such as this:

mysqldump: Got error: 1044: Access denied for user ‘root’@’localhost’ to database ‘information_schema’ when using LOCK TABLES


To fix this MySQLdump error: 

1. You can pass the –single-transaction option to mysqldump command:

$ mysqldump --single-transaction -u user -p DBNAME > backup.sql

2. Also, you can simply grant LOCK TABLES to your user:

$ mysql -u root -p

And type:

mysql> GRANT SELECT,LOCK TABLES ON DBNAME.* TO 'username'@'localhost';

Read More



Configure inbound checks with Nagios – How to do it ?


This article covers how to easily configure inbound checks using both these APIs. Basically, there are two APIs available to handle inbound check transfers in Nagios XI:

  • NRDP - This api works on port 80 (HTTP) or 443 (HTTPS).
  • NSCA - This api works on TCP port 5667.


This will guide Nagios Administrators that needs to configure inbound checks.

Read More



Configure outbound checks in Nagios - How to do it ?


This article covers how to effectively Configure outbound checks with Nagios. Outbound checks are used in federated and distributed monitoring environments, as well as environments where the monitoring server sends passive check results to external applications. 


What is a distributed monitoring in Nagios ?

This is a method of scaling Nagios Xi and Nagios Core to monitor a lot of devices / machines - sometimes across different networks. Large organizations often want distributed monitoring, as do MSPs. Nagios Fusion's central dashboard can be ideal for distributed monitoring solutions. Both Nagios XI and Nagios Core can be configured for distributed monitoring.


What is a server ?

This is a dedicated computer system that generally runs databases, websites, etc. Servers are not used by people on a regular basis (as compared to workstations), but are rather used to run batch jobs, applications, and services.


What is passive check in Nagios ?

This is a check that is performed by an external application, operating system, or device and is submitted to Nagios Core or Nagios XI for processing.

Some monitoring agents - including NSCA, NCPA, and NRDP can be used to send passive checks to Nagios.

An SNMP trap is also considered a passive check.

Read More



Install Joomla in CloudPanel - Step by Step Process ?


This article covers how to Install Joomla in CloudPanel control Panel. Basically, Joomla  is a free and open-source content management system for publishing web content on websites.


Step by Step how to setup Joomla 3.9 with CloudPanel:

1. Login via SSH to the server e.g. with john-ssh and go to the users tmp directory:

$ cd ~/tmp

2. Download and extract the latest Joomla 3.9 version.

$ mkdir ~/tmp/joomla-3.9 && curl -sL https://downloads.joomla.org/cms/joomla3/3-9-25/Joomla_3-9-25-Stable-Full_Package.tar.gz | tar xfz - -C ~/tmp/joomla-3.9/

3. Move files to the htdocs directory of the domain:

$ cp -R joomla-3.9/* /home/cloudpanel/htdocs/www.domain.com/

4. Reset permissions.

$ cd /home/cloudpanel/htdocs/
$ clpctl system:permissions:reset www.domain.com 775

5. Clean up the tmp directory.

rm -rf ~/tmp/*

6. Open your domain in the browser and go through the installation wizard.

7. Done! Joomla 3.9 is now installed.

Read More



Apache Error: "semget: No space left on device" - Fix it Now ?


This article covers methods to resolve Apache Error: "semget: No space left on device". This error indicates that apache failed and will not start again, so check the error log If you see an error similar to the following, it could indicate that your server has run out of semaphores and apache cannot be started:

[emerg] (12)Cannot allocate memory: mod_fcgid: Create process manager error
[error] (28)No space left on device: Cannot create SSLMutex Configuration Failed


To solve this problem you can restart Apache, Postgres and other services that consumer many IPC resources or increase limit of the resources in the system using 'sysctl'. When you stop all services the semaphores and shared memory segments have to be removed, if not, and you still able to see them using 'ipcs' command, try to remove them manually using 'ipcrm' command. 

1. For example to remove semaphore:

# ipcs -a

2. If this is a common problem for you, you may want to increase the semaphore limits on your VPS server. You can do that by adding the following to the /etc/sysctl.conf file:

# Increases the semaphore limits & extend Apache's uptime.

kernel.msgmni = 512
kernel.sem = 250 128000 32 512

3. Then load the new settings into the kernel:

sysctl -p

Read More



Exclude Files from Backups in cPanel - How to do it ?


This article covers how to set up both global and local exclude files. Basically, we would require to exclude certain files from backups in cPanel either for security purposes or to reduce the size of the backup file. 

When backing up large accounts, it can be desirable to skip certain large directories or exclude files for security reasons. Whatever the reason, cPanel offers two methods for excluding files from the standard backup process.


To exclude files or directories from your user backups, perform either of the following actions:

  • Exclude the files from all user's backups.
  • Exclude the files from an individual user's backups.


For one cPanel user

Users or administrators can modify the user-level exclude file. /home/username/cpbackup-exclude.conf excludes files from a specific user's home directory.

$ nano /home/username/cpbackup-exclude.conf

# add new entries here

example/
dir/example.php

Read More



Import Config Files From Nagios Core into Nagios XI


This article covers method to Import Config Files From Nagios Core into Nagios XI.

Importing configuration files automates setting up your existing Hosts, Services, Hostgroups, Servicegroups, and Host/Service Templates in your Nagios XI installation.


To Import Configuration Files Into Nagios XI:

1. In CCM expand Tools and select Config File Management. 

2. Click the Write Configs button to create / update the config files on the Nagios XI server. 

3. You can see in the screenshot to the right that the host and service config files were created and the existing hostgroups and commands config files were updated.

Read More



Configure Windows Firewall Rule using Group Policy


This article covers methods to Configure Windows Firewall Rule using Group Policy. Most of the procedures in this guide instruct you to use Group Policy settings for Windows Firewall with Advanced Security.


To open a GPO to Windows Firewall with Advanced Security:

1. Open the Group Policy Management console.

2. In the navigation pane, expand Forest: YourForestName, expand Domains, expand YourDomainName, expand Group Policy Objects, right-click the GPO you want to modify, and then click Edit.

3. In the navigation pane of the Group Policy Management Editor, navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security - LDAP://cn={GUID},cn=

Read More



PHPMyAdmin import database timeout - Fix it Now ?


This article covers methods to fix PHPMyAdmin import database timeout error. This error happens because of a huge file and the restoration process fails with timeout.


To resolve this error, 

1. Login to the server over SSH.

2. Create the file config.inc.php.

For Plesk Onyx and Plesk Obsidian below 18.0.30:

# cp -p /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/libraries/config.default.php /usr/local/psa/admin/htdocs/domains/databases/phpMyAdmin/config.inc.php

For Plesk Obsidian 18.0.30 and above:

# cp -p /usr/local/psa/phpMyAdmin/libraries/config.default.php /usr/local/psa/phpMyAdmin/config.inc.php

3. Increase the value of $cfg['ExecTimeLimit'] in config.inc.php created on step 2:

$cfg['ExecTimeLimit'] = 3600;

4. Increase the settings in /etc/sw-cp-server/config to avoid '504 Gateway Timeout' error:

fastcgi_read_timeout 3600;
fastcgi_send_timeout 3600;

5. Restart sw-cp-server:

$ service sw-cp-server restart

Read More



Modify the Default SSH Port on any Linux Distribution - Step by Step Process ?


This article covers how to change the default SSH port on your Linux machine.

To change the default port the SSHD daemon is listening on.

We can edit the configuration file using a nano editor:

$ sudo nano /etc/ssh/sshd_config

Once you make a change to the SSHD daemon configuration file, you should restart the services to reload the new changes.

$ sudo service sshd restart

Read More



Database import hangs in Plesk - Fix it Now ?


This article covers methods to resolve Database importing hangs in Plesk with error reading communication packets. Generally, the database import task in Plesk fails due to non-optimized client databases.

The solution to this Plesk error is to simply optimize the databases.

Read More



Configure Windows Firewall Rules with PowerShell


This article covers method to Configure Windows Firewall Rules with PowerShell. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.

Some parameters are used to specify the conditions that must be matched for the rule to apply, such as the LocalAddress and RemoteAddress parameters. Other parameters specify the way that the connection should be secured, like the Authentication and Encryption parameters. Rules that already exist can be managed with the Get-NetFirewallRule and Set-NetFirewallRule cmdlets.

Filter objects, such as NetFirewallAddressFilter or NetFirewallApplicationFilter, are created with each firewall rule. The filter objects and rules are always one-to-one and are managed automatically.


To enable all three network profiles. Domain, Public and Private, use this command:

Set-NetFirewallProfile -All -Enabled True

Or set the specific profile instead All:

Set-NetFirewallProfile -Profile Public -Enabled True

To disable the firewall for all three network location, use the command:

Set-NetFirewallProfile -All -Enabled False

Read More



The RPC server is unavailable – Fix it Now ?


This article covers methods to resolve RPC server error. To prevent the problem from reoccurring, check your firewall settings to see whether RPC data traffic is being blocked. If you use a third-party firewall, check the appropriate settings. If you use the Windows firewall, open the Control Panel and search for 'Windows Firewall". In the "Remote" tab, under "Remote Assistance", all of the boxes should be checked.


How to fix the RPC server error ?

Fortunately, the error can be resolved easily and quickly. You just need to restart the service.

  • From the Start menu (Windows symbol) open the Control Panel.
  • Select "Administrative Tools" and then "Services". Alternatively, you can enter "Services" in the search bar.
  • Find "DCOM Server Process Launcher" in the list and double-click to open it.
  • You are now in the configuration menu for the RPC server. Ideally, the "Startup type" should be set to "Automatic" and the "Service status" should show "Running". If this is not the case, set the "Startup type" to "Automatic" and click the "Start" button under "Service status". Click "OK" to confirm.
  • Now close any programs you have running and restart your computer.

Read More



cPanel reported error number 1 when it ended - Fix it Now ?


This article covers methods to resolve cPanel reported error number 1 when it ended. This error makes cPanel copy action on an account from another server to fail.

The error means that the destination server isn't able to login into the source server to fetch files .


To fix this error, do the following:

1) Recheck your username and password used along with the IP too.

2) Firewall, the source firewall is blocking your destination server IP. 

You would need to login into the WHM of the source server and goto "ConfigServer Security & Firewall".

Retry you transfer and it should be working.

Read More



Import Nagios Log Server Into Microsoft Hyper-V - How to Do it?


This article covers how to easily Import Nagios Log Server Into Microsoft Hyper-V. Basically, to Import Nagios Log Server Into Microsoft Hyper-V we need to follow a series of steps outlined in this guide. 

Read More



cPanel Error Iproute Conflicts With Kernel - Fix it Now ?


This article covers method to fix cPanel Error Iproute Conflicts With Kernel. Basically, this error happens when we have an outdated kernel on the server. 


Instead of deleting conflicting kernels, you can also add the iproute package to the excludes of yum in /etc/yum.conf file, then the iproute package won't be marked for the update.

It can be useful when you need to perform an update but can't reboot the server at the given moment. 

It can be excluded manually using a preferred text editor or using the following command:

$ sed -i 's/exclude=/exclude=iproute /' /etc/yum.conf

The change can be reverted using this command:

$ sed -i 's/exclude=iproute /exclude=/' /etc/yum.conf

Read More



Access denied to VNC Server - How to fix this error ?


This article covers methods to fix the error, Access denied to VNC Server. Basically, this error occurs while trying to connect to a VNC server using a cloud connection. This message means that your RealVNC account has been signed out of VNC Viewer.

This will happen if you have recently changed the password for your RealVNC account, for example.


To resolve this VNC connection issue, click Sign in again and enter your RealVNC account credentials.

Once you see a green tick/check mark in the top right next to your name, try connecting to the VNC Server again.

Read More



Plesk error FPM initialization failed - Fix it Now ?


This article covers methods to fix Plesk error, FPM initialization failed.

Basically, the error "FPM initialization failed" triggers in Plesk mainly in different formats. The is as a result of Incorrect PHP configuration file was generated during subdomain creation via XML API.


To fix this Plesk error:

i. Log in to Plesk server via SSH.

ii. Remove the excessive configuration file:

rm -f  /etc/php-fpm.d/subdomain.example.com.conf

Read More



Plesk error Unable to import the dump - Fix it Now ?


This article covers methods to fix database error in Plesk. 


To fix this Plesk database issue:

1. Start by Checking the version of your SQL server with:

# plesk db -Ne "select version()"

2. Make sure that collation mentioned in the error message is not available in MySQL server:

# plesk db -e "show collation" | grep uft8_general_ci

3. So you have to upgrade MariaDB to version 10.1 or 10.2 on the destination server.


How to upgrade Plesk MySQL 5.5 to 5.6/5.7 or MariaDB 5.5 to 10.X on Linux?

By default, Ubuntu 20.04 is shipped with MariaDB 10.3.

1. For security reasons, create a database dump of all databases with the following command:

MYSQL_PWD=`cat /etc/psa/.psa.shadow` mysqldump -u admin --verbose --all-databases --routines --triggers > /tmp/all-databases.sql

2. Stop MariaDB:

$ service mariadb stop

3. Install repositories from Setting up MariaDB Repositories page:

# apt-get install software-properties-common
# apt-key adv --fetch-keys 'https://mariadb.org/mariadb_release_signing_key.asc'
# add-apt-repository 'deb [arch=amd64,arm64,ppc64el] https://mirror.truenetwork.ru/mariadb/repo/10.4/ubuntu focal main'

4. Create a backup of all MySQL data:

$ cp -v -a /var/lib/mysql/ /var/lib/mysql_backup

5. Start an upgrade with the following command. Leave all fields empty when asked for a 'root' user password:

$ apt-get update
$ apt-get install mariadb-server

6. Start the MariaDB service:

# service mariadb start

7. Upgrade MySQL databases:

MYSQL_PWD=`cat /etc/psa/.psa.shadow` mysql_upgrade -uadmin

8. Restart mysql service:

$ service mariadb restart

9. Execute the following commands to update package version inside Plesk:

# plesk bin service_node --update local
# plesk sbin packagemng -sdf

Read More



SNMP MIB Upload Problems in Nagios – Fix it Now ?


This article covers Nagios SNMP MIB Upload Problems.

This issue happens while uploading SNMP MIB files and it could be as a result of insufficient permissions on the SNMP MIB files.


Execute the following commands to reset the permissions and ownership on the Nagios SNMP MIB files:

# chmod -R ug+rw /usr/share/snmp/mibs
# chown -R root:nagios /usr/share/snmp/mibs

After executing those commands you should be able to upload the MIB file that previously did not work.

Read More



SNMPTT Service generates Cannot find module errors in Nagios


This article covers methods to fix "Cannot find module" errors in Nagios.

Basically, SNMPTT Service generates "Cannot find module" errors in Nagios when a MIB file contains spaces in the filename. 

The MIB files are located in the /usr/share/snmp/mibs/ folder.

This was identified as an issue and resolved in Nagios XI 5.4.0. As of version 5.4.0, when you upload MIBs via the Manage MIBs page the filename will have any spaces replaced with an underscore.

Read More



Problems Using Nagios With Proxies - Fix it Now ?


This article covers how to resolve Problems Using Nagios With Proxies which arises if we do not configure proxies correctly while using Nagios.

Note that the Nagios XI code makes several internal HTTP calls to the local Nagios XI server to import configuration data, apply configuration changes, process AJAX requests, etc. 

These functions may not work properly when you deploy a proxy if it is not configured properly, which could result in a non-functional Nagios XI installation.

Read More



Migrate Performance Data in Nagios - Step by Step Process ?


This article covers how to perform Migrate Performance Data in Nagios.

Basically, to migrate, we have to convert the data to XML and import it into RRD’s on the new machine.

Historical performance data that is used to generate graphs are stored in Round Robin Database (RRD) files.

RRD performance data files are compiled binaries, so for a simple file transfer a user would have to have the architecture match on both machines.

Read More



The source file names are larger than is supported by the file system


This article covers methods to resolve Windows error "The source file names are larger than is supported by the file system". Most Windows users encounter this issue when trying to copy or delete a file on the computer and they may receive an error message saying Source Path Too Long with the explanation of the source file name(s) are larger than is supported by the file system.


This Windows error error happens mainly because one or more files that are kept in a series of subfolders that have long names, but Windows only allows 258 characters at most in the folder path subfolder.
This will prevent you from moving the files or folders that are saved in this folder.

To fix this windows error, try the following:

Delete the File/Folder by Bypassing the Recycle Bin
You know that when you delete files from your computer, these files will be first moved to the Recycle Bin and they will stay there until you delete them permanently.
i. Click on the file or folder that is bothered by the Source Path Too Long error.
ii. Press the SHIFT and Delete buttons at the same time to permanently delete the file or folder.

Read More



Drupal 406 error - Fix it Now ?


This article covers methods to resolve Drupal 406 error.

There are many errors that you may see as you visit different websites across the web.

One of the more common ones is the 406 – Not Acceptable error.

Cause for Drupal 406 error:

In regards to a site on your hosting account, the cause of the 406 error is usually due to a mod_security rule on the server.
Mod_security is a security module in the Apache web server that is enabled by default on all hosting accounts.
If a site, page, or function violates one of these rules, server may send the 406 Not Acceptable error.

To prevent Drupal 406 Not acceptable error:

Mod_security can be turned off. You can also disable specific ModSecurity rules or disable ModSecurity for each domain individually.
If you would like mod_security disabled you can disable mod_security via our Modsec manager plugin in cPanel.

Read More



Unable to connect to VNC Server using your chosen security setting - How to fix it ?


This article covers method to resolve Unable to connect to VNC Server using your chosen security setting.
Basically, the unable to connect error could trigger due to incompatible encryption settings or due to the version of the VNC running in the remote server.

To fix this VNC error, simply apply the following:

1. On the remote computer, change the VNC Server Encryption parameter to something other than AlwaysOff.
2. Change the VNC Viewer Encryption parameter to Server, PreferOn or PreferOff.

Read More



VNC Server is not currently listening for cloud connections - Fix it Now ?


This article covers methods to fix VNC 'Timed out waiting for the response from the host computer' error for our customers.

If you see this message when trying to connect from VNC Viewer, please check the following:
1. Check that the remote computer is connected to the Internet. If it isn't, you won't be able to connect.
2. It may be that the remote computer is asleep. It is advisable to prevent a remote computer sleeping or hibernating while remote access is required:
Windows: In Control Panel > Power Options > Change when the computer sleeps, make sure Put the computer to sleep when plugged in is Never.
Mac: In System Preferences > Energy Saver, make sure Prevent computer from sleeping automatically when the display is off is selected.
3. If you have disabled cloud connections in VNC Server's Options dialog, under the Connections heading. Make sure this is checked.
4. You may have the wrong team selected in VNC Viewer. Please ensure you have selected the correct team for the computer to which you want to connect.
5. If you have purchased a subscription but did not subscribe from within your trial team, you will need to join your computer(s) to the new, paid-for team.

Read More



Improve phone support efficiency - Facts you need to know ?


This article covers some key points to improve phone support efficiency.
In the contact centre environment, becoming more efficient involves reviewing internal processes, eliminating unnecessary steps and duplicate handling, and often implementing new processes. 

The main aims are to reduce call handling times and improve first call resolution.

Methods to Boost Contact Centre Efficiency:
1. Migrate to a cloud hosted solution
Cloud hosted technology solutions don't rely on equipment infrastructure, and therefore scale from five agents to one thousand and back again without incurring any downtime.
2. Improve your self-service options
Customers want choice.  They want to be able to take care of routine and straightforward interactions themselves.
3. Implement automatic call distribution
Poor call traffic distribution results in customers being sent to the wrong department, which ties up personnel and delays them in getting on with helping the right people.
4. Improve your verification process
The average time to verify the identity of a user using Personal Verifiable Questions (PVQs) is 45-90 seconds.
5. Offer a call back service
A cost-effective way to improve team efficiency, and the customer experience, is to use call-backs to defer calls until a later time. 

There are two options for call backs.

i. Virtual queuing – whereby the customer's place in the queue is held and called when her turn arrives
ii. A timed call-back, where customers are offered a selection of time slots for their call-back. This option allows you to schedule the call back to take place during a "trough" period, and so keeps staff productive during quieter periods.

Read More



Manage Scheduled Tasks with PowerShell - How to do it


This article covers how to use the PowerShell features to create scheduled tasks. The Get-ScheduledTask cmdlet gets the task definition object of a scheduled task that is registered on a computer. You can use PowerShell to create and manage scheduled tasks. Managing scheduled tasks with PowerShell is made possible with the use of the ScheduledTasks module that’s built-in to Windows.
With the PowerShell Scheduled Tasks module, setting up scheduled tasks using PowerShell commands is made possible. This module provides the opportunity and means to create and deploy scheduled tasks programmatically on the local and remote computers.

Important scheduled task component:
1. Action – the action that is executed by the scheduled task. An action is typically to run a program or a script. A scheduled task can have more than one actions.
2. Trigger – controls when the scheduled task runs. Triggers can be time-based, like, setting a schedule for daily or hourly recurrence. Triggers can also be activity-based, which runs a task based on detected activities like computer startup, a user logs in, or logged events.
3. Principal – controls the security context used to run the scheduled task. Among other things, a principal includes the user account and the required privilege used by the scheduled task.
4. Settings – is a set of options and conditions that controls how the scheduled task behavior. As an example, you can customize a task to get removed after a consecutive number of days that the task is unused.

To add a Trigger for a scheduled task using PowerShell:
The cmdlet to use for creating a trigger is the New-ScheduledTaskTrigger cmdlet.
The command below creates a trigger to run daily at 3 PM.

Copy and run the code in PowerShell:

# Create a new trigger (Daily at 3 AM)
$taskTrigger = New-ScheduledTaskTrigger -Daily -At 3PM
$tasktrigger

This will Create a Trigger (Daily at 3 AM)

Read More



Cannot download Docker images behind a proxy - Fix it Now


This article covers the error, Cannot download Docker images behind a proxy. 

You can fix this docker issue by doing the following:

1. In the file /etc/default/docker, add the line:

export http_proxy='http://<host>:<port>'

2. Restart Docker:

$ sudo service docker restart


Also, you can Follow the steps given below to fix this docker error:

1. Create a systemd drop-in directory for the docker service:

$ mkdir /etc/systemd/system/docker.service.d

2. Create a file called /etc/systemd/system/docker.service.d/http-proxy.conf and add the HTTP_PROXY env variable:

[Service]
Environment="HTTP_PROXY=http://proxy.example.com:80/"

3. If you have internal Docker registries that you need to contact without proxying you can specify them via the NO_PROXY environment variable:

Environment="HTTP_PROXY=http://proxy.example.com:80/"
Environment="NO_PROXY=localhost,127.0.0.0/8,docker-registry.somecorporation.com"

4. Flush changes:

$ sudo systemctl daemon-reload

5. Verify that the configuration has been loaded:

$ sudo systemctl show --property Environment docker
Environment=HTTP_PROXY=http://proxy.example.com:80/

6. Restart Docker:

$ sudo systemctl restart docker

Read More



Best Ubuntu APT Repository Mirror - How to get it


This article covers methods to find the best APT mirror on the Ubuntu server. 


To Find Best Ubuntu APT Repository Mirror Using Apt-smart:

Apt-smart is yet another command line tool written in Python. It helps you to find APT mirrors that provides best download rate for your location. It can smartly retrieve the mirrors by querying the Debian mirror list, Ubuntu mirror list and Linux mint mirror list and choose best mirror based on the country in which the user lives in. The discovered mirrors are ranked by bandwidth and their status (like up-to-date, 3-hours-behind, one-week-behind etc).

Another notable feature of Apt-smart is it will automatically switch to any other different mirrors when the current mirror is being updated. The new mirrors can be selected either automatically or manually by the user. Good thing is Apt-smart will backup the current sources.list before updating it with new mirrors.


To Install Apt-smart in Ubuntu:

Make sure you have installed Pip and run the following commands one by one to install Apt-smart:

$ pip3 install --user apt-smart
$ echo "export PATH=\$(python3 -c 'import site; print(site.USER_BASE + \"/bin\")'):\$PATH" >> ~/.bashrc
$ source ~/.bashrc


To List all mirrors based on rank:

To list all available ranked mirrors in the terminal, run:

$ apt-smart --list-mirrors

Or,

$ apt-smart -l


To Automatically update mirrors:

Instead of manually finding and updating the best mirror in Ubuntu, you can let Apt-smart to choose a best Apt mirror and automatically update the sources.list with new one like below:

$ apt-smart --auto-change-mirror

To get help, run:

$ apt-smart --help

Read More



Listen on Privileged Ports with Nagios Log Servers - How to set it up


This article covers how to configure Nagios Log Servers to listen on privileged ports. Now Nagios Log Server Administrators who would like configure Nagios Log Server to listen on ports below 1024 which are privileged in Linux. This can be useful if you have legacy devices that can only send on specific ports (e.g. syslog on port 514).

Ports below 1024 are privileged on Linux and only allow the root user to listen on them. 

This can be implemented via two solutions:

1. Run Logstash as root

2. Use setcap


To use Use setcap for Listening On Privileged Ports:

Here, you can use the logstash running as the nagios user but this method may be less secure in some environments as it will allow any Java process to listen on privileged ports.

i. The logstash init configuration file requires three lines to be added to the end of it, open the file with the following command:

On Debian | Ubuntu:

$ vi /etc/default/logstash

or

$ sudo /etc/default/logstash

2. Then, Add the following three lines to the end of the file:

echo $(dirname $(find /usr/lib -name libjli.so)) | awk '{print $1}'> /etc/ld.so.conf.d/java.conf

eval "$(which ldconfig)"

setcap 'cap_net_bind_service=+ep' $(readlink -f $(which java))

3. Save the file and close vi.

4. Restart Logstash Service

The logstash service needs to be restarted for these changes to apply:

$ sudo systemctl restart lagstash.service

Read More



Internal error Account getPassword cannot decrypt password to be plain - Fix this Plesk error Now


This article covers how to resolve Plesk error, 'Internal error: [Account :: getPassword] cannot decrypt password to be plain'. It happens when A database user whose password is encrypted can now import and export the domain database after providing the database password.

However this issue is resolved in Plesk Obsidian.


To fix this Plesk error:

1. Updating Plesk via the Plesk interface

Make sure that port 8447 is opened in a firewall. If it is closed and cannot be opened for some reason, use the command-line instructions.

i. In Plesk, go to Tools & Settings and click Updates and Upgrades.

ii. On the Updates and Upgrades page, click Update Components.

iii. Click Continue to begin the update procedure.

2. Updating Plesk via a command-line interface

i. Connect to a Plesk server via SSH (Linux) / RDP (Windows Server).

ii. Run Plesk Installer Update (on Windows Server, start a command prompt as an Administrator):

plesk installer update


By default, Plesk installs updates automatically by means of the Plesk daily task (executed every night), if the option Automatically install Plesk updates is enabled at Tools & Settings > Update Settings.

During the update process:

1. Plesk may go offline for several minutes, if updates require a Plesk restart

2. Websites will stay online

Note: If a service component is going to be updated, its service will be restarted.


To find out what Plesk update is currently installed on the system, go to the Home page > System Overview.

Alternatively, execute the following command in a command-line interface:

plesk version

Read More



Port 113 IDENT Requests - How to Disable it on Nagios


This article covers how to disable Port 113 IDENT Requests on Nagios. 

You are seeing port 113 return requests either from your Nagios XI server (when submitting NSCA passive results) to the originating host OR you are seeing port 113 return requests when checking NRPE services).

You will see this behavior on your firewall logs as you will most likely not have a firewall rule for port 113.

This is usually because you are running an NRPE check through XINETD with USERID included on the log_on_success or log_on_failure options in your remote hosts /etc/xinetd.d/nrpe file.

OR this could be because you are submitting passive results to the XI server through NSCA (which is running under XINETD) /etc/xinetd.d/nsca with the same options as above.


To disable Port 113 IDENT Requests:

1. Then remove the USERID option from the log_on_failure AND log_on_success to stop the IDENT from occurring. The file you need to change depends on:

i. NRPE on remote host

/etc/xinetd.d/nrpe

ii. NSCA on Nagios XI server

/etc/xinetd.d/nsca

2. After making the changes you need to restart the xinetd service using one of the commands below:

RHEL 7+ | CentOS 7+ | Oracle Linux 7+ | Debian | Ubuntu 16/18/20

$ systemctl restart xinetd.service


What is filter ident port 113?

Filter IDENT(port 113) (Enabled) IDENT allows hosts to query the device, and thus discover information about the host.

On the VPN Passthrough screen, you can configure the router to transparently pass IPSec, PPPoE, and PPTP traffic from internal hosts to external resources.

Read More



Prometheus Distributed Monitoring System - A brief review


This article covers an overview of what Prometheus Distributed Monitoring System is and how it works.

Prometheus is an open-source systems monitoring and alerting toolkit with an active ecosystem.


Why is Prometheus used?

Prometheus is an open-source monitoring software that is very popular in the industry. Prometheus is easy to customize, and produces metrics without impacting application performance.

Along with this, Prometheus monitoring can be used to provide clarity into systems and how to run them.


What is Prometheus monitoring used for?

Prometheus is a free software application used for event monitoring and alerting. It records real-time metrics in a time series database (allowing for high dimensionality) built using a HTTP pull model, with flexible queries and real-time alerting.


What is AWS Prometheus?

Amazon Managed Service for Prometheus (AMP) is a Prometheus-compatible monitoring service that makes it easy to monitor containerized applications at scale.

AMP automatically scales as your workloads grow or shrink, and is integrated with AWS security services to enable fast and secure access to data.


What metrics does Prometheus collect?

At this moment, for Prometheus, all metrics are time-series data. The Prometheus client libraries are the ones in charge of aggregating metrics data, like count or sum. Usually, these client libraries—like the Go library from the graphic above—have four types of metrics: counter, gauge, history, and summary.


What is the difference between Grafana and Prometheus?

Grafana and Prometheus, both help us in tackling issues related to complex data in a simplified manner. 

Grafana is an open-source visualization software, which helps the users to understand the complex data with the help of data metrics.

Prometheus is an open-source event monitoring and alerting tool.


How does Prometheus monitoring work?

Prometheus scrapes metrics from instrumented jobs, either directly or via an intermediary push gateway for short-lived jobs. 

It stores all scraped samples locally and runs rules over this data to either aggregate and record new time series from existing data or generate alerts.

Read More



Your system requires smb2 or higher Windows error - Fix it now


This article covers how to fix the Windows error 'Your system requires smb2 or higher'. SMB1 protocol is vulnerable and your system will give you a warning message saying that it requires SMB2. 

Most Windows 10 users reported Your system requires SMB2 or higher error message on their PC. 

SMB stands for Server Message Block, and it's a protocol for sharing files. The protocol has two versions, the SMB1, and the SMB2, and while both can be used, the latter is the more secure one.


To enable SMB2 on Windows 10:

Check if your system can install SMB2

1. Start PowerShell as administrator. Press the Windows Key+ X and select PowerShell (Admin).

2.Type Get-SmbServerConfiguration | Select EnableSMB2Protocol in the command prompt of the Window PowerShell and press Enter.

3. If your system can run SMB2 protocol, type windows features in the Search box and select Turn Windows features on or off.

4. Once the Windows Features window opens, check SMB1/CIFS File Sharing Support option and hit OK.

5. Restart your PC and check if the problem with SMB2 is resolved.


To enable SMB2 on Windows 10 using Powershell:

1. Start PowerShell as administrator. We already showed you how to do that in our previous solution.

2. Enter Set-SmbServerConfiguration –EnableSMB2Protocol $true and press Enter.

3. Press Y to confirm.

Read More



Redirect FreeBSD Console To A Serial Port for KVM Virsh - How to do it


This article covers how to redirect FreeBSD in KVM to the serial port.

FreeBSD does support a dumb terminal on a serial port as a console.


This is useful for quick login or debug guest system problem without using ssh. 

1. First, login as root using ssh to your guest operating systems:

$ ssh ibmimedia@freebsd.ibmimedia.com

su -

2. Edit /boot/loader.conf, enter:

# vi /boot/loader.conf

3. Append the following entry:

console="comconsole"

4. Save and close the file. Edit /etc/ttys, enter:

# vi /etc/ttys

5. Find the line that read as follows:

ttyd0  "/usr/libexec/getty std.9600"   dialup  off secure

6. Update it as follows:

ttyd0   "/usr/libexec/getty std.9600"   vt100   on secure

7. Save and close the file. Reboot the guest, enter:

# reboot

8. After reboot, you can connect to FreeBSD guest as follows from host (first guest the list of running guest operating systems):

# virsh list

Sample outputs:


 Id Name                 State

----------------------------------

  3 ographics            running

  4 freebsd              running

9. Now, connect to Freebsd guest, enter:

virsh console 4

OR

virsh console freebsd

Read More



Unable to add bridge port vnet0 No such device - Fix it now ?


This article covers how to resolve the error, Unable to add bridge port vnet0: No such device which happens when the bridge device specified in the guest's (or domain’s) <interface> definition does not exist.

Theerror messages reveal that the bridge device specified in the guest's (or domain's) <interface> definition does not exist.

To verify the bridge device listed in the error message does not exist, use the shell command ifconfig br0.

A message similar to this confirms the host has no bridge by that name:

br0: error fetching interface information: Device not found

If this is the case, continue to the solution.


To fix the error, Unable to add bridge port vnet0: No such device :

1. Edit the existing bridge or create a new bridge with virsh

Use virsh to either edit the settings of an existing bridge or network, or to add the bridge device to the host system configuration.

2. Edit the existing bridge settings using virsh

Use virsh edit name_of_guest to change the <interface> definition to use a bridge or network that already exists.

For example, change type='bridge' to type='network', and <source bridge='br0'/> to <source network='default'/>.

Read More



Install and Configure Mahara on Ubuntu


This article covers how to install Mahara. Basically, Mahara is a popular ePortfolio and social networking system that helps educators to develop a digital classroom in a remote learning environment and track student's progress. 

Mahara also has many non-student applications. You can use it to build a blog, a resume-builder, a file-repository, or a competency framework.

Mahara is a fully featured web application to build your electronic portfolio. 

You can upload files, create journals, embed social media resources from the web and collaborate with other users in groups. 


To install Mahara on Ubuntu:

1. 1. Login to your VPS via SSH

ssh user@vps

2. Update the system

[user]$ sudo apt-get update && sudo apt-get -y upgrade

3. Install MariaDB

To install MariaDB, run the following command:

[user]$ sudo apt-get install -y mariadb-server

4. Create MariaDB database for Mahara

Next, we need to create a database for our Mahara installation.

[user]$ mysql -u root -p
MariaDB [(none)]> CREATE DATABASE mahara character set UTF8;
MariaDB [(none)]> GRANT ALL PRIVILEGES ON mahara.* TO 'maharauser'@'localhost' IDENTIFIED BY 'your-password';
MariaDB [(none)]> FLUSH PRIVILEGES;
MariaDB [(none)]> \q

Do not forget to replace 'your-password' with a strong password.

5. Install Apache2 Web Server

Install Apache2 web server

[user]$ sudo apt-get install apache2

6. Install PHP

Install PHP and required PHP modules

To install the latest stable version of PHP version 5 and all necessary modules, run:

[user]$ sudo apt-get install php5 libapache2-mod-php5 php5-mcrypt php5-mysql php5-gd

7. Download and extract Mahara

Download and extract the latest version of Mahara on your server:

[user]$ sudo cd /opt && wget https://launchpad.net/mahara/16.04/16.04.1/+download/mahara-16.04.1.zip
[user]$ sudo unzip mahara-16.04.1.zip
[user]$ sudo mv mahara-16.04.1 /var/www/html/mahara
Create Mahara’s upload directory
[user]$ sudo mkdir /var/www/html/mahara/upload/

8. Configure Mahara

Create Mahara’s config.php

In the Mahara ‘htdocs’ directory there is config-dist.php file. Make a copy of this called config.php.

[user]$ cd /var/www/html/mahara/htdocs/
[user]$ sudo cp config-dist.php config.php

Open the config.php and make the necessary changes where appropriate.

[user]$ sudo nano config.php
$cfg->dbtype   = 'mysql';
$cfg->dbhost   = 'localhost';
$cfg->dbport   = null;
$cfg->dbname   = 'mahara';
$cfg->dbuser   = 'maharauser';
$cfg->dbpass   = 'your-password';
$cfg->dataroot = '/var/www/html/mahara/upload/';

All files have to be readable by the web server, so we need to set a proper ownership

[user]$ sudo chown www-data:www-data -R /var/www/html/mahara/

9. Configure Apache Web Server

Create a new virtual host directive in Apache. For example, create a new Apache configuration file named ‘mahara.conf’ on your virtual server:

[user]$ sudo touch /etc/apache2/sites-available/mahara.conf
[user]$ sudo ln -s /etc/apache2/sites-available/mahara.conf /etc/apache2/sites-enabled/mahara.conf
[user]$ sudo nano /etc/apache2/sites-available/mahara.conf
Then, add the following lines:
<VirtualHost *:80>
ServerAdmin admin@yourdomain.com
DocumentRoot /var/www/html/mahara/htdocs/
ServerName your-domain.com
ServerAlias www.your-domain.com
<Directory /var/www/html/mahara/htdocs/>
Options FollowSymLinks
AllowOverride All
Order allow,deny
allow from all
</Directory>
ErrorLog /var/log/apache2/your-domain.com-error_log
CustomLog /var/log/apache2/your-domain.com-access_log common
</VirtualHost>

10. Restart and Verify

Restart the Apache web server for the changes to take effect:

[user]$ sudo service apache2 restart

Open your favorite web browser, navigate to http://your-domain.com/ and if you configured everything correctly the Mahara installer should be starting.

Read More



No guest machines present libvirtd - Fix it now


This article covers how to troubleshoot and fix No guest machines present libvirtd for our customers. 

The virsh program is the main interface for managing virsh guest domains. The program can be used to create, pause, and shutdown domains. 

It can also be used to list current domains. Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes).

The libvirt daemon is successfully started, but no guest virtual machines appear to be present.


There are various possible causes of this problem.

Performing these tests will help to determine the cause of this situation:

1. Verify KVM kernel modules

Verify that KVM kernel modules are inserted in the kernel:

$ lsmod | grep kvm

If you are using an AMD machine, verify the kvm_amd kernel modules are inserted in the kernel instead, using the similar command lsmod | grep kvm_amd in the root shell.

If the modules are not present, insert them using the modprobe <modulename> command.

Note: Although it is uncommon, KVM virtualization support may be compiled into the kernel. In this case, modules are not needed.

2. Verify virtualization extensions

Verify that virtualization extensions are supported and enabled on the host:

# egrep "(vmx|svm)" /proc/cpuinfo

Enable virtualization extensions in your hardware's firmware configuration within the BIOS setup.

3. Verify client URI configuration

Verify that the URI of the client is configured as desired:

# virsh uri


How to fix No guest machines present #libvirtd #error:

After performing these tests, use the following command to view a list of guest virtual machines:

# virsh list --all

Read More



Benefits of Data Warehouse in Business Organization


This article covers the Advantages of Data Warehouse. 

#Data #warehousing improves the speed and efficiency of accessing different data sets and makes it easier for corporate decision-makers to derive insights that will guide the business and marketing strategies that set them apart from their competitors. Improve their bottom line.

Unlike a database, which is focused on users inputting data, a data warehouse is architected for decision-making, ad hoc queries and analytics. Thus, enabling queries to be performed without any impact to your company's operational database.


A data warehouse is a type of data management system that is designed to enable and support business intelligence (BI) activities, especially analytics. Data warehouses are solely intended to perform queries and analysis and often contain large amounts of historical data.


A data warehouse can help support business needs, such as the ability to consolidate financial results within a complex company that uses different software for different divisions.


Benefits of a Data Warehouse:

1. Delivers enhanced business intelligence.

2. Saves times.

3. Enhances data quality and consistency.

4. Generates a high Return on Investment (ROI).

5. Provides competitive advantage.

6. Improves the decision-making process.

7. Enables organizations to forecast with confidence.

8. Streamlines the flow of information.


The key characteristics of a data warehouse are as follows:

1. Some data is denormalized for simplification and to improve performance.

2. Large amounts of historical data are used.

3. Queries often retrieve large amounts of data.

4. Both planned and ad hoc queries are common.

5. The data load is controlled.


A data warehouse is subject oriented because it provides information around a subject rather than the organization's ongoing operations.


Data warehouses will help you make better, more informed decisions for many reasons, including: 

1. Improved business intelligence

2. When you integrate multiple sources, you make decisions based on ALL of your data. 

3. Timely access to data: Quickly access critical data in one centralized location.

Read More



Difference between BACPAC and DACPAC - More insight


This article covers more information about BACPAC and DACPAC and the difference between BACPAC and DACPAC.
A BACPAC file is a ZIP file with an extension of BACPAC containing the metadata and data from the #database. A BACPAC file can be stored in Azure Blob storage or in local storage in an on-premises location and later imported back into Azure SQL Database, Azure SQL Managed Instance, or a SQL Server instance.
DACPAC = Data Tier AppliCation Package. DACPAC is a single file which contains database model i.e. all files represent database objects. It's a binary representation of database project compatible with SSDT. The name comes from an extension of these files.
Once you extract the contents of the #DACPAC file, you'll see there are four different XML files within it.
These XML files do not contain any data from the database.
The database is scripted out only with the model information.

To import from a #BACPAC file into a new single database using the Azure portal:
1. Open the appropriate server page and then, on the toolbar, select Import database.
2. Select the storage account and the container for the BACPAC file and then select the BACPAC file from which to import.

Data tier controls the servers where the information is stored;
1. It runs a relational database management system on a database server or a mainframe and contains the computer data storage logic.
2. The data tier keeps data independent from application servers or processing logic and improves scalability and performance.

To import a .BAK file into #SQL Server:
1. Open #SSMS and click on Connect.
2. First let us go with Bak File importing.
3. Check the Device Button and Click on it.
4. Click on Add Button, choose the Appropriate bak file and then click on Ok.

Read More



Use Nmap to Scan Open Ports - How to


This article covers how to use Nmap to Scan Open Ports. Nmap is the world's leading port security network scanner. The Nmap hosted security tool can help you determine how well your firewall and security configuration is working.

How would you tell Nmap to scan all ports?
By default, Nmap scans the 1,000 most popular ports of each protocol it is asked to scan.
Alternatively, you can specify the -F (fast) option to scan only the 100 most common ports in each protocol or --top-ports to specify an arbitrary number of ports to scan.

The OS and Service scanning options are helpful for scanning a particular port or service to get more information.
If a service is running on a non-default port, it might be by design – or it might suggest there is a security breach.
Ports often have a default usage. Most ports under 1000 are dedicated and assigned to a specific service.

What file does Nmap use to determine which ports to scan?
Nmap needs an nmap-services file with frequency information in order to know which ports are the most common.

Malicious ("black hat") hackers (or crackers) commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.

Read More



Install OpenBSD As Guest Operating System using KVM virt-install


This article covers how to install OpenBSD as guest operating while using KVM. OpenBSD is well know for focus on security features such as Memory protection, cryptography, randomization and much more in default base installation.
virt-install provides the option of supporting graphics for the guest operating system installation. This is achieved through use of QEMU.

virt-install is a command line tool for creating new KVM, Xen, or Linux container guests using the libvirt hypervisor management library
The virt-install tool provides a number of options that can be passed on the command line.

To see a complete list of options run the following command:
# virt-install --help

Read More



Back Pressure in Exchange server


This article will guide you on Back Pressure which is a feature that helps the Transport Service monitor system resources and stop message submission when it runs low on resources. 

Microsoft Exchange Transport Service Resource Monitoring.

Microsoft Exchange enables email to be delivered directly to a server. 

It works by sending the emails back to your individual workstations in which your staff can access. 

Small and medium-sized companies can achieve three benefits from using Microsoft Exchange. 

Centralize emails so that they can be backed up.


Exchange server roles:

1. Mailbox servers contain the transport services that are used to route mail.

2. Mailbox servers contain mailbox databases that process, render, and store data.

3. Mailbox servers contain the Client Access services that accept client connections for all protocols.

Read More



SSH Connection Refused


This article will guide you on how to resolve SSH connection error occur.

Sometimes while connecting to SSH servers, users often encounter "Connection refused" error by port 22. It happens because of several reasons like SSH service is not running, the port is blocked by the firewall, or the server is using a different port. 

It can also occur because of the IP conflict issue.

To SSH on Ubuntu, Open your terminal either by using the Ctrl+Alt+T keyboard shortcut or by clicking on the terminal icon and install the openssh-server package by typing: sudo apt update sudo apt install openssh-server. Once the installation is completed, the SSH service will start automatically.

To resolve ssh connection refused:

1. Install an SSH tool such as OpenSSH on the server you want to connect to using the sudo apt install openssh-server command. 

2. If your firewall is blocking your SSH connection. Disable the firewall rules blocking your SSH connection by changing the destination port's settings to ACCEPT.

Read More



ACK scan DOS attack


This article will guide you on how the ACK scan DOS #attack works as well as methods to mitigate this. 

A port scan can help an attacker find a weak point to attack and break into a computer system. 

Just because you've found an open port doesn't mean you can attack it. But, once you've found an open port running a listening service, you can scan it for vulnerabilities.

Denial of service attack (DOS) is an attack against computer or network which reduces, restricts or prevents accessibility of its system resources to authorized users. The network of Bots is called botnet.

A Fraggle Attack is a denial-of-service (#DoS) attack that involves sending a large amount of spoofed UDP traffic to a router's broadcast address within a network. 

It is very similar to a Smurf Attack, which uses spoofed ICMP traffic rather than UDP traffic to achieve the same goal.

Common DoS attacks:

1. Buffer overflow attacks – the most common DoS attack.

2. ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine.

3. SYN flood – sends a request to connect to a server, but never completes the handshake.

To prevent port scan attacks:

i. Install a Firewall: A firewall can help prevent unauthorized access to your private network.

ii. TCP Wrappers: TCP wrapper can give administrators the flexibility to permit or deny access to the servers based on IP addresses or domain names.

Read More



AWS security vulnerabilities


This article will guide you on how to create a virtual machine using #Lightsail in AWS.

AWS Cloud Compliance enables you to understand the robust controls in place at AWS to maintain security and data protection in the cloud. 

The IT infrastructure that AWS provides to its customers is designed and managed in alignment with best #security practices and a variety of IT security standards.

AWS WAF is a web application #firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources.

List of AWS Limitations:

1. #AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Read More



Roundcube empty startup greeting


This article will guide you on methods to resolve #Roundcube empty startup greeting error which occurs due to many reasons which include improper configuration of SSL, network #problem, firewall #error and so on.

Roundcube is a webmail client with strong security features and extensive customization options from its plugin repository.

It is important to set Roundcube config file as follows:

$config['default_host'] = 'imaps://domain.tld';

// TCP port used for IMAP connections

$config['default_port'] = 993;


To fix cPanel Roundcube Webmail "An error occurred":

This error indicates a potentially corrupt index file. 

1. establish an SSH session with the server and navigate to:

/home/<username>/mail/<domain name>/<email account name>/

2. Find dovecot.index and rename it to dovecot.index.bak.

Read More



Customer Service Strategy Best Methods


This article will guide you on the customer service strategies that we follow to refresh the existing one based on some aspects.

The Purpose of the Service Strategy is to define the perspective, position, plans, and patterns that a service provider needs to be able to execute to meet an organization's #business Outcomes.

There are five major aspects of service design. These are service solutions, management information systems and tools, technology and management architectures and tools, processes and measurement systems.

Winning #Customer #Service #Strategies:

1. Optimize Agent Training. Invest in an agent training program to ensure your agents are empowered and prepared to meet customer needs.

2. Choose the Right Tools..

3. Improve Call Center KPIs..

4. Personalize the Experience..

5. Make Data-Drive Decisions..

6. Optimize Quality Assurance (QA).

7. Offer Omnichannel Support.

Read More



NTP amplification attack


This article will guide you on steps to mitigate this #NTP amplification attack. An Amplification Attack is any attack where an attacker is able to use an amplification factor to multiply its power. Examples of #amplification #attacks include Smurf Attacks (ICMP amplification), Fraggle Attacks (#UDP amplification), and DNS Amplification.

DNS flood is a type of Distributed Denial of Service (#DDoS) attack in which the attacker targets one or more Domain Name System (#DNS) servers belonging to a given zone, attempting to hamper resolution of resource records of that zone and its sub-zones.

To harden your DNS server:

1. Audit your DNS zones. First things first.

2. Keep your DNS servers up-to-date.

3. Hide BIND version.

4. Restrict Zone Transfers.

5. Disable DNS recursion to prevent DNS poisoning attacks.

6. Use isolated DNS servers.

7. Use a DDOS mitigation provider.

8. Two-Factor Authentication.

Read More



Reporting services configuration manager


This article will guide you on how to setup reporting services configuration manager. Report Manager is Web based interface that can be used to perform different tasks such as. Administer the Report Server,View the Reports and Manager the Report, and so on. You need to have the URL to access the Report Server by using Report Manager interface.

SQL Server Reporting Services (#SSRS) is a reporting #software that allows you to produce formatted reports with tables in the form of data, #graph, images, and charts. These reports are hosted on a server that can be executed any time using parameters defined by the users.

Report server items are always stored in libraries or in a folder within a library. 

When you access the SharePoint site, you see the Browse page and the Library Tools tab.

In #Reporting Services, URLs are used to access the Report Server Web service and the web portal. A test link of the URL appears on page when you define the URL so that you can immediately confirm that the settings you specified result in a valid connection.

To connect to Reporting Services Configuration Manager:

1. Click Start, then click #Programs, then click #Microsoft #SQL Server, then click Configuration Tools, and then click Report Server Configuration Manager. 

2. The Report Server Installation Instance Selection dialog box appears so that you can select the report server instance you want to configure.

Read More



Improve sales with customer service


In summary, we saw how to improve sales with reliable customer service. Along with some of the reasons to invest on customer service.

Basically, good customer service will always increase the likelihood of making a sale. It's not always guaranteed, and pressuring customers to buy won't get you anywhere. 

But keeping the human-to-human sentiment in mind will help people feel like they're not just there to make you money.

Providing excellent customer service means going the extra mile in making sure a customer is happy and satisfied with a company's products or services. 

It also involves providing service to a customer in a timely, pleasant manner.

To to deliver great customer service:

1. Know your product.

2. Maintain a positive attitude.

3. Creatively problem-solve.

4. Respond quickly.

5. Personalize your service.

6. Help customers help themselves.

7. Focus support on the customer.

8. Actively listen.

Read More



Copy rds snapshot to s3


This article will guide you on resolve common rds #error. Basically, the process to copy rds snapshot to s3 is simple and creates and saves backups of the DB instance in the Amazon S3 bucket. 

Amazon Relational Database Service (#Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups.

RDS creates a storage volume snapshot of your #DB instance, backing up the entire DB instance and not just individual databases. RDS saves the automated backups of your DB instance according to the backup retention period that you specify.

To copy a #RDS snapshot from one region to another:

1. Create a #snapshot of your RDS.

2. In your newly created snapshot go to Actions -> Copy Snapshot.

3. Click orange View snapshots in destination region.

4. In the target region's snapshots table find your copied snapshot, and wait until status "Copying" becomes "Completed".

5. Select the snapshot, click Actions -> Restore Snapshot.

Read More



WHM Mail Queue Manager


This article will guide you on use different features available in the #WHM Mail Queue Manager. Basically, the #Mail #Queue Manager feature in WHM is a handy tool that allows us to view, delete, and attempt to deliver queued emails that have not yet left the server. 

Postfix is a free and open-source mail transfer agent (#MTA) that routes and delivers electronic mail.

postfix flush helps to Flush queued mail.

This command will attempt to redeliver all queued mail. Use the command sparingly, multiple flushes will impact the overall performance of your mail server

To check my mail queue in cPanel:

i. Log into WHM.

ii. Go to Main >> Email >> Mail Queue Manager.

iii. You can click on the message to see the details.

Read More



Install Vesta control panel in Ubuntu


This article will guide you on easy steps to install Vesta control panel in #Ubuntu. VestaCP is a control panel for Linux with many features that facilitate the administration of a #server. 

Vesta Development team provides an installer script that automates setting up of Vesta hosting control panel on Ubuntu / Debian and RHEL based Linux distributions. Login to your Ubuntu / #Debian system and ensure the system is updated. Download #Vesta installer. Run install with sudo if you're logged in as standard user.

To install vestaCP on Ubuntu:

1. # Connect to your server as root via #SSH

ssh root@your.server

2. # Download installation script

curl -O http://vestacp.com/pub/vst-install.sh

3. # Run it

bash vst-install.sh

To change my VestaCP port:

i. conf file and change the port that NGINX listens on from 8083 to 2083 (or the port you chose to use). listen 2083; 

ii. Once the port has been changed, press CTRL+X , followed by y , and then hit enter to save your changes. 

iii. The final step is removing the firewall entry for the previous port we were using.

Read More



Modify MSSQL port


This article will guide you on the right steps to change the #MSSQL port using #SQL Server Configuration Manager. 

You can check TCP/IP connectivity to SQL Server by using telnet. For example, at the command prompt, type telnet 192.168. 0.0 1433 where 192.168. 0.0 is the address of the #computer that is running SQL Server and 1433 is the port it is listening on.

To specify a port in SQL Server Management Studio (#SSMS)?

1. You'll need the SQL Server Configuration Manager. 

2. Go to Sql Native Client Configuration, Select Client Protocols.

3. Right Click on #TCP / #IP and set your default port there.

Read More



Cloudflare error 1014 CNAME Cross-User Banned


This article will help to resolve #Cloudflare #error 1014 by applying different methods. By default, Cloudflare prohibits a DNS CNAME record between domains in different Cloudflare accounts. #CNAME records are permitted within a domain (www.example.com CNAME to api.example.com) and across #zones within the same user account (www.example.com CNAME to www.example.net).

To fix error 520:

1. Start by logging into Cloudflare. Then, find your site on the list and click on it. Click on your listed site.

2. Next, click on the #DNS tab, then on the orange cloud under the Proxy status section in the table. 

You'll know Cloudflare was disabled because the cloud will have turned gray.

Read More



Enable firewalld in Centos 7 How to do it


This article will guide you on steps to enable firewalld on #centos 7 servers for our customers. The firewall is one of the most important features of webservers. The #firewalld supports both IPv4 and IPv6 #firewall #settings.

Never run the iptables service and FirewallD service at the same time! The #iptables service is now provided by a separate package called iptables-services: Stop and disable the firewalld service first. # systemctl stop firewalld.

The firewalld daemon manages groups of #rules using entities called "zones". Zones are basically sets of rules dictating what traffic should be allowed depending on the level of trust you have in the networks your #computer is connected to.

To use FirewallD:

1. Installing and Managing FirewallD.

2. To start the service and enable FirewallD on boot: sudo systemctl start firewalld sudo systemctl enable firewalld.

3. Check the firewall status.

4. To view the status of the FirewallD daemon: sudo systemctl status firewalld.

5. To reload a FirewallD configuration: sudo firewall-cmd --reload.

Read More



Install NET framework 4.8 on windows server 2016


This article will guide you on how to #install .NET framework 4.8 on windows server 2016. 

Can't install .NET Framework 3.5 #Windows 10 0x800f0954?

NET Framework 3.5 or Any Optional #Feature. If the error 0x800f0954 occurs installing optional Windows features, it may be because the system is unable to access the Windows Update server. This is especially true in case of domain-joined computers which is configured to downloads updates from a WSUS server.

By using the Windows server 2016, we can install . NET Framework 3.5 which can be easily installed through Server Manager. 

i) Open the 'Server Manager' and navigate to the 'Manage' and then select 'Add Roles and Features'. 

ii) Click next to 'Features' section and select the option '.

To install Microsoft . #NET Framework 3.5. 1 on Windows Server 2012 R2:

1. Open Server Manager and select Features.

2. Select Add roles and features to launch the Add Roles and Features wizard.

3. In the Add Roles and Features wizard, click.

4. In the Confirm Installation Selections dialog box, click Install.

When you try to install the Microsoft . NET Framework 4.7 on a #computer that runs Windows 7 Service Pack 1 (SP1), Windows Server 2008 R2 SP1, or Windows Server 2012, the setup is blocked and cannot continue. 

This issue occurs when the computer does not have the update for D3DComplier (D3DCompiler_47. dll) installed.

Read More



Windows Live Mail Error 0x800ccc0e


This article will guide you on steps to fix #Outlook #Error #0x800ccc0e. Usually, this error occurs due to bad #email settings or because of minor problems with the email server or internet connection. Also, the customer may experience this error while receiving the mail on the email #client.

Try to run Windows Live Mail as Administrator in compatibility mode. Try to re-configure the Windows Live Mail account. Remove the existing WLM account and create a new one. Try reinstalling Windows Essentials 2012 on your Windows 10.

To get rid of Windows Live Mail error:

1. Open your Windows Live mail program.

2. Select the Home tab at the top right of your Windows Live Mail.

3. Click the Outbox to the left. Find any emails that are not sending out.

4. Once you send the email again, you can delete the email in the Outbox. 

The error will go away after the sent email is deleted.

Read More



Transfer Files with Rsync on Windows using SSH connection


This article will guide you on steps to perform Rsync from Windows to Linux over SSH.

#Rsync can use #SSH as a secure transport agent. Make sure rsync is installed by opening a #terminal session and typing rsync --version on each machine.

Most #Linux distributions can now read the FAT32 or NTFS disk formats natively, so you could copy your files to an external hard drive formatted in Windows with either of those file systems, which will then allow you to read the data back easily in Linux.

1. cwRsync is an implementation of rsync for Windows. 

2. rsync uses a #file #transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. 

3. #cwRsync can be used for remote file #backup and #synchronization from/to Windows systems.

Read More



Configure Reporting Services in SQL Server


The article will guide you on the steps to follow to configure #reporting services after renaming the #SQL server. Also , you will learn how to rename the SQL server instance. 

To Configure #Report Server After Renaming SQL Server #Instance:

1. Go to #Database Setup page. 

2. Enter SQL Server name in Server Name and then click Connect. 

3. If Reporting Services is configured using the server name, you must update the database connection information whenever the server name is changed.

To change the service account for SQL Server Reporting Services:

i. Open Reporting Services Configuration Manager, and then connect to the instance of SQL Server Reporting Services.

ii. Click #Microsoft service Identity on the left pane.

iii. Change the account and the password in the Account text box and the Password text box, and then click Apply.

Read More



Improve SQL Server Bulk Data Import Performance


This article will guide you improve #bulk #data #import #performance. The BULK INSERT command is much faster than bcp or the data pump to perform text file import operations, however, the BULK INSERT statement cannot bulk copy data from #SQL Server to a data file. Use the bcp utility instead of DTS when you need to export data from the SQL Server table into a text file.
To Speed up SQL Bulk Insert with #transactions:
1. Declare the variables that store the number of desired items ( @items ), the size of the chunks( @chunk_size ) and the counter of the number of executed inserts( @counter )
2. Open the first transaction and initialize the while loop.

Read More



Pros and Cons of Outsourcing Customer Service


In this article, you will see the different pros and cons to #outsourcing #customer #service. However, each case is unique. We should know best if outsourcing customer service could be the right way.

Outsourcing to someone who specialises in delivery of that part of your process, and therefore has up-to-date systems, technology and staff, can improve the quality of that service by reducing costs, improving final output quality or freeing up your internal staff for other roles they could be performing.

However, the flexible solutions allow you to consider the best-case scenario. Consider all possibilities and pick a scaleable, high-quality solution that best fits the business profile.

Benefits of outsourcing customer service:

1. Focus on core tasks.

2. Lower costs.

3. Promote growth.

4. Maintain operational control.

5. Offer staffing flexibility.

6. Provide continuity and risk management.

7. Develop internal staff.

Read More



Could not load file or assembly Microsoft ReportViewer WebForms


This article will guide you on ways to resolve Could not load #file or #assembly 'Microsoft.ReportViewer.WebForms' #error occurs when #ReportViewer files are missing from the #bin folder.
You need to reference both Microsoft.ReportViewer.WebForms and Microsoft.ReportViewer.Common and set the CopyLocal property to true. This will result in the dll's being copied to our bin #directory (both are necessary).

Read More



Lets encrypt new auth status 429 error


This article will guide you on methods to troubleshoot and fix 429 error which occurs due to creation of multiple #SSL #certificates for a #domain. 

1. 429 means you went over the rate #limits. 

2. You issued 5 certificates in the last week.  This is why you get a #429 answer.

3. You need to wait two days to get another one. do you have access to the certificates you issued?

Read More



SQL server Error 1053


This article will guide you on different methods of fixing error #1053 SQL server which occurs when attempting to pause or stop the SQL Server service in the #Windows Services Console. 

The most common cause of this error is when one of the files needed by sql server was not on a shared resource, and Sql Server, once failed to the other node, couldn't access it.

The #SQL #Server Agent error log may include a path or a file name that is not correct.

In this case, verify that the path and file name for SQLAgent.out is valid:

1. In SQL Server Enterprise Manager, expand the Management folder.

2. Right-click SQL Server Agent, and then click Properties.

3. Under Error Log, make sure that the path that is specified next to File Name is valid.

4. Make sure that the file name is SQLAGENT.out.

Read More



How to create bacpac file from SQL server


This article will guide you on how to export an existing #database into a #BACPAC file is through #SSMS. A bacpac is a dacpac + data, while a dacpac only contains the schema of the database.

To create a Bacpac file:

a. To #export a database using the Azure portal, open the page for your database and click Export on the toolbar.

b. Specify the BACPAC filename, select an existing Azure storage account and container for the export, and then provide the appropriate credentials for access to the source database.

c. Click OK.

To import from a BACPAC file into a new single database using the Azure portal:

1. Open the appropriate server page.

2. On the toolbar, select Import database. 

3. Select the storage account and the container for the BACPAC file and then select the BACPAC file from which to import.

Read More



NFS Data ISO and Export Storage Domain to oVirt RHEV


This article will guide you on steps to add Export Storage #Domain & #NFS #Data to an oVirt/RHEV environment. NFS is the most common protocol for sharing #files between #Unix #systems over a #network. NFS servers export directories from their local hard disks to NFS clients, which mount them so that they can be accessed like any other #directory.

To modify etc #exports:

1. Open the /etc/exports file in a text editor on an NFS client that has root access to the storage system.

2. Make your changes.

3. Save the file.

Read More



Install Cockpit Web Console on Ubuntu


This article will guide you on the steps to #install the #Cockpit web console on #Ubuntu. Basically, Cockpit web console provides a #graphical overview of the core components and overall status of a #Linux #machine.

To access cockpit in Linux:

1. Open the Interface by Opening a web #browser and enter the server's IP address with port 9090 in the address bar. If the web browser is on the Cockpit server, open localhost:9090 or hostname:9090.

2. Log into the Cockpit interface with the same user name and password that you would normally use to log into the #system.

Read More



Deploying Kohana PHP application on Debian


This article will guide you on how to deploy Kohana on #Debian. Kohana offers powerful event handling, multiple session drivers, simple database abstraction using #SQL helpers, and libraries that transparently handle external APIs. Its generous BSD license lets developers use and modify the framework to build commercial applications.

The #AppDynamics platform provides full, code-level visibility into the performance of your PHP application built on the Kohana framework. With rapid installation and the most scalable #architecture in the industry, AppDynamics solutions help you deploy your #applications more quickly and with more confidence.

Read More



Monitor Azure virtual machines with RDP


This article will guide you on how to monitor virtual #machines #RDP using Azure.
You can View performance directly from an Azure VM:
1. In the #Azure portal, select Virtual Machines.
2. From the list, choose a #VM and in the #Monitoring section choose Insights.
3. Select the #Performance tab.

Read More



How to set up Amazon S3 through WHM


This article will guide you on how to configure Amazon S3 via WHM by accessing the 'Backup Configuration'.
To configure your #backups:
i. Login to #WHM and access "Backup Configuration >> Additional Destinations".
ii. Select #Amazon #S3 and click “Create new destination”.

Read More



Export data into Excel in Ionic Application using XLSX


This article will guide you on the steps to #export data into excel file using #XLSX.

How do I export #data from angular to excel?

Environment setup involves;

Step 1: Downloading the XLSX Module.

Step 2: Downloading the File-Saver Module.

Step 3: Creating a Download #Excel button.

Step 4: Writing exportexcel() method.

Step 5: HTML #Table from which the data will be downloaded.

Read More



Send NXLogs with SSL TLS to Nagios Log Server


This guide will guide you on how to send NXLogs with SSL/TLS to #Nagios #Log #Server. Encryption ensures that the traffic between the #Windows machine and Nagios Log Server is not sent in plain text.

Read More



Backup Outlook PST files


This article will guide you on how to perform #backup outlook PST files containing messages and all other Outlook data that is saved on the system which should be backup regularly.

#pst files created by using #Outlook 2010 are saved on your computer in the #Documents\Outlook Files folder. If you are using #Windows XP, these files are created in the My Documents\Outlook Files folder.

Read More



Cloning existing KVM virtual machine images on Linux


This article will guide you on how to use the virt-clone command which provides a number of options to clone a #KVM #VM. You can use the virt-sysprep if you need to clone the VM and make/reset anything inside the guest #OS.

Read More



Testing RPC ports with PowerShell


This article will guide you on how to go about pinging available RPC ports with PowerShell and #Sysinternals tools and we can test #RPC #ports with #PowerShell.

In #Windows, do this by typing "cmd" in the search box in the Start Menu and clicking the command prompt icon. In the command prompt window, type "telnet" followed by a space, then an IP address or domain name followed by another space, and then the port number.

Read More



Install and Configure Free VMware Hypervisor


This article will guide you on the process to Configure Free VMware Hypervisor, to create a virtual #machine, and install a guest operating system.

“VMware vSphere Hypervisor #VMware #vSphere #Hypervisor is a free product that provides a simple and easy way to get started with #virtualization at no cost.

Read More



Process to recover a permanently deleted email in Outlook


This article will guide you on the steps to retrieve permanently deleted emails from Outlook and an Outlook #PST. We can recover deleted emails in Outlook from the Deleted Items folder. 

If you purge an item from the “Deleted Items” folder, you can find it in the “Recoverable Items” folder. This is where #Outlook keeps permanently deleted files, #emails or events.

In Outlook, click the #Folder tab, and then click #Recover Deleted Items. Select the item you want to recover and click Recover Selected #Items.

Read More



Steps to deploy DACPAC with SSMS


This article will guide you on the steps to deploy DACPAC which involves registering a DAC instance by storing the DAC definition in the #msdb system database. 

A DAC is a self-contained unit of #SQL Server #database deployment that enables data-tier developers and database administrators to package SQL #Server objects into a portable artifact called a #DAC package, also known as a #DACPAC.

Read More



Install and configure Grafana on CentOS 7


This article will guide you on the steps to #install #Grafana on #CentOS 7 which is a #visualization and #analytics #monitoring software. Grafana is Free and Open Source which Runs on all major #OS operating systems.

Read More



IIS Security for Sites Steps for server hardening


This article will guide you on the process to #secure sites in IIS to prevent site infections or defacing on a #Windows Server include poor file security or poor #configuration. 

In conclusion, the modular nature of #IIS allows for more granular control over web server resources and #security. However, this can either make your #web #applications more or less secure—depending on the person or group responsible for security.

Read More



Outsourcing server administration Best Services


In conclusion, #outsourcing server #administration provides 24×7 server monitoring by an #Expert Team at an #affordable cost. We specialize on #Hosting #Tech #Support, IT Infrastructure Management, IT Infrastructure Support, #Linux Server Managed #IT Services, #Outsourced Web Hosting Support, Server Management, Server Monitoring, Server Support, System Administration, #Whitelabel #Helpdesk Support

Read More



VPN Error 806 Steps to fix it


This article will guide you on the steps to resolve #VPN #error 806 which occurs when the connection between our #Windows #computer and the VPN server has been established but the VPN remains incomplete. 

Read More



Install Prometheus Network Monitoring Server on CentOS 7


#Prometheus collects metrics from targets by scraping 3metrics #HTTP endpoints. Since Prometheus exposes #data in the same manner about itself, it can also scrape and monitor its own health. 

This article will guide you on the steps to perform #installation of Prometheus on #CentOS 7 along with the method used for the #setup.

Read More



Invalid State of a Virtual Machine on VMWare ESXi


This article will guide you on the steps to resolve the Invalid State of a Virtual Machine on VMWare #ESXi error which relates to #orphaned virtual machines.

A virtual machine can show up as invalid or orphaned in these situations. After a vMotion or #VMware DRS migration. After a VMware HA #host failure occurs, or after the #ESX host comes out of maintenance mode. A virtual machine is deleted outside of vCenter Server. #vCenter Server is restarted while a migration is in progress.

Read More



Adding Multi Language Translation Feature in Ionic Application using ngx-translate


This article will guide you on the steps to add a #multi-language translation feature in #Ionic Application using #NGX-translate. This is possible by first creating an ionic app. Next, installing the Language Translation library. Then adding the language files for each language. After that, we create #languageConfig service to have translation-related methods in one place. Finally, we use translation pipes to translate text into HTML pages.

Read More



After hours tech support Common issues and how to prevent them


After Hours Tech Support Help Desk is designed to meet your immediate technology support needs during scheduled outside of regular business hours.  We encourage you to use this service for any unexpected technology support troubleshooting needs that may arise.

Read More



247 hosting remote support


24/7 hosting support is offered by every web host these days. But very often poorly implemented support operations does more damage then good. Today we’ve seen how you can stand out from the crowd by delivering 24 hour personalized phone support that gives you a powerful marketing edge, and doesn’t cost you a lot of money.

Read More



24 7 365 hosting tech support


Whether you need technical support at any time of the day, With Ibmi Media, we give support remotely to our Customers. Also, we offer technical support, cloud computing, and website development and hosting support.

Our support team is available to assist you 24/7/365 with any hosting or WordPress problem. Get world-class support when you need it.

Read More



RAM Disk in Nagios XI


This article will guide you on how to make use of a RAM disk can provide huge performance improvements on larger systems or any system where check latencies are greater than 2 seconds.

Read More



Redis Latency Monitoring How to enable it


This article will guide you on the aspects of Latency Monitoring and how it helps Redis which helps the user to check and troubleshoot possible latency problems.

Read More



Solve Oversized OST File issues in Outlook


This article will guide you on the different methods to fix an over-sized OST file which affects data accessibility and synchronization.

Read More



Configure Postfix as a Send Only SMTP Server


This article will guide you on how to perform configuration of Postfix as a Send Only SMTP Server which involves a series of steps that include installing postfix and modifying the configuration file.

Read More



PHPMailer smtp error could not authenticate


This article will guide you on how to fix PHPMailer error "smtp error: could not authenticate" which generally occurs when the application can’t establish an SMTP connection to the mail server. This is experienced when users send emails via PHPMailer using SMTP authentication.

Read More



Microsoft Outlook conflicting or unsupported encryption capabilities


This article will help to fix "Outlook conflicting or unsupported encryption capabilities" by simply turning off e-mail address matching for certificates and it depends on the version of Outlook you are running.

Read More



Outlook Error 0x8004210b How to fix it


This article will guide you on how to solve "Outlook Error 0x8004210b" which occurs in the process of installation, Windows shutdown, or while installing the Windows operating system.

Read More



TigerVNC Server installation and configuration


This article will guide you on how to install TigerVNC server CentOS 7.

Read More



How to use netsh to configure port forwarding on windows


This article will guide you on how to configure port forwarding on windows using netsh in order to redirect an incoming TCP connection from the local TCP port to any other port number.

Read More



How to resolve apache not listening on port 443


This guide will help you to solve Apache not listening on port 443 which occurs as a result of Incorrect configuration settings, firewall restrictions and other factors.

Read More



Cannot resolve host address Openvpn


This article will help to fix OpenVPN error "cannot resolve host address" which generally happens when there is a firewall restriction or as a result of configuration errors in the OpenVPN client.

Read More



VirtualBox installation on CentOS 7


This article will help you to install VirtualBox on Centos. VirtualBox Software helps to create and run virtual machines on a single hardware machine.

Read More



How to install and configure Fail2ban on Ubuntu 16.04


Improving Server security by installing Fail2ban on your server to help protect all kinds of services such as sshd, httpd from brute force attacks.

Read More



Our DigitalOcean Active Server Support service


We offer Emergency support and Server management services to help your monitor your infrastructure and quickly resolve and issues that could disrupt your services.

Read More



How to fix ModSecurity Error Failed deleting collection


This article will show you exactly what we did to fix ModSecurity error: collections_remove_stale: Failed deleting collection.

Read More



Solve rsync error code 19


Best method of fixing Rsync error code 19.

Read More



Fix Docker port is already allocated


How we solved Docker error port is already allocated in any Linux and Windows Operating System.

Read More



Fix SQL server error 10048


SQL server error 10048 occurs when the SQL server is about to start. This could be a frustrating experience for the user.

Read More



Fix SQL server error 772


SQL server error 772 occurs when an outdated version of ODBC drivers is used and in other cases the client might be using Forced protocol Encryption.

Read More




For Linux Tutorials

We create Linux HowTos and Tutorials for Sys Admins. Visit us on LinuxAPT.com

Also for Tech related tips, Visit forum.outsourcepath.com or General Technical tips on www.outsourcepath.com






Focus on your business, not your servers.

Click Here to Learn More